2:30) shows how the New Orleans fire department 'took it up a notch' and 'went door to door, boots on the ground' entering resident's homes to install smoke. There's something morbidly fascinating about animals that seem to behave pathologically: The female praying mantis engaging in sexual cannibalism, the fish. New Installation. This chapter explains how to perform a new installation of MantisBT. Start by checking the system requirements and installing the appropriate version of required software. Once that is done, execute the installation script. From your web browser, access http://yoursite/mantisbt/admin/install.php.

Experience: Freshers Functional Area: IT-Software/Software Services Role: Test Engineer Company: Syncfusion Required Skills: * Good in Communication & Verbal Skills * Good in Analytical Skills * Ability to write new scripts or modify existing scripts * Ability to design new scripts of mid- to high complexity * Ability to design framework is necessary * Excellent knowledge on TestNG & JUnit is required * Excellent knowledge on CI tools like Jenkins is required * Good knowledge on Maven & Page object model is required.

Installing Mantis On Iiser

What to do with your broken gaming consoles? Gut it and turn it into a different gaming console! Sudomod forum user [banjokazooie] has concocted his own RetroPie console from the — an ingenious demonstration of how one can recycle hardware to a perfectly suited purpose. [banjokazooie] actually used an original shell for this build, but if you happen to have a broken controller around — or know someone who does — this is a great use for it. A Raspberry Pi 3 is the brains of this operation (not counting [banjokazooie]), and it features a 6.5″ HDMI display, a Teensy 2.0 setup for the inputs, a headphone jack with automatic speaker disconnection, dual 3400 mAh batteries, an external SD card slot, and a lot of hard work on the power supply circuit — although [banjokazooie] reports that the hardest part was cutting to size a custom PCB to mount it all on.

The original plan was to see if the idea was possible, and after a three month effort, it appears to work beautifully. The total cost was approximately $195 USD — but with the stipulation that you don’t fry anything in the build process. There haven’t been any issues to speak of so far despite a three hour battery life when playing the N64 emulator (the only provided figure). A full parts list is provided. Do studies show that soft drinks promote obesity and Type 2 diabetes?

It depends on who paid for the study. Researchers from the University of California, San Francisco, looked at studies of soft drink consumption and its relationship to obesity and diabetes published between 2001 and 2016. They found about 60 studies that were fairly rigorous in their methodology. When the studies were led by independent researchers, they showed a clear link between soda consumption and obesity or metabolic disease.

But notably, 26 of the studies reported no link between sugary soft drinks and poor health. What was different about the studies that found no connection to health problems?

They were all carried out by researchers with financial ties to the beverage industry. The [DOI: 10.7326/L16-0534] [] in the Annals of Internal Medicine. Previously: at SoylentNews. DHS is using firefighters to spy on Americans in their own homes. DHS is using the U.S. Census to ask Americans, questions about smoke detectors, so they can give homes 'fire risk assessments'. The above video (approx.

2:30) shows how the New Orleans fire department 'took it up a notch' and 'went door to door, boots on the ground' entering resident's homes to install smoke detectors in people's bedrooms, kitchens etc. According to the ',' the New Orleans Fire Department (NOFD) has been going door-to-door giving homes free 'fire risk assessments' since 2015. BlackBerry Ltd has signed a deal to work directly with Ford Motor Co to expand the carmaker's use of its, the Canadian technology company said on Monday, as Ford develops increasingly automated vehicles. The deal with Ford is the first BlackBerry has done directly with a major automaker, though it currently sells its technology to auto industry suppliers. The company is betting its future on expanding sales of software products, including to automakers and other manufacturers, after largely ceding the smartphone market to rivals including Apple Inc, Alphabet's Google and Samsung Electronics Co Ltd. Panasonic Automotive currently uses QNX software in the Sync 3 infotainment console that it supplies to Ford.

BlackBerry is hoping the new deal will expand use of BlackBerry's software in Ford vehicles as the two companies identify other systems where it might be used. 'We can form the basis of the entire vehicle all the way from autonomous drive through to infotainment,' John Wall, the head of BlackBerry's QNX unit, said in a phone interview. At SoylentNews. We’re less than a week away from the Hackaday Superconference, where we’ll be announcing the winners of the Hackaday Prize. The Hackaday Prize is a celebration of the greatest hardware the Hackaday community has to offer, and in the past three years we’ve been running this amazing contest, we’ve seen some awesome stuff.

While not every project entered into the Hackaday Prize has gotten off the ground — is still tethered to its test stand — there have been some spectacular projects over the past few years that have already had an incredible impact in industry, academia, and the security industry. For the next few days, we’re going to revisit these projects, see how they’re doing, and look at the impact they’ve had on the world of Open Source hardware. The first project we’re taking a look at is the a tool created by Colin O’Flynn to look at the secret insides of chips and firmware despite whatever embedded security is enabled on said chip. The ChipWhisperer was an entry into the first Hackaday Prize. Since then, the ChipWhisperer has become the de facto hardware tool for investigating clock glitching, side channel analysis, and other exotic magic tricks that make security analysis so much fun. What is the ChipWhisperer?

There is a problem with every crypto system on the planet. Crypto must run on real hardware, and with this comes the ability to analyze the bus, side channel attacks, and clock glitching.

If you glitch a clock when a microcontroller is processing an instruction, something might go wrong. If you’re very good, you might be able to glean a little bit of information about what was happening inside the microcontroller at the time. Clock glitching, side channel analysis and all the other tricks up the ChipWhisperer’s sleeve have been around for decades. The equipment to perform these attacks and analyses have been extremely expensive. Food is one of life’s absolute necessities and one that people take great pleasure from, so it’s no surprise that the future of food is one of those topics that always draws significant interest.

So what will we be tucking into in the year 2036? A plate of bugs with a side order of seaweed? A glass of milky liquid? Cajun Swedish fusion cuisine? Or will it be a world of shortages where we munch on government issue Soylent Green and try not to think about where it came from? Take your places at table and join us as we take a look at what mealtimes in the future might look like.

The strength of spinach isn’t only in its nutrients, but also in its ability to be hacked to function as a sensor, according to researchers at the Massachusetts Institute of Technology. An MIT team used to give the greens the ability to detect explosives and wirelessly transmit information to a mobile device. MIT engineers applied a solution of nanoparticles to the underside of the leaves, allowing them to be taken up into the mesophyll layer where photosynthesis takes place. The embedded nanotubes then acted as sensors able to detect nitroaromatic compounds – which are often used in explosives like land mines – in the groundwater taken up by the plants’ roots.

If the chemicals are present in the water the plant is feeding from, the carbon nanotubes in the leaves emit a fluorescent signal that can be picked up with an infrared camera when a laser is shined on the leaves. The researchers hooked up such a camera to an inexpensive and set it to email the user when the compounds were detected. We’re supposed to be building robots and AI, but scientists at MIT have pretty much been doing the opposite — they’ve built a new kind of AI with the sole purpose of generating the most frightening images ever. Just in time for Halloween, the aptly named uses an algorithm that ‘learns’ what humans find scary, sinister, or just downright unnerving, and generates images based on what it thinks will freak us out the most.

“There have been a rising number of intellectuals, including Elon Musk and Stephen Hawking, raising alarms about the potential threat of superintelligent AI on humanity,” one of the team, Pinar Yanardag Delul. Making Safe Harbors Expire Is Dangerous and Unnecessary Under a new rule from the Copyright Office, website owners could be exposed to massive risk of copyright liability simply for neglecting to submit an online form on time. The rule could eliminate the safe harbor status that thousands of websites receive under the Digital Millennium Copyright Act (DMCA). Current law (, which was enacted as part of the DMCA) protects the owners of websites and online services from monetary liability based on the allegedly infringing activities of their users or other third parties. Owners must meet many requirements in order to be eligible for that protection, including participating in the for allegedly infringing content.

They also must register an agent with the Copyright Office, someone who can respond to takedown requests and other communications. The Copyright Office rewrote the registration process this week, requiring everyone to re-register before December 31, 2017, and renew that registration every three years. When website owners inevitably forget to renew, copyright holders will be able to take advantage of that mistake to hold them liable for their users’ infringing activities.

In fact, it will be trivial for abusive copyright holders to use the Copyright Office’s own system to compile lists of sites at risk. The change comes as part of a multi-year project to modernize the system for registering authorized agents. Clearly, the system needed an update: the current system of (PDF) is absurd; a new online database is long overdue. But, automatic expirations shouldn’t be a part of the new system. They’ll do far more harm than good.

The Copyright Office’s announcement offers a, but none of them are persuasive, and certainly none of them come close to outweighing the risks. The Office says that the contact information for 65% of the sites in its database are different from the designated agent information that owners gave on their own sites. As Internet law expert Eric Goldman points out,: Did the Copyright Office consider that service providers might offer copyright owners multiple ways. Colonial Pipeline Co shut down its main gasoline and distillates pipelines on Monday after an explosion and fire in Shelby, Alabama, that injured seven workers - the second time in two months it had to close the crucial supply line to the U.S. A nine-man crew was conducting work on the Colonial pipeline system at the time of the explosion, Alabama Governor Robert Bentley told a briefing. Seven of the crew members were injured, with two evacuated by air. Four victims of the blast were taken to the UAB hospital in Birmingham, Alabama, hospital spokesman Adam Pope said.

A segment of pipeline was undergoing maintenance on Monday afternoon when it exploded. The fire had been contained as of around 9 p.m. (0100 GMT on Tuesday), according to local media reports. Gasoline futures. December-delivery gasoline rose as much as 21.56 cents to $1.6351 a gallon in intraday trading on the New York Mercantile Exchange after the blast. The contract traded at $1.5675 at 9:03 a.m. In Singapore.

The intraday peak was the highest for a front-month contract since June 2, according to data compiled by Bloomberg. [.] A spill in September closed Colonial for 12 days, cutting supplies to 50 million Americans in the Southeast. Alabama Governor Robert Bentley said in a tweet that the incident in Shelby County on Monday was about a mile west of the Sept. Colonial had planned to remove between late-October and mid-November a temporary bypass pipeline that was built around the site of the earlier spill.

