IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 26 February


Millennials disrupted the system. Gen Z is here to fix the mess Lifeboat News: The Blog

Plurals are known to value compromise, he said, a byproduct of their diversity and comfort with working with peers from different backgrounds. They are also in line to be an adaptive generation. These cohorts tend to come right after disruptive generations that change society in significant ways, such as millennials. When adaptive groups come of age, they take the problems that were brought to light by their predecessors and try to work them out.

In their organized calls for action, the students of Marjory Stoneman Douglas High School could be defining the nations newest generation.


Useful Consumer Review Random Thoughts

Ive had the vast majority of the lights in my apt. controlled remotely (from Emacs, of course) for like a decade. Its a flexible system built on Telldus Telstick receivers and transmitters, and Nexa wall sockets.

But Look at the un-pretty:

Yes, those outlets are fugly. Fortunately quite a few of them are hidden behind furniture, but Ive been on the lookout for prettier solutions. Remote-controlled light bulbs are nice, but most of them use proprietary control systems that seem fiddly and not easy to integrate into my setup. Ikea have released bulbs that show some promise, but the form factors are still very limited, so Ive been biding my time for years waiting for somebody to make something better.




[ANNOUNCE] CVE-2017-15719 - Wicket jQuery UI: XSS in WYSIWYG Editor Open Source Security

Posted by Sebastien Briquet on Feb 25

CVE-2017-15719 - Wicket jQuery UI: XSS in WYSIWYG editor

Severity: High
Versions Affected: <= 6.28.0, <= 7.9.1, <= 8.0.0-M8

Artifacts Affected:

- wicket-jquery-ui-plugins (
- wicket-kendo-ui (com.googlecode.wicket.kendo.ui.widget.editor.Editor)

Description: A security issue as been discovered in the WYSIWYG Editor that
allows an attacker to submit arbitrary JS...


Russia hacked Winter Olympics & framed N.Korea in false-flag attack: US HackRead

By Carolina

On February 9th, 2017, during the opening ceremony of the PyeongChang 2018

This is a post from Read the original post: Russia hacked Winter Olympics & framed N.Korea in false-flag attack: US


Czech President wants Russian hacker Yevgeni Nikulin extradited to Russia instead of US Security Affairs

Czech President Milos Zeman wants the Russian hacker Yevgeni Nikulin to be extradited to Russia instead of the US, he is charged with hacking against social networks and frauds.

Yevgeni Nikulin (29) was requested by the US for alleged cyber attacks on social networks and by the Russian authorities that charged him with frauds.

According to US authorities, the man targeted LinkedIn and Formspring and hacked into the file hosting service Dropbox.

The Russian criminal was arrested in Prague in October 2016 in an international joint operation with the FBI.

The case in the middle of an arm wrestling between Moscow and Washington, the US Government are accusing Russia to have interfered with 2016 Presidential election through hacking.

In May, a Czech court ruled that Nikulin can be extradited to either Russia or the United States, leaving the final decision to the Justice Minister Robert Pelikan.

It is true there have been two meetings this year where the president asked me not to extradite a Russian citizen to the United States but to Russia, the website of the weekly newspaper Respekt quoted Pelikan as saying.

In 2016, Pelikan did not allow to extradite two Lebanese citizens charged by US court with several crimes, including the sale of ground-to-air missiles and cocaine trafficking.

Respekt also quoted Babis, who professes a strong pro-EU and NATO stance, as saying earlier this month he would prefer Nikulin to be sent to the United States, but had no power over the decision. His spokeswoman declined comment....


NRA Gives Award to FCC Chairman Ajit Pai while Facing Public Outcry after Parkland, Florida Attack SoylentNews

We had submissions from three Soylentils with different takes on the NRA (National Rifle Association) and the public response in the wake of an attack at a Parkland, Florida high school.

Public Outcry Convinces National Companies to Cut Ties with NRA

Common Dreams reports:

In the latest sign that the aftermath of the Parkland, Florida tragedy may be playing out differently than the fallout from other mass shootings, several national companies have cut ties with the National Rifle Association (NRA).

[Car rental companies] Alamo, Enterprise, and National--all owned by Enterprise Holdings--announced late on [February 22] that they would end discounts for the NRA's five million members. Symantec, the security software giant that owns Lifelock and Norton, ended its discount program on Friday as well.

The First National Bank of Omaha also said it would stop issuing its NRA-branded Visa credit cards, emblazoned with the group's logo and called "the Official Credit Card of the NRA". The institution is the largest privately-held bank in the U.S., with locations in Nebraska, Colorado, Illinois, Iowa, Kansas, and South Dakota.

Additional coverage on TheHill, MarketWatch, Independent and Politico.

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 25 February


China Sets Stage for Xi to Stay in Office Indefinitely

Via: Reuters: Chinas ruling Communist Party on Sunday set the stage for President Xi Jinping to stay in office indefinitely, with a proposal to remove a constitutional clause limiting presidential service to just two terms in office.


Power Supply Choices Hackaday

Unless you are building a crystal radio or youve finally invented that infinite energy machine, any project you do is going to need some sort of power supply. There was a time when a battery was enough, but these days you probably need some sort of regulation. But there are many kinds to choose. Linear, switching, SEPIC, LDO how do you pick? [Andreas Spiess] has some practical advice in his recent video, which you can see below.

[Andreas] calls the video Voltage Regulator Cheat Sheet and thats an apt name. He covers the major architectures and even points out why you cant always trust the vendors information on certain types of supplies.

Even though it is billed as a cheat sheet, the video also covers a good bit of theory on how the different regulators work and their efficiency and thermal characteristics. He punctuates his theory with practical demonstrations, as always. He even releases a little magic smoke in the name of explaining things.

If you want to look inside a linear regulator, we saw a good teardown of the venerable 7805. We dont suggest it, but the next step up from the resistor [Andreas] shows is a zener diode, a topic we covered last year.


[ANNOUNCE] CVE-2018-1286 - Apache OpenMeetings - Insufficient Access Controls Open Source Security

Posted by Maxim Solodovnik on Feb 25

Severity: Medium

Vendor: The Apache Software Foundation

Versions Affected: Apache OpenMeetings 3.0.0

Description: CRUD operations on privileged users are not password
protected allowing an authenticated attacker to deny service for
privileged users.

The issue was fixed in 4.0.2
All users are recommended to upgrade to Apache OpenMeetings 4.0.2

Credit: This issue was identified by Sahil Dhar of Security Innovation Inc


LLVM / Clang 6.0 Should Be Released Soon With Its Many New Features Phoronix

LLVM 6 is running a few days behind scheduled for its release along with Clang 6 for the C/C++ compiler, but this latest big update to this open-source compiler stack should still be on the ways in the days ahead...


SEC Urges Clearer Disclosures About Cybersecurity Risks SoylentNews

Arthur T Knackerbracket has found the following story:

The US Securities and Exchange Commission on Wednesday issued new guidance on how and when public companies should disclose cybersecurity risks and breaches.

The "interpretive guidance" document (PDF) urges informing investors of risks in a timely fashion, including vulnerabilities that have not yet been targeted by hackers. The guidance also says executives should refrain from trading in the company's stock while in possession of nonpublic information about significant cybersecurity attacks.

The commission, which unanimously approved the updated guidance, believes the document will help "promote clearer and more robust disclosure by companies about cybersecurity risks and incidents, resulting in more complete information being available to investors," SEC Chairman Jon Clayton said in a statement.

Original Submission

Read more of this story at SoylentNews.


Most Users of Exclusive Torrent Site Also Pay For Services Like Netflix or Prime TorrentFreak

Despite a notable move to unlicensed streaming portals, millions of people still use public torrent sites every day to obtain the latest movies and TV shows. The process is easy, relatively quick, and free.

While these open-to-all platforms are undoubtedly popular, others prefer to use so-called private trackers, torrent sites with a private members club feel. Barriers to entry are much higher and many now require either an invitation from someone who is already a member or the passing of what amounts to an entrance exam.

Once accepted as a member, however, the rewards can be great. While public sites are a bit of a free-for-all, private trackers tend to take control of the content on offer, weeding out poor quality releases and ensuring only the best reach the user. Seeders are also plentiful, meaning that downloads complete in the fastest times.

On the flipside, some of the most exclusive trackers are almost impossible to join. A prime example is HDBits, a site that at last count wouldnt accept more than 21,000 users yet keeps actual memberships down to around the 18,000 mark. Invites are extremely rare and those already inside tend to guard their accounts with their lives.

Second chances are rare on a site indexing more than 234,000 high-quality releases seeded by more than 950,000 peers and one of the broadest selection of Blu-ray offerings around. Thats what makes the results of a survey currently being carried out on the site even more remarkable.

In a poll launched by site staff, HDBits members who by definition are already part of one of the most exclusive pirate haunts around were asked whether they also pay for legal streaming services such as Netflix, Hulu or Amazon Prime.

At the time of writing more than 5,300 members have responded, with a surprising 57% (3,036) stating that they do indeed subscribe to at least one legal streaming service. When questioned on usage, more than a quarter of respondents said they actually use the legal service MORE than they use HDBits, which for a site of that caliber is quite a revelation.

HDBits poll 57% of pirates pay for legal services

Keeping in mind that the site is creeping towards a quarter of a million torrents and is almost impossible to get into, its perhaps no surprise that unscrupulous people with access to an invitation on the site are selling them (against the sites wishes) for up to $350 each on...


GNOME Shell vs. KDE Plasma Graphics Tests On Wayland vs. X.Org Server Phoronix

A premium member this week had requested some benchmarks of openSUSE Tumbleweed when looking at the performance of KDE Plasma vs. GNOME Shell in some open-source graphics/gaming tests while also looking at the Wayland vs. X.Org Server performance...


Top A.I. experts warn of a Black Mirror-esque future with swarms of micro-drones and autonomous weapons Lifeboat News: The Blog

To better protect against the rise of ill-intended AI, policymakers ought to be working closely with technical specialists to be aware of potential applications of machine intelligence. Also, technical developers ought to be proactively reaching out to appropriate leaders when they understand the technology they are developing can have negative applications, the report says.

New report from 26 technology experts issues dire warning about the potential of malicious artificial intelligence.


Casting Metal Parts and Silicone Molds from 3D Prints Hackaday

The invention of the relatively affordable 3D printer for home use has helped bring methods used to produce parts for prototypes, samples, and even manufacturing, closer to designers. This tutorial on how to cast metal parts from 3D printed silicone molds is a perfect example of how useful a 3D printer can be when you are looking to make a custom and durable metal part at home.

After 3D printing a mold design using an Ultimaker 2 [M. Borgatti] casts the mold using Smooth-On Mold Star 15 that can withstand heat up to 450 F (232 C), which he points out is ideal for the low-temp metal casting alloy tin-bismuth comprised of 58% Bismuth and 42% Tin with a melting point of 281 F.

You may have heard of molds created from 3D printed parts before, but what makes this tutorial great is that the author, [M. Borgatti], really sets you up to be successful. He offers up plenty of insights including mold-making techniques and terminology like why you would need a well and runners designed as part of your mold when casting with metal.

You can either reproduce his designs or use the tutorial to create your own which makes it a good start for beginners as well as another method to file away for people who already have experience 3D printing molds. This post is als...


Allwinner A83T Will Support HDMI With Linux 4.17 Phoronix

The Sun4i DRM driver work has been progressing a lot since its mainline introduction two years ago with Linux 4.7. With the Linux 4.17 cycle, the A83T SoC will have initial HDMI output support...


Dozen vulnerabilities discovered in Trend Micro Linux-based Email Encryption Gateway Security Affairs

Security researchers at Core Security have discovered a dozen vulnerabilities in Trend Micro  Linux-based Email Encryption Gateway.

Security researchers at Core Security have discovered a dozen flaws in Trend Micro  Linux-based Email Encryption Gateway, some of them have been rated as critical and high severity. The flaws received the CVE identification numbers CVE-2018-6219 through CVE-2018-6230.

The most severe flaw could be exploited by a local or remote attacker with access to the targeted system to execute arbitrary commands with root privileges.

Encryption for Email Gateway [1] is a Linux-based software solution providing the ability to perform the encryption and decryption of email at the corporate gateway, regardless of the email client, and the platform from which it originated. The encryption and decryption of email on the TMEEG client is controlled by a Policy Manager that enables an administrator to configure policies based on various parameters, such as sender and recipient email addresses, states Core Security.

Multiple vulnerabilities were found in the Trend Micro Email Encryption Gateway web console that would allow a remote unauthenticated attacker to gain command execution as root.

Trend Micro Email Encryption Gateway

The most serious vulnerability is CVE-2018-6223, it is related to missing authentication for appliance registration. Administrators can configure the virtual appliance running Email Encryption Gateway during the deployment process upon deployment via a registration endpoint.

The researchers discovered that attackers can access the endpoint without authentication to set administrator credentials and make other changes to the configuration.

The registration endpoint is provided for system administrators to configure the virtual appliance upon deployment. However, this endpoint remains accessible without aut...


One-Stop Counterfeit Certificate Shops. For All Your Malware-Signing Needs SoylentNews

Arthur T Knackerbracket has found the following story:

The Stuxnet worm that targeted Iran's nuclear program almost a decade ago was a watershed piece of malware for a variety of reasons. Chief among them, its use of cryptographic certificates belonging to legitimate companies to falsely vouch for the trustworthiness of the malware. Last year, we learned that fraudulently signed malware was more widespread than previously believed. On Thursday, researchers unveiled one possible reason: underground services that since 2011 have sold counterfeit signing credentials that are unique to each buyer.

"Contrary to a common belief that the security certificates circulating in the criminal underground are stolen from legitimate owners prior to being used in nefarious
campaigns, we confirmed with a high degree of certainty that the certificates are created for a specific buyer per request only and are registered using stolen corporate identities, making traditional network security appliances less effective," Andrei Barysevich, a researcher at Recorded Future, reported.

Barysevich identified four such sellers of counterfeit certificates since 2011. Two of them remain in business today. The sellers offered a variety of options. In 2014, one provider calling himself C@T advertised certificates that used a Microsoft technology known as Authenticode for signing executable files and programming scripts that can install software. C@T offered code-signing certificates for macOS apps as well. His fee: upwards of $1,000 per certificate.

[...] "Although code signing certificates can be effectively used in widespread malware campaigns such as the distribution of banking trojan or ransomware, the validity of the certificate used to sign a payload would be invalidated fairly quickly," [Barysevich] explained. "Therefore, we believe that the limited number of power-users specializing in more sophisticated and targeted campaigns, such as corporate espionage, is the main driving force behind the new service."

Original Submission

Read more of this story at SoylentNews.


As Japan Moves Towards Reducing Patent Lawsuits and Curbing SEP Abuse Will the United States Follow Suit? Techrights

Ask Makan Delrahim

KDDI Corporation logo

Summary: Japan is getting tougher on standards-imposed patent traps (SEP), the US may be getting ready to do the same, and Japans KDDI Corporation joins OIN

WE recently wrote about Japan's growing comprehension of the SEP threat, unlike the US with Makan Delrahim (a lobbyist) in charge of antitrust matters. President Trump fills his swamp and it truly shows (just look at his USPTO Director pick, soon to speak at an IAM event). As IAM put it the other day: Another speech from @TheJusticeDepts Makan Delrahim suggesting US gov is looking very closely at use of antitrust enforcement in standard setting (think about Qualcomm for instance).

Watchtroll, in the mean time, is frustrated that on patents Trump DOJ is on the same page as the Obama DOJ, which is hard to fathom given all the promises made by President Trump during his campaign.

The patent maximalists sure hope that chaos will be restored as they profit from that chaos.Watchtroll now helps the lobby for patent chaos, hoping that republishing a letter will help it have impact. The patent maximalists sure hope that chaos will be restored as they profit from that chaos.

As we recently noted, Japan (and JPO) recognises that patent litigation isnt desirable (unless youre a lawyer) and this new report says that Japan will soon implement a process that will swiftly resolve disputes over patents that are crucial to adhering to certain technical standards (thats SEP)

This is a good thing. Consider...


Arguing With Patent Maximalists is Not Arguing With People Who Care for Facts and Reason Techrights

Patent policy, according to some, is a matter of national security crisis.

A duck
Should we restart nuclear drills?

Summary: The levels of unprecedented drama, or the attempts to induce panic, have reached laughable levels; just because the United States adopts saner patent policies does not mean doom and gloom, except for people who work for the patent industry

MARCH is approaching, so it may be way too late for new years resolutions. One thing Im beginning to realise is that its pointless and hopeless debating with patent maximalists. They keep thinking (or lying to themselves) that US demise is purely due to patent policy, notably patent reform (we debunked that nonsense several times earlier this month), they think that technology companies are the most evil thing in their country, and many deny the very existence of patent trolls. They may never start using logic. They reject facts. The patent system is being improved, not killed, but here they go saying that it is now a national security crisis.

No, its not a national security crisis. Maybe its just a crisis to parasitic professions like particular lawyers and patent trolls. When I said this to one of them he responded by repeatedly saying that I am a shill for Google. [1, 2]

They say the same thing about others whom they dont like; theyre seeing Google in everything.

Yesterday we wrote about spin and judge-bashing (Professor Crouch made an offensive and potentially racist mockery of a judge with Mexican heritage, insinuating he does not care about facts).Ive never worked for them either directly or indirectly, but that does not seem to matter to these people. To even suggest I have anything to do with Google is to associate oneself with conspiracy theories, I told him. I write lots of negative things about Google.

Then again, speaking to people who are literally burning things in front of the USPTO (in a group of less than a dozen people, which makes the protest laughable) is probably a waste of time. It was an unauthorised protest and it basically made patent maximalists loo...


AnandTech Interview With the CTO of GlobalFoundries: 7nm EUV and 5 GHz Clock Speeds SoylentNews

AnandTech's Ian Cutress interviewed Dr. Gary Patton, CTO of GlobalFoundries. A number of topics were discussed, including the eventual use of ASML's extreme ultraviolet lithography (EUV) for the "7nm" node:

Q13: With EUV still in the process of being brought up, and the way it is with counting masks and pellicle support coming through, is there ever a mentality of 7nm not getting EUV, and that 7nm could end up a purely optical transition? Do you fully expect EUV to come in at 7nm?

