Eindhovense Computer Associatie
Sinds 1978 bezig met computers
Hoofd menu
· Upload
recente toevoegingen
recente toevoegingen
Welkom
Inlognaam:

Wachtwoord:


Laatste Forum Posts
Nog geen berichten

Newsfeeds
Slashdot
  • One US Oil Field a Key Culprit In Global Ethane Gas Increase
    An anonymous reader writes: According to scientists, a single U.S. shale oil field is responsible for much of the past decade's increase in global atmospheric levels of ethane, a gas that can damage air quality and impact climate. The Bakken Formation, an oil and gas field in North Dakota and Montana is spewing nearly 2% of the globe's ethane. That translates to about 250,000 tons each year. "Two percent might not sound like a lot, but the emissions we observed in this single region are 10 to 100 times larger than reported in inventories. They directly impact air quality across North America. And they're sufficient to explain much of the global shift in ethane concentrations," said Eric Kort, U-M assistant professor of climate and space sciences and engineering.The Washington Post has more details (paywalled; alternatively you can read this Gizmodo report)

    Read more of this story at Slashdot.



  • FBI Bought $1M iPhone 5C Hack, But Doesn't Know How It Works
    An anonymous reader writes: The FBI has no idea how the hack used in unlocking the San Bernardino shooter's iPhone 5C works, but it paid a sum less than $1m for the mechanism, according to a report. Reuters, citing several U.S. government sources, note that the government intelligence agency didn't pay a value over $1.3m for purchasing the hack from professional hackers, as previously reported by many outlets. The technique can also be used as many times as needed without further payments, the report adds. The FBI director, James Comey, said last week that the agency paid more to get into the iPhone 5C than he will make in the remaining seven years and four months he has in his job, suggesting the hack cost more than $1.3m, based on his annual salary.

    Read more of this story at Slashdot.



  • Slashdot Asks: What's Your View On Benchmark Apps?
    There's no doubt that benchmark apps help you evaluate different aspects of a product, but do they paint a complete picture? Should we utterly rely on benchmark apps to assess the performance and quality of a product or service? Vlad Savov of The Verge makes an interesting point. He notes that DxOMark (a hugely popular benchmark app for testing a camera) rating of HTC 10's camera sensor is equal to that of Samsung's Galaxy S7, however, in real life shooting, the Galaxy S7's shooter offers a far superior result. "I've used both extensively and I can tell you that's simply not the case -- the S7 is outstanding whereas the 10 is merely good." He offers another example: If a laptop or a phone does well in a web-browsing battery benchmark, that only gives an indication that it would probably fare decently when handling bigger workloads too. But not always. My good friend Anand Shimpi, formerly of AnandTech, once articulated this very well by pointing out how the MacBook Pro had better battery life than the MacBook Air -- which was hailed as the endurance champ -- when the use changed to consistently heavy workloads. The Pro was more efficient in that scenario, but most battery tests aren't sophisticated or dynamic enough to account for that nuance. It takes a person running multiple tests, analyzing the data, and adding context and understanding to achieve the highest degree of certainty. The problem is -- more often than not -- gadget reviewers treat these values as the most important signal when judging a product, which in turn, also influences several readers' opinion. What's your take on this?

    Read more of this story at Slashdot.



  • Weasel Apparently Shuts Down World's Most Powerful Particle Collider
    New reader mjnhbg1088 cites an article on NPR: A small mammal has sabotaged the world's most powerful scientific instrument. The Large Hadron Collider, a 17-mile superconducting machine designed to smash protons together at close to the speed of light, went offline overnight. Engineers investigating the mishap found the charred remains of a furry creature near a gnawed-through power cable. "We had electrical problems, and we are pretty sure this was caused by a small animal," says Arnaud Marsollier, head of press for CERN, the organization that runs the $7 billion particle collider in Switzerland. Although they had not conducted a thorough analysis of the remains, Marsollier says they believe the creature was "a weasel, probably." The shutdown comes as the LHC was preparing to collect new data on the Higgs Boson, a fundamental particle it discovered in 2012. The Higgs is believed to endow other particles with mass, and it is considered to be a cornerstone of the modern theory of particle physics. CERN says the creature may have been a marten.

    Read more of this story at Slashdot.



  • GCHQ Has Disclosed Over 20 Vulnerabilities This Year
    Joseph Cox, reporting for Motherboard: Earlier this week, it emerged that a section of Government Communications Headquarters (GCHQ), the UK's signal intelligence agency, had disclosed a serious vulnerability in Firefox to Mozilla. Now, GCHQ has said it helped fix nearly two dozen individual vulnerabilities in the past few months, including in highly popular pieces of software like iOS. "So far in 2016 GCHQ/CESG has disclosed more than 20 vulnerabilities across a number of software products," a GCHQ spokesperson told Motherboard in an email. CESG, or the National Technical Authority for Information Assurance, is the information security wing of GCHQ. Those issues include a kernel vulnerability in OS X El Captain v10.11.4, the latest version, that would allow arbitrary code execution, and two in iOS 9.3, one of which would have done largely the same thing, and the other could have let an application launch a denial of service attack.