Also reported at,, and the. At SoylentNews. Science is making progress on the treatment of aging and age-releated diseases but should you rush out and start your own testing or not? This article weighs up some of the pros and cons. Accumulate with age, and that harms organs and tissues in numerous ways, such as via the production of increased chronic inflammation.

This is one of the root causes of aging and age-related disease. Safe and effective has been on the for fifteen years, but only recently has progress in scientific funding and demonstrations of improved health and life spans in mice snowballed to the point at which startup companies could make a real go of it. Things are moving fairly rapidly in this field now. With the recent in work on senescent cell clearance, and other companies angling for their own launch, it is fair to say that this line of research and development is underway for real.

Clinical trials of senescent cell clearance will be underway soon, funded by UNITY Biotechnology, and using drug candidates such as developed in the cancer research community, noted for their ability to induce, a form of. Senescent cells are primed for apoptosis, and it takes little to tip them over the edge in comparison to a normal, which means that there may well be quite a large stable of existing drugs that will have some useful effect. The question here is one that is only now starting to be useful to ask: should we all be running out today to obtain and take a drug (such as navitoclax) or drug combination (such as dasatinib and quercetin) that were shown to clear some fraction of senescent cells in rodents? Certainly there have been no shortage of people chasing after whatever the curr. It's time for Trump to answer serious questions about his ties to Russia. — Hillary Clinton (@HillaryClinton) This is nonsense. The evidence available on the Internet is that Trump neither (directly) controls the domain ' trump-email.com', nor has access to the server.

Instead, the domain was setup and controlled by Cendyn, a company that does marketing/promotions for hotels, including many of Trump's hotels. Cendyn outsources the email portions of its campaigns to a company called Listrak, which actually owns/operates the physical server in a data center in Philidelphia. In other words, is (minus the political bits) likely true, supported by the evidence. It's the conclusion I came to even before seeing the response. When you view this 'secret' server in context, surrounded by the other email servers operated by Listrak on behalf of Cendyn, it becomes more obvious what's going on. In the same Internet address range of Trump's servers you see a bunch of similar servers, many named [client]-email.com. In other words, trump-email.com is not intended as a normal email server you and I are familiar with, but as a server used for marketing/promotional campaigns.

Researchers have built that — when perfected — could have up to five times the energy density of current lithium-ion devices. Researchers in the UK and China drew inspiration from intestines to overcome problems in the battery construction.

In your intestine, small hair-like structures called villi increase the surface area that your body uses to absorb nutrients from food. In the new lithium-sulphur battery, researchers used tiny zinc oxide wires to form a layer of material with a villi-like structure. These villi cover one electrode and can trap fragments of the active material when they break off, allowing them to continue participating in the electrochemical reaction that produces electricity. Lithium-sulphur batteries aren’t new (in fact, they were used in 2008 in that broke several records), but this new technique may make them more practical. You can see a video about ordinary lithium-sulphur batteries below along with more on how this research improves the state of the art. A typical lithium-ion battery contains graphite and lithium cobalt oxide. Positively charged lithium ions move back and forth from the cathode, through the electrolyte and into the anode. Since the carbon atoms in the graphite can only take (at most) one lithium ion, that sets the theoretical limit on how much energy you can draw from the battery. Sulphur and lithium react differently, via.

That’s why sulphur can offer a much higher theoretical capacity. However, as the battery undergoes several charge-discharge cycles, bits of the sulphur break away causing the battery to gradually lose active material. The zinc oxide villi tend to trap these pieces which slows the degradation of the battery. The villi improved the number of times the prototype battery can be charged and discharged, but it is still not able to match a conventional lithium-ion battery. On the other hand, the new battery doesn’t need recharging as often. We’ve seen nanotech in. There’s also other research going on with.

Astronomers using observations from NASA's Kepler and Swift missions have discovered a batch of rapidly spinning stars that produce X-rays at more than 100 times the peak levels ever seen from the sun. The stars, which spin so fast they've been squashed into pumpkin-like shapes, are thought to be the result of close binary systems where two sun-like stars merge.

'These 18 stars rotate in just a few days on average, while the sun takes nearly a month,' said Steve Howell, a senior research scientist at NASA's Ames Research Center in Moffett Field, California, and leader of the team. 'The rapid rotation amplifies the same kind of activity we see on the sun, such as sunspots and solar flares, and essentially sends it into overdrive.' The most extreme member of the group, a K-type orange giant dubbed KSw 71, is more than 10 times larger than the sun, rotates in just 5.5 days, and produces X-ray emission 4,000 times greater than the sun does at solar maximum. These rare stars were found as part of an X-ray survey of the original Kepler field of view, a patch of the sky comprising parts of the constellations Cygnus and Lyra. (DOI: 10.3847/0004-637X/831/1/27) () () at SoylentNews. With so many systems depending on Linux, the secure shell SSH has become a staple for many developers. If you are connected to your Raspberry Pi via a cable or a wireless router a few feet away, SSH can provide you with an encrypted connection straight to the box.

However, if you have a system out in a swamp somewhere with intermittent slow network access, SSH can be a real pain. When your IP address can change (for example, roaming on a cellular network), SSH has problems, too. To combat these and other problems, you might consider an open source program called (mobile shell). There’s two parts to Mosh.

One part works as a server while the other is the client application. Neither of these require root access. You can see a video about Mosh below. Using Mosh is pretty similar to using SSH (and, in fact, you can use SSH to initially launch Mosh). The Mosh server has a system that synchronizes the screen, so it doesn’t waste time sending characters that won’t really appear to the user.

In addition, the client keeps its own notion of the screen and it attempts to handle some operations locally. For example, in SSH every character you type echos through the server.

While this is useful to know the server is there, it isn’t good for responsiveness. Mosh handles echo locally and also predicts certain things like insertion and deletion of characters. Unlike SSH, Mosh uses UDP datagrams so packet loss isn’t a big deal. In fact, if you switch networks or if your computer sleeps and wakes up, Mosh will stay “connected.” Because Mosh doesn’t send data you won’t see, you can easily interrupt a long scrolling output (Mosh selects a frame rate for scrolling based on the network connection’s quality). Seeing the Future When you type something in Mosh, it might make a prediction. If the network isn’t robust, Mosh will presume that most characters will appear at the current cursor location.

It also expects certain behavior of keys like backspace, right arrow, and left arrow. Of course, there’s a chance it is wrong, so it underlines guesses until they are proven right. The software gathers batches of predicted input (epochs) that it validates (or refutes) as a group.

Certain characters (like the up and down arrow) heuristically start new epochs. For example, if you start typing inside emacs (or vi), you will start building an epoch that does not display on the screen.

When data comes back from the host computer that validates the guess as correct, Mosh will display the epoch and continue to display its guesses until something (like an up or down arrow) changes the epoch. Then it will go back to not performing the local echo until it is once again correctly predicting.

All this works well, but you can turn predictions off if you wish. If you want to see. Contents • • • • • • What would the world look like right now—all these years later—if Linux were never created? What would our daily lives look like? What actual, real-world impact would the simple act of a penguin not biting a Finnish man have on the lives of people on the other side of the world? Well, as luck would have it [ahem], we happened to gain access to a (totally real) set of posts from the FriendFace account of a man living in an alternate universe that bears a striking resemblance to the one we just described.

I present those to you now—unedited. You’re welcome. • VMware takes advantage of Sun Microsystems’ loss by bringing the once-niche Linux VDI out of the shadows and into the sun with Horizon 7 for Linux.

• As the wall between worlds comes twain, and the spooks and spectres seep on in, our thoughts turn to the graveyard of Linux distributions. For every spirited Ubuntu there’s a spiriting celebrity-based spin; for every Gentoo based success is a gOS shaped abscess, decaying in the mausoleum of popularity.

In this fiendishly frightful blog post we’re going to look at three of the most diabolical Linux distributions ever summoned. • How can a Linux geek have a fun Halloween? It’s not as hard as you might imagine. Before you put away your costume and.

The British Government announces an active defence posture in response to nation-state cyber attacks, Chancellor warns UK will retaliate against attacks. Hacking back, or “active defence” as security experts prefer to call it, is becoming a high debated argument. While the number of cyber attacks continues to increase and attackers are using even more sophisticated techniques, many Governments are planning to hack back crooks and nation-state hackers that threaten their infrastructure. Recently a china’s cybersecurity draft law to hit back foreign hackers that power. The British government fears that “old legacy IT systems used by many organizations in the UK” are increasingly targeted by hackers who have no problem to compromise them.

Britain will strike back against nation-state actors that will launch cyber attacks on the national critical infrastructure. Chancellor Philip Hammond retaliatory countermeasures in response to state-sponsored attacks, he also unveiled a £1.9bn package designed to boost Government defenses against cyber threats as part of a five-year national cyber security strategy. The strategy of the UK Government has a five-year plan and aims to “work to reduce the impact of cyber attacks and to drive up security standards across public and private sectors.” Philip Hammond he reiterated that the measures are a question of national security. In the three and half months since a failed military coup, Turkey has sacked or suspended more than 110,000 people, launched a military incursion into Syria, and repeatedly threatened to do the same in Iraq. [.] In the latest purge, police on Monday detained the editor and senior staff of the Cumhuriyet newspaper - one of few outlets still critical of Erdogan - over its alleged support for the July putsch.

Playlist The Very Best Of Mudvayne Rar Download. A senior EU politician described it as crossing a red line against freedom of expression, while the U.S. State Department expressed deep concern. Erdogan is riding a wave of patriotism as the ruling AK Party he founded seeks constitutional change to move Turkey to a fully presidential system which would give him greater executive powers. New Rayman Legends Keygen Download 2016 - Free And Full Version 2016.