GP: I absolutely believe that EUV is here. It's coming, I absolutely believe it so. As you've seen with the machines we are installing in the clean room, we have placed a big bet on it. As Tom (Thomas Caulfield) was saying, it's a pretty high scale investment. I think if you look at the tool itself, for example, ASML has demonstrated 250W with it. This is pretty repeatable, so I think that it looks in good shape. There are some challenges with the collector availability. They are getting close, I think around 75% availability now is pretty solid, but they have to get to 85%, and they are cranking these tools out. Even with this as a work in progress, there are going to be a lot of tools out on the field, and that is going to also help with improving the performance and control of the tools. The tools we have here are the ultimate tools, the ultimate manufacturing versions.

The lithographic resist is a little bit of a challenge, but we are still trying to optimize that. I don't see that as a show stopper, as we are managing throughout bring up. I think the real challenge is the masks, and I feel very good about the pellicle process. They have made a lot of progress, and they have shown it can handle 250W. The biggest issue has been that you lose a bit of power - so you've done all this work to get to 250W, and then you just lost 20% of that. So it has to go up another 10%, so it's closer to 90%, in terms of a loss to be viable. For contacts and vias, we can run without pellicles. We have the right inspection infrastructure to manage that, and then bring the pellicles in when they are ready.

[...] Q17: Does the first generation of 7LP target higher frequency clocks than 14LPP?

GP: Definitely. It is a big performance boost - we quoted around 40%. I don't know how that exactly will translate into frequency, but I would guess that it should be able to get up in the 5GHz range, I would expect.



Changes Introduced by the EPOs Administrative Council Made It Abundantly Clear That Separation of Powers Does Not Exist for Independence of Judges Techrights

Also: IP Kat seems to have become a pet blog of Bristows, CIPA and other elements of Team UPC

CIPA meeting with Stephen Jones
IP Kat and Battistelli last month

Summary: IP Kat (i.e. Bristows in this case) wants us to think that the EPO keeps the Boards of Appeal alive and healthy, but in reality thats just an illusion which Team UPC is attempting to prop up, knowing that Battistelli's attack on the Boards of Appeal dooms the UPC

YESTERDAY we wrote about Bristows using IP Kat to post ads for the EPOs management, possibly to help bolster the false perception they need in order to weaken the constitutional complaint and then ratify the UPC. Have they mentioned, one person asked, that EPO/BoA judges can be suspended on half-salary for a minimum of two years (extension optional) at the whim of the appointing authority? (against the EPC, i.e. core rules)

The cited document (warning: link) is worth reposting below in case the EPO removes it in the future (or makes it a lot harder to locate).

CA/D 18/15

of 17 December 2015
amending Articles 2 and 95 of the Service
Regulations for permanent employees of the
European Patent Office


Having regard to the European Patent Convention, and in particular Articles 10(2)(c), 11 and 33(2)(b) thereof,

Having regard to the Service Regulations for permanent employees of the European Patent Office (hereinafter referred to as the Service Regulations), and in particular Articles 2 and 95 thereof,

On a proposal from the President of the European Patent Office, submitted after...


Maplin For Sale Hackaday

If you are an American Electronics Enthusiast of a Certain Age, you will have misty-eyed reminiscences of the days when every shopping mall had a Radio Shack store. If you are a Brit, the name that will bring similar reminiscences to those Radio Shack ones from your American friends is Maplin. They may be less important to our community than they once would have been so this is a story from the financial pages; it has been announced that the Maplin chain is for sale.

Maplin started life as a small mail-order company supplying electronic parts, grew to become a large mail order company selling electronic parts, and them proceeded to a nationwide chain of stores occupying a similar niche to the one Radio Shack fitted into prior to their demise. They still sell electronic components, multimeters, and tools, but the bulk of their floor space is devoted to the more techy and hobbyist end of mass-market consumer electronics. As the competition from online retailers has intensified  it is reported that the sale may be an attempt to avoid the company going into administration.

Its fair to say that in our community they have something of a reputation of late for being not the cheapest source of parts, somewhere you go because you need something in a hurry rather than for a bargain. A friend of Hackaday remarked flippantly that the asking price for the company would be eleventy zillion pounds, which may provide some clues as to why custom hasnt been so brisk. But for a period in the late 1970s through to the 1980s they were the only place for many of us to find  parts, and their iconic catalogues with spaceships on their covers could be bought from the nationwide WH Smith newsagent chain alongside home computers such as the ZX Spectrum. Its sad to say this, but if they did find themselves on the rocks wed be sorry to see the name disappear, but we probably wouldnt miss them in 2018.

One of the things Maplin were known for back in the day were their range of kits. Weve shown you at least one in the past, this I/O port for a Sinclair ZX81.

Footnote: Does anyone still have any of the early Maplin catalogues with the spaceships on the cover? Ours perished decades ago, but wed love to borrow one for a Retrotechtacular piece.

Maplin store images: Betty Longbottom [CC BY-SA 2.0], and Futurilla [CC BY-SA 2.0].


Patents in the US Are Not Hard to Enforce, Software Patents Are Techrights

Some trolls and businesses have become accustomed to a pipeline of extortions


Summary: Depending too much on abstract software patents is a losing strategy; it does not, however, mean that patents in general are not enforceable

THE number of patents granted by the USPTO kept climbing for many years. This sheer number and this growth is about to end. As we shall show later today, examiners are becoming tougher, owing primarily to PTAB.

Someone has just said that its still almost impossible to enforce a patent in the US. Rare cases of success take 4-7 years and $5M-10M+.

examiners are becoming tougher, owing primarily to PTAB.This isnt true unless one assumes that a low-quality patent like a software patent gets used.

Just the other day Michael Loney took a look at Lex Machinas data and said that ANDA pharma litigation spikes back up in 2017 with some record rulings (in terms of damages). To quote:

After a slump in 2016, US pharmaceutical patent litigation triggered by the Hatch-Waxman process rose to 411 cases last year

Last year 411 ANDA cases were filed in the US, up from 318 in 2016, reveals Lex Machinas recently released Patent Litigation Year in Review report.

The report features many interesting statistics on case filing (the headline figure is a 10% drop) and the impact of TC Heartland on districts, Loney wrote in another part (this too behind a paywall). His summary mentions Section 101 invalidation: A closer look at Lex Machinas Patent Litigation Year in Review report reveals some interesting nuggets of information on success rates of transfers, the judges with the most cases, design patent litigation, injunctions, Section 101 invalidation and damages

Inherently, the problem isnt enforcement but enforcement of software pat...


Arctic's Accelero Twin Turbo III Works Well For Polaris GPU Cooling Phoronix

Back in December I wrote about passively cooling a Radeon RX 480 by means of the after-market Accelero S3 passive cooler. That passive GPU cooler worked well but under demanding loads did get a bit hot, but what I came to realize after buying that cooler is the height requirements exceeded that of a 4U rackmount chassis... So recently I decided to switch to using the Arctic Cooling Accelero Twin Turbo III...


Facebook Removes VR Shooting Game From its Booth at CPAC SoylentNews

Facebook removes VR shooting demo at top conservative conference out of 'respect for the victims' of Florida shooting

Facebook has removed a virtual reality shoot-em-up experience from a tech demo at a top American conservative conference after recieving criticism for being "tone deaf" following last week's deadly school shooting in Florida. The social network has a presence at the Conservative Political Action Conference (CPAC) conference in Maryland, this week, including a booth running a demo of its Oculus Rift virtual reality headset. This demo included a first-person shooting game.

People on Twitter have criticised Facebook for running this demo so soon after the deadly shooting attack at Marjory Stoneman Douglas High School that left 17 people dead.

The game, Bullet Train, was just one of a number of standard Oculus games/demos that Facebook has included at public events. In fact, Bullet Train has been around since 2015, and the team that made it released a full game called Robo Recall, funded by Oculus:

The game will be an Oculus exclusive that company is funding its development and the five-to-ten-person team that created Bullet Train has ballooned into a full 15 person team at Epic in order to turn this into a real game with a release date in "early 2017." It will include a number of graphical jumps from Bullet Train, and this benefits Epic in other ways as well.

Yet, Facebook still tried to distance itself from the original demo:

The demo for the game, called "Bullet Train," is being developed by a third-party game-maker, not Oculus, the company said.

Why is Facebook at CPAC? Probably as part of an ongoing effort to placate conservatives angry at the platform.

This comes a few months after the Puerto Rico hurricane VR debacle.

Also at The Guardian and...


This 3D-Printed Robotic Vacuum Sucks Hackaday

After youve taken a moment to ponder the turn of phrase used in the title, take a look at this scratch-built robotic vacuum created by [theking3737]. The entire body of the vacuum was 3D printed, and all of the internal electronics are off-the-shelf modular components. We cant say how well it stacks up against the commercial equivalents from iRobot and the like, but it doesnt look like it would be too hard to build one yourself to find out.

The body of this rather concerned-looking robot was printed on a DMS DP5 printer, which is a neat trick as it only has a build platform of 200 mm x 200 mm. Once all the pieces were printed, a 3D pen was used to weld the sections together. The final result looks a bit rough, but should give a bond thats just as strong as the printed parts themselves.

The robot has four sets of ultrasonic range finders to detect walls and obstacles, though probably not in the positions you would expect. The right side of the robot has two sets of sensors, while the left side only gets one. We arent sure the reasoning behind the asymmetrical layout, but presumably the machine prefers making right turns.

Control is provided...


Trumps Back to the Moon Directive Leaves Some Scientists with Mixed Feelings Lifeboat News: The Blog

While some planetary scientists are enthusiastic about Trumps proposal to send astronauts to the moon before Mars, others are leery about what it could cost or if it will happen.


Elon Musk Reveals Personal Crypto Holdings Lifeboat News: The Blog

Elon Musk has revealed his personal cryptocurrency holdings.

The billionaire CEO of SpaceX and Tesla told Twitter followers that he in fact has never purchased cryptocurrency, and only holds a small amount of Bitcoin gifted by a friend.

Not sure. I let @jack know, but its still going. I literally own zero cryptocurrency, apart from .25 BTC that a friend sent me many years ago.


Apple Moves to Store iCloud Keys in China, Raising Human Rights Fears

Via: Reuters: When Apple Inc begins hosting Chinese users iCloud accounts in a new Chinese data center at the end of this month to comply with new laws there, Chinese authorities will have far easier access to text messages, email and other data stored in the cloud. Thats because of a change to how the []


U.S. has 62nd Ranking in LTE Speeds in the World, about 1/3 the Speed of Singapore SoylentNews

According to OpenSignal's latest State of LTE report, the average 4G download speed in the United States was 16.31 Mbps in Q4 2017. That's little more than a third of the speed that mobile device users in Singapore enjoy and ranks the U.S. at a disappointing 62nd place in the global ranking.
Where Smartphone Users Surf the Fastest

The Full Open Signal Report, The State of LTE (February 2018):

Original Submission

Read more of this story at SoylentNews.


Top The Pirate Bay Alternatives Best Torrent Download Sites (2018) HackRead

By Waqas

The Pirate Bay (TPB) is one of the most visited

This is a post from Read the original post: Top The Pirate Bay Alternatives Best Torrent Download Sites (2018)


Physicists Have Confirmed a Pear-Shaped Nucleus, And It Could Ruin Time Travel Forever Lifeboat News: The Blog

Physicists have confirmed the existence of a new form of atomic nuclei, and the fact that its not symmetrical challenges the fundamental theories of physics that explain our Universe.

But thats not as bad as it sounds, because the 2016 discovery could help scientists solve one of the biggest mysteries in theoretical physics where is all the dark matter? and could also explain why travelling backwards in time might actually be impossible.

Weve found these nuclei literally point towards a direction in space. This relates to a direction in time, proving theres a well-defined direction in time and we will always travel from past to present, Marcus Scheck from the University of the West of Scotland told Kenneth MacDonald at BBC News at the time.


Delightful Electromechanical Build Of A Jet Engine Model Hackaday

[InterlinkKnight]s jet engine model is a delight to behold and to puzzle out. Many of us have been there before. We know how to build something, we know its not the most up-to-date approach, but we just cant help ourselves and so we go for it anyway. The result is often a fun and ingenious mix of the mechanical and the electrical. His electric jet engine model is just that.

Being a model, this one isnt required to produce any useful thrust. But hes made plenty of effort to make it behave as it should, right down to adding a piece of plastic to rub against a flywheel gear in order to produce the perfect high-pitched sound, not to forget the inclusion of the flywheel itself to make the turbine blades gradually slow down once the motors been turned off. For the N1 gauge (fan speed gauge) he built up his own generator around the motor shaft, sending the output through rectifying diodes to a voltmeter.

But the most delightful of all has to be the mechanical linkages for the controls. The controls consist of an Engine Start switch, Fuel Control switch and a throttle lever and are all built around a rheostat which controls the motor speed. The linkages are not pretty, but you have to admire his cleverness and just-go-for-it attitude. He must have done a lot of head scratching while getting it to all work together. We especially like how flipping the Fuel Control switch from cutoff to run levers the rheostat with respect to its dial just a little, to give a bit of extra power to the engine. See if you can puzzle it out in his Part 3 video below where he removes the cover and walks through it all.

Now if youre looking for a working jet engine then check out this bike mounted one.

This ones been around for a few months and we cant b...


Report On Device Encryption Suggests A Few Ways Forward For Law Enforcement SoylentNews

Techdirt covers a new paper published by the US National Academies of Science, Engineering, and Medicine regarding the general access that the FBI and DOJ want to encrypted communications.

Another paper has been released, adding to the current encryption discussion. The FBI and DOJ want access to the contents of locked devices. They call encryption that can be bypassed by law enforcement "responsible encryption." It isn't. A recent paper by cryptograpghy expert Riana Pfefferkorn explained in detail how irresponsible these suggestions for broken or weakened encryption are.

This new paper [PDF] was put together by the National Academies of Science, Engineering, and Medicine. (h/t Lawfare) It covers a lot of ground others have and rehashes the history of encryption, along with many of the pro/con arguments. That said, it's still worth reading. It raises some good questions and spends a great deal of time discussing the multitude of options law enforcement has available, but which are ignored by FBI officials when discussing the backdoors/key escrow/weakened encryption they'd rather have.

The paper's suggestions have not been rigorously investigated by those with domain expertise, yet.

Source : Report On Device Encryption Suggests A Few Ways Forward For Law Enforcement

Original Submission

Read more of this story at SoylentNews.


These Small PCBs are Made for Model Rocketry Hackaday

Model rocketry hobbyists are familiar with the need to roll their own solutions when putting high-tech features into rockets, and a desire to include a microcontroller in a rocket while still keeping things flexible and modular is what led [concretedog] to design a system using 22 mm diameter stackable PCBs designed to easily fit inside rocket bodies. The system uses a couple of 2 mm threaded rods for robust mounting and provides an ATTiny85 microcontroller, power control, and an optional small prototyping area. Making self-contained modular sleds that fit easily into rocket bodies (or any tube with a roughly one-inch inner diameter) is much easier as a result.

The original goal was to ease the prototyping of microcontroller-driven functions like delayed ignition or altimeter triggers in small Estes rockets, but [concretedog] felt there were probably other uses for the boards as well and made the design files available on GitHub. (Thanks!)

We have seen stackable PCBs for rocketry before with the amazingly polished M3 Avionics project, but [concretedog]s design is much more accessible to some hobbyist-level tinkering; especially since the ATTiny85 can be programmed using the Arduino IDE and the boards themselves are just an order from OSH Park away.

[via Dangerous Prototypes Blog]



Algorithm Creates "Movies" From Text Descriptions SoylentNews

A machine learning algorithm has created tiny (6464 pixels) 32-frame videos based on text descriptions:

The researchers trained the algorithm on 10 types of scenes, including "playing golf on grass," and "kitesurfing on the sea," which it then roughly reproduced. Picture grainy VHS footage. Nevertheless, a simple classification algorithm correctly guessed the intended action among six choices about half the time. (Sailing and kitesurfing were often mistaken for each other.) What's more, the network could also generate videos for nonsensical actions, such as "sailing on snow," and "playing golf at swimming pool," the team reported this month at a meeting of the Association for the Advancement of Artificial Intelligence in New Orleans, Louisiana.

[...] Currently, the videos are only 32 frames longlasting about 1 secondand the size of a U.S. postage stamp, 64 by 64 pixels. Anything larger reduces accuracy, says Yitong Li, a computer scientist at Duke University in Durham, North Carolina, and the paper's first author. Because people often appear as distorted figures, a next step, he says, is using human skeletal models to improve movement.

Tuytelaars also sees applications beyond Hollywood. Video generation could lead to better compression if a movie can be stored as nothing but a brief description. It could also generate training data for other machine learning algorithms. For example, realistic video clips might help autonomous cars prepare for dangerous situations they would not frequently encounter. And programs that deeply understand the visual world could spin off useful applications in everything from refereeing to surveillance. They could help a self-driving car predict where a motorbike will go, for example, or train a household robot to open a fridge, Pirsiavash says.

An AI-generated Hollywood blockbuster may still be beyond the horizon, but in the meantime, we finally know what "kitesurfing on grass" looks like.

Original Submission

Read more of this story at SoylentNews.


UVD-Based HEVC Video Encoding Main Now Supported In Mesa 18.1 Phoronix

Earlier this month AMD developers landed VCN-powered video encode support for the HEVC main format while now this has come to the UVD engine so it will work with pre-Raven GPUs...


Tiny Light-Activated Gold-Covered Nanowires Can Make Neurons Fire Lifeboat News: The Blog

Researchers at the University of Chicago have developed light-activated nanowires that can stimulate neurons to fire when they are exposed to light. The researchers hope that the nanowires could help in understanding complex brain circuitry, and they may also be useful in treating brain disorders.

Optogenetics, which involves genetically modifying neurons so that they are sensitive to a light stimulus, has attracted a lot of attention as a research tool and potential therapeutic approach. However, some researchers have misgivings about optogenetics, as it involves inserting a gene into cells, potentially opening the door to unforeseen effects and possibly permanently altering treated cells.

