OldJuke writes "Called the YotaPhone, the device pairs a traditional LCD color touch-screen on one side with a black-and-white, electronic-paper display on the other, allowing users to continuously view data in real time without having to constantly wake up their phones and drain their batteries. General interaction will be done through the LCD screen, but the e-paper display allows an image to be displayed at all times — from maps, airline boarding passes and family photos to Twitter messages and emails — but only uses power when the picture changes. BBC News interviewed the company's leader, Vlad Martynov, for a hands-on demonstration."
curtwoodward writes "Nearly four years after the concept was introduced, MIT spinout Superpedestrian has started selling its $700 'Copenhagen wheel' kits that promise to turn any old bike into an electric-powered, smartphone-connected dynamo, simply by swapping out the back wheel. But they're not alone: a competing startup called FlyKly has already raised $700,000 worth of pre-orders for a similar device. Superpedestrian, which holds exclusive license to the MIT patents covering the Copenhagen wheel, clearly thinks there's some foul play going on. 'Their founder actually dropped by our lab at MIT a year and a half ago, saying he wants to collaborate, and spent quite some time with the Copenhagen wheel team. We'll leave it at that,' Superpedestrian founder Assaf Biderman said."
caferace writes "I've been around the block. I'm a long-time worker in the tech industry (nearly 30 years), absolutely kickass SQA and Hardware person, networking, you name it. But I'm 50+ now, and finding new regular or contract work is a pain. And it shouldn't be. I have the skills and the aptitude to absorb and adapt to any new situations and languages way beyond what any of my college age brethren might have. But when I send out a perfectly good resume and use the more obvious resources there are still precious few bites for someone requiring to work remotely. Am I just whining, or is this common? Are we being put out to pasture far too early?"
An anonymous reader writes "A number of groups, including the MPAA, are pushing to educate elementary school kids about the dangers of piracy. From the article: 'A nonprofit group called the Center for Copyright Information, which is supported by the MPAA and other groups, has commissioned a school curriculum to teach elementary-age children about the value of copyrights. The proposed curriculum is still in draft stage, but it's already taking flak. Some critics say the curriculum promotes the biased agenda of Hollywood studios and music labels. Others contend it would use up valuable classroom time when U.S. public schools are already struggling to teach the basics.'"
$3.80 saved by only an hours work and a thousand dollars worth of hardware along with the possibility of jail time... bargain
First time accepted submitter Papa Fett writes "DARPA announced the Cyber Grand Challenge (CGC)--the first-ever tournament for fully automatic network defense systems. International teams will compete to build systems that reason about software flaws, formulate patches and deploy them on a network in real time. Teams would be scored against each other based on how capably their systems can protect hosts, scan the network for vulnerabilities, and maintain the correct function of software. The winning team would receive a cash prize of $2 million , with second place earning $1 million and third place taking home $750,000." Also at Slashcloud.
The Bad Astronomer writes "On Oct. 10, 2013, the Cassini spacecraft took a series of wide-angle pictures of Saturn from well above the plane of the rings. Croatian software developer and amateur astronomical image processor Gordan Ugarkovic assembled them into a stunning mosaic (mirrored on Flickr), showing the planet from a high angle not usually seen. There's a lot to see in this image, including the rings (and the gaps therein), moons, and the planet itself, including the remnants of a monstrous northern hemisphere storm that kicked off in 2010. It's truly wondrous."
Nerval's Lobster writes "This year's revelations about NSA surveillance have upended the idea that our data—any of it—is truly secure from prying eyes. That uncertainty has sparked the rise of several businesses with a simple proposition: you can send whatever you want via their online service (text, images, video), and that data will vaporize within seconds of the recipient opening it up. One of the most popular of those services is Snapchat, which allows users to take "Snaps" (i.e., videos or photos) that self-destruct a few seconds after the recipient opens them; that data also disappears from the company's servers. But is 'disappearing' data truly secure from prying eyes? Earlier this week, Snapchat admitted to a loophole in its schema that leaves Snaps open to viewing by law enforcement — provided the latter shows up at the company's front door with a warrant. Until a recipient opens a Snap, it's stored in the company's datacenter. In theory, law enforcement could request that Snapchat send it an unopened Snap. 'If we receive a search warrant from law enforcement for the contents of Snaps and those Snaps are still on our servers,' read an Oct. 14 posting on Snapchat's corporate blog, 'a federal law called the Electronic Communications Privacy Act (ECPA) obliges us to produce the Snaps to the requesting law enforcement agency.' Law-enforcement entities have hit Snapchat with 'about a dozen' search warrants for unopened Snaps since May 2013. 'Law enforcement requests sometimes require us to preserve Snaps for a time, like when law enforcement is determining whether to issue a search warrant for Snaps,' the blog continued. That surveillance could also go beyond unopened Snaps: Snapchat 'Stories,' or a cluster of Snaps, live on the company's servers for up to 24 hours and can be viewed multiple times, which broadens the window for law enforcement to poke its way in."