'What's happening domestically and in terms of Turkey's foreign policy are a political tactic to keep solid the alliance between the base of the AKP and the nationalists,' said Sinan Ulgen, a former Turkish diplomat and analyst at Carnegie Europe. 'This alliance is keen on harsh policies on the Kurdish issue, looks to be in favor of reinstating the death penalty, and we can't really say they regard the preservation of freedom of speech and of the media very highly,' he told Reuters. There is no sign of any easing in Turkish policy at home or abroad, given the need to ensure nationalist support for the constitutional changes that Erdogan and the ruling party want to result from a referendum, which AKP officials have said could be held next spring. The nationalist MHP opposition party, many of its fervently patriotic members supportive of Erdogan's stance since the coup, has indicated it could back the AKP in parliament as it seeks support for the referendum on the presidential system. Also at,,,,,, and. Turkey has for more 'too big to fail'. #1, #1-3 by Beto Hernandez with Mario Hernandez and Jaime Hernandez.

These are comics that I should have covered in the blog post, perhaps. At least the first one. Probably not the last one. It’s a bit of a mish-mash, but anyway. Ten Years of Love and Rockets reprints a few shorter stories, and there’s a character index and stuff, but the real attraction is two new one-page pieces, as well as two articles on their artistic processes. Jaime illustrates some common reader question and comments for a very cute page.

You can now hack your car and smart TV without worrying about lawsuits If you are a security researcher and intend to find out the inner workings of security vulnerabilities by using your car or smart TV, then it looks like you will be able to carry out both operations without risking a lawsuit. According to the latest implementation from FTC, it has authorized changes to the Digital Millennium Copyright Act (DMCA) and will allow Americans to hack their own electronic devices, just as long as they own that piece of hardware. Researchers will lawfully be able to reverse engineer products and consumers can repair their vehicle’s electronics, but the FTC is only allowing the exemptions for a two-year trial run. FTC introduced a similar change back in 2014 when it announced that yo.

Over the years, many Germans have gotten used to YouTube’s, which prevented them from playing music videos that are widely available in the rest of the world. At the root of this issue is a dispute between the video hosting platform and, a local music group that claims to represent 70,000 artists. YouTube and GEMA have been fighting several court cases for more than half a decade, but today they announced a breakthrough. The two parties have signed a licensing agreement where the video hosting platform agrees to pay a fee for making the music videos of GEMA members available in Germany.

As a result, the blocking notifications on many videos will disappear. “This is a win for music artists around the world, enabling them to reach new and existing fans in Germany, while also earning money from the advertising on their videos,” says YouTube’s Christophe Muller. “And for YouTube users in Germany, who will no longer see a blocking message on music content that contains GEMA repertoire, for the first time in seven years.”.

GEMA is happy with the outcome as well, in particular because YouTube agreed to pay retroactive compensation for videos that have been published since the start of the dispute in 2009. “After seven years of tough negotiations, signing a deal with YouTube marks a milestone for GEMA and its members,” GEMA’s Harald Heker comments. “What is crucial is that the license agreement covers publications from both the future and the past. With this agreement, we can provide our members their royalties,” he adds. Increasingly, music groups are for “profiting” from the hard work of artists without paying proper compensations, so it’s not unlikely that similar deals will follow in other countries. On the other hand, music insiders have also complained about GEMA’s restrictive policies. Sony Music’s Edgar Berger previously said that because of the YouTube ban.

At the same time, some musicians that there were not able to. Intel Atom E3900 series is designed to further improve the connected world of IoT ARM, your competition is here and it is definitely fierce The Intel Atom E3900 series is here and is based on the company’s Goldmont Atom CPU core, and will be catered to drive the IoT market to new heights. The new architecture will allow the chips to run at higher speeds while consuming a small amount of power, which will only result in a better thermal envelop and longevity. The Intel Atom E3900 series will have a TDP roughly between the 6-12 watt range, with the 12 watts of power dedicated to being present insi.

Arch Linux has updated (two vulnerabilities) and (three code execution vulnerabilities). Debian-LTS has updated (two vulnerabilities) and (file overwrite). Fedora has updated (F24: denial of service). Gentoo has updated (information disclosure) and (multiple vulnerabilities from 2014). Mageia has updated (code execution).

Red Hat has updated kernel (;;: two vulnerabilities), (RHSCL: multiple vulnerabilities), and (RHSCL: multiple vulnerabilities). Slackware has updated (local privilege escalation (Dirty COW)), (multiple vulnerabilities), (multiple vulnerabilities), and (multiple vulnerabilities). SUSE has updated (SLEMWS12: multiple vulnerabilities). What’s the quickest way to turn one game into 2,400?

Cram a Raspberry Pi Zero running RetroPie into an NES cartridge and call it. This elegant little build requires no soldering — provided you have good cable management skills and the right parts. To this end, [Zach] remarks that finding a USB adapter — the other main component — small enough to fit inside the cartridge required tedious trial and error, so he’s he assures will work. One could skip this step, but the potential for couch co-op is probably worth the effort.

Another sticking point might be Nintendo’s use of security screws; if you have the appropriate bit or screwdriver, awesome, otherwise you might. Cutting back some of the plastic to widen the cartridge opening creates enough room to hot glue in the USB hub, a micro USB port for power, and an HDMI port in the resulting gap. If you opted to shorten the cables, fitting it all inside should be simple, but you may have to play a bit of Tetris with the layout to ensure everything fits.

Using a Back To The Future game cartridge encapsulates the essence of this project, considering its contents would be nearly science fiction back in the 1980’s — a nice touch. We’ve featured plenty of RetroPie setups — each with their own unique flair — but if you’re looking for a more period appropriate gaming station, you could simply gut an. CenturyLink Inc. Agreed to buy Level 3 Communications Inc. For about $34 billion in cash and stock, creating a more formidable competitor to AT&T Inc. In the market to handle heavy internet traffic for businesses.

[.] The equity value of the deal, excluding debt, is about $24 billion. Both companies have struggled against larger competitors -- AT&T Inc.

And Verizon Communications Inc. -- in the business services market.

Investors sent CenturyLink shares down the most in 3 1/2 years on concern the company is overpaying and piling on debt to acquire a company whose sales growth has stagnated in a hotly competitive market. The deal will. 'This transaction increases CenturyLink's network by 200,000 route miles of fiber, which includes 64,000 route miles in 350 metropolitan areas and 33,000 subsea route miles connecting multiple continents,' CenturyLink said. 'Accounting for those served by both companies, CenturyLink's on-net buildings are expected to increase by nearly 75 percent to approximately 75,000, including 10,000 buildings in EMEA and Latin America.' Currently, CenturyLink says it operates a '250,000-route-mile US fiber network and a 300,000-route-mile international transport network.' Besides Internet access, CenturyLink offers cloud and managed hosting services for enterprises.

At SoylentNews. Having traveled from the New Horizons spacecraft over 3.1 billion miles (five hours, eight minutes at light speed), the final item – a segment of a Pluto-Charon observation sequence taken by the Ralph/LEISA imager – arrived at mission operations at the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, at 5:48 a.m. The downlink came via NASA's station in Canberra, Australia. It was the last of the 50-plus total gigabits of Pluto system data transmitted to Earth by New Horizons over the past 15 months.

[.] Because it had only one shot at its target, New Horizons was designed to gather as much data as it could, as quickly as it could – taking about 100 times more data on close approach to Pluto and its moons than it could have sent home before flying onward. The spacecraft was programmed to send select, high-priority datasets home in the days just before and after close approach, and began returning the vast amount of remaining stored data in September 2015. 'We have our pot of gold,' said Mission Operations Manager Alice Bowman, of APL. The New Horizons Kuiper Belt Extended Mission (KEM) will involve a flyby of the Kuiper belt object on January 1, 2019. The object is estimated to have a diameter of 30-45 km. At SoylentNews. By embedding tiny tubes in the plants' leaves, they can be made to pick up chemicals called nitro-aromatics, which are found in landmines and buried munitions.

Real-time information can then be wirelessly relayed to a handheld device. The MIT (Massachusetts Institute of Technology) work is published [DOI: 10.1038/nmat4771] []. The scientists implanted nanoparticles and carbon nanotubes (tiny cylinders of carbon) into the leaves of the spinach plant. It takes about 10 minutes for the spinach to take up the water into the leaves. To read the signal, the researchers shine a laser onto the leaf, prompting the embedded nanotubes to emit near-infrared fluorescent light. This can be detected with a small infrared camera connected to a small, cheap Raspberry Pi computer. The signal can also be detected with a smartphone by removing the infrared filter most have.

At SoylentNews. With the new version, there's an option that allows you to only suppress notifications containing specific stings, useful to quickly disable notifications from certain sources. As an example, you could block new message notifications in Pidgin for some specific contacts, while allowing the rest. Another new feature in the latest NoNotifications is an option to store the notifications missed while the 'Don't disturb' mode was enabled. These notifications are stored in ~/.config/nonotifs_prefs/notificationlogs. The missed notifications feature still needs some work, because right now it stores some extra information that's not useful for the user, like the application icon name, and more. Other changes in the latest NoNotifications 0.9.x: • option to suppress the sound along with the notifications (this is considered experimental for now); • option to always show notifications on statup; • option to run NoNotifications on startup; • the app now remembers the last state (suppressing or not); • various smaller improvements.

Update: missed notifications can now be accessed from the indicator menu. It’s hard to make an audio mixer with any less technology than (YouTube video, embedded below). We’re pretty sure that [Sergey Kasich] isn’t going to get a patent on this one.

But what he does get is our admiration for pushing a simple idea far enough that it’s obviously useful. The basic idea is transmitting signals using the human body as a conductor. What [Sergey] does is lay out multiple sound sources and sinks on the table, and then play them like a mixer made musical instrument. Pressing harder reduces the resistance, and makes the sound louder. Connecting to two sources mixes them (in you). Watch the video — he gets a lot of mileage out of this one trick.

We can think of a number of improvements to this system. A bunch of nails in a board acting as the contact points would be a lot easier to play than 1/4″ cables taped down to a desk. You could make it a permanent instrument. If you were designing the system from scratch, you’d want high-input-impedance amplifiers on the receiving end. Add a to kill the mains hum, or an and another electrode on your ankle. Pretty soon, you’re an EKG and a mixing desk.