In an effort to develop an alternative, a research team at the University of Chicago has devised a new modality that can enable light activation of neurons without the need for genetic modification. Their technique involves nanowires that are so small that if they were laid side-by-side, hundreds of them would fit on the edge of a sheet of paper. Although initially designed for use in solar cells, their small size also makes them well suited to interacting with cells.


Copyright Holders Call Out Costa Rica Over TorrentFreak

The International Intellectual Property Alliance (IIPA) has submitted its latest submission for the U.S. Governments 2018 Special 301 Review, pinpointing countries it believes should better protect the interests of the copyright industry.

The IIPA, which includes a wide range of copyright groups including the MPAA, RIAA, BSA, and ESA, has listed its complaints against a whole host of countries.

Canada is prominently discussed, of course, as are Argentina, China, India, Mexico, Switzerland and many others. The allegations are broad, ranging from border protection problems to pirate site hosting and everything in between.

What caught our eye, however, was a mention of This domain name which, unlike the name suggests, sports a KickassTorrents logo, uses the Costa Rican Top Level Domain .cr.

While its a relatively small player in the torrent site ecosystem, it appears to be of great concern in diplomatic circles.

Previously, the U.S. Embassy in Costa Rica threatened to have the countrys domain registry shut down unless it suspended This hasnt happened, yet, but it was a clear signal.

In the IIPAs recent submission to the USTR, the domain is also brought into play. The copyright holders argue that Costa Rica is not living up to its obligations under the CAFTA-DR trade agreement.

One of the key DR-CAFTA obligations that has not been implemented is introducing clear rules on copyright, liability, as well as providing meaningful legal incentives for inter-industry cooperation to deal with online infringements, the IIPA writes.

Instead, Costa Ricas law offers largely unconditional liability exceptions to Internet Service Providers (ISPs) and others, even allowing identified infringing activity to remain on their systems for as long as 45 days.

Next, it puts a spotlight on the local domain registry, which it described as a safe haven for sites including

There are still many instances where the Costa Rican Top Level Domain (ccTLD) registry has provided a safe haven to notorious online enterprises dedicated to copyright infringement, IIPA writes.

For example, domain is still online despite actions against it from ICANN and the U.S. Embassy in Costa Rica. Costa Ricas failure to deal eff...


Links 24/2/2018: Npm Bug, Mycroft AI on Plasma Techrights

GNOME bluefish



  • Purism

    • February 2018 coreboot update now available

      Hey everyone, Im happy to announce the release of an update to our coreboot images for Librem 13 v2 and Librem 15 v3 machines.

      All new laptops will come pre-loaded with this new update, and everyone else can update their machines using our existing build script which was updated to build the newest image. Some important remarks:

    • Purism Releases Updated Coreboot Images For Their Laptops

      Purism has released updated Coreboot images for their Librem 13 v2 and Librem 15 v3 laptops.

      The updated Coreboot images are now re-based to Coreboot 4.7, Intel FSP 2.0, IOMMU (VT-d) support is now available, TPM support is also enabled, and there are fixed ATA errors for 6Gbps speeds.

    • New Inventory with TPM by Default, Free International Shipping

      In November, we announced the availability of our Trusted Platform Module as a $99 add-on for early adopters, something that would allow us to cover the additional parts & labor costs, as well as test the waters to see how much demand there might be for this feature. We thought there would be some interest in that as an option, but we were not sure how much, especially since it was clearly presented as an early preview and offered at extra cost.

    • Design report #3: designing the UI Shell, part 2

      Peter has been quite busy thinking about the most ergonomic mobile gestures and came up with a complete UI shell design. While the last design report was describing the design of the lock screen and the home screen, we will discuss here about navigating within the different features of the shell.

  • Server

    • ...


San Francisco's Community Broadband Could Solve Net Neutrality and Privacy Issues SoylentNews

San Francisco: Building Community Broadband to Protect Net Neutrality and Online Privacy

Like many cities around the country, San Francisco is considering an investment in community broadband infrastructure: high-speed fiber that would make Internet access cheaper and better for city residents. Community broadband can help alleviate a number of issues with Internet access that we see all over America today. Many Americans have no choice of provider for high-speed Internet, Congress eliminated user privacy protections in 2017, and the FCC decided to roll back net neutrality protections in December.

This week, San Francisco published the recommendations of a group of experts, including EFF's Kit Walsh, regarding how to protect the privacy and speech of those using community broadband.

This week, the Blue Ribbon Panel on Municipal Fiber released its third report, which tackles competition, security, privacy, net neutrality, and more. It recommends San Francisco's community broadband require net neutrality and privacy protections. Any ISP looking to use the city's infrastructure would have to adhere to certain standards. The model of community broadband that EFF favors is sometimes called "dark fiber" or "open access." In this model, the government invests in fiber infrastructure, then opens it up for private companies to compete as your ISP. This means the big incumbent ISPs can no longer block new competitors from offering you Internet service. San Francisco is pursuing the "open access" option, and is quite far along in its process.

Original Submission

Read more of this story at SoylentNews.


Gnter Blobel Solved a Mystery of Cell Biology: How Proteins Navigate the Body Lifeboat News: The Blog

The Germany-born scientist, who arrived in the U.S. in 1962 and never left, was an opera-loving bon vivant who would have stood out in any field. His discovery of how proteins navigate the body provided a foundation for todays research into treatments for cancer and myriad other diseases.


Chicago-Cleveland hyperloop transit proposed Lifeboat News: The Blog

Visit Crains Chicago Business for complete business news and analysis including healthcare, real estate, manufacturing, government, sports and more.


Fully 3D Printed Nerf Thirst Zapper Hackaday

In case you werent aware, there is a whole community out there that revolves around customizing NERF guns. In that community is a subculture that builds their own NERF guns, and within that group is a sub-subculture that 3D prints NERF guns. So next time you are contemplating how esoteric your little corner of the hacking world is, keep that in mind.

Anyway, [Wesker] is currently making his way in the world of 3D printed one-off NERF guns, and has unveiled his latest creation: a fully 3D printed Thirst Zapper from Fallout 4. Except for the springs, each and every piece of this gun was printed on his CR-10 printer. You could even wind your own springs if you really wanted to, and keep the whole thing in-house. Because if youre going to do something this niche, you might as well go all in.

Even if you arent a member of the NERF-elite, the video [Wesker] has put together for this project is a fantastic look at what it takes to design, print, and finish a custom build. From creating the model to mixing the paint to match the in-game model, this video has a little something for everyone.

This isnt the first time weve cove...


RADV Vulkan Driver Improvements Coming For Wolfenstein 2 On Wine Phoronix

Wolfenstein II: The New Colossus makes use of the Vulkan graphics API on the id Tech 6 engine but sadly remains Windows-only aside from the consoles. While it runs with Wine, there are some bugs when using the RADV Radeon Vulkan driver but fortunately one of Valve's Linux developers is working on some improvements...


AU Optronics to Ship 8K Panels to TV Manufacturers in H1 2018 SoylentNews

More 8K (4320p) TVs will be coming soon. AU Optronics has announced plans to ship 8K panels to TV manufacturers starting in the first half of 2018:

The lineup of panels featuring a 76804320 resolution will be aimed at ultra-high-end TVs and sizes will range from 65 to 85 inches, said Liao Wei-Lun, president of AUO's video products business group, at a press conference. The high-ranking executive did not disclose other specifications of the panels, such as luminance and contrast ratio, but given their positioning, it is logical to expect their characteristics to be comparable to 8K UHDTVs to be offered by LG and Samsung.

Multiple TV makers demonstrated various 8K UHDTVs at various trade shows in the recent years, but so far no one has started to sell them. Given the lack of content, it is hard to expect high demand for 8K televisions in the next couple of years, aside from the halo factor - nonetheless, AUO expects 8K panels to account for 10% of its '65-inch and above' panel shipments in 2020. The presumably high-cost of the panels would indicate that in terms of unit shipments this might still be a low-ish number. However, as with 4K displays, someone has to release 8K TVs to stimulate content providers to offer appropriate material. At this year's CES, Samsung demonstrated its Q9S, its first commercial 8K TV-set, but it did not announce its pricing or availability timeframe. LG and Sony also demonstrated their 8K TVs at CES 2018, but nothing is clear about their plans regarding these products.

[...] As for 8K displays for PCs, Dell is currently the only company to offer an 8K monitor (this one is based on a panel from LG, so the latter might introduce its own 8K display at some point). Philips last year promised to start shipments 328P8K monitor in 2018, so expect the product to hit the market in the coming months too.

Need something to watch on your 8K TV? How about the 2020 Olympics?

Also at DigiTimes.

Related: LG to Demo an 8K Resolution TV at the Consumer Electronics Show
Dell Announces First "Mass-Market" 8K Display
Philips Demos an 8K Monitor
Pimax Launches Kickstarter for "8K" Virtual Reality Headset
HDMI 2...


Use 1Password pwned password to verify if your password was leaked HackRead

By Waqas

1Passwords pwned password will check your password on the list

This is a post from Read the original post: Use 1Password pwned password to verify if your password was leaked


Chinas AI startups scored more funding than Americas last year Lifeboat News: The Blog

Of $15.2 billion invested in AI startups globally in 2017, 48 percent went to China and just 38 percent to America. So says a new report from CB Insights about the state of AI.

So long, America: Its the first time Chinas AI startups surpassed those in the US in terms of funding. While America still has more AI startups than China, theyre starting to lose out in striking equity deals: the US accounted for 77 percent of them in 2013, but that fell to 50 percent last year.

Fierce competition: AI startup investment rose 141 percent in 2017 compared with 2016but with 1,100 new startups appearing last year, AI appearing in business models everywhere, and Big Techs enterprise AI offerings gaining traction, its harder than ever to snag funds.


Microchip Introduces Tiny Cheap Linux Modules Hackaday

Linux is in everything these days, and that means designers and engineers are crying out for a simple, easy-to-use module that simplifies the design of building a product to do something with Linux. The best example of this product category would probably be the Raspberry Pi Compute Module, followed by the C.H.I.P. Pro and its GR8 module. There are dozens of boards with Allwinner and Mali chips stuffed inside that can be used to build a Linux product, and the BeagleBone on a Chip is a fantastic product if you need Linux and want to poke pins really, really fast.

Now Microchip is rolling out with their answer to the Linux System on Module. The SAMA5D2 is a single chip in a BGA package with a small footprint that runs Linux. Its capable, its cheap, and if you want to put Linux in a project, this is your newest option.

The core product in this new Microchip lineup is the SAMA5D2 SIP, a system in package that puts an ARM Cortex-A5 CPU and DDR2 memory in a single BGA package that, with a cursory examination, looks easy enough to design a PCB around and reflow. There are four chips in this lineup, with 128 Mbit, 512 Mbit, and 1 Gbit of DDR2 memory. The 128 Mbit chip is meant for bare metal and RTOS applications, with the higher memory chips capable of running Linux at least as well as a repurposed router.

This chip is at the core of Microchips ATSAMA5D2 SOM, a system on module that adds power management (that only requires a single 3.3V supply), an Ethernet PHY, and boot memory into a single package thats effectively as hand-solderable as a QFN package. Its Linux on a Chip, or at least as close as weve gotten to such a concept.

Adding Linux to a project is hard, and while there are modules and systems that can do it, were always welcoming more options given to designers. While these modules and systems arent exactly cheap compared to a beefy ARM microcontroller the SIP starts at around $9, the SOM is available for $39 in 100-unit quantities this price is quite low compared to other Linux-on-Modules available.


Paypal issue allows disclosure of account balance and recent transactions Security Affairs

Paypal issue allows for enumeration of the last four digits of payment method and for the disclosure of account balance and recent transactions of any given PayPal account.


This post details an issue which allows for enumeration of the last four digits of payment method (such as a credit or debit card) and for the disclosure of account balance and recent transactions of any given PayPal account.

This attack was submitted to PayPals bug bounty program where it was classified as being out of scope, which is something that would admittedly be unavailing to refute since their program scope does not mention anything about attacks on their interactive voice response system.

PayPal ticket

Prerequisites and Reconnaissance

In order to get started, the attacker would require knowledge of two pieces of information pertaining to an account, which would be the e-mail address and phone number linked to it.

Armed with knowledge of the e-mail address and phone number linked to an account, the attacker would visit the Forgot Password page on PayPals website, and enter the e-mail address associated with the targeted account.

The attacker would then be presented with the type of card linked to the account, as well as the last two digits of the same.

PayPal - Forgot Password

Attacking the Interactive Voice Response System

On first glance, the interactive v...


Best Processors for Gaming 2018

Every beginner gamer has this question in mind. What is the best processor for gaming? In this post, I am going to cover best cpu for gaming. These are best budget gaming processors. Intro to CPU in Computer Gaming The central processing unit, or CPU, is the very core of a computer. If a chip has []

The post Best Processors for Gaming 2018 appeared first on


Thanks to Consent Buried Deep in Sales Agreements, Car Manufacturers Are Tracking Tens of Millions of U.S. Cars

Via: BoingBoing: Millions of new cars sold in the US and Europe are connected, having some mechanism for exchanging data with their manufacturers after the cars are sold; these cars stream or batch-upload location data and other telemetry to their manufacturers, who argue that they are allowed to do virtually anything they want with this []


SpaceX Begins Starlink Satellite Broadband Trial

Via: cnet: A pair of small satellites named for an adventurous Belgian cartoon character could serve as proof of concept for an ambitious global broadband service envisioned by Elon Musk. After days of delays, a SpaceX Falcon 9 rocket carrying the two small satellites, newly dubbed Tintin A and B by Musk (but known more []


A Larger Role for Midwives Could Improve Deficient U.S. Care for Mothers and Babies

Via: ProPublica: In Great Britain, midwives deliver half of all babies, including Kate Middletons first two children, Prince George and Princess Charlotte. In Sweden, Norway and France, midwives oversee most expectant and new mothers, enabling obstetricians to concentrate on high-risk births. In Canada and New Zealand, midwives are so highly valued that theyre brought in []


36-Way Comparison Of Amazon EC2 / Google Compute Engine / Microsoft Azure Cloud Instances vs. Intel/AMD CPUs Phoronix

Earlier this week I delivered a number of benchmarks comparing Amazon EC2 instances to bare metal Intel/AMD systems. Due to interest from that, here is a larger selection of cloud instance types from the leading public clouds of Amazon Elastic Compute Cloud, Microsoft Azure, and Google Compute Engine.


World Leaders Abandoning Human Rights: Amnesty International SoylentNews

Original URL: World leaders abandoning human rights: Amnesty

World leaders are undermining human rights for millions of people with regressive policies and hate-filled rhetoric, but their actions have ignited global protest movements in response, a rights group said.

US President Donald Trump, Russian leader Vladimir Putin, and China's President Xi Jinping were among a number of politicians who rolled out regressive policies in 2017, according to Amnesty International's annual human rights report published on Thursday.

The human rights body also mentioned the leaders of Egypt, the Philippines and Venezuela.

"The spectres of hatred and fear now loom large in world affairs, and we have few governments standing up for human rights in these disturbing times," Salil Shetty, Amnesty's secretary-general, said.

"Instead, leaders such as el-Sisi, Duterte, Maduro, Putin, Trump and Xi are callously undermining the rights of millions."

[...] The regressive approach to human rights adopted by a number of world leaders has, however, inspired new waves of social activism and protest, Amnesty said, highlighting the example of the Women's March in January last year, which began in the US before becoming a global protest.

Original Submission

Read more of this story at SoylentNews.


Construction Begins on Jeff Bezos $42 Million 10,000-Year Clock

Via: The Verge: Installation has finally begun on Jeff Bezos 10,000-year clock, a project that the Amazon CEO has invested $42 million in (along with a hollowed-out mountain in Texas that Bezos intends for a Blue Origin spaceport), with the goal of building a mechanical clock that will run for 10 millennia.


Unified Patents, With Help From PTAB, Succeeds at Disarming Patent Trolls; InterDigital and RPX See a Massive Decline in Income Techrights

Freezing the assets of patent trolls and patent sharks

Polar bears

Summary: Positive news about the rapid demise of small patent trolls, large (even publicly-traded) trolls, and entities like RPX which profit from troll activity

THE EPOs recklessness has caused an insurgence of patent trolls in Europe, whereas USPTO reforms have pushed back this ugly phenomenon, whose net effect is predation at the expense of productive industries.

Today and tomorrow well write about Section 101, Alice and PTAB. The latest developments continue to be positive.

Over the past few days, on Thursday and on Friday, Unified Patents wrote about its battles against patent trolls such as Uniloc. Unified Patents relies on PTAB and yesterday it said:

On February 23, 2018, the Patent Trial and Appeal Board (PTAB) instituted trial on all challenged claims in an IPR filed by Unified against U.S. Patent 8,838,976 owned and asserted by Uniloc Luxembourg S.A., a well-known NPE. The 976 patent, directed to an online service user authentication system, belongs to the Etchegoyen portfolio that Uniloc has asserted against Apple. The 976 was removed from the litigation following Unifieds IPR petition, although the litigation continues.

A day beforehand Unified Patents wrote about Leigh Rothschilds troll, which we wrote about several times before. This too was announced on the same date it had happened:

On February 22, 2018, the Patent Trial and Appeal Board (PTAB) instituted trial on all challenged claims in an IPR filed by Unified against U.S. Patent 7,860,648 owned and asserted by Location Ba...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 24 February


2,000 Computers at Colorado DOT were infected with the SamSam Ransomware Security Affairs

SamSam Ransomware hit the Colorado DOT, The Department of Transportation Agency Shuts Down 2,000 Computers after the infection.

SamSam ransomware made the headlines again, this time it infected over 2,000 computers at the Colorado Department of Transportation (DOT).

The DOT has shut down the infected workstations and is currently working with security firm McAfee to restore the ordinary operations. Officials confirmed the ransomware requested a bitcoin payment.

The Colorado Department of Transportation has ordered an estimated 2,000 employees to shut down their computers following a ransomware attack Wednesday morning. wrote the CBS Denver.

The CDOT spokesperson Amy Ford said employees were instructed to turn off their computers at the start of business Wednesday after ransomware infiltrated the CDOT network.