    Read more of this story at Slashdot.



  • Microsoft Flow -- An IFTTT Alternative -- Aims To Connect Your Online Apps
    An anonymous user writes: Microsoft has unveiled a new product called Microsoft Flow, which is designed to better connect diverse services so that you could, if you were so inclined, put all your tweets into a spreadsheet or get an SMS alert when you receive an email. That example may be a solution in search of a problem, but there are other more useful possibilities. Flow could be set up so that any email from your boss triggers an SMS notification to your phone, for example. Or you could make sure any updated work documents get deposited in your team's SharePoint. To be sure, Microsoft is not first to this app-integration party. Many people already use If This Then That (IFTTT) or Zapier, which claims more than 500 app integrations, to knit their services together.Some IFTTT users must be breathing a sigh of relief.

    Read more of this story at Slashdot.



  • US Calls Switzerland An Internet Piracy Haven
    An anonymous reader writes: The Office of the United States Trade Representative has published its annual Special 301 Report calling out other nations for failing to live up to U.S. IP enforcement standards. This year European ally Switzerland has been placed on the Watch List for protecting file-sharers and playing host to many pirate sites. "Generally speaking, Switzerland broadly provides high-levels of IPR protection and enforcement in its territory. Switzerland makes important contributions to promoting such protection and enforcement internationally, including in bilateral and multilateral contexts, which are welcomed by the United States," the USTR writes in its assessment.

    Read more of this story at Slashdot.



  • Freshly Minted Unicorns Now a Rare Sighting In Silicon Valley
    An anonymous reader shares a Quartz report: Unicorns, start-up companies valued at over $1 billion each, once a rare sighting for investors, have frolicked across Silicon Valley of late. Now the market seems to be yanking on the reins. Venture capital research firm CB Insights reports the number of venture-backed startups achieving a $1 billion or more valuation ground to a halt over the last six months. In the first quarter of 2016, only five new unicorns arrived. That's compared to an average of about 20 per quarter last year. The number of startups worth at least $1 billion has doubled since 2015 to more than 160, says CB Insights. At the same time, the number of such companies accepting "down rounds" or exits with lower valuations is now up. That number exceeded the quantity of new unicorns being created starting in the last quarter of 2015.

    Read more of this story at Slashdot.



  • Google AI Has Access To 1.6M People's NHS Records
    Hal Hodson, reporting for New Scientist:It's no secret that Google has broad ambitions in healthcare. But a document obtained by New Scientist reveals that the tech giant's collaboration with the UK's National Health Service goes far beyond what has been publicly announced. The document -- a data-sharing agreement between Google-owned artificial intelligence company DeepMind and the Royal Free NHS Trust -- gives the clearest picture yet of what the company is doing and what sensitive data it now has access to. The agreement gives DeepMind access to a wide range of healthcare data on the 1.6 million patients who pass through three London hospitals run by the Royal Free NHS Trust -- Barnet, Chase Farm and the Royal Free -- each year. This will include information about people who are HIV-positive, for instance, as well as details of drug overdoses and abortions. The agreement also includes access to patient data from the last five years. According to their original agreement, Google cannot use the data in any other part of its business.

    Read more of this story at Slashdot.



  • US Toy Maker Maisto's Website Pushes Ransomware
    An anonymous reader shares a PCWorld article: Attackers are aggressively pushing a new file-encrypting ransomware program called CryptXXX by compromising websites, the latest victim being U.S. toy maker Maisto. Fortunately, there's a tool that can help users decrypt CryptXXX affected files for free. Security researchers from Malwarebytes reported Thursday that maisto.com was infected with malicious JavaScript that loaded the Angler exploit kit. This is a Web-based attack tool that installs malware on users' computers by exploiting vulnerabilities in their browser plug-ins. It also steals bitcoins from local wallets, a double hit to victims, because it then asks for the equivalent of $500 in bitcoins in order to decrypt their files. [...] Researchers from antivirus firm Kaspersky Lab recently updated their ransomware decryption toolto add support for CryptXXX affected files. The attack code exploits vulnerabilities in older versions of applications such as Flash, Java, Internet Explorer, and Silverlight. At this point, it isn't clear exactly how many users are affected.

    Read more of this story at Slashdot.