The biggest limitation he has is that the body is just one big conductor. Can anyone think of how to get multiple channels through flesh and bone without making the whole setup over-complicated? Now excuse us as we tape instrument cables all over our desk. We’re inspired. The Thirty Meter Telescope (TMT) could move to La Palma, in Spain's Canary Islands, if opposition from Native Hawaiians prevents the next-generation observatory from being built atop the Hawaiian mountain of Mauna Kea as planned. The decision, announced on 31 October by the TMT International Observatory's board of governors, creates an alternative path forward for the troubled mega-telescope. Its opponents blocked access to the Mauna Kea site in April 2015, halting construction, although work on the telescope's components continues at sites around the world.

Native Hawaiians regard the decision to build the TMT on Mauna Kea as that hosts 13 other telescopes, some of which are being decommissioned. In December, Hawaii's state supreme court that would have allowed the TMT to proceed. A fresh round of hearings began this month, with TMT officials seeking a new permit from the state's Bureau of Land and Natural Resources. Previously: at SoylentNews. Linux, FreeBSD, and Unix-like systems are multi-user and need some way of authenticating individual users. Back in the old days, this was done in different ways.

You need to change each Unix application to use different authentication scheme. Also, authentication schemes differed between a variant of Unix systems. Porting was a nightmare. For example to use Windows Server (Active Directory) or LDAP for authentication you need to make changes to an application. Each application had its way of authenticating users. So Open Group lead to the development of PAM for the Unix-like system.

Today Linux, FreeBSD, MacOS X and many other Unix-like systems are configured to use a centralized authentication mechanism called Pluggable Authentication Modules (PAM). The book 'PAM Mastery' deals with the black magic of PAM.

In the US, Europe, and Canada, copyright holders have been teaming up with piracy monitoring firms to develop a new flow of revenue. Together they track down alleged pirates and hit them with a demand for cash settlement – or else. This so-called ‘copyright-trolling’ hit Sweden earlier this year. An organization calling itself Spridningskollen (Distribution Check) headed up by law firm Gothia Law, said its new initiative would save the entertainment industries and educate the masses.

“One can compare it to a speed camera. In the same way that a speed camera only records those who drive too fast, only those Internet users who share copyrighted material without permission are logged,” spokesman Gordon Odenbark. Those ‘speeding fines’ were set at around $250 but backed up by threats that they would increase if file-sharers were uncooperative.

Predictably there was a huge backlash, both among the public and in the media, but few expected the announcement that came yesterday. “Gothia Law, who on behalf of rights holders in the film and television industry created Distribution Check, is now ending its involvement in the file sharing issue,” the firm said. “In a short time, Distribution Check has given rise to criticism but also a decline in illegal file sharing. This without a single collection letter being sent out.” Noting that in a short time the anti-piracy campaign had generated intense debate, the law firm also went on to claim that it had been a success. “Knowledge of an individual’s legal responsibility is higher today than it was before the initiative was launched. It also established that the method to address a claim against a person who held a particular IP address through which copyrighted materials were distributed illegally, is in full compliance with both Swedish and European legislation,” the company added.

The claim that the campaign had somehow achieved its aims is somewhat weak, especially when one considers the legal and administrative costs that have been accrued in what was a sizeable operation. That is further compounded by the fact that no letters being sent out means that a) all the threats and promises were hollow and b) zero revenue was generated. Perhaps worse still, those threats were made by a law firm that now has to deal with damage to its reputation among both its clients and the general public. “The polarized debate focused on how to act to avoid the Swedish law. Many hold the belief that it is socially acceptable to withhold the truth in order to escape the penalty for a criminal.

Google has disclosed a Windows zero-day vulnerability after 7-day deadline it gives vendors when the flaw is actively exploited in the wild by hackers. Google has once again publicly disclosed a zero-day vulnerability affecting current versions of Windows operating system and Microsoft still hasn’t issued a patch. Yes, you’ve got it right! There is a critical zero-day unpatched and attackers are already exploiting it in the wild. The vulnerability is a local privilege escalation flaw that affects the Windows operating system kernel. The zero-day could be exploited by attackers to gain administrator-level access by escaping the sandbox protection and execute malicious code. Google has chosen to public disclose the flaw just 10 days after privately reporting it to Microsoft, giving the company a very little time to issue security updates.

According to Google, the reason for going public without waiting for a patch is that its experts have observed exploits for the flaw in the wild., when a flaw is exploited in the wild Google public disclosed the flaw after seven days. “On Friday, October 21st, we reported 0-day vulnerabilities — previously publicly-unknown vulnerabilities — to Adobe and Microsoft.

Adobe updated Flash to address CVE-2016-7855; this update is available via Adobe’s updater and Chrome auto-update.” reads a published by Google. “After 7 days, per our, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released. This vulnerability is particularly serious because we know it is being actively exploited.” According to Google’s Neel Mehta and Billy Leonard, the Windows zero-day “can be triggered via the win32k.sys system call NtSetWindowLongPtr() for the index GWLP_ID on a window handle with GWL_STYLE set to WS_CHILD.”. NASA announces the addition of its newest virtual institute to advance the field of small spacecraft systems. The Small Spacecraft Systems Virtual Institute (S3VI), hosted at NASA's Ames Research Center in Moffett Field, California, will leverage the growing small spacecraft community, promote innovation, identify emerging technology opportunities, and provide an efficient channel for communication about small spacecraft systems with industry, academia, and other government agencies. [.] Depending on the mission objective, a small spacecraft can range in size from a postage-stamp (under an ounce) up to the size of a refrigerator (about 400 pounds). Many recently launched NASA small spacecraft conform to the CubeSat standards - established by academia - in which a single cube (called a one-unit, or 1U) measures about 4 inches on each side, has an approximate volume of one quart, and weighs less than three pounds.

The variety of sizes offers spacecraft capabilities tailored to specific science instruments, exploration sensors, or technology demonstrations. NASA will (for example, those that are imaging the Earth or asteroids using satellites). The White House is announcing its plan today to promote the use of small space satellites — a move aimed at strengthening the U.S.' Burgeoning commercial space industry. The project, called 'Harnessing the Small Satellite Revolution,' is meant to spur collaboration between government agencies, including NASA, and the private sector to find practical uses for small satellites, or smallsats. These tiny space probes — which weigh anywhere between a few hundred pounds to just a few ounces — can be valuable tools for planetary scientists, as well as provide internet access and monitor space traffic. That's why the White House is looking for ways to boost smallsat production, as well as find ways these private spacecraft can benefit the government.

So as part of the new initiative, NASA will be spending up to $25 million to purchase data collected by private companies' smallsats. For now, the space agency is looking for data that can help with its study of Earth science, like detailed images of the planet's surface. NASA will also spend an extra $5 million to make this smallsat technology even more robust. Security researchers at cyber security labs publicly announced this morning (November 1, 2016) major cyber security vulnerabilities affecting one of the world’s largest manufacturers of SCADA and Industrial Control Systems,. The zero-day vulnerabilities dubbed PanelShock, found earlier this year by, CTO and Founder of CRITIFENCE, a leading Critical Infrastructure, SCADA and Industrial Control Systems cyber security firm. The PanelShock vulnerability was uncovered in collaboration with CRITIFENCE released an of the vulnerability.

“PanelShock disclose a new type of vulnerabilities in Schneider Electric’s SCADA Human Machine Interface (HMI) device panels. A low skills attacker can freeze and disconnect an HMI panel devices from the SCADA network remotely by exploiting these vulnerabilities.

HMI panel devices allows operators and process engineers to monitor and control manufacture processes and field equipment, such as valves, pumps, engines, turbines, centrifuges and more.” says. Are among the most common SCADA vendors in North America, Europe and worldwide. The vendor’s p. • author Paul A.

Spiegel Humanity stands on the brink of the Age of Longevity. Advances in science hold the promise of extending the healthy lifespan beyond the roughly 120 years presently accepted as the “natural” limit’, achieving radical life extension (“RLE”). In considering this breakthrough, two questions often arise in popular discourse: If people live indefinitely, how will society support so many retirees? And won’t longevity treatments be only for the wealthy?

The answers require a new social compact for a new age. Current retirement systems work reasonably well in an age of finite, reasonably predictable lifespan and a generally predictable process of decline toward an inevitable death. “Work hard, and contribute to society” we are told, “and in your old age, society will support you for as long as you live, so you will never have to work again.” “Social security”, as it is called in the many countries, works where the retirement age is set high enough that most who enjoy benefits will not do so for very long. It is unsustainable where the healthy human lifespan is indefinite. Eliminating retirement is a difficult proposition to sell.

People who have paid into the system expect, with justification, to benefit from it. But the system works only if participants age and die. RLE enhancement can be used to change this system. Under a new social compact, anyone wanting to receive RLE enhancement would have to relinquish all claim to retirement at society’s expense. The old social compact, that society will support you in old age for as long as you live, would be replaced by a new one: If you want to live indefinitely, don’t expect society to support you if you don’t want to work. This new social compact would allow countries with socialized medicine to provide RLE enhancement, presumably costly at first, to any individual. What the state spends on RLE would be offset by savings on retirement.

Recipients of RLE enhancement would enjoy indefinite healthy life in exchange for indefinite productivity. There would be no promise of retirement at society’s expense simply because you had lived a long time.

To receive RLE enhancem. LED matrix projects are all over the place, but this one is interesting for its simplicity: it’s an LED. [Ray] put it together as a quick project for his students to teach the basics of LED programming. It’s built using a and his own. But the gist of the hardware is simply an ESP8266 and some WS2812’s. Where this gets interesting is with the user interaction side of things. The ESP makes WiFi and web serving easy, and [Ray] has build a simple HTTP GET API into the firmware.

This is a great combination for the web dashboard and JavaScript-based animation programs [Ray] is demonstrating in the video below. Just get on the same network and load up the module’s WiFi address for a graphical representation of the 5×7 LED matrix. Pick a color, turn pixels on or off, or choose a predefined pattern and send it to the hardware. This is a powerful way to get use input and with this as a guide it’s fast to set up for pretty much an application you can think of. Just work your way through the (Zip file link), including all of the code and the slides he used to run the workshop. An eye witness report gets no better than this. Four people were involved and a government reaction was also described. Then they were silenced.

This could be a Giant Sloth possibly a young one or even a female. We even got two separate events involved. There is a forest fire flushing animals and we have a lucky truck impact. However the hands and feet say no. To be a chimp though it is way too large.