Were working on it right now, added Ford.

The good news is that crucial systems at the Colorado DOT such as surveillance cameras, traffic alerts were not affected by the ransomware.

David McCurdy, OITs Chief Technology Officer, issued the following statement:

Early this morning state security tools detected that a ransomware virus had infected systems at the Colorado Department of Transportation. The state moved quickly to quarantine the systems to prevent further spread of the virus. OIT, FBI and other security agencies are working together to determine a root cause analysis. This ransomware virus was a variant and the state worked with its antivirus software provider to implement a fix today. The state has robust backup and security tools and has no intention of paying ransomware. Teams will continue to monitor the situation closely and will be working into the night.

The Colorado DOT officials confirmed that the agency will not pay the ransom and it will restore data from backups.

The SamSam ransomware is an old threat, attacks were observed in 2015 and the list of victims is long, many of them belong to the healthcare industry. The attackers spread the malware by gaining access to a companys internal networks by brute-forcing RDP connections.

Among the victims of the Samsam Ransomware there is the MedStar non-profit group that manages 10 hospitals in the Baltimore and Washington area. Crooks behind the attack on MedStar requested 45 Bitcoins (about US$18,500) for restoring the encrypted files, but the organization refused to pay the Ransom because it had a backup of the encrypted information....


Youve Never Seen A Flipping Eyeball Like This One! Hackaday

Inspired by some impressive work on textile flip-bit displays, and with creative steampunk outfits to create for Christmas, [Richard Sewell] had the idea for a flippable magnetic eye in the manner of a flip-dot display. These devices are bistable mechanical displays in which a magnet is suspended above a coil of wire, and flipped in orientation under the influence of a magnetic field from the coil.

In [Richard]s case the eyeball was provided by a magnetic bead with a suitable paint job, and the coil was a hand-wound affair with some extremely neat lacing to keep it all in place. The coil requires about 200 mA to ensure the eye flips, and the job of driving it is performed by a Digispark ATTiny85 board with an LM293 dual H-bridge driver upon which the two bridges are wired in parallel. The whole is mounted in the centre of a charity shop brooch that has been heat-treated to give a suitable aesthetic.

You can see the eyeball in all its glory in the two videos below the break, and should you be curious you can also read our write-up of the original pieces from [Irene Posch] that inspired it.

And here they eye is in close-up.


Generic FBDEV Emulation Continues To Be Worked On For DRM Drivers Phoronix

Noralf Trnnes has spent the past few months working on generic FBDEV emulation for Direct Rendering Manager (DRM) drivers and this week he volleyed his third revision of these patches, which now includes a new in-kernel API along with some clients like a bootsplash system, VT console, and fbdev implementation...


Chinese Firms Dominate the Chinese Mobile Market Where Patents Are Used for Nationalist Protectionism Techrights

China now uses patents like it uses speech restrictions/censorship (as a trade barrier)

An ancient door

Summary: Chinas patent offensive, which is far from a charm offensive, may mean that foreign companies wont survive in the Chinese market, which is itself dominated by companies that are closely connected to the Chinese Communist Party, also known as the Communist Party of China (CPC)

THE patent bubble in China is a fascinating thing. As we noted in our previous post, patent numbers are on the decline in the West (unless one counts only Chinese applications at USPTO, EPO etc.), whereas in Chinas SIPO patent filings now go through the roof while patent litigation continues to soar. Theres not so much press coverage about it, at least not in English. As Chinese patents are written in Mandarin theres also little chance of finding any Western press coverage about these. The consensus is that these are low-quality patents and its likely that only the good ones reach the USPTO, EPO etc. In other words, those which Westerners can actually read are the better ones.

The consensus is that these are low-quality patents and its likely that only the good ones reach the USPTO, EPO etc.China appears to have found a hack. It just floods the market with patents as means of trade war/sanctions strategy. The US appears to have been slow to react, citing mostly security not patents as a pretext (they used to just call Chinese products knockoff and/or piracy). Both the US and China can now happily pretend to themselves that they dont engage in a trade war and instead hide behind the mask of back doors, patents, and human rights. The US government discourages carriers from stocking ZTE and Huawei phones while publicly asking people not to buy these (outside contracts with carriers). This is all public information the type of stuff we habitually cover in our daily links.

To people who are accustomed to thinking of Asia (or east Asia) as one big country it may be confusing to learn about tensions (military, trade etc.) between Japan, Korea and China. Sure, a lot of the production is outsourced to mainland China (the US isnt the only country doing so, even Taiwan does). China itself has a very conservative government and its actively trying to promote homegrown Chinese brands, not Korean and Japanese ones. So its hardly...


Homeopathy Explained Lifeboat News: The Blog

What are the principles behind Homeopathy and does it work?

Kurzgesagt Newsletter:

Support us on Patreon so we can make more videos (and get cool stuff in return):

Kurzgesagt merch:

The MUSIC of the video:



Should We Loosen Bacterial Limits on Robotic Mars Exploration Before It's Too Late? SoylentNews

NASA's Planetary Protection Officer has suggested that it's time to contaminate Mars slightly aggressively before humans arrive with their microbiomes in tow:

Is there life on the surface of Mars? The clock is ticking on scientists' window to solve that long-standing question before astronautsand the microbes that live on themcontaminate the planet. Today, at a meeting in Washington, D.C., of NASA's planetary science advisory committee, the agency's new planetary protection officer raised the possibility of opening up a few of the planet's most promising regions to more aggressive exploration.

Just a few weeks into the job, Lisa Pratt, formerly a geomicrobiologist at Indiana University in Bloomington, has signaled that she wants the office to be open to the notion that a degree of contamination might be necessary to explore several of the planet's most habitable spots. Previously, the office has served as a watchdog to prevent the contamination of Mars and other planets with microbes from Earth, and vice versa. But now, time is pressing, given NASA's long-term goals, Pratt says. "No matter what we do, the minute we've got humans in the area we've got a less pristine, less clean state," Pratt said at the meeting. "Let's hope we know before the humans get there, one way or the other, if there is an ecosystem at or near the surface."

Although no region of Mars is banned for exploration, international treaties set the allowable levels of microbial contamination on robotic spacecraft destined for other planetary environments. Some scientists say it is too costly to meet the sterilization requirements to explore the potentially warm and wet "special regions" on Mars that are most likely to harbor microbes. Only the 1970s Viking landers achieved the cleanliness necessary to explore a special region. A growing number of scientists have argued that the agency needs to rethink its plans, as Science reported last year.

Related 2013 paper: The overprotection of Mars (DOI: 10.1038/ngeo1866) (DX)

Previously: NASA Posts Planetary Protection Officer Job Position

Original Submission



Not Just EPO: USPTO Too Will See Patent Filings Declining Techrights

EPO already lowered the fees (we assume in order to artificially inflate the numbers again)

Going down the drain
Up the quality, down the drain bad patents

Summary: The retreat from patent maximalism, as well as the lowered perceived value of patents, may mean that fewer people/companies now pursue patents or bother with litigation (they work on technology instead)

THE EPO saw a decline in the number of patent applications in spite of or because of dilution of patents and harm to the reputation of European Patents (EPs). The USPTO too is said to be expecting this in spite of or because of decline in the perceived value of US patents. Far too many had been granted over the past decade or two, including a lot of software patents which now turn out to be worthless.

As William New put it 4 days ago:

The United States Patent and Trademark Office (USPTO) is predicting a slight decline in some patent filings for 2018 and 2019, including through the international Patent Cooperation Treaty (PCT) managed by the World Intellectual Property Organization. Trademarks, meanwhile, will likely see slowing growth.

WIPO still claims some sort of all-time record, hailing China with its low-quality, government-supported patent gold rush.

Does that mean that the US is losing it? Not at all. It just means that the litigation industry is losing it. Its less capable of harassing productive companies with frivolous litigation (at both ends).

4 days ago and again yesterday the CCIA wrote about the patent industry claims that tougher patent regulations/rules ruin the economy; facts are not on their side.

To quote Patent Progress (CCIA):

After examining the evidence for U.S. in...


Automated Tracking Solutions, Aatrix and Berkheimer Dont Change Anything; Theyre Exploited by Patent Extremists to Pressure/Mislead/Insult Judges Techrights

Berkheimer and Aatrix are old and the US patent microcosm has become a lot like the Trump administration, habitually insulting judges (even racially, however subtle that may seem)

Judge Reyna
Loss of civility (the Internet never forgets). The patent microcosm also insults judges (the above has been removed since), perpetuating the long-running insult/innuendo that judges who invalidate patents dont care about facts or are "impotent" (in the case above, theres also a racial slant). At the same time, judges that are actually caught engaging in serious misconduct (and call other judges death squads) are defended by them because of their pro-trolls, pro-software patents stance. At the patent microcosms spheres, bias is revealing. They want more and more patents and they vehemently hate quality control for patents. They even call rejections and invalidations kills and call judges that they dont like a cabal that rubberstamps these rejections (are examiners a "cabal that rubberstamps low-quality applications"?); Only yesterday one of them called judges the death squad CRAWFORD, MOHANTY, BAYAT, in effect comparing patent judges to executioners, which is not fair and far from respectful.

Summary: The intentional lies, in addition to insults directed at judges who push back against patent maximalism, represent a new low for the US patent industry; like a pack of wild hyenas they just gang up against those who do the rational thing and what makes economic sense for their country

THE US patent system is no longer open to software patents. No matter how many of them the USPTO will allow to slip through, PTAB and district/federal courts will almost always say no. In our next post well talk about the consequences of this.

We are very disturbed to see patent law firms succumbing to the tactics of Team UPC. Truth no longer matters to them, so they just lie whenever that suits their financial agenda. They hope that by...


FBI warns of spike in phishing campaigns to gather W-2 information Security Affairs

The FBI is warning of a spike in phishing campaigns aimed to steal W-2 information from payroll personnel during the IRSs tax filing season.

The FBI has observed a significant increase since January of complaints of compromised or spoofed emails involving W-2 information.

Beginning in January 2017, IRSs Online Fraud Detection & Prevention (OFDP), which monitors for suspected IRS-related phishing emails, observed an increase in reports of compromised or spoofed emails requesting W-2 information. states the alert published by the FBI.

W-2 information is a precious commodity for crooks that are showing an increasing interest in tax data.

Law enforcement and security experts observed many variations of IRS and tax-related phishing campaigns, but most effective are mass data thefts, for example, campaigns targeting Human Resource (HR) professionals.

The most popular method remains impersonating an executive, either through a compromised or spoofed email in order to obtain W-2 information from a Human Resource (HR) professional within the same organization. continues the alert.

Individual taxpayers may also be the targeted, but criminals have evolved their tactics to focus on mass data thefts.

w-2 information

A separate warning od W-2 -related phishing campaigns was issued by the Internal Revenue Service.

The Form W-2 scam has emerged as one of the most dangerous phishing emails in the tax community. During the last two tax seasons, cybercriminals tricked payroll personnel or people with access to payroll information into disclosing sensitive information for entire workforces. reads the IRSs advisory issued in January. The scam affected all types of employers, from small and large businesses to public schools and universities, hospitals, tribal governments and charities.

Once cybe...


What Makes GLIBC 2.27 Exciting To The Clear Linux Folks Phoronix

Released at the beginning of February was Glibc 2.27 and it's comprised of a lot of new features and performance improvements. But what's the best of Glibc 2.27?..


Testing LDPC code erasure decoding performance Daniel Estvez

In my previous post I talked about the RFC5170 LDPC codes used in Outernet. There I explained in some detail the pseudorandom construction of the LDPC codes and the simple erasure decoding algorithm used both in free-outernet and in the official closed-source receiver.

The Outernet LDPC codes follow what I call the "identity scheme". This is different from the staircase and triangle schemes introduced in the RFC. The identity scheme already appeared in the literature, but it did not make it into the RFC. See, for instance, the report by Roca and Neumann Design, Evaluation and Comparison of Four Large Block FEC Codecs, LDPC, LDGM, LDGM Staircase and LDGM Triangle, plus a Reed-Solomon Small Block FEC Codec, especially Section 2, where it is called "LDGM".

I also commented that erasure decoding for an LDPC code (or any other linear code) amounts to solving a linear system. This can be done using any algebraic method, such as Gaussian elimination. However, the simple decoding algorithm used in Outernet is as follows: try to find an equation with only one unknown, solve for that unknown, and repeat until the system is solved. Clearly this algorithm can fail even if the system can be solved (see my previous post for some examples and formal results). I will refer to this algorithm as iterative decoding, as it is done in the RFC.

With these two things in mind, I wondered about the performance of the LDPC codes used in Outernet and the iterative decoding algorithm. I've done some simulations and here I present my results.

The notation I use in this post is the same that I used in the previous post. I won't introduce it again, so I refer the reader to the previous post to consult the notation.

I have done my simulations using Sage, since it provides a simple way of doing linear algebra over the field GF(2). I have used the Python code from free-outernet to generate the parity check matrices according to the RFC. To generate random numbers, I am using the most significant bits of the output of the Lehmer PRNG, as the RFC indicates, not the least significant bits (which are less random), as Outernet does. I guess that this difference doesn't impact the results much.

To perform the simulations, I fix a value of n and ...


Iran-linked group OilRig used a new Trojan called OopsIE in recent attacks Security Affairs

According to malware researchers at Palo alto Networks, the Iran-linked OilRig APT group is now using a new Trojan called OopsIE.

The Iran-linked OilRig APT group is now using a new Trojan called OopsIE, experts at Palo Alto Networks observed the new malware being used in recent attacks against an insurance agency and a financial institution in the Middle East.

One of the attacks relied on a variant of the ThreeDollars delivery document, the same malicious document was sent by the threat actor to the UAE government to deliver the ISMInjector Trojan.

In the second attack detected by PaloAlto, the OilRig hackers attempted to deliver the malicious code via a link in a spear phishing message.

On January 8, 2018, Unit 42 observed the OilRig threat group carry out an attack on an insurance agency based in the Middle East. Just over a week later, on January 16, 2018, we observed an attack on a Middle Eastern financial institution. In both attacks, the OilRig group attempted to deliver a new Trojan that we are tracking as OopsIE. reads the analysis from Palo Alto Networks.

The first attack occurred on January 8, 2018, the hackers sent two emails to two different email addresses at the target organization within a six minutes time span. Attackers spoofed the email address associated with the Lebanese domain of a major global financial institution.

OilRig launched another attack on January 16, in this case, the attackers downloaded the OopsIE Trojan from the command and control (C&C) server directly. The same organization was hit by OilRig for the second time, the first attacks occurred in 2017.

The researchers explained that the malware is packed with SmartAssembly and obfuscated with ConfuserEx.

The hackers gain persistence by creating a VBScript file and a scheduled task to run itself every three minutes. The OopsIE Trojan communicates with the C&C over HTTP by using the InternetExplorer application object.

By using the InternetExplorer application object, all C2 related requests will look as if they came from the legitimate browser and therefore will not contain any anomalous fields within the request, such as custom User-Agents. The OopsIE Trojan is configured to use a C2 server hosted at:

www.msoffice365cdn[.]com states the analysis.

The Trojan will construct specific URLs to communicate with the C2 server and parses the C2 servers response looking for content within the tags <pre> and </pre>. The initial HTTP request...


Russia VPN Blocking Law Failing? No Provider Told To Block Any Site TorrentFreak

Continuing Russias continued pressure on the restriction of banned websites for copyright infringement and other offenses, President Vladimir Putin signed a brand new bill into law July 2017.

The legislation aimed to prevent citizens from circumventing ISP blockades with the use of services such as VPNs, proxies, Tor, and other anonymizing services. The theory was that if VPNs were found to be facilitating access to banned sites, they too would find themselves on Russias national Internet blacklist.

The list is maintained by local telecoms watchdog Rozcomnadzor and currently contains many tens of thousands of restricted domains. In respect of VPNs, the Federal Security Service (FSB) and the Ministry of Internal Affairs is tasked with monitoring unblocking offenses, which they are then expected to refer to the telecoms watchdog for action.

The legislation caused significant uproar both locally and overseas and was widely predicted to signal a whole new level of censorship in Russia. However, things havent played out that way since, far from it. Since being introduced November 1, 2017, not a single VPN has been cautioned over its activities, much less advised to block or cease and desist.

The revelation comes via Russian news outlet RBC, which received an official confirmation from Rozcomnadzor itself that no VPN or anonymization service had been asked to take action to prevent access to blocked sites. Given the attention to detail when passing the law, the reasons seem extraordinary.

While Rozcomnadzor is empowered to put VPN providers on the blacklist, it must first be instructed to do so by the FSB, after that organization has carried out an investigation. Once the FSB gives the go-ahead, Rozcomnadzor can then order the provider to connect itself to the federal state information system, known locally as FGIS.

FGIS is the system that contains the details of nationally blocked sites and if a VPN provider does not interface with it within 30 days of being ordered to do so, it too will be added to the blocklist by Rozcomnadzor. Trouble is, Rozcomnadzor hasnt received any requests to contact VPNs from higher up the chain, so they cant do anything.

As of today, there have been no requests from the members of the RDD [operational and investigative activities] and state security regarding anonymizers and VPN services, a Roskomnadzor spokesperson said.

However, the problems dont end there. RBC quotes Karen Ghazaryan, an analyst at the Russian Electronic Communications Association (RAEC), who says that even if it had received instructions, Rozcomnadzor wouldnt...


Scientists warn of unusually cold Sun: Will we face another ice age? Terra Forming Terra

 Solar flare

 The figure of seven percent is been bandied about in terms of the apparent variation in solar output.  The Earth moderates this variation which surely follows the sunspot cycle and also underpins the hurricane cycle and the El Nino cycle as well as all other decadal systems identified.

If we discover that the typical variation is seven percent over an eleven year cycle, we have plenty of energy variation for the Earth's climate to accommodate.

Now imagine if there is a super cycle with sunspots that allowed the  two ore three lows to be stacked in line not allowing a proper recovery.  Thus a little ice age.

All our climate variation can be laid directly to this phenomena that we are slowly mapping and understanding.  What we do lack is two thousand years of good temerature data.

Scientists warn of unusually cold Sun: Will we face another ice age?

