Slashdot Deals: Deal of the Day - 6 month subscription of Pandora One at 46% off. ×

Dark Matter Grows Hair Around Stars and Planets ( 44

StartsWithABang writes: Dark matter may make up 27% of the Universe's energy density, compared to just 5% of normal (atomic) matter, but in our Solar System, it's notoriously sparse. In particular, there's just a nanogram's worth per cubic kilometer, which makes the fact that we've never directly detected it seem inevitable. But recent work has demonstrated that Earth and all the planets leave a "wake" of dark matter where the density is enhanced by a billion times or more. Time to go put those dark matter detectors where they belong: in the path of these dark matter hairs.

Windows 10 Fall Update Uninstalls Desktop Software Without Informing Users ( 113

ourlovecanlastforeve sends this report from Martin Brinkmann of gHacks: Microsoft's Windows 10 operating system may uninstall programs — desktop programs that is — from the computer after installation of the big Fall update that the company released earlier this month. I noticed the issue on one PC that I upgraded to Windows 10 Version 1511 but not on other machines. The affected PC had Speccy, a hardware information program, installed and Windows 10 notified me after the upgrade that the software had been removed from the system because of incompatibilities. There was no indication beforehand that something like this would happen, and what made this rather puzzling was the fact that a newly downloaded copy of Speccy would install and run fine on the upgraded system. An IT Director I know had this happen with ESET antivirus as well, on multiple computers. He says fixes have been rolled out for both TH2 and the antivirus software to prevent this from happening. Other reports mention CPU-Z, AMD's Catalyst Control Center, and CPUID as software that's being automatically uninstalled.

The Tamagochi Singularity Made Real: Infinite Tamagochi Living On the Internet ( 41

szczys writes: Everyone loves Tamagochi, the little electronic keychains spawned in the '90s that let you raise digital pets. Some time ago, XKCD made a quip about an internet-based matrix of thousands of these digital entities. That quip is now a reality thanks to elite hardware hacker Jeroen Domburg (aka Sprite_TM). In his recent talk called "The Tamagochi Singularity" at the Hackaday SuperConference he revealed that he had built an infinite network of virtual Tamagochi by implementing the original hardware as a virtual machine. This included developing AI to keep them happy, and developing a protocol to emulate their IR interactions. But he went even further, hacking an original keychain to use wirelessly as a console which can look in on any of the virtual Tamagochi living on his underground network. This full-stack process is unparalleled in just about every facet: complexity, speed of implementation, awesome factor, and will surely spark legions of other Tamagochi Matrices.

On iFixit and the Right To Repair ( 130

Jason Koebler writes: Motherboard sent a reporter to the Electronics Reuse Convention in New Orleans to investigate the important but threatened world of smartphone and electronics repair. As manufacturers start using proprietary screws, offer phone lease programs and use copyright law to threaten repair professionals, the right-to-repair is under more threat than ever. "That Apple and other electronics manufacturers don't sell repair parts to consumers or write service manuals for them isn't just annoying, it's an environmental disaster, [iFixit CEO Kyle Wiens] says. Recent shifts to proprietary screws, the ever-present threat of legal action under a trainwreck of a copyright law, and an antagonistic relationship with third-party repair shops shows that the anti-repair culture at major manufacturers isn't based on negligence or naiveté, it's malicious."

How Computer Scientists Cracked a 50-Year-Old Math Problem ( 64

An anonymous reader writes: Over the decades, the Kadison-Singer problem had wormed its way into a dozen distant areas of mathematics and engineering, but no one seemed to be able to crack it. The question "defied the best efforts of some of the most talented mathematicians of the last 50 years," wrote Peter Casazza and Janet Tremain of the University of Missouri in Columbia, in a 2014 survey article.

As a computer scientist, Daniel Spielman knew little of quantum mechanics or the Kadison-Singer problem's allied mathematical field, called C*-algebras. But when Gil Kalai, whose main institution is the Hebrew University of Jerusalem, described one of the problem's many equivalent formulations, Spielman realized that he himself might be in the perfect position to solve it. "It seemed so natural, so central to the kinds of things I think about," he said. "I thought, 'I've got to be able to prove that.'" He guessed that the problem might take him a few weeks.

Instead, it took him five years. In 2013, working with his postdoc Adam Marcus, now at Princeton University, and his graduate student Nikhil Srivastava, now at the University of California, Berkeley, Spielman finally succeeded. Word spread quickly through the mathematics community that one of the paramount problems in C*-algebras and a host of other fields had been solved by three outsiders — computer scientists who had barely a nodding acquaintance with the disciplines at the heart of the problem.