It is twice the weight of a man and could tear you apart. That also makes it an import. I keep thinking that he should have been able to look at both hands and feet closely which would help hugely.

Hairy Humanoid Body.An Official Cover-Up in Florida. Hardening the security on your VPS should be one of the first tasks you perform when buying a new VPS.

As a result, we’ve provided several tips that will help you increase the security on your VPS. When you buy a VPS, your provider will likely send you a default root password for your server. You will need to change this password to a string that only you know. But that’s just the start of what you should be doing to make sure your VPS is reasonably secure.

When you leave your password as the default password assigned by your hosting provider, your attack surface increases since someone will simply need to breach your email account in order to gain access to your VPS. Changing Your Default Password To begin this process, ensure that you have at least one root SSH session active.

Reason being, you won’t be able to reset the password again if the test login fails after changing it’s authentication. This little trick can potentially save you from having to contact your VPS provider for a password reset. The importance of a strong password cannot be stressed. You can always use one of the many password generating tools available such as pwgen or mkpasswd. You can also generate a secure password online using the following website: Once you have chosen the password, make sure to memorize it or store it in a safe location (not a post-it note on your screen). Next, let’s assign the password.

Execute the following command and type the password twice as asked: >passwd As advised above, keep create a terminal root SSH connection open while performing the password change. Open another SSH connection and make sure you can log in with new password. Using Key Authentication for Remote Connections to your VPS Another good way to avoid intruders is to connect to your VPS is by using Key Authentication. Key file authentication increases security because it makes it even nearly impossible to gain unauthorized access to your VPS without the key file that you generate. Let’s start with generating RSA key on your workstation: >ssh-keygen -b 2048 -t rsa The app will ask you for a password to guard your keys.

If you are using the app from a secure workstation you might not feel compelled to set one up. Having a password for your key files will only increase the security around your VPS since you can effectively restrict access to the rep. A former employee of the Office of the Comptroller of the Currency downloaded 10,000 records onto thumb drives before his retirement in November 2015. On Friday, the US banking regulator told Congress about a potential “major information security incident” after it discovered that a former employee has downloaded a large number of files onto thumb drives before his retirement in November 2015. According to the Office of the Comptroller of the Currency, there was no evidence that suggests that the former employee has publicly disclosed the data neither he has misused it.

The Office of the Comptroller is tasked with protecting consumers and the regular activity on financial markets. The banking regulator confirmed the former employee downloaded a large number of files onto two removable thumb drives, the stolen information was encrypted. According to the Office of the Comptroller of the Currency, the security breach was only detected last month after a routine security assessment. The OCC reported that when the former employee was contacted by the Agency, he “was unable to locate or return the thumb drives to the agency.” “The OCC has deemed the breach a “major incident” because the devices containing the information are not recoverable and more than 10,000 records were removed, the agency said.”.

“An official familiar with the investigation declined to comment on a possible motive. The official, who was not authorized to discuss the case, noted that a large batch of unclassified personnel records were among the cache.” Experts have downplayed the risks for the users arguing that the information was not released to unauthorized sources.It is quite frequent that employees or consultants report missing thumb drives containing sensitive data. It is quite frequent that employees or consultants report missing thumb drives containing sensitive data. Recently the National Security Agency went in the headlines. The National Highway Traffic Safety Administration has sent a letter demanding George Hotz's company comma.ai provide information pertaining to the safety of their system (This morning [28 Oct], Ars Technica reports that from Shenzhen that the comma one was now cancelled (comma.ai had just received a $3.1m investment from Andreessen-Horowitz in April (at SoylentNews. Linux and Unix systems have long made it pretty easy to run a command on boot.

Just add your command to /etc/rc.local and away you go. But as it turns out, running a command on shutdown is a little more complicated. Why would you want to run a command as the computer shuts down? Perhaps you want to de-register a machine or service from a database. Maybe you want to copy data from a volatile storage system to a permanent location. Want your computer to post '#RIP me!'

On its Twitter account before it shuts down? There’s something morbidly fascinating about animals that seem to behave pathologically: The female praying mantis engaging in sexual cannibalism, the fish eating its own fry. It was this sort of twisted behavior that first drew anthropologist and evolutionary biologist Sarah Hrdy (pronounced Hur-dee) to study langurs in Mount Abu, in India. The males among these large, gray-haired monkeys were killing their own colony’s infants; at the time, in the late 1960s and early 1970s, researchers thought the pressures of overcrowding were the cause. What Hrdy found, however, was that these langurs’ infanticidal tendencies were actually adaptive behavior—behavior that, she argues, one can also see in humans. In the langur colonies she observed, infanticides were hardly indiscriminate, which is what you might expect if the killings were driven by some kind of psychological anguish. In fact, the males never attacked their own offspring, and the ones they did knock off were less than six-months old—infants that were still suckling.

This led Hrdy to conclude that infanticide was an effective tactic to allow mothers to mate. They can’t mate while they’re lactating because lactation suppresses ovulation.

But they stop lactating once they’re childless. Killing baby langurs increases a male’s opportunity to.

Today we kicked off our with the goal of raising enough funds to cover about one month of our operations - $200,000. That amount covers the operational and engineering staff, the hardware and the software, and general operating expenses needed to securely and reliably issue and manage many millions of certificates. We decided to run a crowdfunding campaign for a couple of reasons. First, there is a gap between the funds we’ve raised and what we need for next year. Second, we believe individual supporters from our community can come to represent a significant diversification of our annual revenue sources, in addition to corporate sponsorship and grants.

We will provide updates on our progress throughout the campaign via Twitter (). Thank you for your support! For the first time, researchers have achieved — the phenomenon of electrical conductivity with zero resistance — in a material that’s not a superconductor. The new technique demonstrates a concept that was first proposed back in the 1970s, but until now had never been proven, and it could lead to ways to make existing superconductors, like the ones used in MRI machines or, cheaper and more efficient at higher temperatures. “Superconductivity is used in many things, of which MRI (magnetic resonance imaging) is perhaps the best known,”. Rattling around inside a hard drive doesn’t sound like an awful lot of fun — but then, neither does death.

Both eventualities are rather difficult to imagine, but we’ll all have to give them some thought sooner rather than later. Neuroscientist and neuroengineer Randal Koene thinks it’s only going to be another 10 years before we replace parts of the brain with prosthetics. From there, it’s just a matter of replacing each region systematically, to end up with someone whose brain is immortal and electronic. Could the last person to die have already been born?

It runs Linux, uses, and the plugin standard used is LV2 Some time ago, the jumped onto my radar. In a nutshell, it is a guitar stomp box that comes loaded with different effects and sounds. Instead of buying the multitude of guitar pedals that many musicians string together in complex, if somewhat beautiful ways, the MOD Duo negates all that. It is a single box and what's more, it is powered by open source. Now, when I say it is powered by open source, I don't just mean it runs Linux, but we will get to that a little later. [.] Inside the beefy-looking steel enclosure is a computer that is loaded with software for generating lots of different guitar effects and sounds.

This includes delays, reverbs, choruses, flangers, and more. When you plug this thing into you computer, you can then use a web interface to build your own virtual pedalboard: Just like a physical pedalboard, you drag the different virtual stomp boxes onto the floor and use cables to connect them together in different ways.

When you have created your sounds, the MOD Duo will save them and you can call them directly from the hardware unit. This means you don't need a computer to use the MOD Duo to play gigs; you only use the computer to configure your pedalboards. The interface is not just used for creating sounds, though. You can also browse additional virtual pedals and download them, and create banks of patches.

[.] For many years you have been able to plug a USB sound card into a Linux computer, set up JACK, configure your plugins, and output the audio in different ways. Although possible, this was historically complicated to set up and use. [.] The MOD Duo changed all this. First, everything is set up and good to go on the device itself. You literally don't need to know jack about JACK. Second, the plugins have completely refreshed and simplified interfaces that look and feel like guitar pedals.

Third, the overall interface for stringing these different effects together is simple, natural, and a lot of fun. For the geeks they even go so far as to offer a MOD Arduino Shield for experimenting with different sensors and a MOD software development kit. [.] Aside from all the technical merits of the MOD Duo from an open source perspective, I also love how the team is working in this very community-oriented way. Once again, the real power of open source is not code, it is the community fabric and methodology that underpins it. Our hats off to [SpeedyCop] and his [Gang of Outlaws] for turning a junked former Vietnam War. Yes, that’s right.

It’s both driven on water and raced in the 24 Hours of LeMons at New Jersey Motorsports Park. It started life as a 1969 Bell OH-58 Kiowa (US Army Vietnam Assault helo) and had not only served in Vietnam but also for a federal drug task force. It was chopped up for parts and the body found its way to [SpeedyCop] and friends.

The body now sits on an 80s Toyota van chassis, has a Mazda Miata rear suspension, and Audi 3.0 V6 engine. The pontoons were originally added to hide the seam between the helicopter body and the van but they then inspired the idea of making it amphibious. And with the addition of a four-blade, 7000 RPM propeller from a parasail boat, the idea became reality, as you can see in the video after the break (we suspect the trailing line is a rope to pull it back to shore in case of engine failure). If you’re looking for more combinations in a single vehicle, how about this military that even if seen, wouldn’t be believed. And still on the theme of personal helicopters, there’s this one by a.

[via ] Filed under. China plans to launch its first e-commerce satellite in 2017, with the primary purpose of using satellite data in agriculture.

The plan was announced on Monday during an international aviation and aerospace forum in Zhuhai, Guangdong Province, by the China Academy of Launch Vehicle Technology, China Aerospace Museum and Juhuasuan, an arm of e-commerce giant Alibaba. “In an era of space economy, the potential of a commercial space industry is immeasurable,” Han Qingping, president of the Chinarocket Co., Ltd, said at the forum. These are the ten most read articles on FOSS Force for the month of October, 2016.

By Ken Starks. Published October 4, 2016.

It’s getting harder and harder to scam little old ladies these days. They’ll just up and switch to Linux on you. By Isaac Carter. Published October 12, 2016.

