Rambo Tribble writes The Federal Aviation Administration has ordered Boeing to replace Honeywell-built cockpit screens that could be affected by wi-fi transmissions. Additionally, the FAA has expressed concerns that other frequencies, such as used by air surveillance and weather radar, could disrupt the displays. The systems involved report airspeed, altitude, heading and pitch and roll to the crew, and the agency stated that a failure could cause a crash. Meanwhile, the order is said to affect over 1,300 aircraft, and some airlines are balking, since the problem has never been seen in operation, that the order presents "a high, and unnecessary, financial burden on operators".
mi writes Attorney General Eric Holder called it is "worrisome" that tech companies are providing default encryption on consumer electronics, adding that locking authorities out of being able to access the contents of devices puts children at risk. “It is fully possible to permit law enforcement to do its job while still adequately protecting personal privacy,” Holder said at a conference on child sexual abuse, according to a text of his prepared remarks. “When a child is in danger, law enforcement needs to be able to take every legally available step to quickly find and protect the child and to stop those that abuse children. It is worrisome to see companies thwarting our ability to do so.”
First time accepted submitter Kexel writes Security researchers have claimed to discover the first Apple iOS Trojan attack in a move to thwart the communications of pro-democracy Hong Kong activists. From the article: "The malicious software, known as Xsser, is capable of stealing text messages, photos, call logs, passwords and other data from Apple mobile devices, researchers with Lacoon Mobile Security said on Tuesday. They uncovered the spyware while investigating similar malware for Google Inc's Android operating system last week that also targeted Hong Kong protesters. Anonymous attackers spread the Android spyware via WhatsApp, sending malicious links to download the program, according to Lacoon. It is unclear how iOS devices get infected with Xsser, which is not disguised as an app."
The Bad Astronomer writes Astronomers have found a new asteroid, 2014 OL339, that is a quasi-moon of the Earth. Discovered accidentally earlier this year, the 150-meter asteroid has an orbit that is more elliptical than Earth's, but has a period of almost exactly one year. It isn't bound to Earth like a real moon, but displays apparent motion as if it did, making it one of several known quasi-moons.
coondoggie (973519) writes "The Defense Advanced Research Projects Agency said this week one of its contractors, working on one of the agency’s anti-counterfeit projects has developed and deployed what it calls an Advanced Scanning Optical Microscope that can scan integrated circuits by using an extremely narrow infrared laser beam, to probe microelectronic circuits at nanometer levels, revealing information about chip construction as well as the function of circuits at the transistor level."
Link to Original Source
Link to Original Source
First time accepted submitter chentiangemalc writes While Australia is on "high alert" for terror threats a man walked past a Sydney Airport security screening while engrossed in his iPad and delayed flights for an hour. From the article: "This event was captured on CCTV and unnerved officials so much that they evacuated passengers. As the Sydney Morning Herald reported, the man found himself (or, perhaps, didn't) going into the terminal through an exit passage that clearly was convenient for him, but less convenient for the hordes of passengers who not only had to be removed from Terminal 3, but also re-screened. A spokeswoman for Qantas told the Morning Herald: 'The man disembarked a flight and left. It appears he wasn't paying attention, was looking at his iPad, forgot something and walked back past (the security area).'"
First time accepted submitter Scroatzilla writes What makes someone rise to the top in music, games, sports, business, or science? This question is the subject of one of psychology's oldest debates. Malcolm Gladwell's '10,000 hours' rule probably isn't the answer. Recent research has demonstrated that deliberate practice, while undeniably important, is only one piece of the expertise puzzle—and not necessarily the biggest piece.
jfruh writes Microsoft's Windows Hardware Engineering Conference, or WinHEC, was an annual staple of the '90s and '00s: every year, execs from Redmond would tell OEMs what to expect when it came to Windows servers and PCs. The conference was wrapped with software into Build in 2009, but now it's being revived to deal with not just computers but also the tablets and cell phone Microsoft has found itself in the business of selling and even making. It's also being moved from the U.S. to China, as an acknowledgment of where the heart of the tech hardware business is now.
cartechboy writes There's been plenty of skepticism when it comes to Tesla. The Silicon Valley startup unveiled an all-electric car that stunned the world and had many other automakers rolling their eyes. Fast forward to 2014 and Tesla's preparing to launch its third model, the Model X. Production of the Model S sedan is humming along, and this new automaker continues to make headlines multiple times a week. Industry veteran Bob Lutz was the champion behind the Chevrolet Volt, and has been quite vocal about Tesla from the beginning. So what's his view on the company now? He said Tesla will remain a "fringe brand" until it launches its next generation of vehicles and the smaller, less expensive Model 3. Speaking Wednesday on CNBC's "Squawk Alley" finance show he said that Tesla's stock price was "kinda high" at the moment.
