turkeydance quotes a report from Hollywood Reporter: Given the increased frequency of terrorist bombings and mass shootings and an under-lying sense of havoc fed by divisive election politics, it's no surprise that home security is going over the top and hitting luxurious new heights. Or, rather, new lows, as the average depth of a new breed of safe haven that occupies thousands of square feet is 10 feet under or more. Those who can afford to pull out all the stops for so-called self-preservation are doing so -- in a fashion that goes way beyond the submerged corrugated metal units adopted by reality show "preppers" -- to prepare for anything from nuclear bombings to drastic climate-change events. Gary Lynch, GM at Rising S Bunkers, a Texas-based company that specializes in underground bunkers and services scores of Los Angeles residences, says that sales at the most upscale end of the market -- mainly to actors, pro athletes and politicians (who require signed NDAs) -- have increased 700 percent this year compared with 2015, and overall sales have risen 150 percent. Any time there is a turbulent political landscape, we see a spike in our sales. Given this election is as turbulent as it is, "we are gearing up for an even bigger spike," says marketing director Brad Roberson of sales of bunkers that start at $39,000 and can run $8.35 million or more (FYI, a 12-stall horse shelter is $98,500). Adds Mike Peters, owner of Utah-based Ultimate Bunker, which builds high-end versions in California, Texas and Minnesota: "People are going for luxury [to] live underground because they see the future is going to be rough. Everyone I've talked to thinks we are doomed, no matter who is elected." Robert Vicino, founder of Del Mar, Calif.-based Vivos, which constructs upscale community bunkers in Indiana (he believes coastal flooding scenarios preclude bunkers being safely built west of the Rockies), says, "Bill Gates has huge shelters under every one of his homes, in Rancho Santa Fe and Washington. His head of security visited with us a couple years ago, and for these multibillionaires, a few million is nothing. It's really just the newest form of insurance."
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
sciencehabit writes from a report via Science Magazine: All good things must come to an end, and so it will be tomorrow when the Rosetta spacecraft makes its planned soft landing onto the surface of comet 67P/Churyumov-Gerasimenko, the culmination of 2 years of close-up studies. Solar power has waned as 67P's orbit takes it and Rosetta farther from the sun, and so the mission team decided to go on a last data-gathering descent before the lights go out. This last data grab is a bonus after a mission that is already changing theorists' views about how comets and planets arose early in the solar system. Several Rosetta observations suggest that comets form not from jolting mergers of larger cometesimals, meters to kilometers across, but rather from the gentle coalescence of clouds of pebbles. And the detection of a single, feather-light, millimeter-sized particle -- preserved since the birth of the solar system -- should further the view of a quiet birth. The report concludes: "A slew of instruments will keep gathering data as Rosetta approaches the surface at the speed of a gentle stroll. For team members whose instruments have already been turned off to conserve power, the ending is bittersweet -- but their work is far from over. Most instrument teams have only examined their own data, and are just now thinking about combining data sets. "We've just started collaborating with other teams," [Holger Sierks of the Max Planck Institute for Solar System Research in Gottingen, Germany, chief of Rosetta's main camera,] says. "This is the beginning of the story, not the end."
An anonymous reader quotes a report from The Verge: The Americas are now free of measles and we have vaccines to thank, the Pan American Health Organization said earlier this week. This is the first region in the world to be declared measles-free, despite longtime efforts to eliminate the disease entirely. The condition -- which causes flu-like symptoms and a blotchy rash -- is one of the world's most infectious diseases. It's transmitted by airborne particles or direct contact with someone who has the disease and is highly contagious, especially among small children. To be clear, there are still people with measles in the Americas, but the only cases develop from strains picked up overseas. Still, the numbers are going down: in the U.S. this year, there have been 54 cases, down from 667 two years ago. The last case of measles that developed in the Americas was in 2002. (It took such a long time to declare the region measles-free because of various bureaucratic issues.) Health officials say that credit for this victory goes to efforts to vaccinate against the disease. Though the measles, mumps, and rubella (MMR) vaccine is recommended for all children and required by many states, anti-vaxxers have protested it due to since-discredited claims that vaccines can cause autism. NPR interviewed Dr. Seth Berkley, the CEO of GAVI, a Geneva-based nonprofit organization whose mission is to improve and provide vaccine and immunization coverage to children in the world's poorest countries. She says that 90 to 95 percent of people in a given region need to be vaccinated in order to stop transmission in a region. The rate worldwide is about 80 percent for measles, which means that 20 percent of people around the world are not covered.