A study by the University of California San Diego has said the Sun will experience a cold period where all solar activities will be reduced drastically. 

February 8, 2018



Tachometer Uses Light, Arduinos Hackaday

To measure how fast something spins, most of us will reach for a tachometer without thinking much about how it works. Tachometers are often found in cars to measure engine RPM, but handheld units can be used for measuring the speed of rotation for other things as well. While some have mechanical shafts that must make physical contact with whatever youre trying to measure, [electronoobs] has created a contactless tachometer that uses infrared light to take RPM measurements instead.

The tool uses an infrared emitter/detector pair along with an op amp to sense revolution speed. The signal from the IR detector is passed through an op amp in order to improve the quality of the signal and then that is fed into an Arduino. The device also features an OLED screen and a fine-tuning potentiometer all within its own self-contained, 3D-printed case and is powered by a 9 V battery, and can measure up to 10,000 RPM.

The only downside to this design is that a piece of white tape needs to be applied to the subject in order to get the IR detector to work properly, but this is an acceptable tradeoff for not having to make physical contact with a high-speed rotating shaft. All of the schematics and G code are available on the project site too if you want to build your own, and if youre curious as to what other tools Arduinos have been used in be sure to check out the Arduino-based precision jig.


Puerto Rico's Arecibo Observatory Saved From Uncertain Fate SoylentNews

Arecibo Observatory, which is the second-largest radio telescope in the world, is under new management. A group led by the University of Central Florida will take over the operations of the telescope from the National Science Foundation, which was considering shutting down the observatory.

The telescope's fate had previously been uncertain. Back in 2016, the National Science Foundation announced that it was exploring different options in regard to Arecibo. There wasn't enough funding to continue supporting the telescope, so the NSF was looking at partnering with other organizations, scaling back or shutting down Arecibo entirely. That same year, the observatory was the first to capture repeating cosmic radio bursts, which have helped us understand the nature of our galaxy and the universe around it.

[...] But now, this new agreement ensures that Arecibo Observatory will remain open. It is scheduled to take effect on April 1st. UCF and its partners, Universidad Metropolitana in San Juan and Yang Enterprises, Inc. in Oviedo, also plan to expand the operations of the telescope. It's good news for the scientific community, and also for Puerto Rico.


Original Submission

Read more of this story at SoylentNews.


Vulkan Turns Two Years Old, What Do You Hope For Next? Phoronix

This last week marked two years since the debut of Vulkan 1.0, you can see our our original launch article. My overworked memory missed realizing it by a few days, but it's been a pretty miraculous two years for this high-performance graphics and compute API...


News Corp CEO Admits He Wants Internet Censored So News Corp Can Make More Money Terra Forming Terra

Right now, and most of you are unaware of this, Main stream media or MSM is struggling to both censor independent voices and to suppress alternative news sources.  Problem is that the primary reason that the MSM is losing market share is simply because they have at the same time abandoned all traditions for fair reporting as so clearly evidenced during the past three election cycles.
It was not particularly subtle and readers fled into the internet to do their own homework.  Thus the market responded with alt media and fresh voices sharing their readers and listeners curiosity.  They need to remember that this happened in the USSR as well.
Now they are trying to control what can be found in the internet.  It is all nonsense.
What it is promoting, not voiced yet, is the formal breakup up of all forms of media ownership concentration as abusive monopoly manipulation.   The laws do exist but that battle has yet to be joined.  It is coming as sure as day follows night..
News Corp CEO Admits He Wants Internet Censored So News Corp Can Make More Money

The potential returns for our journalism would be far higher

Paul Joseph Watson

February 9, 2018

The CEO of News Corp. has admitted that big corporations are pushing for the likes of Google and Facebook to censor alternative media outlets so that News Corp-owned publications can make more money.

The admission is contained in an AFP article about Robert Thompson, CEO of the publishing arm of Rupert Murdochs media empire.

Thompson accuses Google and Facebook of creating a dysfunctional and debased online environment by failing to crack down on what he calls bot-infested badlands, and that this lack of censorship is making it harder to achieve a safe space for advertisers.

Thompson goes on to compla...


Our Road to Immortality Terra Forming Terra

One of the questions that has forever haunted humanity is whether or not immortality is possible at all in our third tier matter form.  Our driving spiritual form is also physical in terms of second tier matter and surely provides immortality in that way.  Yet we have a serious investment in our third tier form and perhaps forgetting the spirit life we yearn for a much longer life than we have available.

In fact for most, return to the spirit form is likely the preferred option.  Usually the investment is simply insufficient to justify lingering at all, or worse, a misstep is hindering meaningful improvement.  It is completely reasonable that a spirit would need to process a full cycle of lives before deemed ready to live a long sustained life in the Third Tier.  Such a cycle would apparently consist eight separate live usually over eighty years or so but don in multiple aspects.  This is important.  It is reasonable to be on earth in thirty two separate individuals following naturally tracking paths allowing a variety of decisions to be made and investigated.  At the end of each life you would subsume all thirty two lives into your personality.

The consequence is that a matured spirit will have experienced eight times thirty two lives instead of a mere eight and the dominant thread emerges out of this.  I do not ask you to buy this but to consider the plausibility.   

Rather obviously we will want matured spirits to emerge in the last life and that with only the principal aspect at that.  Thus the class of potential immortals will always be perhaps at most around one out of 256 at most and actually much less as these eight century cycles of spiritual evolution will often need to be repeated several times.

This is obviously a complete theological departure.  please do not forget that our spirit bodies are physical and understand that they have forever to work all this out.  So why not?...


SpaceX engine production and rocket capacity Terra Forming Terra

What we have here is production capacity to launch monthly at least and haul serious tonnage at the same time.  This is essentially continuous operation allowing a steady lowering of the cost profile.
The actual launch capacity now matches the Saturn standard with the heavys.  Thus it becomes plausible to support a true space station.  Such a station should be a balloon through which we have an axle consisting of a large cross section tube to handle docking g and construction storage and hanger decks.  We can then suspend cable stayed decks around the rotational axis and sustain centripetal acceleration on the decks allowing artificial gravity for work to be done.
I like to call these dyson spheres though initially need to be small..
SpaceX engine production and rocket capacity
brian wang | February 8, 2018

SpaceX is producing about 5 engines per week and has the factory capacity for 400 engines per year or about 8 engines per week....


Robot keeps elderly loved ones connected Lifeboat News: The Blog

A friendly robot is helping the elderly stay connected to family and friends.


A.I. will be billions of times smarter than humans and man needs to merge with it, expert says Lifeboat News: The Blog

Ian Pearson, a futurist at Futurizon, said there will need to be a link between AI and a human brain.


PAL-V will soon debut its flying car vehicle Lifeboat News: The Blog

PAL-V could deliver what many have promised but few provided.


This robot can lay up to 400 bricks per hour Lifeboat News: The Blog

Bricklaying robots could build your next home 5 times faster than a human. .


Heres why people are working on languages for computers that barely exist Lifeboat News: The Blog

There may soon be more quantum programming languages than there are quantum computers.


For The First Time Ever, Astronomers Have Observed a Black Hole Ejecting Matter Twice Lifeboat News: The Blog

Black holes dont just sit there munching away constantly on the space around them. Eventually they run out of nearby matter and go quiet, lying in wait until a stray bit of gas passes by.

Then a black hole devours again, belching out a giant jet of particles. And now scientists have captured one doing so not once, but twice the first time this has been observed.

The two burps, occurring within the span of 100,000 years, confirm that supermassive black holes go through cycles of hibernation and activity.


Dyson bets on electric cars to shake up industry Lifeboat News: The Blog

Engineering pioneer will produce 3 vehicles from scratch in bold 2 billion venture, Financial Times reports.


Quantum computers offer next level processing Lifeboat News: The Blog

Quantum computing will transform our computing capabilities.


Researchers Invent Tiny, Light-Powered Wires To Modulate Brain's Electrical Signals SoylentNews

The human brain largely remains a black box: How the network of fast-moving electrical signals turns into thought, movement and disease remains poorly understood. But it is electrical, so it can be hacked--the question is finding a precise, easy way to manipulate electrical signaling between neurons.

A new University of Chicago study shows how tiny, light-powered wires could be fashioned out of silicon to provide these electrical signals. Published Feb. 19 in Nature Nanotechnology, the study offers a new avenue to shed light on--and perhaps someday treat--brain disorders.

[...] A team led by Asst. Prof. Bozhi Tian built minuscule wires previously designed for solar cells. These nanowires are so small that hundreds of them could sit side by side on the edge of a sheet of paper--putting them on the same scale as the parts of cells they're trying to communicate with.

These nanowires combine two types of silicon to create a small electrical current when struck by light. Gold, diffused by a special process onto the surface of the wire, acts as a catalyst to promote electrochemical reactions.

"When the wire is in place and illuminated, the voltage difference between the inside and outside of the cell is slightly reduced. This lowers the barrier for the neuron to fire an electrical signal to its neighboring cells," Tian said.

The team tested the approach with rat neurons grown in a lab, and saw they could indeed trigger neurons to fire these electrical signals.

"The nice thing about it is that both gold and silicon are biologically compatible materials," said graduate student Ramya Parameswaran, the first author on the study. "Also, after they're injected into the body, structures of this size would degrade naturally within a couple of months."

Original Submission

Read more of this story at SoylentNews.


Robotic Laser Keeps Cat Entertained While You Hack Hackaday

Whether its our own cat or a neighbors, many of us have experienced the friendly feline keeping us company while we work, often contributing on the keyboard, sticking its head where our hands are for a closer look, or sitting on needed parts. So how to keep the crafty kitty busy elsewhere? This roboticized laser on a pan-tilt mechanism from the [ team] should do the trick.

The laser is a 650 nm laser diode mounted on a 3D printed pan-tilt system which they found on Thingiverse and modified for attaching the diodes housing. Its all pretty lightweight so two 9G Micro Servos do the grunt work just fine. The brain is an Arduino UNO running an open-source VarSpeedServo library for smooth movements. Also included are an HC-05 Bluetooth receiver and an Android app for controlling the laser from your phone. Set it to Autoplay or take a break and use the buttons to direct the laser yourself. See the video below for build instructions and of course their cat, [Pepper], looking like a Flamenco dancer chasing the light.

Think your cat might get bored chasing a light around by itself? Mount the laser on a mobile robot with added IR proximity sensor which can roll around and play with the cat.


A Unifying Blockchain to Enhance Interoperability, Scalability and Usability Within the Ecosystem TechWorm

There internet as a fundamental tool in the development of humankind has experienced constant growth since its creation. This growth has been in phases and currently, the world is in the phase of the Internet of Value (IoV), which is significantly powered by the blockchain.

A community of independent entities

The ease of value transfer is very crucial if the emerging blockchain technology must find a prominent place within the mainstream. In its current state, the blockchain industry is littered with several independent blockchains and their respective tokens. These as individual solutions are contributing positively to in their respective ways towards the development of the digital world. However, as a unit, having so much independent units in one environment portends a semblance of chaos and disharmony.

To solve this problem, the blockchain ecosystem needs to find a solution to certain problems that are fundamental and cut across all the individual entities. These include the problems of  interoperability, scalability and usability. These problems make it impossible for the various independent entities to interact effectively, hence they offer limited solutions.

Bringing everyone together

In other to find a solution to the above mentioned problems and improve the adaptability of blockchain technology to mainstream processes, FUSION is creating an inclusive cryptofinance platform that is based on blockchain. This platform will enhance a seamless interaction between blockchain platforms and their tokens.

Fusion is building a value transfer infrastructure that is based on various tokens. This infrastructure can convert values across various blockchains and can fulfill almost all the functionality of traditional finance, but in a distributed and more efficient manner, with substantial cost savings.

To this point, the interactive gateway for tokens and cryptocurrencies remain the crypto exchanges. This is not a closed system and at the same time could involve some cumbersome and non-seamless procedures. With Fusions  establishment of a public blockchain as an inclusive cryptofinance platform, the existing bottlenecks of of interoperability and scalability can be overcome.

Shaping up the ecosystem

In order to achieve this, FUSION utilizes distributed network nodes to control various types of tokens private keys and, in this way, it connects various values by establishing a control and management layer on top of all types of blockchains. At the same time, it becomes feasible to build cross blockchain smart contracts. In order to further expand interoperability and scalability...


New Challenges May Lie Ahead for Use of CRISPR in Humans Lifeboat News: The Blog

In our weekly news roundup: researching immunity to CRISPR, this years flu season, the legal battle over frozen embryos, and more.


Aerospace Company to Launch Private, Inflatable Space Stations Lifeboat News: The Blog

Bigelow Aerospace announced plans for sending soft-bodied modules that are compressed during launch but expand once they reach space.


6 Cloud Computing Tips for Small Businesses TechWorm

Cloud computing has seen incredible steps forward in the last 10 years and unsurprisingly, that means the adoption rates within small to medium sized industries has soared.

However, like all aspects of IT, cloud computing doesnt stand-still and understanding how to leverage the technology for maximum effect is often outside the knowledge based of company owners and decision makers whose expertise lays predominantly in other fields.

Well take you through 6 of the most important tips that small businesses should consider when implementing and working with cloud-based IT tech, from security and backups to collaboration and recruitment

Encourage collaboration

Cloud networking has had a fascinating impact on peoples ability to truly collaborate with one another.

Heres an interesting fact:

Large companies report that the effectiveness and productivity that comes as a result of collaborating over the cloud far surpasses anything that was seen when workers sat at desks close to one another and shared documents in a more rudimentary fashion. If youve been in a workplace that duplicates spreadsheets before adding to them, renaming them then recirculating them, youll know exactly how frustrating this can be!

So, the teamwork is strong when youre not sitting with your team it would appear.

With this in mind, you should be encouraging your team to fully buy-in to these new collaboration tools. Whether youre simply file-sharing using an service like DropBox, Googles G-Suite or Microsofts 365 range of products or working hand-in-hand on complex projects in specialist software, it turns out that we get more done when were digitally together.

Always be thinking about security

The cloud offers a huge array of benefits but security isnt touted as being one of those things. Thats not to say that the cloud is a big risk the companies who are providing the services are huge and highly reputable in most cases, but be careful not to be lulled into a false sense of security.

In many instances, technology isnt to blame when things go wrong with the cloud for every genuine hack theres likely to be 1,000 instances of human error whether thats lost files, poor passwords or other risky online behaviour.

As such, you should start by implementing strong policies and procedures around your employees access to cloud based resources.

Of course, data security isnt just limited to protecting against those with malicious intent there are countless more instances of file loss or file corruption that dont get the same kind of coverage that a hack does so you also need to think about backing up.

Backing up cloud-based services and data might seem counterintuitive, after all, isnt that what the cloud is really?



Unexpected Ways That Artificial Intelligence Will Change Your Life In The Next 10 Years Lifeboat News: The Blog

We wanted to delve a little deeper into the future of AI, so we spoke to some experts working in the industry about how its expected to affect your dating, work and personal life very soon


GCC 8 Will Let You -march=native Correctly On ARM/AArch64 Phoronix

Linux developers and enthusiasts on x86_64 have long enjoyed the ability to use the -march=native option for having the GCC compiler attempt to auto-detect the CPU and set the appropriate microarchitecture flags. That support is finally being offered up for ARM with GCC 8...


The Unified Patent Court (UPC) is Dead, But Spin From Team UPC is Now Abundant Techrights

Bristows seems to be promoting the EPOs management again (even at IP Kat, which makes one wonder who controls this blog after the silence on EPO scandals)

The end
Team UPC is as bad as Big Tobacco lobbyists

Summary: As we predicted, Team UPC is now denying the very facts about a German court agreeing to hear a major UPC complaint, exploiting blogs with a larger audience to spread falsehoods

THE UPC has been a zombie for quite a while and a few days ago it was the final nail on its coffin. EPO management has said not even a single word about it; silence in this case is deafening. As for Team UPC? Thats another story

UP & UPC Conference, a relatively obscure account with almost no followers, carries on as though nothing happened. The UPC is effectively dead, but people/accounts whose whole/sole purpose is UPC promotion do not let facts get in the way. Liz Coleman, Divisional Director of @The_IPO, [UK-IPO] it says, will speak at the upcoming UP&UPC conference on 3 July, @EPOorg in Munich.

Thats 3 days after Campinos takes over and by that stage, more or less for sure, it will have been too late for the UK (of UK-IPO) to do anything about UP&UPC. Brexit timeline suggests so. So what is even the point of this event? They might as well just call it off to save people the trouble.

We are rather worried to see what goes on at IP Kat, which until recently had among its writers a Battistelli friend from CIPA. Bristows wrote no less than 4 articles in IP Kat yesterday (thats just one day). Makes one wonder who controls the blog nowadays the most prolific writer is from Bristows, which lies a lot for the UPC. Bristows is like a leech that uses other peoples blogs (Kluwer Patent Blog and IP Kat for the most part) to disseminate its lies because almost nobody reads Bristows own blog. Its almost defunct. Yesterday, like 3 days ago, Bristows published a test page (long UPC ramble/marketing) and forgot to remove it. Why does that keep happening?

Anyway, going back to IP Kat, yesterday it published an EPO ad and it...


Tor Director Shari Steele Will Step Down at the End of the Year SoylentNews

Shari Steele is resigning her position as the director of the Tor Project, according to a report by Cyberscoop. Steele will remain director through December 31st, and the search for her replacement is still underway.

[...] For many, Steele's directorship, which started in December 2015, signaled a sea change within the organization and shifted Tor towards being more inclusive and community focused.

[...] "I had intended to retire after my time with EFF, but I believed strongly in the Tor Project's mission, and I felt I could help," Steele wrote in a blog post after the news broke. "I look at the Tor Project organization today and feel quite confident that we've got the talent and the structure to continue to support the organization's great work."

Source: The Verge

Original Submission

Read more of this story at SoylentNews.