An anonymous reader writes Nokia must pay damages to consumers in Mexico who reported malfunctioning handsets, following a court ruling for a trial that has lasted four years. The case was brought to court by Mexican watchdog Profeco in 2010, before the Finnish manufacturer was acquired by Microsoft – that deal was only completed earlier this year. Profeco added that the court has ordered Nokia to either replace the faulty handsets and/or reimburse their cost. On top of that, Nokia must also pay compensation totaling at least 20 percent of the damages resulting from malfunctioning. Customers that had been affected by faulty Nokia equipment would be able to seek damages even if they had not yet presented complaints.
schwit1 writes Google is looking to exert more pressure on device OEMs that wish to continue using the Android mobile operating system. Among the new requirements for many partners: increasing the number of Google apps that must be pre-installed on the device to as many as 20, placing more Google apps on the home screen or in a prominent icon folder and making Google Search more prominent. Earlier this year, Google laid its vision to reduce fragmentation by forcing OEMs to ship new devices with more recent version of Android. Those OEMs that choose not to comply lose access to Google Mobile Services (GMS) apps like Gmail, Google Play, and YouTube.
KentuckyFC writes One way of predicting the future is to study data about events in the past and build a statistical model that generates the same pattern of data. Statisticians can then use the model to generate data about the future. Now one statistician has taken this art to new heights by predicting the content of the soon-to-be published novels in the Song of Ice and Fire series by George R R Martin. The existing five novels are the basis of the hit TV series Game of Thrones. Each chapter in the existing books is told from the point of view of one of the characters. So far, 24 characters have starred in this way. The statistical approach uses the distribution of characters in chapters in the first five books to predict the distribution in the forthcoming novels. The results suggest that several characters will not appear at all and also throw light on whether one important character is dead or not, following an ambiguous story line in the existing novels. However, the model also serves to highlight the shortcomings of purely statistical approaches. For example, it does not "know" that characters who have already been killed off are unlikely to appear in future chapters. Neither does it allow for new characters that might appear. Nevertheless, this statistical approach to literature could introduce the process of mathematical modelling to more people than any textbook.
colinneagle points out this article about how the Marines are using a Microsoft Kinect to build maps. A military contractor has come up with something that has the U.S. Marine Corps interested. The Augmented Reality Sand Table is currently being developed by the Army Research Laboratory and was on display at the Modern Day Marine Expo that recently took place on Marine Corps Base Quantico in Virginia. The set-up is simple: a table-sized sandbox is rigged with a Microsoft Kinect video game motion sensor and an off-the-shelf projector. Using existing software, the sensor detects features in the sand and projects a realistic topographical map that corresponds to the layout, which can change in real time as observers move the sand around in the box. The setup can also project maps from Google Earth or other mapping and GPS systems, enabling units to visualize the exact terrain they'll be covering for exercises or operations. Eventually, they hope to add visual cues to help troops shape the sandbox to match the topography of a specified map. Eventually, the designers of the sandbox hope to involve remote bases or even international partners in conducting joint training and operations exercises. Future possibilities include large-scale models that could project over a gymnasium floor for a battalion briefing, and a smartphone version that could use a pocket-sized projector to turn any patch of dirt into an operational 3-D map.
HughPickens.com writes Reuters reports that your medical information, including names, birth dates, policy numbers, diagnosis codes and billing information, is worth 10 times more than your credit card number on the black market. Fraudsters use this data to create fake IDs to buy medical equipment or drugs that can be resold, or they combine a patient number with a false provider number and file made-up claims with insurers, according to experts who have investigated cyber attacks on healthcare organizations. Medical identity theft is often not immediately identified by a patient or their provider, giving criminals years to milk such credentials. That makes medical data more valuable than credit cards, which tend to be quickly canceled by banks once fraud is detected. Stolen health credentials can go for $10 each, about 10 or 20 times the value of a U.S. credit card number, says Don Jackson, director of threat intelligence at PhishLabs, a cyber crime protection company. He obtained the data by monitoring underground exchanges where hackers sell the information. Plus "healthcare providers and hospitals are just some of the easiest networks to break into," says Jeff Horne. "When I've looked at hospitals, and when I've talked to other people inside of a breach, they are using very old legacy systems — Windows systems that are 10 plus years old that have not seen a patch."
An anonymous reader writes "An evolutionary race between rival elements within the genomes of primates drove the evolution of complex regulatory networks that orchestrate the activity of genes in every cell of our bodies, reveals new research. The race was between mobile DNA sequences known as 'retrotransposons' (jumping genes) and the genes that have evolved to control them. Scientists at the University of California Santa Cruz, identified genes in humans that make repressor proteins to shut down specific jumping genes. "We have basically the same 20,000 protein-coding genes as a frog, yet our genome is much more complicated, with more layers of gene regulation. This study helps explain how that came about," said Sofie Salama, a research associate at the UC Santa Cruz Genomics Institute who led the study."