Orome1 quotes a report from Help Net Security: Despite high-profile, large-scale data breaches dominating the news cycle -- and repeated recommendations from experts to use strong passwords -- consumers have yet to adjust their own behavior when it comes to password reuse. A global Lab42 survey, which polled consumers across the United States, Germany, France, New Zealand, Australia and the United Kingdom, highlights the psychology around why consumers develop poor password habits despite understanding the obvious risk, and suggests that there is a level of cognitive dissonance around our online habits. When it comes to online security, personality type does not inform behavior, but it does reveal how consumers rationalize poor password habits. My personal favorite: password paradox. "The survey revealed that the majority of respondents understand that their digital behavior puts them at risk, but do not make efforts to change it," reports Help Net Security. "Only five percent of respondents didn't know the characteristics of a secure password, with the majority of respondents understanding that passwords should contain uppercase and lowercase letters, numbers and symbols. Furthermore, 91 percent of respondents said that there is inherent risk associated with reusing passwords, yet 61 percent continue to use the same or similar passwords anyway, with more than half (55 percent) doing so while fully understanding the risk." The report also found that when attempting to create secure passwords, "47 percent of respondents included family names or initials," while "42 percent contain significant dates or numbers and 26 percent use the family pet."
An anonymous reader quotes a report from ZDNet: IBM said Thursday it plans to acquire compliance consulting firm Promontory Financial Group to bring more financial regulatory expertise to Watson's cognitive computing platform. Promontory is a global consulting operation with an aim of helping banks manage the ever-increasing regulation and risk management requirements in the financial sector. With that in mind, IBM wants to use the industry expertise of Promontory's workforce -- which is made up of ex-regulators and banking executives -- to teach Watson all about regulation, risk and compliance. IBM is also using the deal to create a new subsidiary called Watson Financial Services, which will build cognitive tools for things things like tracking regulatory obligations, financial risk modeling, surveillance, anti-money laundering detection systems. "This is a workload ideally suited for Watson's cognitive capabilities intended to allow financial institutions to absorb the regulatory changes, understand their obligations, and close gaps in systems and practices to address compliance requirements more quickly and efficiently," IBM said in a press release.
itwbennett writes from a report via CSO Online: After Yahoo raised eyebrows in the security community with its claim that state-sponsored hackers were responsible for the history-making breach, security firm InfoArmor now says it has evidence to the contrary. InfoArmor claims to have acquired some of the stolen information as part of its investigation into "Group E," a team of five professional hackers-for-hire believed to be from Eastern Europe. The database that InfoArmor has contains only "millions" of accounts, but it includes the users' login IDs, hashed passwords, mobile phone numbers and zip codes, said Andrew Komarov, InfoArmor's chief intelligence officer. Earlier this week, Chase Cunningham, director of cyber operations at security provider A10 Networks, called Yahoo's claim of state-sponsored actors a convenient, if trumped up, excuse: "If I want to cover my rear end and make it seem like I have plausible deniability, I would say 'nation-state actor' in a heartbeat." "Yahoo was compromised in 2014 by a group of professional blackhats who were hired to compromise customer databases from a variety of different targeted organizations," Scottsdale, Arizona-based InfoArmor said Wednesday in a report. "The Yahoo data leak as well as the other notable exposures, opens the door to significant opportunities for cyber-espionage and targeted attacks to occur."
Media outlets are increasingly vying for your attention. But they are also feeding Google's algorithm. Some of them churn hundreds of news articles every day, hoping to offer a diverse range of articles to their readers, and also increase their "search space." The Washington Post is currently running a promotional offer -- letting people get a six-month digital subscription for $10 (pretty good if you ask me). But the Washington Post also mentions that is now publishes a new piece of content every minute. That's like 1,440 articles, videos and other forms of content in one single day. This raises a question: how much content is too much content? How many stories can a person possibly find time to read in a day? Do you feel that perhaps outlets should cut down on the number of things they publish? Or are you happy with the way things are?