EPO Roundup: Low Profile, Employment Changes, Patent Trolls, Refusal to Obey Courts, and Animal Breeding Patents Techrights

Breeding patents back on the agenda


Summary: A few recent developments and observations regarding the European Patent Office (EPO), which is in a volatile state and is making no public statement about the future of staff (canteen talk now revolves around alleged deep cuts to staffing)

THE EPO has made no announcements for quite a while. Low profile seem to have generally been kept so far this year. Weve hypothesised about the reasons for this, but these are merely hypotheses. We can recall days (or months) when the EPO made plenty of controversial statements, but nowadays both the site and the accounts (of the EPO) say nothing of great importance. Yesterday the EPO spoke about intellectual property & patents, which is an odd way to frame things. Its misleading to say that, I told them, because the former is a propaganda term, the latter a law which is typically put under this umbrella thats a propaganda term. Its not a property.

Unlike the USPTO, the EPO does not deal with anything but patents (the T in USPTO stands for trademarks). Its important to separate all these things and not refer to them collectively using terms like IP, which perpetuates old falsehoods. Speaking of which, theres that old canard about innovation in yesterdays news from the US. Real invention isnt to be measured in terms of patents, but the article Washington state stakes its claim as a bastion for invention would have us believe otherwise. To quote:

Washington was home to 2,220 inventors in 2017 (29.98 per capita), behind New Yorks 2,290, Texas 3,007 and Californias 10,009, according to U.S. Patent and Trademark Office data.

This has a lot to do with where large corporations are based, not with inherent spark for inventorship. Well revisit this topic later in the weekend. We intend to write a lot about the US.

It has meanwhile been...


Andreessen Horowitz invests in in digital custody startup Anchor Labs Lifeboat News: The Blog

Andreessen Horowitz has invested in Anchor Labs, a stealthy startup planning to provide digital asset custody, according to multiple sources. The startup is raising up to $17 million in Series A funding, according to a Delaware filing from December that Axios obtained from Lagniappe Labs, though its not clear whether the round has closed yet and who else participated.

Hot commodity: Anchor Labs opted to raise funds after acquisition talks with Coinbase didnt end in a deal. In November, Coinbase unveiled its own plans to provide custody services to institutional investors.

Read more toggle.


Stretched PC Case Turned GPU Cryptominer Hackaday

We dont do financial planning here at Hackaday, so we wont weigh in on the viability of making money mining cryptocurrency in such a volatile market. But we will say that if youre going to build a machine to hammer away at generating Magical Internet Monies, you might as well make it cool. Even if you dont turn a profit, at least youll have something interesting to look at while you weep over your electricity bill.

Sick of seeing the desktop machine he built a decade ago gathering dust, [plaggle24w5] decided to use it as the base for a cryptocurrency mining rig. Of course, none of the original internals would do him any good, but the case itself ended up being a useful base to expand on. With the addition of some 3D printed components, he stretched out the case and installed an array of video cards.

To start with, all the original plastic was ripped off, leaving just the bare steel case. He then jammed a second power supply into the original optical drive bays to provide the extra power those thirsty GPUs would soon be sucking down. He then designed some 3D printed arms which would push out the side panel of the case far enough that he could mount the video cards vertically alongside the case. Three case fans were then added to the bottom to blow...


Car Companies Are Preparing to Sell Driver Data to the Highest Bidder SoylentNews

OEMs aren't just connecting cars for the fun of it; the idea is to actually improve their customers' experience with the cars. But right now, we're still missing an actual killer appand to be honest, data on how many customers renew those cell contracts for their vehicles. A survey out this week from Solace that polled 1,500 connected car owners found that they still don't really trust the technology.

[...] But the bit of Solace's survey I found most interesting was the widespread ignorance regarding data collection. Only 38 percent of connected car drivers knew that their cars could store personally identifiable information [PII] about them, with 48 percent unaware this was the case. And that's important because that PII is being viewed as a goldmine.

[...] "[The fuel companies] want to offer you more than fuel," [Ben] Volkow said. "Many times, the fuel stations are also interested in anonymized datawhy do some people always stop, do they take whatever's available or a specific brand, places to build new stations, and so on."

What's more, unlike selling cars, selling data is a high-margin businessbetween 80- and 90-percent profit. "A big part of the investment is already done," he said. "The databases are built, SIMs and modems are in the cars; they've crossed the Rubicon."

[...] Volkow thinks that drivers will be happy to share this data, as long as they get some value out of it, like free servicing or micropayments per mile traveled. But he also thinks consumer education is vital. "People tend to be more demanding when it comes to cars; they don't think of them as the same as mobile devices. You have to convince them there's a benefit," he told me.

Source: ArsTechnica

Original Submission

Read more of this story at SoylentNews.


8,000-Year-Old Heads on Spikes Found in Swedish Lake SoylentNews

In east-central Sweden, workers demolishing a railway that crossed the Motala Strm River discovered something bizarre. For roughly 7,500 years, a shallow, swampy lake in the area had hidden a pile of stones that contained the skeletal remains of at least 10 people and weapons made of stone and antler. They also found the bones of bears, deer, boar, and a badger. Two of the human skulls were mounted on pointed stakes.

Thousands of years ago, this semi-submerged burial ground must have been an imposing sight for the small settlements located nearby. A pile of rocks rose above the water, covered in weapons, wooden structures, and the grisly remains of fearsome animalsas well as the skulls of some carefully chosen people. Now dubbed "Kanaljorden," the archaeological site has finally begun to yield some secrets about the people who created it. In a recent article for Antiquity, Stockholm University archaeologist Sara Gummesson and her colleagues explain what the evidence reveals about how this ritual site was used.

Though we've seen lots of heads on stakes in Game of Thrones and various movies, Kanaljorden is the first time anyone has found evidence in real life that Stone Age people in this area were mounting heads on stakes. And their reasons are not quite what you might imagine.

Antiquity, 2018. DOI: 10.15184/aqy.2017.210

Source: ArsTechnica

Original Submission

Read more of this story at SoylentNews.


Intel didn't give government advance notice on chip flaws The Hill: Technology Policy

Intel did not inform U.S. officials of major computer chip flaws until they were leaked to the public six months after the firm first became aware of the vulnerabilities, according to letters the company sent lawmakers. In a letter to...


MIT predicts 10 breakthrough technologies of 2018 Lifeboat News: The Blog

The MIT Technology Review has released a list of technologies it believes will make the most impact over the next 12 months, including smarter cities, genetic fortune telling and babel fish earphones.

The Massachusetts Institute of Technologys magazine has published the annual list online in its March/April 2018 issue, and based its contents on the innovations that will shape the coming year.

What Tech Review looks for when selecting the list is to identify what will have a profound effect on our lives, said a statement from the institution, based in Cambridge, Massachusetts.


Tiny Quad Core Module Available Soon Hackaday

We get a lot of new product announcements here at Hackaday, and we run across even more. As excited as a manufacturer might be about their latest Raspberry Pi killer or cheaper Arduino clone, we usually dont have much to say about new products unless there is something really interesting about them. Our attention was piqued though when we saw the Neutis N5. Shipping in April, the device packs a quad-core ARM processor running at 1.3 GHz with 8 GB of flash memory and 512 MB of RAM, has an extended temperature range, WiFi (802.11N), and Bluetooth (including BLE). Theres also a crypto chip, and all this is packed into a tiny package. Really tiny. Less than 4130 mm square and less than 4.5 mm thick. Theres a Debian-based distribution and a development board. Oh and the really interesting thing is the price, which is $49 in single quantities.

Some of the I/O ports are multiplexed, but there are plenty of options including audio, Ethernet, HDMI, USB, and more. They clearly mean for these to be put into products. The module claims UL and CE certification, each unit has a unique serial number, and there is a gang programming capability.

For comparison purposes, an SD card is 32 mm x 24 mm and not quite as thick (2.1 mm). So the N5 is a little larger, but not by much. A Raspberry Pi is huge by comparison at just under 86 mm x 57 mm. Even a Pi Zero is 65 mm x 30 mm.

Admittedly we havent seen one of these yet, and everything always looks good on paper. Still, if it lives up to its promise it could give a run for the money to the Raspberry Pi and Beaglebone markets. Especially if you are trying to build it into something.

We have seen lots of cheaper or smaller Pi killers, like the Orange Pi. If you want to go the opposite direction on the price and performance scale, there is always try the HiKey 290.


Facebook apologizes for virtual shooting game demo at CPAC The Hill: Technology Policy

Facebook removed a virtual reality shooting game demonstration after facing backlash over the timing of showcasing the game one week after the Parkland, Fla., shooting.The company let visitors at the Conservative Political Action...


LA Times website hacked to mine Monero cryptocurrency HackRead

By Waqas

Another day, another Monero cryptocurrency miner This time, the target

This is a post from Read the original post: LA Times website hacked to mine Monero cryptocurrency



Ancient Britons Replaced By Newcomers SoylentNews

Arthur T Knackerbracket has found the following story:

The ancient population of Britain was almost completely replaced by newcomers about 4,500 years ago, a study shows.

The findings mean modern Britons trace just a small fraction of their ancestry to the people who built Stonehenge.

The astonishing result comes from analysis of DNA extracted from 400 ancient remains across Europe.

The mammoth study, published in Nature, suggests the newcomers, known as Beaker people, replaced 90% of the British gene pool in a few hundred years.

Lead author Prof David Reich, from Harvard Medical School in Cambridge, US, said: "The magnitude and suddenness of the population replacement is highly unexpected."

The reasons remain unclear, but climate change, disease and ecological disaster could all have played a role.

Read more of this story at SoylentNews.


Enzyme Designed Entirely From Scratch Opens a World of Biological Possibility Lifeboat News: The Blog

Ann Donnelly was utterly confused the first time she examined her protein. On all counts, it behaved like an enzymea protein catalyst that speeds up biological reactions in cells. One could argue that enzymes, sculpted by eons of evolution, make life possible.

There was just one problem: her protein wasnt evolved. It wasnt even natural. It was, in fact, a completely artificial construct made with random sequences of DNAsomething thats never existed in nature before.

Donnelly was looking at the first artificial enzyme. An artificial protein that, by all accounts, should not be able to play nice with the intricate web of biochemical components and reactions that support life.


Wine "PBA" Shows Potential For Improving Direct3D-Over-OpenGL Performance Phoronix

University student Andrew Comminos wasn't too familiar with Direct3D or Wine development, but out of a desire for better World of Warcraft performance on Linux, he figured out the code-base and a means of enhancing the WineD3D code...


[SECURITY] CVE-2017-15693 Apache Geode unsafe deserialization of application objects Open Source Security

Posted by Anthony Baker on Feb 23

CVE-2017-15693 Apache Geode unsafe deserialization of application objects

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Geode 1.0.0 through 1.3.0

The Geode server stores application objects in serialized form.
Certain cluster operations and API invocations cause these objects to
be deserialized. An user with DATA:WRITE access to the cluster may be
able to cause remote code execution if...


[SECURITY] CVE-2017-15692 Apache Geode unsafe deserialization in TcpServer Open Source Security

Posted by Anthony Baker on Feb 23

CVE-2017-15692 Apache Geode unsafe deserialization in TcpServer

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Geode 1.0.0 through 1.3.0

The TcpServer within the Geode locator opens a network port that
deserializes data. If an unprivileged user gains access to the Geode
locator, they may be able to cause remote code execution if certain
classes are present on the classpath.

A malicious...


SUNY math professor makes the case for free and open educational resources ( looks at the availability of open educational resources (OERs), where to find them, and what the advantages of OERs are. Math and computer science professor David Usinski is a strong advocate for OERs and was interviewed for the article. "The ability to customize the curriculum is one of David's favorite benefits of OER. 'The intangible aspect is that OER has allowed me to reinvent my curriculum and take ownership of the content. With a textbook, I am locked into the chapter-by-chapter approach by one or two authors,' he says. Because of OER 'I am no longer hindered or confined by published materials and now have the flexibility to create the curriculum that truly addresses the course outcomes.' By freely sharing the content he creates, other instructors can also benefit."


Uiterwijk: Fedora package delivery security

On his blog, Patrick Uiterwijk writes about about Fedora packaging and how the distribution works to ensure its users get valid updates. Packages are signed, but repository metadata is not (yet), but there are other mechanisms in place to keep users from getting outdated updates (or to not get important security updates). "However, when a significant security issue is announced and we have repositories that include fixes for this issue, we have an 'Emergency' button. When we press that button, we tell our servers to immediately regard every older repomd.xml checksum as outdated. This means that when we press this button, every mirror that does not have the very latest repository data will be regarded as outdated, so that our users get the security patches as soon as possible. This does mean that for a period of time only the master mirrors are trusted until other mirrors sync their data, but we prefer this solution over delaying getting important fixes out to our users and making them vulnerable to attackers in the meantime."


See Jupiters South Pole Change Over Time in Incredible Time-Lapse View Lifeboat News: The Blog

New photos by NASAs Juno spacecraft show Jupiters south pole as seen from above during a recent close encounter on Feb. 7, 2018.


A Little Robotic Submarine Could Ply Alien Seas Lifeboat News: The Blog

NASA is designing a robot submarine to explore the ultrachilly, hydrocarbon-filled seas on Saturns moon Titan the only body in the solar system, apart from Earth, with liquid on its surface. Researchers have been testing the probe with a bucket-sized mock alien ocean in a lab.

The seas of Titan are very different from their counterparts on Earth: instead of seawater, Titans seas consist mainly of a frigid mixture of methane and ethane, at a temperature of around minus 300 degrees Fahrenheit (minus 184 degrees Celsius). Thats what NASAs Cassini spacecraft and its Huygens probe, which landed on Titan in 2005, found.

The plan is to send the autonomous submarine into the largest sea on Titan. called Kraken Mare, from the name of a Scandinavian sea-monster and the Latin word for sea, the extraterrestrial sea covers 155,000 square miles (400,000 square kilometers) of the moons surface. (The second-largest sea on Titan, about a quarter the size of Kraken, is Ligeia Mare, named after one of the monstrous sirens of Greek mythology.) [See Photos of Titans Oceans].


Bigelow Aerospace Reveals Plans For Space Hotels Lifeboat News: The Blog

The rise of commercial spaceflight companies such as SpaceX and Bigelow Aerospace sparked the age of space tourism as the ultra-wealthy became able to buy a ticket for a rocket ride into space. Of course, there is a huge limit on tourism if there isnt a place to stay in ones intended destination, but thats about to change in space. Bigelow has announced plans to build two space stations that will float in low-Earth orbit. The company has big plans for these space stations and ideas about who might pay to use them. Essentially, the stations will be like orbiting space hotels where astronauts and possibly even tourists might stay one day.

In a press release this week, Bigelow Aerospace announced that it has created a spin-off venture called Bigelow Space Operations, which will operate and manage two space stations that will serve as hotels. The company expects to launch both hotels in 2021, and its beginning to work toward building them this year. Bigelow describes the two space stations as the largest, most complex structures ever known as stations for human use in space.

The two stations are currently being referred to as B330-1 and B330-2, and they arent the only two that Bigelow Space Operations plans to build. The two space stations are inflatable and will provide shelter for up to six people in low-Earth orbit with about 12,000 cubic feet of living space.


Disney's Lawsuit Against Redbox May Have Backfired SoylentNews

Disney's attempt to prevent Redbox from buying its discs for rental and resale may have blown up in the House of Mouse's face. The Hollywood Reporter describes how District Court Judge Dean Pregerson sided with Redbox to shoot down a Disney-mandated injunction. In addition, Pregerson contended that Disney may itself be misusing copyright law to protect its interests and its own forthcoming streaming service.

If you're unfamiliar with the backstory, Redbox didn't have a deal in place to procure Disney DVDs and Blu-rays for its disc rental kiosks. So, the company simply bought the discs at retail, often snagging combo packs that include a DVD, Blu-ray and a download code for the movie as well. Redbox would then offer up the discs for rental, and sell on the codes at its kiosks for between $8 and $15.

Such a move enraged Disney, which includes language in its packaging and on the website demanding that users must own the disc if they download a copy. But this is where Pregerson began to disagree, saying that Disney cannot dictate what people do with copyrighted media after they have bought it. Specifically, that there's no law, or explicit contract term, that prevents folks from doing what Redbox did with Disney discs.


Original Submission

Read more of this story at SoylentNews.



3D Printing Brings a Childs Imagination to Life Hackaday

Telling somebody that youre going to make their dreams come true is a bold, and potentially kind of creepy, claim. But its one of those things that isnt supposed to be taken literally; it doesnt mean that youre actually going to peer into their memories, extract an idea, and then manifest it into reality. Thats just crazy talk, its a figure of speech.

Original sketch of the CURV II

As it turns out, theres at least one person out there who didnt get the memo. Remembering how his father always told him about the elaborate drawings of submarines and rockets he did as a young boy, [Ronald] decided to 3D print a model of one of them as a gift. Securing his fathers old sketchpad, he paged through until he found a particularly well-developed idea of a personal sub called the CURV II.

The final result looks so incredible that we hear rumors manly tears may have been shed at the unveiling. As a general rule you should avoid making your parents cry, but if youre going to do it, you might as well do it in style.

Considering that his father was coming up with detailed schematics for submarines in his pre-teen days, it...


AMDGPU In Linux 4.17 Exposes WattMan Features, GPU Voltage/Power Via Hwmon Phoronix

AMD's Alex Deucher today sent in the first pull request to DRM-Next of AMDGPU (and Radeon) DRM driver feature material that will in turn be merged with the Linux 4.17 kernel down the road. There's some fun features for AMDGPU users coming with this next kernel!..


Camera Technology In Vehicles: Low-Latency Image Data Compression SoylentNews

Arthur T Knackerbracket has found the following story:

The number of cameras in cars is increasing. However, through the flood of data the internal networks are being pushed to their limits. Special compression methods reduce the amount of video data, but exhibit a high degree of latency for coding. Fraunhofer researchers have adapted video compression in such a way that a latency is almost no longer perceivable. It is therefore of interest for use in road traffic or for autonomous driving. This technology will be on display at the Embedded World from 27 February until 1 March 2018 in Nuremberg in hall 4 (booth 4-470).

[...] The Fraunhofer HHI, for example, has made a decisive contribution to the development of the two video coding standards H.264/Advanced Video Coding (AVC) and H.265/MPEG High Efficiency Video Coding (HEVC). "With these methods, the data quantities can be sharply reduced. In this way, more than ten times the quantity of data can be transmitted," emphasizes the group leader of the "Video Coding and Machine Learning" department at the Fraunhofer HHI.