Raspbian, the Raspberry Pi’s most well known distro, has an exciting new look and feel with Pixel. By Robin “Roblimo” Miller. Published October 13, 2016. In this story, “Roblimo” takes us back to 2002, to an open source conference in a country where the common belief was that “nobody knew anything about Linux.” Boy, were they in for a surprise. By FOSS Force staff.

October 5, 2016. Users of Fedora 24 might want to put any update plans on hold until this bug issue is resolved. By Phil Shapiro. Published October 7, 2016. Free Code Camp is an organization that teaches people to code.

As part of this free training, student coders produce free code needed by nonprofit organizations. Free Code Camp doesn’t accept donations, but you can support them by buying t-shirts, hoodies and audiobooks through their store. By Christine Hall. Published July 25, 2016.

A month after Linux Mint 18 “Sarah” was released we decided to take it for a spin and have our first ever look at the Cinnamon desktop. By Christine Hall. Published October 7, 2016.

Also included in this “Week in Review”: Judge seems to make software patents illegal, Mageia mourns a contributor, Yakkety Yak frozen, KDE’s new release, and getting ready for All Things Open. Published September 29th, 2016. This Ubuntu-based Linux distribution provides the Internet for those who don’t have 24×7 access to the net. The Tel Aviv-based startup is building 'smart glasses' which pair with an app on your smartphone to offer users incentivized promotions and discounts. How it works is fairly straightforward. Consumers order their drinks at the bar and are prompted to scan the glasses over their phones when served.

The glasses have an NFC chip embedded at the bottom and work with any QR scanner. There's no need to have the Glassify app pre-installed – it'll prompt you to download it when you scan a compatible glass for the first time. 'There's always an incentive for users to scan their glass,' explains Ben Biron, CEO of Glassify. 'This could be things like a free drink, chaser, or a food combo.' This really shouldn't be that hard of a call but free is my favorite kind of beer. At SoylentNews.

Researchers at the (IISER) in Kolkata, India, have for the first time implemented a bio-waste-derived electrode as cathode in a quantum-dot-sensitized solar cell. “The materials to be used as cathode in quantum dot solar cells need to be highly catalytic and electrically conducting to facilitate the electron transfer processes,” explains Professor Sayan Bhattacharyya from the Department of Chemical Sciences at IISER. He adds that the lamellar structure of human hair is likely responsible for the graphene-like sheets in the transformed graphitic porous carbon. “Secondly,” he continues, “since hair contains keratin and other amino acids, carbonizing the acid-digested hair under inert conditions likely retains the nitrogen and sulphur hetero-atoms, which are useful to enhance the catalytic propensity of the produced carbon.” As the professor explains, the idea behind this research project was to use a bio-waste resource like hair in future energy technologies to achieve a win-win situation — i.e., “A smart way to address environmental concerns and also to produce cheaper devices.”. Majorana fermions were first proposed by the physicist Ettore Majorana in 1937. They are fermion particles that are also their own antiparticles. These fermions are vital to the research of superconducting materials and topological quantum computation.

However, 80 years later, scientists have not found a Majorana elementary particle. Though it is hypothesized that neutrinos are Majorana fermions, there is still no evidence to support this conjecture.

In condensed matter physics,. Recently, a research team from the Key Laboratory of Quantum Information of the Chinese Academy of Sciences achieved the fabrication and manipulation of MZMs in an optical simulator. The team led by Professors LI Chuangfeng, XU Jinshi, and HAN Yongjian implemented the exchange of two MZMs such that the non-Abelian statistics of MZMs are supported. This work is published in Nature Communications on October 25th.

At SoylentNews. [Hari Waguna] wanted to build a computerized Sudoku game. Ordinarily, that wouldn’t be a big deal. You can buy one, of course, but what fun is that? There’s plenty of apps for phones, but again, not much of a challenge. If you want to preserve your hacker cred, you’d use a CPU board like an Arduino or a Raspberry Pi with an LCD screen, right? But if you want to grow your hacker cred, you’d follow [Hari’s] lead and use.

Driving that many displays takes some doing (in this case shift registers). [Hari] uses some other tricks, like reading the keyboard using a single pin (and a resistor network).

He’s made several videos about the project, including the one below. The PCB measures eight inches by a little over five inches. Maybe that’s handheld.

Probably not. We’ve seen before, although perhaps not as compact.

If you really want street cred, you can always try. Saturday night's election results show [that] Iceland's Pirate Party [.] won 10 seats, more than tripling its three seats in the last election.

The Left-Green Party also won 10 seats. Birgitta Jonsdottir, the leader of the Pirate Party, said she was satisfied with the result. 'Whatever happens, we have created a wave of change in the Icelandic society', she told a cheering crowd early Sunday morning [October 30]. The left-leaning parties--the Left-Greens, the Pirates, and two allies--won a total of 27 seats, just short of the 32 required to command a majority in Iceland's Parliament, the world's oldest.

The governing center-right Progressive party lost more than half of its seats in the election which was triggered by Prime Minister Sigmundur Gunnlaugsson's resignation which revealed the offshore assets of high-profile figures. Current Prime Minister Sigurdur Ingi Johannsson [resigned October 30]. The anti-establishment Pirate Party, which was founded in 2012, had said it could be looking to form a coalition with three left-wing and centrist parties. The Pirates' are: direct democracy, freedom of expression, civil rights, net neutrality, and transparency, all set out in a popular, draft of a new national Constitution that the current government has failed to act on. They also seek to re-nationalize the country's natural resource industries, create new rules for civic governance, and issue a passport to Edward Snowden. [Continues.] at SoylentNews.

New method for creating smaller switches for QC identified and making smaller and more efficient QC systems possible. Edmonton nanotechnology researchers working with atom-sized materials have made a breakthrough that could lead to smaller, ultraefficient computers. The team, led by Robert Wolkow, together with collaborators at the Max Planck Institute in Hamburg, have developed a way to create atomic switches for electricity nearly 100 times smaller than the smallest switches, or transistors, on the market today.

Their findings appeared in the Oct. 26 edition of the scientific publication Nature Communications.

“What we’re showing in this new paper is one part in a bigger scheme that allows us to make ultralow power consuming electronic devices,” said Wolkow, a physics professor at the University of Alberta and the principal research officer at Edmonton’s National Institute for Nanotechnology. He’s also chief technology officer at spinoff company Quantum Silicon Inc. Talk about downsizing – researchers at have developed a design for, the university announced Oct. For now, that size is entirely theoretical. It could be managed by a novel kind of logic that enables the computer to process data inside a three-dimensional structure. “In a regular computer, data processing and memory storage are separated, which slows down computation.

Processing data directly inside a three-dimensional memory structure would allow more data to be stored and processed much faster,” said Gina Adam, a postdoctoral researcher and the lead author of the paper. In a newly published study, nanoscientists look ahead to what we can expect in the coming decade, and conclude that nanoscience is poised to make important contributions in many areas, including health care, electronics, energy, food and water. Nanoscience research involves molecules that are only 1/100th the size of cancer cells and that have the potential to profoundly improve the quality of our health and our lives. Now nine prominent nanoscientists look ahead to what we can expect in the coming decade, and conclude that nanoscience is poised to make important contributions in many areas, including health care, electronics, energy, food and water. Significant progress has already been made in nanomaterials, report authors Paul Weiss, who holds a UC presidential chair and is a distinguished professor of chemistry and biochemistry at UCLA, and Dr. Andre Nel, chief of nanomedicine at the David Geffen School of Medicine at UCLA. In the journal ACS Nano, Weiss, Nel, who is a distinguished professor of medicine, and their colleagues say the following.

Patches of chain-like placed across particles can radically transform the optical, electronic, and properties of particle-based. Understanding why depends critically on the three-dimensional features of these “polymer nano-patches”—which are tantalizingly difficult to reveal at a scale spanning just billionths of a meter. Now, have used cutting-edge electron techniques—a process of 3D reconstructive —to pinpoint the structure and composition of the polymer nano-patches. The results, published earlier this month in the journal Nature, “lay the foundation for new architectures that could potentially enhance technologies such as self-assembled and catalysts,” said lead author Eugenia Kumacheva of the University of Toronto.

The tracked the patches formed by different synthetic polymers—versatile and common compounds used in everything from plastics to —on the surface of gold nanospheres thousands of times smaller than the width of a single human hair. To visualize the. In the TU Wien design, quantum cascade heterostructures are arrayed within concentric ring-shaped waveguides (top; diameter of outer ring is 400 microns), and can act as both sources and detectors of light on the same chip. In the specific setup tested by the lab (bottom), one of the ring structures (on the right), acting in QCL mode, sends its light through a chamber containing the gas to be analyzed. The beam is reflected by a mirror (on the left) and sent back through the chamber, to be picked up by the other ring structure, acting in detector mode. [Image: TU Wien] Quantum cascade lasers (QCL) excel as mid-infrared light sources, a characteristic that has made them a linchpin in many environmental and industrial gas-sensing applications. But though QCLs themselves can be quite small, actually setting up a sensor system requires other elements beyond the laser, which can make it tough to design compact devices ready for field use.

A team of scientists from the Vienna University of Technology (TU Wien), Austria, now offers a concept that the group believes could make designing handheld QCL-based sensors a lot easier. The key: a clever scheme that combines the laser and the detector on a single chip less than half a millimeter across (ACS Photon., doi: ). Satellite engineers have been puzzling over. Thanks to Swarm, it appears 'thunderstorms' in the ionosphere are to blame. Launched in 2013, the Swarm trio is measuring and untangling the different magnetic fields that stem from Earth's core, mantle, crust, oceans, ionosphere and magnetosphere – an undertaking of at least four years. As with many satellites, ESA's three Swarm satellites carry GPS receivers as part of their positioning system so that operators keep them in the correct orbits.

In addition, GPS pinpoints where the satellites are making their scientific measurements. However, sometimes the satellites lose their GPS connection. In fact, during their first two years in orbit, the link was broken 166 times. A paper published recently describes how Swarm has revealed there is a direct link between these blackouts and ionospheric 'thunderstorms', around 300–600 km above Earth. At SoylentNews.

If you have been off trick-or-treating and returned home with an embarassment of candy, what on earth can you do to mange the problem and sort it by brand? Yes, it’s an issue that so many of us have had to face at this time of year. So much a challenge, that the folks at [Dexter Industries] to automate the task.