An anonymous reader quotes a report from TechCrunch: A day after announcing a new artificial intelligence partnership with IBM, Google, Facebook and Amazon, Microsoft is upping the ante within its own walls. The tech giant announced that it is creating a new AI business unit, the Microsoft AI and Research Group, which will be led by Microsoft Research EVP Harry Shum. Shum will oversee 5,000 computer scientists, engineers and others who will all be "focused on the company's AI product efforts," the company said in an announcement. The unit will be working on all aspects of AI and how it will be applied at the company, covering agents, apps, services and infrastructure. Shum has been involved in some of Microsoft's biggest product efforts at the ground level of research, including the development of its Bing search engine, as well as in its efforts in computer vision and graphics: that is a mark of where Microsoft is placing its own priority for AI in the years to come. Important to note that Microsoft Research unit will no longer be its on discrete unit -- it will be combined with this new AI effort. Research had 1,000 people in it also working on areas like quantum computing, and that will now be rolled into the bigger research and development efforts being announced today. Products that will fall under the new unit will include Information Platform, Cortana and Bing, and Ambient Computing and Robotics teams led by David Ku, Derrick Connell and Vijay Mital, respectively. The Microsoft AI and Research Group will encompass AI product engineering, basic and applied research labs, and New Experiences and Technologies (NExT), Microsoft said.
After recent bombings, the Federal Communications Commission has voted to update the four-year-old emergency smartphone alerts system, which is used by officials to ping smartphones to alert people of severe weather, missing children, terror attacks or other danger. Some of the new changes allow the system to send texts with links to pictures, maps and phone numbers. CNNMoney reports: The agency also voted to allow longer messages -- 360 characters, up from 90 -- and to require wireless providers to support Spanish-language alerts. Wireless carriers will be allowed to support embedded links later this year. They'll be required to next year. The system's limits were on display last week when millions of New Yorkers received a text alert seeking information on Ahmad Khan Rahami, suspected in bombings in New York and New Jersey. "See media for pic," the alert said. Emergency alerts still won't include embedded photos, but commissioners said they're open to the idea. "Vague directives in text about where to find information about a suspect, just as we saw in New York, are not good enough," said Jessica Rosenworcel, an FCC commissioner. "As we move into the 5G future, we need to ensure that multimedia is available in all of our alert messages." Not everyone was so sure. Michael O'Rielly, another commissioner, said adding links and multimedia could jam cell networks during emergencies.
An anonymous reader quotes a report from The Hill: Republican attorneys general in four states are filing a lawsuit to block the transfer of internet domain systems oversight from the U.S. to an international governing body. Texas Attorney General Ken Paxton, Arizona Attorney General Mark Brnovich, Oklahoma Attorney General Scott Pruitt and Nevada Attorney General Paul Laxalt filed a lawsuit on Wednesday night to stop the White House's proposed transition of Internet Assigned Numbers Authority (IANA) functions. The state officials cite constitutional concerns in their suit against the National Telecommunications and Information Administration, U.S. government and the Department of Commerce. "The Obama Administration's decision violates the Property Clause of the U.S. Constitution by giving away government property without congressional authorization, the First Amendment to the U.S. Constitution by chilling speech, and the Administrative Procedure Act by acting beyond statutory authority," a statement released by Paxton's office reads. The attorneys generals claim that the U.S. government is ceding government property, pointing to a Government Accountability Office (GAO) review that "concluded that the transition does not involve a transfer of U.S. government property requiring Congressional approval." Paxton also echoed Texas Sen. Ted Cruz's warnings that the transition could harm free speech on the internet by giving Russia, China and Iran a voice on the international governing body that would oversee internet domain systems. "Trusting authoritarian regimes to ensure the continued freedom of the internet is lunacy," Paxton said. "The president does not have the authority to simply give away America's pioneering role in ensuring that the internet remains a place where free expression can flourish."
You asked, he answered!
Raspberry Pi founder and CEO Eben Upton has responded to questions submitted by Slashdot readers. Read on for his answers.