Read more of this story at SoylentNews.


Mesa 18.1 Receives OpenGL 3.1 With ARB_compatibility For Gallium3D Drivers Phoronix

Going back to last October, Marek of AMD's open-source driver team has been working on ARB_compatibility support for Mesa with a focus on RadeonSI/Gallium3D. Today that work was finally merged...


ISO 27001 & cybersecurity training and qualifications: Now in New York Help Net Security

Achieve globally recognized ISO 27001 qualifications by learning from experienced practitioners. Get practical and interactive instruction with classroom and live and online training from Foundation level through to Lead Implementer or Lead Auditor qualifications.


Build Your Own Altair 8800 Personal Computer IEEE Spectrum Recent Content full text

Go back to 1974 and the dawn of home computing with this Arduino-based kit Photo: Randi Klett

Altair 8800 Computer Gif: Randi Klett

The MITS Altair 8800 was the first commercially successful personal computer. Created by Ed Roberts in 1974, it was purchased by the thousands via mail order, proving there was a huge demand for computers outside universities and large corporations. Its influence was immense: For example, after seeing the Altair featured on the cover of the January 1975 issue of Popular Electronics , Bill Gates and Paul Allen founded Microsoft (then Micro-Soft) in order to write a Basic interpreter for the new machine.

The Altair sold for US $439 in kit form. Original machines are now collectors items that trade for thousands of dollars. Fortunately, there are some cheaper alternatives for people who want to get a direct understanding of the Altair computing experience. Modern kits that replicate the Altair hardware as faithfully as possible are available, as are purely virtual online simulators. Falling somewhere between a replica and a simulation is the $149 Altairduino kit from Chris Davis. The Altairduino duplicates the front panel of the Altair in all its LED- and switch-festooned glory while emulating the internal hardware (including some once fantastically expensive peripherals), using an Arduino Due.

The Altairduino is derived from David Hansels work on cloning the Altair with the Arduino Due and Arduino Mega 2560. If you want to build one of Hansels designs from scratch, you can do so by following his free instructions on The advantage of Daviss kit is that it provides all the components, including a nice bamboo case and plastic front panel, along with a custom printed circ...


Which phishing messages have a near 100% click rate? Help Net Security

Training employees to spot phishing emails, messages and phone calls cant be done just once or once a year if the organization wants to see click rates decrease. For one thing, employees come and go (and change roles) with regularity. Secondly, threats change over time. Thirdly, knowledge and practices that arent regularly reinforced will be lost. And, finally, awareness isnt the same as knowledge. Just knowing a threat exists isnt the same as knowing how More


Xen Security Advisory 254 (CVE-2017-5753,CVE-2017-5715,CVE-2017-5754) - Information leak via side effects of speculative execution Open Source Security

Posted by Xen . org security team on Feb 23

Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254

Information leak via side effects of speculative execution


Corrections to ARM SP2 information:

* ARM 32-bit requires new firmware on some CPUs.
* Provide link to the ARM firmware page, accordingly.
* ARM 32-bit mitigations are complete for Cortex-A CPUs.
We do not have...


Arduino Watchdog Has Bite And Doesnt Need Treats Hackaday

My dog Jasper isnt much of a watchdog: hes too interested in sleeping and chasing my cats to keep an eye on things. Fortunately, [Vadim] has come up with a more reliable alternative with this simple Arduino watchdog. Its designed to work with crypto coin mining rigs, but it could be easily adapted for other high-uptime uses, such as file servers or doomsday weapons.

The way it works is simple: a small program on the watched computer sends a command over the serial port: a polite hello. The Arduino watchdog picks this up and responds with an equally polite HELLO. That starts the watchdog running. A simple Java program on the watched computer then sends a ping every five seconds over the serial port to let the watchdog know it is still running okay.

If the watchdog doesnt receive this ping, it uses reed relay wired into the reset pins of the computer to trigger a reset. It then waits for the watched computer to say hello, starting the process again.

[Vadim] includes a demo video where the system resets an unreliable crypto mining rig. It does have limitations, of course: if the mining program crashes without taking down the e...


Xen Security Advisory 254 (CVE-2017-5753,CVE-2017-5715,CVE-2017-5754) - Information leak via side effects of speculative execution Open Source Security

Posted by Xen . org security team on Feb 23

Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254

Information leak via side effects of speculative execution


Information provided about migitation for Spectre variant 2.

Mention whether CPU hardware virtualisation extensions are required
in the SP3 mitigations summary table.

An additional patch "x86: fix...


SDL Now Disables Mir By Default In Favor Of Wayland Compatibility Phoronix

With Mir focusing on Wayland compatibility now, toolkits and other software making direct use of Mir's APIs can begin making use of any existing Wayland back-end instead. GTK4 drops the Mir back-end since the same can be achieved with the Wayland compatibility and now SDL is now making a similar move...


FCC chair Pai receives NRA gun award for courage The Hill: Technology Policy

Federal Communications Commission (FCC) Chairman Ajit Pai received the National Rifle Association's (NRA) Charlton Heston Courage Under Fire Award at the Conservative Political Action Conference on Friday.The NRA-sponsored award was...


Torrentz2 blocked on Google Chrome and Firefox over harmful programs TechWorm

Chrome and Firefox prevent users from accessing Torrentz2 Over harmful programs

Torrent users have suffered a setback, as leading browsers Google Chrome and Firefox have blocked direct access to the popular torrent meta-search engine, for reported harmful programs. The past few hours, Chrome and Firefox users have been unable to access, TorrentFreak reported on Thursday.

When the users to access, they are greeted with the dreaded red window in Google Chrome with a warning that states, The site ahead contains harmful programs. The warning further adds, Attackers on might attempt to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit).

While those using Mozilla Firefox received a similar warning. It said: Firefox blocked this page because it might try to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit).

Advisory provided by Google Safe Browsing.

These warning messages are generated by Googles Safe Browsing algorithm which highlights websites that could cause potential danger to visitors. Chrome, Firefox, and others use this service to stop users from opening an unwanted software.

These warnings are normally the result of malicious ads, which does not appear to be in this case. The Torrentz2 operator told TorrentFreak that he currently only promotes a VPN service, which is by no means malicious.

However, Torrentz2 has been flagged for installing unwanted or malicious software on visitors computers, as per Googles Safe Browsing report.

Apparently, Google also flags social engineering attempts wherein false claims fool users to take a certain action, TorrentFreak had discovered from another site admin in the past.

Torrentz2s ad warned: Your Internet Provider is tracking your torrent activity! which theoretically could fit this category, as ISPs basically dont keep a record of users torrenting habits.

Currently, the website is down due to hosting issues, which the operator plans to fix soon.

For those torrent users, who are unaffected by the warning messages by Chrome and Firefox, and wish to visit the affected sites by bypassing the blocks can do so at their risk by taking proper measures (ChromeFF).

Source: TorrentFreak




Man Sues Feds For Installing Surveillance Camera on his Property HackRead

By Carolina

A 74-year old rancher in Texas discovered a small portal

This is a post from Read the original post: Man Sues Feds For Installing Surveillance Camera on his Property


Disney Holds $1000 Bonuses Hostage As Leverage In Contract Negotiations SoylentNews

AlterNet reports

Disney Inadvertently Exposes Trump's Tax Cut for the Scam It's Been from the Start

When Donald Trump signed the Tax Cuts and Jobs Act into law, he touted the legislation as a financial boon for American labor. As recently as January, Trump pointed to $1,000 bonuses for employees that American Airlines, AT&T, and Disney have announced as proof corporations would reinvest the billions of dollars they stand to save in their respective workforces. But if the president has offered a vision of how tax cuts for multinational corporations might operate in theory, an unfair labor practice complaint filed Tuesday reveals how they work in practice.

According to the Orange County Register, Unite Here Local 11, a union representing 2,700 housekeepers and other low-wage workers, has accused the Walt Disney Co. of effectively holding its bonuses hostage to secure a more favorable bargaining agreement. Disney is refusing to release the one-time payments "notwithstanding the union's lack of objection", the statement reads. "[The company] has violated its duty to bargain in good faith, and has engaged in conduct that is inherently destructive to rights guaranteed employees under the [National Labor Relations] Act." (For Disney's part, a spokeswoman maintains the company has a "strong offer on the table".)

[...] Regulatory findings released last month indicate [CEO Bob] Iger earned $36.3 million in compensation for 2017, which is $7.6 million less than he made the year before. The average union member at Disney World is paid $10.71 an hour, while just 3,000 employees earn in excess of $15. Disneyland staffers make a fraction more, the beneficiaries of California's decision last month to raise its minimum wage from $10.50 to $11 an hour. Unite Here's latest filing follows a separate complaint by a coalition of unions representing 38,000 Disney World workers in Florida.

Original Submission

Read more of this story at SoylentNews.


Stephen Geary, CEO at Sothic Bioscience, joins our Biotech/Medical Board. Lifeboat News

Stephen Geary, CEO at Sothic Bioscience, joins our Biotech/Medical Board.


InfoWars one step closer to YouTube ban after Florida conspiracy theory video The Hill: Technology Policy

InfoWars is reportedly one step closer to being banned from YouTube after posting a video promoting a conspiracy theory about the Florida high school shooting.The channel, run by famed conspiracy theorist Alex Jones, received one strike from YouTube...


New uTorrent Web Streams and Downloads Torrents in Your Browser TorrentFreak

While dozens of millions of people use uTorrent as their default BitTorrent client, the software has seen few feature updates in recent years.

That doesnt mean that the development team has been sitting still. Instead of drastically expanding the current software, they have started a new ambitious project: uTorrent Web.

This new piece of software, which launched rather quietly, allows users to download and stream torrents directly in their default web browsers, such as Chrome or Firefox.

The way it works is pretty straightforward. After installing the client, which is Windows-only at the moment, torrent and magnet links are automatically opened by uTorrent Web in a browser window.

People can use their regular torrent sites to find torrents or use the apps search box, which redirects them to Google.

Lets start

TorrentFreak took the application for a spin and it works quite well. Videos may take a short while to load, depending on the download speed, but then they play just fine. As in most modern video players, subtitles are also supported, if theyre included.

The streaming functionality supports both audio and video, with the option to choose a specific file, if a torrent contains more than one.

Applications and other files can also be downloaded, but these are obviously not streamed.

uTorrent Web in action

The current Beta release comes with several basic preferences settings and users can change things such as the download location and upload speed. Its likely that more options will follow as development matures, however.

Were very, very sensitive. We know people have been using uTorrent for a very long time and love it. So were very, very sensitive to that and gonna be sure to make sure that people feel that its an upgrade thats happening. Not that weve just destroyed the experience, Bram said.

Were going to roll it out and get feedback and make sure that people are happy with it before we roll it out to everybo...


Pengutronix Gets Open-Source 3D Working On MX8M/GC7000 Hardware Phoronix

We've known that Pengutronix developers had been working on i.MX8M / GC7000 graphics support within their Etnaviv open-source driver stack from initial patches posted in January. Those patches back at the start of the year were for the DRM kernel driver, but it turns out they have already got basic 3D acceleration working...


Rapidly Prototyping Prosthetics, Braille, and Wheelchairs Hackaday

We live in an amazing time where the availability of rapid prototyping tools and expertise to use them has expanded faster than at any other time in human history. We now have an amazing ability to quickly bring together creative solutions perfect examples of this are the designs for specialized arm prosthetics, Braille printing, and custom wheelchair builds that came together last week.

Earlier this month we published details about the S.T.E.A.M. Fabrikarium program taking place at Makers Asylum in Mumbai. The five-day event was designed to match up groups of makers with mentors to build assistive devices which help improve the condition of differently-abled people.

The participants were split into eight teams and they came up with some amazing results at the end of the five-day program.

Hands-On: Prosthetic Designs That Go Beyond

Three teams worked on projects based on Bionico a myoelectric prosthesis

DIY Prosthetic Socket a Human Machine Interface : [Mahendra Pitav aka Mahen] lost his left arm during the series of train bomb blasts in Mumbai in 2006, which killed 200 and injured over 700 commuters. He uses a prosthetic arm which is essentially a three-pronged claw that is cable activated using his other good arm. While it is useful, the limited functionality restricted him from doing many simple things. The DIY Prosthetic socket team worked with [Mahen] and [Nico Huchet] from MyHumanKit (who lost his right arm in an accident 16 years back), and fabricated a prosthetic forearm for [Mahen] with a modular, 3D printed accessory socket. Embedded within the arm is a rechargeable power source that provides 5V USB output at the socket end to power the devices that are plugged in. It also provides a second port to help recharge mobile phones. Also embedded in the arm was an IR reflective sensor that can be used to sense muscle movements and help trigger specific functions of add-on circuits, for example servos.



'Memtransistor' Forms Foundational Circuit Element to Neuromorphic Computing IEEE Spectrum Recent Content full text

Combining characteristics of a memristor with a transistor mimics the multiple synapses of neurons Illustration: Northwestern University

Computers that operate more like the human brain than computersa field sometimes referred to as neuromorphic computinghave promised a new era of powerful computing.

While this all seems promising, one of the big shortcomings in neuromorphic computing has been that it doesnt mimic the brain in a very important way. In the brain, for every neuron there are a thousand synapsesthe electrical signal sent between the neurons of the brain. This poses a problem because a transistor only has a single terminal, hardly an accommodating architecture for multiplying signals.

Now researchers at Northwestern University, led by Mark Hersam, have developed a new device that combines memristorstwo-terminal non-volatile memory devices based on resistance switchingwith transistors to create what Hersam and his colleagues have dubbed a memtransistor that performs both memory storage and information processing.

This most recent research builds on work that Hersam and his team conducted back in 2015 in which the researchers developed a three-terminal, gate-tunable memristor that operated like a kind of synapse.

While this work was recognized as mimicking the low-power computing of the human brain, critics didnt really believe that it was acting like a neuron since it could only transmit a signal from one artificial neuron to another. This was far short of a human brain that is capable of making tens of thousands of such connections.

Traditional memristors are two-terminal devices, whereas our memtransistors combine the non-volatility of a two-terminal memristor with the gate-tunability of a three-terminal transistor, said Hersam to IEEE Spectrum. Our device design accommodates additional terminals, which mimic the multiple synapses in neurons.

Hersam believes that these unique attributes of these multi-terminal memtransistors are likely to present a range of new opportunities for non-volatile memory and neuromorphic computing.

In research described in the journal Nature , Hersam and his colleagues developed a design based on...


Tech and telecom lobbying groups announce joint cybersecurity initiative The Hill: Technology Policy

Lobbying groups representing major technology and telecommunications firms are teaming up to jointly tackle cybersecurity issues.The Information Technology Industry Council (ITI) and USTelecom on Friday announced the creation of the Council to...


Khaki Rodway, Cofounder of NewSpace NYC, joins our Space Settlement Board. Lifeboat News

Khaki Rodway, Cofounder of NewSpace NYC, joins our Space Settlement Board.


PEEC Planetarium Show: "The Analemma Dilemma" Shallow Thoughts

[Analemma by Giuseppe Donatiello via Wikimedia Commons] Dave and I are giving a planetarium show at PEEC tonight on the analemma.

I've been interested in the analemma for years and have written about it before, here on the blog and in the SJAA Ephemeris. But there were a lot of things I still didn't understand as well as I liked. When we signed up three months ago to give this talk, I had plenty of lead time to do more investigating, uncovering lots of interesting details regarding the analemmas of other planets, the contributions of the two factors that go into the Equation of Time, why some analemmas are figure-8s while some aren't, and the supposed "moon analemmas" that have appeared on the Astronomy Picture of the Day. I added some new features to the analemma script I'd written years ago as well as corresponding with an expert who'd written some great Equation of Time code for all the planets. It's been fun.

I'll write about some of what I learned when I get a chance, but meanwhile, people in the Los Alamos area can hear all about it tonight, at our PEEC show: The Analemma Dilemma, 7 pm tonight, Friday Feb 23, at the Nature Center, admission $6/adult, $4/child.


2,000 Colorado DOT computers infected with SamSam Ransomware HackRead

By Uzair Amir

Another day, another ransomware scam This time, it is

This is a post from Read the original post: 2,000 Colorado DOT computers infected with SamSam Ransomware


23 Attorneys General Refile Challenge to FCC Net Neutrality Repeal SoylentNews

The FCC's order to overturn net neutrality protections was officially published in the Federal Register today and soon thereafter, the attorneys general of 22 states and Washington DC filed a lawsuit challenging the FCC's order. The coalition filed a suit earlier this year, but agreed last week to withdraw it until the FCC published the order, Reuters reports. "Today, the FCC made official its illegal rollback of net neutrality -- and, as promised, our coalition of attorneys general is filing suit," New York Attorney General Eric Schneiderman said in a statement. "Consumers and businesses in New York and across the country have the right to a free and open internet, and our coalition of attorneys general won't stop fighting to protect that right."

[...] The attorneys general say in their complaint that the FCC's order was "arbitrary, capricious and an abuse of discretion within the meaning of the Administrative Procedure Act." They also say it violates federal law and conflicts with the notice-and-comment rulemaking requirements. They're asking the court to vacate the order.


Original Submission

Read more of this story at SoylentNews.



Mini lab-created organs successfully check cancer treatments Lifeboat News: The Blog

Lab-grown tumor tissue matched response of the patients tumor to cancer treatment.


Laptops with 5G connectivity coming next year Lifeboat News: The Blog

Intel partners with Microsoft, Dell, HP, and Lenovo.

Intel has partnered with four major PC makers to bring 5G technology to laptops by the end of next year.

The chip giant is working with Microsoft, HP, Dell, and Lenovo to bring 5G connectivity to PCs with Intels XMM 8000 series modems.


The Commodore Story Documentary Premieres Today Hackaday

What is it about a computer that was introduced 36 years ago by a company that would be defunct 12 years later that engenders such passion that people still collect it to this day? Were talking about the Commodore 64, of course, the iconic 8-bit wonder that along with the other offerings from Commodore International served as the first real computer to millions of us.