OK, there’s something of the tongue-in-cheek about the application. But the technology they’ve used is interesting, and worth a second look. Hardware wise it’s a Lego Mindstorms conveyor and hopper controlled by a Raspberry Pi through the BrickPi interface. All very well, but it’s in the software that the interest lies. They use the Raspberry Pi’s camera to take a picture to send off to Google Cloud Vision, which they then query to return a guess at the brand of the candy in question. The value returned is then compared to a list of brands to keep or donate to another family member, and the hopper tips the bar into the respective pile. They provide full build details and code, as well as the video we’ve put below the break.

So simple a child can explain it, sort of. Machine vision remains a challenge, as we can see from; only a few of them over all the years Hackaday has been in existence. Using a cloud service might not be to everyone’s taste, but it provides an alternative route into machine vision as well as the extra power of the Google engine, and could open up the technology to makers who might not otherwise use it. [via ] Filed under. Tonight while I was handing out candy on Halloween as the children came to the door trick-or-treating getting whatever candy I've not yet eaten.

I started thinking about scary stories the security universe. Some of the things we do in Security could be compared to the old fable of the cursed monkey's paw, which is one of my favorite stories. This story got me thinking about security, how we ask questions and how we answer questions. What if we think about this in the context of application security specifically for this example. If someone was to ask the security the question “does this code have a buffer overflow in it?” The person I asked for help is going to look for buffer overflows and they may or may not notice that it has a SQL injection problem. Or maybe it has an integer overflow or some other problem. The point is that's not what they were looking for so we didn't ask the right question.

You can even bring this little farther and occasionally someone might ask the question “is my system secure” the answer is definitively no. You don't even have to look at it to answer that question and so they don't even know what to ask in reality. They are asking the monkey paw to bring them their money, it's going to do it, but they're not going to like the consequences. So this really makes me think about how we frame the question since the questions we ask are super important, getting the details right is a big deal. However there's also another side to asking questions and that's being the human receiving the question.

You have to be rational and sane in the way you deal with the person asking those questions. If we are the monkey's paw; only giving people the technical answer to the technical question, odds are good we aren't actually helping them. As I sit here on this cold windy Halloween waiting for the kids to come and take al. You probably don’t expect the government to log and track your personally identifying information, despite having broken no laws, just because you attended an event at the fairgrounds. That would be preposterous in the Land of the Free. But, according to the, federal agencies have joined forces with local police to deploy (ALPR) technology at gun shows, with the aim of collecting attendees' plate information—without an explicit target.

Gun show patrons are typically concerned about their Second Amendment rights, but what about the First Amendment? ALPRs are high-speed camera systems that capture the license plates of every vehicle that passes into view. These images are then translated into machine-readable characters that can be run through police and driver databases. The scans are also often added to massive ALPR databases. In aggregate, this data can reveal patterns of behavior, such as when you leave for work, where you sleep at night, what doctors you visit, who you hang out with, and, yes, whether you attend gun shows. ALPR is a form of mass surveillance since it captures information on every driver, not just those suspected of involvement in crimes.

Most states and local jurisdictions have not enacted any kind of public accountability for these systems. We must demand it. EFF has joined a broad coalition to support the (CCOPS) campaign, which seeks to ensure that all members of the community, and not just a few police executives, get to decide whether or not to allow the police to deploy new surveillance tools. The Crossroads of the West Gun Show in Del Mar, California, is a popular event that draws crowds of 6,000-9,000. ICE agents colluded with local law enforcement officers in 2010 to use license plate readers mounted on officers’ cars to gather information on vehicles at this gun show, according to a federal Immigration and Customs Enforcement email ( after a Freedom of Information Act request). Police then cross-referenced that data with license plates headed south into Mexico in an attempt to find a smuggling connection. Perhaps the biggest problem with this tactic is that the police had no specific target.

Rather, this was a dragnet operation that collected information on thousands of innocent people, without evidence of any particular. After a 115-day stay on the. Returning on a Russian Soyuz space capsule, U.S. Astronaut Kate Rubins of NASA, Russian cosmonaut and Expedition 49 Commander Anatoly Ivanishin of Roscosmos and Japanese astronaut Takuya Onishi landed near Kazakhstan at 9:58 a.m. local time on Sunday (Oct.

30), or 11:58 p.m. EDT (0358 GMT). 'Touchdown confirmed,' NASA spokesman Rob Navias said during the agency's landing webcast commentary. 'After a journey of 115 days and 48.9 million miles, the Expedition 49 crew is home.' At SoylentNews.

Should law enforcement get an all access, long-term pass to a teenager’s cell phone, just because he or she had a run in with police? That question is in front of California’s highest court, and in an filed earlier this month, EFF and the three California offices of the ACLU warned that it was a highly invasive and unconstitutional condition of juvenile parole.

In this case, a teenager known in court documents as Ricardo P. Admitted to two cases of burglary. One condition of his parole was that he submit his phone to search at any time, whether by his probation officers or any peace officer, even though his phone use had nothing to do with the commission of the crimes. Supreme Court has ruled that you cannot treat personal electronic devices so cavalierly. In 2014, the court in Riley v. California recognized that government searches of cellphones implicate personal privacy in ways that few things do, and rejected the government’s claims that cellphones can be searched without a warrant.

After all, cell phones contain the sum of all of our lives, including our religious views, our sexual orientations, our health conditions, or physical movements throughout the day, and more. And the privacy implications go far further than the individual juvenile on parole. Everyone the child talks to also has personal information that is exposed to law enforcement.

An on-demand search without any probable cause is like letting the government have a long-running wiretap—unprecedented for a probation condition for a juvenile. And this search condition isn’t just unconstitutional—it’s counter-productive to rehabilitation. Young people rely on their phones and other digital devices to connect with friends and family, as well as to research and contact support services.

Knowing they were subject to a search at any time means that kids would have to decide between using everyday tools to get what they need, or giving up their privacy and free expression rights. Tens of thousands of young people in California go on probation every year. Yet some juvenile courts in the state are still unfairly and inaccurately applying pre-digital legal rules to modern technology. We hope the California Supreme Court helps get juvenile probation into the 21st century, and protect kids who are on parole from these unconstitutional searches. Ready to leave your body behind?

Scientists have developed that people can remotely control and embody using their minds, a breakthrough set to revolutionize the lives of paralyzed patients. The (VERE) project “aims at dissolving the boundary between the human body and surrogate representations in immersive virtual reality and physical reality,” meaning that people genuinely feel like the surrogate body is an extension of themselves. Three volunteers have tried out a prototype, and the results are promising. “The feeling of actually embodying the robot was good, although needless to say, the sensation varied over time,”, a volunteer on the project, in an interview published Wednesday.

“When the robot was stationary, the feeling of embodiment was low, but the moment I gave the first command or changed direction, there was this feeling of control and increased embodiment.” The three volunteers, based in Italy, placed an electroencephalogram (EEG) cap on their heads that scanned for brain activity through the scalp. Patients were given a video feed of what a robot in Japan could see, superimposed with arrows. When the wearer focused on one arrow, the machine was able to detect the signal and send it remotely to the robot.

Abstract: In 1959 renowned physicist Richard Feynman, in his talk “Plenty of Room at the Bottom,” spoke of a future in which tiny machines could perform huge feats. Like many forward-looking concepts, his molecule and atom-sized world remained for years in the realm of science fiction. And then, scientists and other creative thinkers began to realize Feynman’s nanotechnological visions. In the spirit of Feynman’s insight, and in response to the challenges he issued as a way to inspire scientific and engineering creativity, electrical and computer engineers at UC Santa Barbara have developed a design for a functional nanoscale computing device. The concept involves a dense, three-dimensional circuit operating on an unconventional type of logic that could, theoretically, be packed into a block no bigger than 50 nanometers on any side.

Should prosecutors have the ability to take advantage of unclear laws to bring charges for behavior far beyond the problem Congress was trying to address? We don’t think so. When not carefully limited, criminal laws give prosecutors too much power to go after innocent individuals for innocuous behavior, like by using a partner’s password to post something for them or print out a boarding pass. And that’s terrifying. It’s also contrary to a long-held constitutional rule requiring vague criminal statutes to be interpreted narrowly—called the —intended to ensure that people have clear and unambiguous notice in the letter of the law itself of what behavior could land them in prison.

But recently released for prosecutions under the Computer Fraud and Abuse Act (CFAA), intended to assist prosecutors in deciding when to bring charges under the notoriously vague federal statute targeting computer break-ins, demonstrate that prosecutors have far too much discretion in applying the CFAA. What’s more, the guidelines all but condone use of the CFAA to prosecute cases for political gain, under the guise of “deterrence.” The CFAA was enacted back in 1986. Amazingly enough, it was prompted in part by fear generated by a fictional movie—the 1983 techno­thriller, starring Matthew Broderick. The law’s text makes it illegal to intentionally access a “protected computer”—which includes any computer connected to the Internet—“without authorization” or in excess of authorization. But the CFAA does not define “without authorization.” This has given overzealous prosecutors broad discretion to bring criminal charges against individuals for behavior that goes far beyond WarGames’ break-in of a government nuclear weapons control system. Indeed, the government now maintains that the CFAA can be violated merely by doing something on a computer network that the owner doesn't like and has prohibited in its one-sided terms of service. And this is important, because a violation of the law comes with.

We’re not talking jaywalking here. —the Second Circuit, Fourth Circuit, and Ninth Circuit, the three most recent circuit courts to address the issue—have rejected the government’s broad interpretation of the statute. In the context of corporate computer use restri. Since the 1940s when the first transistor was created, transistors have evolved from ornery blocks of germanium wrangled into basic amplifiers into thousands and thousands of different devices made of all kinds of material that make any number of electrical applications possible, cheap, and reliable. MOSFETs can come in at least four types: P- or N-channel, and enhancement or depletion mode. They also bear different power ratings.

And some varieties are more loved than others; for instance, depletion-mode, N-channel power MOSFETs are comparatively scarce. [DeepSOIC] was trying to find one before he decided to. For those not intimately familiar with semiconductor physics, the difference between these two modes is essentially the difference between a relay that is normally closed and one that’s normally open. Enhancement-mode transistors are “normally off” and are easy to obtain and (for most of us) useful for almost all applications. On the other hand, if you need a “normally on” transistor, you will need to source a depletion mode transistor. [DeepSOIC] was able to create a depletion mode transistor by “torturing” the transistor to effectively retrain the semiconductor junctions in the device. If you’re interested in semiconductors and how transistors work on an atomic level, [DeepSOIC]’s project will keep you on the edge of your seat. On the other hand, if you’re new to the field and looking to get a more basic understanding, look no further than.

Writes: The ( Apus apus) is a remarkable bird found all over Europe, northern Asia and Africa. Because it migrates into sub-Saharan Africa, and because roost sites have never been found there, some scientists have speculated that it stays aloft during its entire non-breeding season. A group of Swedish scientists attached data loggers, light sensors, and accelerometers to thirteen common swifts and monitored them for two years.

They found that of their non-breeding periods. All of the birds were airborne >99% of the time, but several didn't land at all during those 10 months. Their work is in the journal. I have often talked about the or approach to quantum mechanics — here’s an explanatory, an from, and from a talk. But I don’t think I’ve ever explained as persuasively as possible why I think it’s the right approach. So that’s what I’m going to try to do here.

Although to be honest right off the bat, I’m actually going to tackle a slightly easier problem: explaining why the many-worlds approach is not completely insane, and indeed quite natural. The harder part is explaining why it actually works, which I’ll get to in another post. Any discussion of Everettian quantum mechanics (“EQM”) comes with the baggage of pre-conceived notions. People have heard of it before, and have instinctive reactions to it, in a way that they don’t have to (for example). Hell, there is even an app,, that lets you create new universes from your iPhone.

(Seriously.) So we need to start by separating the silly objections to EQM from the serious worries. The basic silly objection is that EQM postulates. In quantum mechanics, we can’t deterministically predict the outcomes of measurements. In EQM, that is dealt with by saying that every measurement outcome “happens,” but each in a different “universe” or “wo. If you’ve ever fired a potato cannon, you’ll know that they are a raucous good time, but are somewhat clumsy to reload after each shot. Seeing an opportunity to improve on the design and minimize the delay between launches, [Danger First] have concocted — or should I say — Potowitzer.

The key here is that they’ve gone through the extra effort of designing and building honest-to-goodness artillery rounds for their Potowitzer’s manual breech-loading mechanism. Foregoing the inconsistency of potatoes, they’ve 3D printed a bevy of bullets and sealed them with propane gas into PVC pipe cartridges. Metal contacts around the base to carry current from a BBQ lighter to the inside of the cartridge to ignite the propellant. Seeing it fire at about 18 rounds per minute is something special. This home-made piece of artillery looks like a blast to fire. The only issue appears to be that the rapid salvos are offset by the necessity of fabricating more ammunition — something that isn’t an issue with regular potato cannons.

Remember to exercise all necessary precautions if you plan on using any kind of combustible. If you want to get an idea of what’s going in inside these rounds — or the chamber of a regular potato cannon — check out this. [Thanks for the submission, Ivan Owen!] Filed under. Is somebody really claiming to have invented a method for switching from watching one video to watching another? This question comes from a lawyer at the New York Times, as an aside in an about the paper’s to a defamation threat from a presidential candidate. Apparently, that defamation threat distracted the his legal team from their work on another task: responding to a patent troll. Intrigued, we looked into it.

The patent troll is called and its patent,, is our latest Stupid Patent of the Month. The patent is titled “Video input switching and signal processing apparatus.” It includes just two pages of text and, as the title suggests, describes an apparatus for switching between channels that come from different inputs (e.g. Between cable channels and free-to-air broadcasts).

The patent is directed to the equipment found in and around a 1990s television (such as VCRs, cable converters, satellite tuners). It does not even mention the Internet. This is not how you watch video on nytimes.com Even though its patent has nothing whatsoever to do with Internet video, has sued the New York Times and a dozen other companies that provide online content.

In its complaints, it suggests that merely auto-playing a video after another has finished is enough to infringe its patent. In its against the New York Times it claims: [O]n its website [], NYT practices The Accused Instrumentality of automatically changing from a first TV program (e.g., “Bill Clinton Offers Personal Tales of Hillary”) to an alternate TV program (e.g., “Sanders Delegates Revolt After Roll Call”) at a TV viewer location (e.g., at the location of a user of the accused instrumentality). This is ridiculous. Even if we assume this perfunctory paten. Researchers at MIT have put together a pictorial survey -- if the self-driving car loses its brakes, should it go straight or turn?

Various scenarios are presented with either occupants or pedestrians dying, and there are a variety of peds in the road from strollers to thieves, even pets. This AC found that I quickly began to develop my own simplistic criteria and the decisions got easier the further I went in the survey. While the survey is very much idealized, it may have just enough complexity to give some useful results?

At SoylentNews. 15 years ago, Ray Kurzweil published one of the most significant essays in the history of futurism: “.” This piece showcased the immense power of exponential technology versus linear technology and became a pivotal concept for anyone trying to anticipate what the future held. The essay predicted advances in business and technology with eerie precision, including how exponential growth would ripple through any technology that became an information technology, such as computing, biotechnology, or energy. Perhaps the most bustling marketplace on the Internet where people can compare and purchase so-called “booter” and “stresser” subscriptions — attack-for-hire services designed to knock Web sites offline — announced last week that it has permanently banned the sale and advertising of these services. On Friday, Oct.

28, Jesse LaBrocca — the administrator of the popular English-language hacking forum Hackforums[dot]net — said he was shutting down the “server stress testing” (SST) section of the forum. The move comes amid heightened public scrutiny of the SST industry, which has been to several unusually powerful recent attacks and is on the Internet today. The administrator of Hackforums bans the sale and advertising of server stress testing (SST) services, also known as “booter” or “stresser” online attack-for-hire services. “Unfortunately once again the few ruin it for the many,” LaBrocca wrote under his Hackforums alias “Omniscient.” “I’m personally disappointed that this is the path I have to take in order to protect the community. I loathe having to censor material that could be beneficial to members.

But I need to make sure that we continue to exist and given the recent events I think it’s more important that the section be permanently shut down.” Last month, hit KrebsOnSecurity.com. The attack was launched with the help of Mirai, a malware strain that enslaves. CentOS has updated (C5: two vulnerabilities). Debian has updated (regression in previous update). Debian-LTS has updated (error in previous update), (denial of service), (regression in previous update), and (multiple vulnerabilities). Philadelphia—In an era when of police shootings have shined a much-needed light on law enforcement activities—greatly contributing to public discussion about police use of force—it’s never been more important to establish that have a free speech right to record and share videos of public police activity, EFF told a federal appeals court today.

“Individuals have the under the exercising their official duties in public,” said EFF Staff Attorney Sophia Cope. “Bystander videos published online have alerted the public to the use of in numerous cases—Alton Sterling, Eric Garner, Walter Scott, the list goes on. These recordings have informed the public and elected officials about what is happening on our streets. The Supreme Court has made it clear that the process of taking these photos and videos is protected by the First Amendment as an inherently expressive activity or as a form of information and news gathering, and this is true regardless of the intent of the maker at the time of the recording.” EFF filed filed an today with the U.S.

Court of Appeals for the Third Circuit in support of two plaintiffs in consolidated cases, Fields v. City of Pennsylvania and Geraci v. City of Pennsylvania. Both plaintiffs were detained for recording the Philadelphia police in 2012 and 2013. Richard Fields, a Temple University college student, was arrested for photographing about 20 officers breaking up a house party. In a separate incident, Amanda Geraci, was detained and prevented from filming an officer arresting a participant at a public environmental protest. The appeals came after a federal judge.

Every day security administrators monitor networks, support security tools, establish security requirements, perform vulnerability assessments, and much more. SysAdmin Magazine offers a wide range of helpful and time-tested tips and tools every security administrator will find useful. The October edition of SysAdmin Magazine offers a wide range of helpful and time-tested tips and tools for IT security heroes. The contents of this issue include: IT risks infographics Group policy troubleshooting techniques Office 365 password policy.

If you are a certain age, you probably remember writing software (or playing Adventure) bathed in an amber or green light from an old CRT terminal. If you are even older, you might have found it way better than punching cards, but that’s another story.

[Tobi] wanted to relive those days (well, sounds like he is too young to have lived them to start with) so he to his Linux box. This isn’t that surprising. Linux’s forefather, Unix, expected these kind of terminals (or a hard copy TeleType) and all the trappings for working with a glass terminal are still in there. You do have to deal with a few configuration items that [Tobi] works through. In fact, it appears that he wrote his blog post using vi on that very VT220 using a text-based Web browser to research the links. He has a lot of resources for connecting a terminal of any sort (or even a terminal emulator) to a Linux computer. There’s been a lot of interest in.

You see a lot of old. I personally have an ADDS Regent 100 that occasionally connects to several of my computers. You can see it in the video below.

Not to sound ageist, but generally speaking 86-year-old women are not that interested in zombie games like Metro 2033. This also applies to Christine McMillan from Ontario, Canada. In fact, she’d never even heard of the game until an anti-piracy group accused her of pirating a copy via BitTorrent.

McMillan is one of the hundreds of thousands of people who’ve been accused of copyright infringement under Canada’s “” regime. Due to a change to Canada’s copyright law early last year, ISPs are now required to forward copyright infringement notices to their customers. As a result, tens of thousands of Internet subscribers have received warnings in their mailboxes, with some asking for cash settlements.

The 86-year-old woman falls in the latter category. In the letter received from anti-piracy group, she’s threatened with thousands of dollars in damages, if she doesn’t comply. “They didn’t tell me how much I owed, they only told me that if I didn’t comply, I would be liable for a fine of up to $5,000 and I could pay immediately by entering my credit card number,” McMillan told. At first, McMillan thought she was dealing with spammers but Cogeco, her Internet provider, confirmed that the email with the settlement offer was legitimate. The power of the settlement scheme lies in the uncertainty people face.

Most recipients are unawar.