Raspberry Pi founder and CEO Eben Upton has responded to questions submitted by Slashdot readers. Read on for his answers.
An anonymous reader quotes a report from Politico: The FBI concluded that a computer technician working on Clinton's email was not engaged in an illicit cover-up when he asked on the Reddit website for a tool that could delete a "VIP" email address throughout a large file, FBI Director James Comey said Wednesday. Republican lawmakers have suggested that the July 2014 Reddit post from a user believed to be Platte River Networks specialist Paul Combetta showed an effort to hide Clinton's emails from investigators. However, at a House Judiciary Committee hearing Wednesday, Comey said FBI agents concluded that all the computer aide was trying to do was replace Clinton's email address so it wouldn't be revealed to the public. "Our team concluded that what he was trying to do was when they produced emails not have the actual address but have some name or placeholder instead of the actual dot-com address in the 'From:' line," Comey said. Comey said he wasn't sure whether the FBI knew about the Reddit posting when prosecutors granted Combetta immunity to get statements from him about what transpired. However, he added that such a deletion wouldn't automatically be considered an effort to destroy evidence. "Not necessarily ... It would depend what his intention was and why he wanted to do it," the FBI director said.
Sperm bank? There's an app for that. The largest sperm bank in the United Kingdom -- the London Sperm Bank -- has released an official app that aims to "modernize the process of hooking prospective parents up with the biological material they need to make it happen," according to MIT Technology Review: The app is essentially just a mobile version of the filtered search function the London Sperm Bank offers on its website. But in doing something as simple as bringing its desktop services to mobile devices, the bank is making a play to further normalize reproductive technologies. The London Sperm Bank boasts that users will receive push notifications as soon as new donors are available, which could help speed things up for hopeful parents looking for a match. The road to conception can take years for people using reproductive technologies, so expediting any part of the process would be a welcome time-saver. But the bank has over 10,000 vials of sperm, so searching, even using filters, could still be a lengthy process. To combat this, the app also offers a wish list function that lets more focused users predetermine what they're looking for in a donor, and receive a notification when their criteria are met. The way the service works on mobile has been compared to Tinder, but there's actually no swiping involved. Its wish list function means it's more akin to apps like Anthology, which job seekers use to find their next career move. The report notes that, while there are other mobile sperm bank apps out there, the London Sperm Bank is the only one with several medical associations and the U.K. government's Human Fertilization and Embryology Authority on board. Also, the app is free to download, but the cost of ordering sperm is about $1,200 per order, which is the same as if you order through the London Sperm Bank catalogue.
MojoKid writes: One common gripe in the twenty-first century is that nothing is built to last anymore. Even complex, expensive computers seem to have a relatively short shelf-life nowadays. However, one computer in a small auto repair shop in Gdansk, Poland has survived for the last twenty-five years against all odds. The computer in question here is a Commodore C64 that has been balancing driveshafts non-stop for a quarter of a century. The C64C looks like it would fit right in with a scene from Fallout 4 and has even survived a nasty flood. This Commodore 64 contains a few homemade aspects, however. The old computer uses a sinusoidal waveform generator and piezo vibration sensor in order to measure changes in pressure, acceleration, temperature, strain or force by converting them to an electrical charge. The C64C interprets these signals to help balance the driveshafts in vehicles. The Commodore 64 (also known as the C64, C-64, C= 64) was released in January 1982 and still holds the title for being the best-selling computer of all time.