Theres more to the passion that Commodore aficionados exhibit than just plain nostalgia, though, and a new documentary film, The Commodore Story, seeks to explore both the meteoric rise and fall of Commodore International. Judging from the official trailer below, this is a film anyone with the slightest interest in Commodore is not going to want to miss.

It will of course dive into the story of how the C64 came to be the best selling computer in history. But Commodore was far from a one-trick pony. The film traces the history of all the Commodore machines, from the PET computers right through to the Amiga. There are interviews with the key players, too, including our own Bil Herd. Bil was a hardware engineer at Commodore, designing several machines while there. He has shared some of these stories here on Hackaday, including the development of the C128  (successor to the C64) and making th...


Video Friday: More Boston Dynamics, OpenCat Robot, and Uncanny Valley IEEE Spectrum Recent Content full text

Your weekly selection of awesome robot videos Photo: Engineered Arts U.K. company Engineered Arts has a new line of entertainment robots called Mesmer.

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):

International Symposium on Medical Robotics  March 1-3, 2018  Atlanta, Ga., USA
HRI 2018  March 5-8, 2018  Chicago, Ill., USA
US National Robotics Week  April 7-17, 2018  United States
Xconomy Robo Madness  April 12, 2018  Bedford, Mass., USA
NASA Swarmathon  April 17-19, 2018  Kennedy Space Center, Fla., USA
RoboSoft 2018  April 24-28, 2018  Livorno, Italy
ICARSC 2018  April 25-27, 2018  Torres Vedras, Portugal
NASA Robotic Mining Competition  May 14-18, 2018  Kennedy Space Center, Fla., USA
ICRA 2018  May 21-25, 2018  Brisbane, Australia

Let us know if you have suggestions for next week, and enjoy todays videos.

An extra special thank-you to Boston Dynamics this week for posting another video of SpotMini that includes a nice, detailed explanation of whats actually going on:

A test of SpotMinis ability to adjust to disturbances as it opens and walks through a door. A person (not shown) drives the robot up to the door, points the hand at the door handle, then gives the GO command, both at the beginning of the video and again at 42 seconds. The robot proceeds autonomously from thes...


DIY Cryogel Sustains Live Cells Hackaday

We like to think our readers are on the cutting edge. With the advent of CRISPR kits at home and DIY bio blooming in workshops across the world, we wanted to share a video which may be ahead of its time. [The Thought Emporium] has just shown us a way to store eukaryotic cells at room temperature. His technique is based on a paper published in Nature which he links to from the YouTube page, but you can see his video after the break.

Eukaryotic cells, the kind we are made of, have been transported at low temperatures with techniques like active refrigeration, liquid nitrogen, and dry ice but those come with a host of problems like cost, convenience, and portability. Storing the cells with cryogel has been shown to reliably keep the cells stable for up to a week at a time and [The Thought Emporium] made some in his homemade freeze-dryer which hes shown us before. The result looks like a potato chip, but is probably less nutrious than astronaut ice cream.

If cell transport doesnt tickle your fancy, cryogel is fascinating by itself as a durable, lightweight insulator similar to Aerogel. You can make Aerogel at home too.


CNN Town Hall: Stick to the Script

Via: Real Clear Politics: Marjory Stoneman Douglas High School shooting survivor Colton Haab appeared on FOX News Tucker Carlson Tonight to talk about his saga with CNN and how they scripted a question for him to use at Wednesday nights town hall event hosted by the network and moderated by CNNs Jake Tapper. Haab, a []


This Week in Open Source News: Documentary Series on Women in Tech to Premiere Next Month, Fake Linux News & More

This Week in Open Source News: Documentary Series on Women in Tech to Premiere Next Month, Fake Linux News & More


Ancient Sculptures Return to Mosul as Digitally Reconstructed Replicas IEEE Spectrum Recent Content full text

Submillimeter 3D scanning produces precise copies of Assyrian statues Photo: Factum Foundation for Digital Technology in Conservation

Photo: Factum Foundation for Digital Technology in Conservation Hold Still: Artists scan a lamassu at night in the British Museum.

The Iraqi city of Mosul is still recovering from its brutal occupation by the Islamic State. The city suffered devastating bloodshed during that time, and many archaic statues and artifacts were destroyed by militants and vandals. Raising the city from the rubble will be rough work. In at least a couple of instances, though, resurrecting a piece of the ancient past will come courtesy of a 3D scanner.

Later this month, two ultradetailed facsimiles of the massive stone statues known as lamassu, protective spirits that date back nearly 3,000 years to the Assyrian empire, will begin a journey from the Netherlands to take up permanent residence in Mosul. As products of the digital age, their journey poses questions about authenticity and where objects belong.

These new spirits are copies of two lamassu originally excavated by a British archaeological expedition in the mid-19th century. While charting Mesopotamia, the group uncovered a field of artifacts that had been buried for 2,700 years.

The lamassu they found thereimposing winged statuesonce stood guard along the walls surrounding the ancient city of Nineveh, near what is now Mosul. The excavators brought two of the statues back to London.

In 2004, the art historian Adam Lowe set out to record these statues at 300-micrometer resolution in order to produce copies of them for a traveling exhibition. Lowe heads Factum Arte, an art studio that has made a stir by casting precise facsimiles of antiquities.

For five weeks, Lowe and his team spent every evening at the British Museum scanning the lamassu and relief panels and shards. For the lamassu, they used a white-light scanner built by the company...


Stable kernels 4.4.117, 4.9.83, 4.14.21, and 4.15.5 released

The 4.4.117, 4.9.83, 4.14.21, and 4.15.5 stable kernels have been released. They contain a large number of updates throughout the tree; users should upgrade.


Windows licenses for under 13 USD!(10% promote code) TechWorm

We offer 10% coupon code:SKtechworm10%

Microsoft Windows 10 Pro OEM CD-KEY GLOBAL origin price: $57.04 -use the code: 12.60 usd

Office2016 Professional Plus CD Key Global origin price:$244.14 use the code: 31.50 usd

Visio Professional 2016 Key Global origin price: $245.49 use the code: 25.39 usd

Windows10 PRO OEM + Office2016 Professional Plus CD Keys Pack  origin price: $301.18 -use the code: 39.14 usd

Windows licenses are usually expensive. For example, for an original license of Microsofts Windows 10 Pro in the official Microsoft store 305 USD payable. A cheaper alternative is the key marketplace SCDKey. Here you can save on licenses for software or games properly!

What makes it all interesting is that the site works really and we had the opportunity to test it with our pocket money . So, in this specific case, we use the Office2016 Professional Plus CD Key Global link.

Windows licenses for under 13 USD!(promote code)

Then we click on  Buy Now  or  Buy Now if changing the website language at the top of the screen if you need, and we are presented with the registration window in this case the values that are initially presented US Dollars Euros to spend. We can register on the site or, alternatively, we can use one of our Facebook, G + or WindowsLive accounts.

Windows licenses for under 13 USD!(promote code)

After you have logged in, you can proceed to the product confirmation page and click on Send Order and go to the payment method...


Fake News is Part of a Bigger Problem: Automated Propaganda SoylentNews

The Columbia Journalism Review has some analysis of the problem of disinformation and propaganda being actively spread over social control media. As the situation is studied more, albeit belatedly, the nature of social control's business model gets more daylight.

"That fundamental goal is to get the user to stay as long as possible," Ghosh said in an interview. "Their motivations are differentfor platforms, it is to maximize ad space, to collect more information about the individual, and to rake in more dollars; and for the disinformation operator, the motive is the political persuasion of the individual to make a certain decision. But until we change that alignment, we are not going to solve the problem of disinformation on these platforms."

After Mueller released his indictments, sociologist Zeynep Tufekci noted on Twitter that the indictment "shows [Russia] used social media just like any other advertiser/influencer. They used the platforms as they were designed to be used."

The phrase surveillance capitalism gets more traction as it becomes acknowledged that while social control media do not actively spread disinformation and propaganda it is a side effect of collecting as much personal information as legally (and somtimes illegally) allowed. That information is aggregated from multiple sources both internal and external to social control media itself. As a result it is getting increasingly difficult to distinguish between disinformation and authentic political speech.

Automated attacks make that differentiation that much harder. Faecebook gets the most attention, but the others, including YouTube work the same way and can thus be manipulated just as easily. (Ed: Speaking of YouTube, to single out one topic as an example, as seen recently with FCC comments on Net Neutrality, only 17%of the comments the FCC received were legitimate with the rest filled in by clumsy bots.)

Source : Fake news is part of a bigger problem: automated propaganda

Original Submission

Read more of this story at SoylentNews.


Security updates for Friday

Security updates have been issued by Debian (cups, gcc-6, irssi, kernel, and squid3), Fedora (mupdf), Mageia (irssi, mpv, qpdf, and quagga), openSUSE (libmad and postgresql95), SUSE (kernel and php5), and Ubuntu (kernel, linux-lts-trusty, linux-raspi2, and wavpack).


Hacking these IoT baby monitors is childs play, researchers reveal Graham Cluley

Austrian security researchers have this week warned about the latest baby monitor affected by critical security vulnerabilities which raise very real privacy concerns.

Read more in my article on the Bitdefender Box blog.


Chaos backdoor, a malicious code that returns from the past targets Linux servers Security Affairs

Security experts from GoSecure, hackers are launching SSH brute-force attacks on poorly secured Linux servers to deploy a backdoor dubbed Chaos backdoor.

This post describes a backdoor that spawns a fully encrypted and integrity checked reverse shell that was found in our SSH honeypot, states the report published by GoSecure.

We named the backdoor Chaos, following the name the attacker gave it on the system. After more research, we found out this backdoor was originally part of the sebd rootkit that was active around 2013.

The Chaos backdoor was one of the components of the sebd Linux rootkit that appeared in the threat landscape back in 2013, researchers discovered a post on, where a user claims to know how the backdoor was made publicly available.

It seems that the source code of the backdoor was caught by a researcher that released it on the forum by changing the name of the backdoor in Chaos to trick members into believing that is was a new threat.

The malicious code is now being used by attackers in the wild to target Linux servers worldwide.

Researchers performed an Internet-wide scan using the handshake extracted from the client in order to determine the number of infected Linux servers and they discovered that this number is quite low, below the 150 marks.

chaos infection worldmap

The installation of the Chaos backdoor starts with the attacker downloading a file that pretended to be a jpg from

The file was currently a .tar archive containing the Chaos (ELF executable), the client (ELF executable), initrunlevels Shell script, the install Shell script.

Chaos, in the tar archive, is the actual backdoor that is installed on the victims system and the Client file is the client to connect to the installed backdoor.



Plasma Mobile Could Give Life to a Mobile Linux Experience

Plasma Mobile Could Give Life to a Mobile Linux Experience


Radeon Linux OpenGL Driver Continues Giving Its Best Against Windows 10 Phoronix

With having around a Windows 10 installation this week for the latest Windows 10 WSL vs. Linux benchmarking, I also carried out some fresh benchmarks of the Radeon gaming performance between Windows 10 and Ubuntu Linux using the very latest drivers on each platform. This time around a Radeon RX 580 and RX Vega 64 were used for this benchmarking.


Animal Study Shows How To Retrain The Immune System To Ease Food Allergies SoylentNews

Treating food allergies might be a simple matter of teaching the immune system a new trick, researchers at Duke Health have found.

In a study using mice bred to have peanut allergies, the Duke researchers were able to reprogram the animals' immune systems using a nanoparticle delivery of molecules to the lymph nodes that switched off the life-threatening reactions to peanut exposures.


They focused on the Th2-type cytokine immune response, which is increasingly understood as a driver of the overactive immune responses in allergy attacks. In an appropriate immune response, Th2 works in tandem with Th1, but during allergic reactions, Th2 is overproduced and Th1 is diminished.

The solution appears simple enough: deliver more Th1-type cytokines ahead of an allergen exposure to restore balance. But it has proven difficult. A test of this type was attempted as an asthma therapy, but it required a massive dose to the lungs and was ineffective.

In their experiment with the peanut-allergy mice, St. John and colleagues instead delivered antigen- and cytokine-loaded nanoparticles into the skin. The nanoparticles traveled to the lymph nodes, where they dissolved and dispensed their payload at the source of the immune response.

Animals that received this therapy no longer went into an acute allergic response called anaphylaxis when they were subsequently exposed to peanuts. The new-found tolerance was long-lasting, so did not need to be repeated ahead of each exposure to the allergen.

"The Th1 and Th2 sides of immunity balance each other," St. John said. "We reasoned that since we know Th2 immunity is over-produced during allergic responses, why not try to skew the immune response back the other direction? By delivering cytokines to the lymph nodes where immune responses are established, we were able to re-educate the immune system that an allergic response is not an appropriate one."

The approach could theoretically be applied to other allergens, including environmental triggers such as dust and pollen. Additional experiments are underway to move the findings into human trials.

Original Submission

Read more of this story at SoylentNews.


Next Week: Bring-A-Hack In NYC Hackaday

Hackaday, along with Ultimaker and New Lab, are hosting an extravaganza of super hacks and more in New York next week. Grab a project youre working on and join us on Wednesday, February 28 in Brooklyn.

This is all about showcasing the coolest, newest stuff being worked on by makers, hackers, artists, and engineers. Get ready to talk hardware, stare into far too many LEDs, and enjoy drinks and camaraderie. The event is being hosted by New Lab, and were teaming up with Ultimaker to bring you a night of fun and solder fumes. We have great speakers lined up, and weve blocked out some time for lightning talks too so fill out this form if youre interested.

Support for the KiCad Project

RSVPs for this meetup are $5, with all proceeds being donated to the KiCad project via CERN.

Sending some funding to support this Open Source EDA project is a great thing. If this fee is a no-go for you, we&#8217...


2017 Was a Record Year for ID Theft in the U.S. IEEE Spectrum Recent Content full text

At least 16.7 million Americans had their identities compromised Photo: iStock Photo

This will not come as a big shock: an estimated 16.7 million Americans were victims of identity theft last year, according to a survey published by the research and advisory firm Javelin Strategy & Research. And the company says this tops the previous record of 15.4 million compromised identities which occurred, not surprisingly, in 2016.

Javelin notes in its report that cyber thieves have changed tactics over the past year, which has made them more efficient and effective. They are now focusing on targeting cellphones and email accounts to obtain a persons complete details, such as their name, address, and social security number, instead of trying to access individual pieces of personal information in order to piece together a profile.

This strategy is making it easier for cyber criminals to open fraudulent accounts and to exploit them for a longer period of time before they are discovered. The company estimates that fraud losses last year amounted to some US $16.8 billion.

In addition, nearly 1 in 3 Americans were notified of a data breach in 2017, a significant jump from 1 in 8 in 2016, Javelin reports. A major reason was the consumer credit bureau Equifax breach that was discovered on 29 July 2017, in which the personal information of 145.5 million people (130 million Americans, 15.2 million British citizens, and 8,000 Canadians) was compromised. It's unclear how many of those affected also became victims of identity theft as a result.

As if the loss of names, addresses, social security numbers, and/or birthdates wasnt enough, Equifax quietly informed the Senate Banking Committee earlier this month that even more information had been accessed in their data breach than it first reported.

Equifax told the committee that for an unknown number of persons, email addresses, driver license numbers (including issue...


OMG botnet, the first Mirai variant that sets up proxy servers on vulnerable devices Security Affairs

Researchers at Fortinet have discovered the OMG botnet, the first Mirai variant that sets up proxy servers on the compromised IoT devices.

A new variant of the infamous Mirai botnet appeared in the threat landscape, it was discovered by researchers at Fortinet that referred it as OMG because of strings containing OOMGA in the configuration table.

For this reason, we decided to name this variant OMG.The table, originally encrypted, was decrypted using 0xdeadbeef as the cipher key seed, using the same procedure adopted for the original Mirai. The first thing we noticed are the strings /bin/busybox OOMGA and OOMGA: applet not found. wrote Fortinet.

The name Mirai was given to the Mirai bot because of the strings /bin/busybox MIRAI and MIRAI: applet not found, which are commands to determine if it has successfully brute-forced its way into the targeted IoT device. These strings are similar with other variations such as Satori/Okiru, Masuta, etc. 

The Mirai botnet was first spotted in August 2016 by the security researcher MalwareMustDie, it was specifically designed to compromise vulnerable or poorly protected IoT. Once Mirai malware compromises an IoT device it recruits it into a botnet primarily used for launching DDoS attacks, such as the one that hit Dyn DNS service.

In October 2016, the Mirai source code was leaked and threat actors in the wild started customizing their Mirai botnet.

The OMG botnet includes most of Mirais features and modules, including the attack, killer, and scanner modules, but also adds new ones.

According to Fortinet its configuration includes two strings used to add a firewall rule to ensure traffic on two random ports is allowed.

This variant also adds and removes some configurations that can be found in the original Mirai code. Two notable additions are the two strings that are used to add a firewall rule to allow traffic on two random ports, which we will discuss in the latter part of the article. continues the analysis.



3 Warning Flags of DevOps Metrics

"Human beings adjust behavior based on the metrics they're held against." Choose your metrics carefully.

Metrics. Measurements. Data. Monitoring. Alerting. These are all big topics for DevOps and for cloud-native infrastructure and application development more broadly. In fact, acm Queue, a magazine published by the Association of Computing Machinery, recently devoted an entire issue to the topic.

Friday, 23 February


With rules repealed, what's next for net neutrality? The Hill: Technology Policy

The battle over the Federal Communications Commissions (FCC) repeal of net neutrality rules is entering a new phase, with opponents of the move launching efforts to preserve the Obama-era consumer protections.The net neutrality rules had required...


Let's Encrypt Hits 50 Million Active Certificates and Counting

In yet another milestone on the path to encrypting the web, Lets Encrypt has now issued over 50 million active certificates. Depending on your definition of website, this suggests that Lets Encrypt is protecting between about 23 million and 66 million websites with HTTPS (more on that below).


Mentor Embedded Linux Gains Cloud-Based IoT Platform

Mentor announced a Mentor Embedded IoT Framework platform that builds on top of Mentor Embedded Linux with cloud-based IoT cloud services ranging from device authentication and provisioning to monitoring and diagnostics.


IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog