szczys writes: The Internet of Things is all the hype these days. On one side we have companies clamoring to sell you Internet-Connected-everything to replace all of the stuff you already have that is now considered "dumb." On the other side are security researchers screaming that we're installing remote access with little thought about securing it properly. The truth is a little of both is happening, and that this isn't a new thing. It's been around for years in industry, the new part is that it's much wider spread and much closer to your life. Al Williams walks through some real examples of the unintended consequences of IoT, including his experiences building and deploying devices, and some recent IoT gaffs like the NEST firmware upgrade that had some users waking up to an icy-cold home.
Press2ToContinue writes: White lines along the center of roads have been removed in parts of the UK, with some experts saying it encourages motorists to slow down. So is it the beginning of the end for the central road marking? You are driving along the road when the dotted white line that has been your companion — separating your car from oncoming traffic — suddenly disappears. One theory is that you will slow down, making the road safer. What could possibly go wrong?
MikeChino writes: New FCC filings suggest that Google is currently installing wireless charging systems for self-driving cars at its headquarters in Mountain View. The documents suggest that the systems will be installed by Hevo Power and Momentum Dynamics. Both companies offer technology that can wirelessly charge an electric car via plates that are embedded in the ground.
New submitter TechnoidNash writes: China announced last week a major breakthrough in the realm of nuclear fusion research. The Chinese Experimental Advanced Superconducting Tokamak (EAST), was able to heat hydrogen gas to a temperature of near 50 million degrees Celsius for an unprecedented 102 seconds. While this is nowhere near the hottest temperature that has ever been achieved in nuclear fusion research (that distinction belongs to the Large Hadron Collider which reached 4 trillion degrees Celsius), it is the longest amount of time one has been maintained.
derekmead writes: Differentiating wolf howls with human ears can prove tricky, so researchers have turned to computer algorithms to suss out if different wolf species howl differently. They think that understanding wolf howls could help improve wolf conservation and management programs. In a study published in the journal Behavioural Processes, a group of international researchers describe using machine learning for the first time to analyze 2,000 wolf howls gathered from both wild and domesticated wolves and their subspecies from around the world.
itwbennett writes: On Friday, Oracle published a security advisory recommending that users delete all the Java installers they might have laying around on their computers and use new ones for versions 6u113, 7u97, 8u73 or later. The reason: Older versions of the Java installer were vulnerable to binary planting in the Downloads folder. 'Though considered relatively complex to exploit, this vulnerability may result, if successfully exploited, in a complete compromise of the unsuspecting user's system,' said Eric Maurice, Oracle's software security assurance director, in a blog post.
snydeq writes: InfoWorld's Peter Wayner takes a look at the new services and pricing models that are making cloud computing more powerful, complex, and cheaper than it was a few short years ago. 'We get more, but using it isn't always as simple as it could be. Sure, you still end up on root on some box that's probably running Linux, but getting the right performance out of that machine is more complex,' Wayner writes. "But the real fun comes when you try to figure out how to pay for your planned cloud deployment because there are more options than ever. ... In some cases, the cost engineering can be more complex than the software engineering."
Zothecula writes: The danger posed by rising levels of atmospheric carbon dioxide has seen many schemes proposed to remove a proportion it from the air. Rather than simply capture this greenhouse gas and bury it in the ground, though, many experiments have managed to transform CO2 into useful things like carbon nanofibers or even fuels, such as diesel. Unfortunately, the over-arching problem with many of these conversions is the particularly high operating temperatures that require counterproductive amounts of energy to produce relatively low yields of fuel. Now researchers at the University of Southern California (USC) claim to have devised a way to take CO2 directly from the air and convert it into methanol using much lower temperatures and in a correspondingly simpler way.
Today, Instagram announced that users will be able to switch between up to five different accounts when using the app on iOS and Android. This new feature will be available later this week, when users download version 7.15 of the app. According to a blog post from the company, "Go to your profile settings to add an additional account. From there, tap your username at the top of your profile to switch between accounts. Once you have multiple accounts added, you'll see your profile photo appear in places throughout the app so you can always tell which one you're using at the moment."
dcblogs writes: U.S. Sen. Richard Blumenthal (D-Conn.) is asking the U.S. Department of Justice to investigate the layoff and replacement of IT workers by foreign workers at a state energy utility. But he is also demanding that the utility, Eversource Energy, drop a particularly restrictive non-disparagement clause that laid off employees had to sign to receive their severance. This clause bars discussion "that would tend to disparage or discredit" the utility. [emphasis added] He wants the employees, who had to train foreign replacements, to be able to state "honestly what happened to them."
An anonymous reader writes: Not even a week has gone by since Torrents Time appeared on the scene, and the site has already been served with a cease-and-desist letter. Anti-piracy group BREIN, based in the Netherlands, has deemed the streaming tool an "illegal application" and demands the administrators "cease and desist the distribution of Torrents Time immediately."
destinyland writes: Last week GitHub released a new open source tool called Scientist, a Ruby-based library they've been using in-house for several years. "It's the most terrifying moment when you flip the switch," GitHub engineer Jesse Toth told one technology reporter, who notes that the tool is targeted at developers transitioning from a legacy system. "Scientist was born when GitHub engineers needed to rewrite the permissions code — one of the most critical systems in the GitHub application." The tool measures execution duration and other metrics for both test and production code during runtime, and Toth reports that they're now also developing new versions in Node.js, C#, and .Net..
Jason Koebler writes: Two and a half years after Elon Musk pitched the technology, actually traveling on a hyperloop is still theoretical, but its effect on business is not. There is a very real, bonafide industry of people whose job description is, broadly speaking "make the hyperloop into a tangible thing." The SpaceX Hyperloop Pod Design Weekend at Texas A&M University earlier this weekend was the coming out party for people in that industry.
An anonymous reader writes: The BBC has now put the second of Stephen Hawking's Reith Lectures up on their web site, with accompanying illustrations. It's not 'All you ever wanted to know about Black Holes', but it's an easy introduction to some of the latest thinking on them.
An anonymous reader writes: There's a German security researcher that is arduously testing the installers of tens of software products to see which of them are vulnerable to basic DLL hijacking. Surprisingly, many companies are ignoring his reports. Until now, only Oracle seems to have addressed this problem in Java and VirtualBox. Here's a short (probably incomplete) list of applications that he found vulnerable to this attack: Firefox, Google Chrome, Adobe Reader, 7Zip, WinRAR, OpenOffice, VLC Media Player, Nmap, Python, TrueCrypt, and Apple iTunes. Mr. Kanthak also seems to have paid special attention to antivirus software installers. Here are some of the security products he discovered vulnerable to DLL hijacking: ZoneAlarm, Emsisoft Anti-Malware, Trend Micro, ESET NOD32, Avira, Panda Security, McAfee Security, Microsoft Security Essentials, Bitdefender, Rapid7's ScanNowUPnP, Kaspersky, and F-Secure.