According to a report from The Wall Street Journal (Warining: may be paywalled), U.S. officials are all but certain that the hacker Guccifer 2.0, who hacked the Democratic National Committee in June, is connected to a network of individuals and groups who are being shielded by the Russian government to mask its involvement in cyberintrusions. Even though the hacker denies working for the Russian government, the hacker is thought to be working with the hacking groups Fancy Bear and Cozy Bear, which have ties to the Russian government. The Wall Street Journal reports: Following successful breaches, the stolen data are apparently transferred to three different websites for publication, these people say. The websites -- WikiLeaks, DCLeaks.com and a blog run by Guccifer 2.0 -- have posted batches of stolen data at least 42 times from April to last week. Cybersecurity experts believe that DCLeaks.com and Guccifer 2.0 often work together and have direct ties to Russian hackers. Guccifer 2.0 said in a Twitter direct message sent to The Wall Street Journal that he wants to expose corruption in politics and shine light on how companies influence policy. The hacker said he also hopes to expose "global electronization." "I think I won't have a better opportunity to promote my ideas than this year," Guccifer 2.0 added in a long exchange with a Journal reporter. The Journal cannot verify the identity of the person sending messages on behalf of Guccifer 2.0, but the account is the same one that was used to publish personal information about Democrats. A posting on a blog run by Guccifer 2.0 says he is a man who was born in Eastern Europe, has been a hacker for years and fears for his safety. "I think u've never felt that feeling when u r crazy eager to shout: look everyone, this is me, this is me who'd done it," the hacker wrote to the Journal. "but u can't." WikiLeaks officials didn't respond to requests for comment on whether Russia fed them the stolen files published by WikiLeaks in July. A representative for DCLeaks.com asked the Journal to submit questions via email but hasn't responded to them. Last week, U.S. intelligence chielf James Clapper said it "shouldn't come as a big shock to people" that Russia is behind the hacking operation. While Russia has tried to interfere in U.S. elections since at least the 1960s by spying and funneling money to particular political groups, "I think it's more dramatic maybe because now they have the cyber tools," he said.
An anonymous reader quotes a report from Science Daily: A new World Health Organization (WHO) air quality model confirms that 92% of the world's population lives in places where air quality levels exceed WHO limits. "The new WHO model shows countries where the air pollution danger spots are, and provides a baseline for monitoring progress in combatting it," says Dr Flavia Bustreo, Assistant Director General at WHO. It also represents the most detailed outdoor (or ambient) air pollution-related health data, by country, ever reported by WHO. The model is based on data derived from satellite measurements, air transport models and ground station monitors for more than 3000 locations, both rural and urban. It was developed by WHO in collaboration with the University of Bath, United Kingdom. Some 3 million deaths a year are linked to exposure to outdoor air pollution. Indoor air pollution can be just as deadly. In 2012, an estimated 6.5 million deaths (11.6% of all global deaths) were associated with indoor and outdoor air pollution together. Nearly 90% of air-pollution-related deaths occur in low- and middle-income countries, with nearly 2 out of 3 occurring in WHO's South-East Asia and Western Pacific regions. Ninety-four per cent are due to noncommunicable diseases -- notably cardiovascular diseases, stroke, chronic obstructive pulmonary disease and lung cancer. Air pollution also increases the risks for acute respiratory infections. Major sources of air pollution include inefficient modes of transport, household fuel and waste burning, coal-fired power plants, and industrial activities. However, not all air pollution originates from human activity. For example, air quality can also be influenced by dust storms, particularly in regions close to deserts. The model has carefully calibrated data from satellite and ground stations to maximize reliability. National air pollution exposures were analyzed against population and air pollution levels at a grid resolution of about 10 km x 10 km. The interactive maps provide information on population-weighted exposure to particulate matter of an aerodynamic diameter of less than 2.5 micrometers (PM2.5) for all countries. The map also indicates data on monitoring stations for PM10 and PM2.5 values for about 3000 cities and towns. Quartz's report features a table that highlights the countries with the world's worst air pollution. The table "shows all the median levels of particulate matter in each country where the WHO collected data."
An anonymous reader quotes a report from TechCrunch: In an act of self-governance, Facebook, Amazon, Alphabet, IBM, and Microsoft came together today to announce the launch the new Partnership on AI. The group is tasked with conducting research and promoting best practices. Practically, this means that the group of tech companies will come together frequently to discuss advancements in artificial intelligence. The group also opens up a formal structure for communication across company lines. It's important to remember that on a day to day basis, these teams are in constant competition with each other to develop the best products and services powered by machine intelligence. Financial support will be coming from the initial tech companies who are members of the group, but in the future membership and involvement is expected to increase. User activists, non-profits, ethicists, and other stakeholders will be joining the discussion in the coming weeks. The organizational structure has been designed to allow non-corporate groups to have equal leadership side-by-side with large tech companies. As of today's launch, companies like Apple, Twitter, Intel and Baidu are missing from the group. Though Apple is said to be enthusiastic about the project, their absence is still notable because the company has fallen behind in artificial intelligence when compared to its rivals -- many of whom are part of this new group. The new organization really seems to be about promoting change by example. Rather than preach to the tech world, it wants to use a standard open license to publish research on topics including ethics, inclusivity, and privacy.