  • Doctor Ready to Perform First Human Head Transplant
    Ross Kenneth Urken, reporting for Newsweek (edited and condensed): Italian neurosurgeon Sergio Canavero had his Dr. Strange moment when he announced he'd be able to do a human head transplant in a two-part procedure he dubs HEAVEN (paywalled, this alternate link could help) (head anastomosis venture) and Gemini (the subsequent spinal cord fusion). [...] Canavero has a plan: It's a 36-hour, $20 million procedure involving at least 150 people, including doctors, nurses, technicians, psychologists and virtual reality engineers. In a specially equipped hospital suite, two surgical teams will work simultaneously -- one focused on Valery Spiridonov (patient) and the other on the donor's body, selected from a brain-dead patient and matched with the Spiridonov for height, build and immunotype. Both patients -- anesthetized and outfitted with breathing tubes -- will have their heads locked using metal pins and clamps, and electrodes will be attached to their bodies to monitor brain and heart activity. Next, Spiridonov's head will be nearly frozen, ultimately reaching 12 to 15 degrees Celsius, which will make him temporarily brain-dead.Shouldn't it be called a body transplant? Since a person is often defined by the brain. You can read the complete procedure here.

    Read more of this story at Slashdot.



  • Supreme Court Gives FBI More Hacking Power
    An anonymous reader cites an article on The Intercept (edited and condensed): The Supreme Court on Thursday approved changes that would make it easier for the FBI to hack into computers, many of them belonging to victims of cybercrime. The changes, which will take immediate effect in December unless Congress adopts competing legislation, would allow the FBI go hunting for anyone browsing the Internet anonymously in the U.S. with a single warrant. Previously, under the federal rules on criminal procedures, a magistrate judge couldn't approve a warrant request to search a computer remotely if the investigator didn't know where the computer was -- because it might be outside his or her jurisdiction. The rule change would allow a magistrate judge to issue a warrant to search or seize an electronic device if the target is using anonymity software like Tor."Unbelievable," said Edward Snowden. "FBI sneaks radical expansion of power through courts, avoiding public debate." Ahmed Ghappour, a visiting professor at University of California Hastings Law School, has described it as "possibly the broadest expansion of extraterritorial surveillance power since the FBI's inception."

    Read more of this story at Slashdot.



  • The Critical Hole At the Heart Of Our Cell Phone Networks
    An anonymous reader writes: Kim Zetter from WIRED writes an intriguing report about a vulnerability at the heart of our cell phone networks. It centers around Signaling System No. 7 (SS7), which refers to a data network -- and the protocols or rules that govern how information gets exchanged over it. Zetter writes, "It was designed in the 1970s to track and connect landline calls across different carrier networks, but is now commonly used to calculate cellular billing and send text messages, in addition to routing mobile and landline calls between carriers and regional switching centers. SS7 is part of the telecommunications backbone but is not the network your voice calls go through; it's a separate administrative network with a different function." According to WIRED, the problem is that SS7 is based on trust -- any request a telecom receives is considered legitimate. In addition to telecoms, government agencies, commercial companies and criminal groups can gain access to the network. Most attacks can be defended with readily available technologies, but more involved attacks take longer to defend against. T-Mobile and ATT have vulnerabilities with fixes that have yet to be implemented for example.

    Read more of this story at Slashdot.



  • Obesity 'Explosion' In Young Rural Chinese A Result Of Socioeconomic Changes, Study Warns
    An anonymous reader quotes a report from BBC: Obesity has rapidly increased in young rural Chinese, a study has warned, because of socioeconomic changes. Researchers found 17% of boys and 9% of girls under the age of 19 were obese in 2014, up from 1% for each in 1985. The 29-year study, published in the European Journal of Preventive Cardiology, involved nearly 28,000 students in Shandong province. The study said China's rapid socioeconomic and nutritional transition has led to an increase in energy intake and a decrease in physical activity. The data was taken from six government surveys of rural school children in Shandong aged between seven and 18. The percentage of overweight children has also grown from 0.7% to 16.4% for boys and from 1.5% to nearly 14% for girls, the study said. "It is the worst explosion of childhood and adolescent obesity that I have ever seen," Joep Perk from the European Society of Cardiology told AFP news agency.

    Read more of this story at Slashdot.



  • In Internet Age, Pirate Radio Arises As Surprising Challenge
    K7DAN writes: Just as the demise of terrestrial radio has been greatly exaggerated, so has the assumed parallel death of pirate radio. Due to the failure of licensed stations to meet the needs of many niche communities, pirate radio continues to increase in popularity. Helping facilitate this growth is the weakening power of the FCC to stop it, reports the Associated Press. Rogue stations can cover up to several square miles thanks largely in part to cheaper technology. The appeal? "The DJs sound like you and they talk about things that you're interested in," said Jay Blessed, an online DJ who has listened to various unlicensed stations since she moved from Trinidad to Brooklyn more than a decade ago. "You call them up and say, 'I want to hear this song,' and they play it for you," Blessed said. "It's interactive. It's engaging. It's communal." It's upsetting many congressional members who are urging the FCC to do more about the "unprecedented growth of pirate radio operations." They're accusing said pirates of undermining licensed minority stations while ignoring consumer protection laws that guard against indecency and false advertising.

    Read more of this story at Slashdot.



| Publicatiedatum: 2016-04-29T21:35:12+00:00
Terug naar newsfeed overzicht


Datum / Tijd