First time accepted submitter Gavrielkay writes "We seem to have attracted the attention of some less than savory types in online gaming and now find our home network relentlessly DoSed. We bought a new router that doesn't fall over quite so easily, but it still overwhelms our poor little DSL connection and prevents us web browsing and watching Netflix occasionally. What's worse is that it seems to find us even if we change the MAC address and IP address of the router. Often the router logs IPs from Russia or Korea in these attacks (no packet logging, just a blanket 'DoS attack from...' in the log. But more often lately I've noticed the IPs trace back to Microsoft or Amazon domains. Are they spoofing those IPs? Did they sign us up for something weird there? And how do they find us with a new MAC address and IP within minutes? We're looking for a way to hide from these idiots that doesn't involve going to the Feds, although that is what our ISP suggested. Piles of money for a commercial grade router is out of the question. We are running antivirus and anti-malware programs and haven't seen any evidence of hacked computers so far."
ananyo writes "It is the most fundamental, and yet also the strangest postulate of the theory of quantum mechanics: the idea that a quantum system will catastrophically collapse from a blend of several possible quantum states to just one the moment it is measured by an experimentalist. Researchers have now been able to capture that collapse through the use of weak measurements — indirect probes of quantum systems that tweak a wavefunction slightly while providing partial information about its state, avoiding a sudden collapse. Atomic and solid-state physicist Kater Murch of the University of California, Berkeley, and his colleagues performed a series of weak measurements on a superconducting circuit that was in a superposition — a combination of two quantum states. They did this by monitoring microwaves that had passed through a box containing the circuit, based on the fact that the circuit's electrical oscillations alter the state of the microwaves as they pass through the box. Over a couple of microseconds, those weak measurements captured snapshots of the state of the circuit as it gradually changed from a superposition to just one of the states within that superposition — as if charting the collapse of a quantum wavefunction in slow motion."
mysqlbytes writes "The BBC is reporting the National Ignition Facility (NIF), based at Livermore in California, has succeeded in breaking even — 'During an experiment in late September, the amount of energy released through the fusion reaction exceeded the amount of energy being absorbed by the fuel — the first time this had been achieved at any fusion facility in the world.'"
Hugh Pickens DOT Com writes "BBC reports that Chinese web users are criticizing Apple after the company pulled a free iPhone app called OpenDoor, which enables users to bypass firewalls and access restricted internet sites. The developers of OpenDoor — who wish to remain anonymous — told Radio Netherlands that Apple removed the app because it 'includes content that is illegal in China.' 'It is unclear to us how a simple browser app could include illegal contents, since it's the user's own choosing of what websites to view,' say the developers. 'Using the same definition, wouldn't all browser apps, including Apple's own Safari and Google's Chrome, include illegal contents?' Chinese internet users were disappointed by the move by Apple. Zhou Shuguang, a prominent Chinese blogger and citizen journalist, told U.S.-based Radio Free Asia that Apple had taken away one of the tools which internet users in China relied on to circumvent the country's great firewall. 'Apple is determined to have a share of the huge cake which is the Chinese internet market. Without strict self-censorship, it cannot enter the Chinese market,' says one Chinese user disappointed by the move by Apple."
Lasrick writes "Motherboard's Africa correspondent, Amanda Sperber, has a great piece on how protesters in Sudan are getting around the government's shutdown of the internet. Quoting: 'Since Wednesday afternoon, Sudan's internet has been sporadically shut off amid a fifth day of protests against President Omar al Bashir's regime. Despite the attempt to cut off communications and limit organization and reporting on the ground, a group of tech-savvy people based in Khartoum have developed a map for recording key data about the protests that's powered by cell networks. '"
Nerval's Lobster writes "In 2012, hurricane Sandy smacked the East Coast and did significant damage to New Jersey, New York City, and other areas. Flooding knocked many datacenters in Manhattan offline, temporarily taking down a whole lot of Websites in the process. Now that fall (and the tail end of hurricane season) is upon us again, any number of datacenters and IT companies are probably looking over their disaster-preparedness checklists in case another storm comes barreling through. Ryan Murphey, who heads up design and capacity planning for PEER 1 (which kept its Manhattan datacenter running during the storm by creating a makeshift bucket brigade to carry fuel to the building's 17th floor), offers a couple basic tips for possibly mitigating damage from the next infrastructure-crushing disaster, including setting up emergency response teams and arranging contracts for maintenance and fuel in advance."
First time accepted submitter gbrambilla writes "A problem every system administrator has to face sooner or later is to improve the performance of the infrastructure that he administers. This is especially true if the infrastructure is a Citrix XenApp farm that publishes applications to the users, that starts complaining as soon as those applications become slow. A couple of weeks ago I was asked to publish a new ERP application and suddenly all the hosted applications started to suffer performance problems... after some basic tests I looked on Amazon for an help and found the book I'm reviewing: Citrix XenApp Performance Essentials, by Luca Dentella, is a practical guide that helps system administrators to identify bottlenecks, solve performance problems and optimize XenApp farms thanks to best-practices and real-world examples." Read below for the rest of gbrambilla's review.