An anonymous reader quotes a report from Ars Technica: A report by The Wall Street Journal claims that Amazon is building its own shipping service to replace FedEx and UPS, giving it more control over its packages and possibly allowing it to ship packages from other retailers. Amazon has said its own delivery services would be meant to increase its capacity during busier times of the year, like the upcoming holiday season. However, "current and former Amazon managers and business partners" claim that the company's plans are bigger than that. The initiative dubbed "Consume the City" will eventually let Amazon "haul and deliver" its own packages and those of other retailers and consumers. That delivery network would also directly compete with the likes of UPS and FedEx. It makes sense that Amazon would want to sell, ship, and deliver orders on its own. The report estimates that the company spent $11.5 billion on shipping just last year, amounting to 10.8 percent of sales. The shipping process is currently a bit convoluted: packages from Amazon warehouses get sent to one of two shipping routes, either FedEx or UPS, or to a sorting facility that lumps all packages with similar zip codes together. FedEx and UPS handle its shipments and deliver them to customers, while the packages at the sorting facilities either get delivered via USPS or by Amazon employees themselves. If Amazon were to have control over its shipments over longer distances, it's estimated that the company could save about $3 per package -- about $1.1 billion annually.
An anonymous reader quotes a report from Tom's Hardware: D-Wave, a Canadian company developing the first commercial "quantum computer," announced its next-generation quantum annealing computer with 2,000 qubits, which is twice as many as its previous generation had. One highly exciting aspect of quantum computers of all types is that beyond the seemingly Moore's Law-like increase in number of qubits every two years, their performance increases much more than just 2x, unlike with regular microprocessors. This is because qubits can hold a value of 0, 1, or a superposition of the two, making quantum systems able to deal with much more complex information. If D-Wave's 2,000-qubit computer is now 1,000 faster than the previous 1,000-qubit generation (D-Wave 2X), that would mean that, for the things Google tested last year, it should now be 100 billion times faster than a single-core CPU. The new generation also comes with control features, which allows users to modify how D-Wave's quantum system works to better optimize their solutions. These control features include the following capabilities: The ability to tune the rate of annealing of individual qubits to enhance application performance; The ability to sample the state of the quantum computer during the quantum annealing process to power hybrid quantum-classical machine learning algorithms that were not previously possible; The ability to combine quantum processing with classical processing to improve the quality of both optimization and sampling results returned from the system. D-Wave's CEO, Vern Brownell, also said that D-Wave's quantum computers could also be used for machine learning task in ways that wouldn't be possible on classical computers. The company is also training the first generation of programmers to develop applications for D-Wave quantum systems. Last year, Google said that D-Wave's 1,000 qubit computer proved to be 100 million times faster than a classical computer with a single core: "We found that for problem instances involving nearly 1,000 binary variables, quantum annealing significantly outperforms its classical counterpart, simulated annealing. It is more than 10^8 times faster than simulated annealing running on a single core," said Hartmut Neven, Google's Director of Engineering.
A former Verizon technician who worked in Alabama is being accused of selling customers' private call records and location data to an unnamed private investigator. Authorities said the data was sold for more than four years, from 2009 to 2014. The Associated Press reports: [Daniel Eugene Traeger] logged into one Verizon computer system to gain access to customers' call records, authorities said. He used another company system known as Real Time Tool to "ping" cellphones on Verizon's network to get locations of the devices, according to the plea agreement. He then compiled the data in spreadsheets, which he sent to the private investigator for years, the court records show. "Between April 2009 and January 2014, the defendant was paid more than $10,000 in exchange for his provision of confidential customer information and cellular location data to the PL, an unauthorized third party," court records state. Though Traeger was based in the Birmingham area, the court records do not indicate whether the information that was sold involved Verizon Wireless customers in Alabama or elsewhere. He faces up to five years in prison, but prosecutors are recommending a lesser sentence since he accepted responsibility, according to terms of the plea agreement.