2015 'Dance Your PhD' Winner Announced ( 12

sciencehabit writes: Jargon seems unavoidable in science. When you try to explain your work, it becomes a minefield of technical concepts and abstract reasoning. But what if we just want the gist of what you do, the essence of your research? Oh, and make it a dance. The results are in from Science magazine's annual 'Dance Your PhD' contest. The winners include a ballet about a protein, a tango about entangled photons, a Bollywood spectacle about the immune system and, this year's top prize-winner, a dance by Florence Metz of the University of Bern, Switzerland, who combined hip hop, salsa, and acro-yoga to explain her PhD on the intricacies of water protection policies. She goes home with $1000 and a trip to Stanford University in the spring to screen her PhD dance and give a talk — hopefully jargon-free.

Green Light Or No, Nest Cam Never Stops Watching ( 152

chicksdaddy writes: How do you know when the Nest Cam monitoring your house is "on" or "off"? It's simple: just look at the little power indicator light on the front of the device — and totally disregard what it is telling you. The truth is: the Nest Cam is never "off" despite an effort by Nest and its parent Google to make it appear otherwise. That, according to an analysis of the Nest Cam by the firm ABI Research, which found that turning the Nest Cam "off" using the associated mobile application only turns off the LED power indicator light on the front of the device. Under the hood, the camera continues to operate and, according to ABI researcher Jim Mielke, to monitor its surroundings: noting movement, sound and other activity when users are led to believe it has powered down.

Mielke reached that conclusion after analyzing Nest Cam's power consumption. Typically a shutdown or standby mode would reduce current by as much as 10 to 100 times, Mielke said. But the Google Nest Cam's power consumption was almost identical in "shutdown" mode and when fully operational, dropping from 370 milliamps (mA) to around 340mA. The slight reduction in power consumption for the Nest Cam when it was turned "off" correlates with the disabling of the LED power light, given that LEDs typically draw 10-20mA.

In a statement to The Security Ledger, Nest Labs spokesperson Zoz Cuccias acknowledged that the Nest Cam does not fully power down when the camera is turned off from the user interface (UI). "When Nest Cam is turned off from the user interface (UI), it does not fully power down, as we expect the camera to be turned on again at any point in time," Cuccias wrote in an e-mail. "With that said, when Nest Cam is turned off, it completely stops transmitting video to the cloud, meaning it no longer observes its surroundings." The privacy and security implications are serious. "This means that even when a consumer thinks that he or she is successfully turning off this camera, the device is still running, which could potentially unleash a tidal wave of privacy concerns," Mielke wrote.


Hospitals Can 3D Print a Patient's Vasculature For Aneurysm Pre-Op Practice ( 17

Lucas123 writes: University of Buffalo physicians and researchers from two institutes working with 3D printer maker Stratasys have successfully 3D-printed anatomically correct models of patients' vascular systems — from their femoral artery to their brain — in order to test various surgical techniques prior to an actual operation. The new 3D printed models not only precisely replicate blood vessels' geometry, but the texture and tissue tension, allowing surgeons a realistic preoperative experience when using catheterization techniques. The printed models are also being used by physicians in training.

UK Mobile Operator Could Block Ads At Network Level ( 82

Mickeycaskill writes: UK network operator EE says it is investigating the possibility of blocking adverts at a network level, allowing customers to limit the types and frequency of adverts they see in browsers and applications. The move is likely to concern digital publishers, many of whom rely on advertising revenue to fund their content. Ad blockers have become more popular in recent times, with many users employing them to save battery life, consume less data and protect against malvertising attacks. EE CEO Olaf Swantee said, "We think it’s important that, over time, customers start to be offered more choice and control over the level and intensity of ads on mobile. For EE, this is not about ad blocking, but about starting an important debate around customer choice, controls and the level of ads customers receive. This is an important debate that needs to happen soon."

Video High-Security, Open-Source Router is a Hit on Indiegogo (Video) 79

The device is called the Turris Omnia, and its Indiegogo page says it's a "hi-performance & open-source router." Their fundraising goal is $100,000. So far, 1,191 backers have pledged $248,446 (as of the moment this was typed), with 49 days left to go. They've shipped 2,000 pieces so far but, says interviewee Ondej Filip, "95% of them are in the Czech Republic."

This is not only an open-source project, but non-profit as well. A big motive for it is heightened security, as the interview (and transcript) make clear. It's also apparent that the hardware here is overkill for a router; it can run a complete Linux distro, no problem, so it can function as a server, not just as a router. Interested? You might want to put a reservation in soon. This isn't the cheapest router (or even server) out there, but a lot of people obviously think a Turris Omnia, with its crypto security, automatic updates, and server functions would be nice to have.

Lori Garver Claims That NASA Is 'Wary' of Elon Musk's Mars Plans ( 84

MarkWhittington writes: Ars Technica reports that former NASA Deputy Administrator Lori Garver claimed, during a panel discussion at the Council for Foreign Relations, that many at NASA are "wary" of the Mars ambitions of SpaceX's Elon Musk. While the space agency has yielded low Earth operations to the commercial sector as part of the commercial crew program, it reserves for itself deep space exploration. Garver herself disagrees with that sentiment: "I thought, fundamentally, you just don’t understand. We’re not in a race in a swimming pool where everyone is racing against one another. We're in a cycling race where the government is riding point and the others are drafting behind us, and if someone comes alongside us and can pass us because they’ve found a better way, we don’t get out our tire pump and stick it between their spokes."
The Internet

One Family Suffering Through Years-Long Trolling Campaign ( 215

blottsie writes: Since 2010, the Straters have been under assault from an online campaign of ever-increasing harassment — prank deliveries, smear attacks, high-profile hacks, and threats of violence against schools and law enforcement officials in their name — and it's slowly torn them apart. Masterminding it all is a teenage Lizard Squad hacker from Finland, at war with their son, Blair, over a seemingly minor dispute. "When the family started getting notices about their utilities being disconnected, they realized things were escalating out of control. Utility provider Commonwealth Edison once called the house to iron out the details about a request to have the power turned off after a supposed move. Something similar happened with their trash service. On Halloween 2013, Comcast shut off their cable and Internet service."

How Black Friday and Cyber Monday Are Losing Their Meaning ( 125 writes: Brad Tuttle reports at Money Magazine that while the terms "Black Friday" and "Cyber Monday" are more ubiquitous than ever, the importance of the can't-miss shopping days is undeniably fading. Retailers seem to want it both ways: They want shoppers to spend money long before these key shopping events, and yet they also want shoppers to turn out in full force to make purchases over the epic Black Friday weekend. When they use the "Cheap Stuff!" card day after day and week after week, the deals on any single day stop seeming special. Add to that the trend of manufacturers creating stripped-down versions of their electronics to sell on Black Friday, and consumers have less reason than ever to flood retail stores.

The true story behind Black Friday is not as sunny as retailers might have you believe. Back in the 1950s, police in the city of Philadelphia used the term to describe the chaos that ensued on the day after Thanksgiving, when hordes of suburban shoppers and tourists flooded into the city in advance of the big Army-Navy football game held on that Saturday every year. Shoplifters would also take advantage of the bedlam in stores to make off with merchandise, adding to the law enforcement headache. Sometime in the late 1980s, however, retailers found a way to reinvent Black Friday and turn it into something that reflected positively, rather than negatively, on them and their customers. The result was the "red to black" concept of the holiday mentioned earlier, and the notion that the day after Thanksgiving marked the occasion when America's stores finally turned a profit.

Electronic Frontier Foundation

Judge Wipes Out Safe Harbor Provision In DMCA, Makes Cox Accomplice of Piracy ( 191

SysKoll writes: The DMCA is well-known for giving exorbitant powers to copyright holders, such as taking down a page or a whole web site without a court order. Media companies buy services from vendors like Rightscorp, a shake-down outfit that issues thousands of robot-generated take-down notices and issues threats against ISPs and sites ignoring them. Cox, like a lot of ISPs, is inundated with abusive take-down notices, in particular from Rightscorp. Now, BMG Rights Management and Round Hill Music are suing Cox for refusing to shut off the Internet access of subscribers that Rightscorp accused of downloading music via BitTorrent. Cox argues that as an ISP, they benefit from the Safe Harbor provision that shields access providers from subscribers' misbehavior. Not so, says U.S. District Judge Liam O'Grady. The judge sided with the media companies ahead of trial, saying Cox should have terminated the repeat offenders accused by Rightscorp. Cox's response is quite entertaining for a legal document (PDF): its description of Rightscorp includes the terms "shady," "shake-down," and "pay no attention to the facts." O'Grady also derided the Electronic Frontier Foundation's attempt to file an amicus brief supporting Cox, calling them hysterical crybabies.

High Level Coding Language Used To Create New POS Malware ( 83

An anonymous reader writes: A new malware framework called ModPOS is reported to pose a threat to U.S. retailers, and has some of the highest-quality coding work ever put into a ill-intentioned software of this nature. Security researchers iSight say of the ModPOS platform that it is 'much more complex than average malware'. The researchers believe that the binary output they have been studying for three years was written in a high-level language such as C, and that the software took 'a significant amount of time and resources to create and debug'.