×
Science

Mystery of the Cargo Ships That Sink When Their Cargo Suddenly Liquefies (theconversation.com) 31

An anonymous reader writes (condensed for space): On average, ten "solid bulk cargo" carriers have been lost at sea each year for the last decade. Solid bulk cargoes -- defined as granular materials loaded directly into a ship's hold -- can suddenly turn from a solid state into a liquid state, a process known as liquefaction. And this can be disastrous for any ship carrying them -- and their crew. A lot is known about the physics of the liquefaction of granular materials from geotechnical and earthquake engineering. The vigorous shaking of the earth causes pressure in the ground water to increase to such a level that the soil "liquefies." Yet despite our understanding of this phenomenon, and the guidelines in place to prevent it occurring, it is still causing ships to sink and taking their crew with them.

Solid bulk cargoes are typically "two-phase" materials as they contain water between the solid particles. When the particles can touch, the friction between them makes the material act like a solid (even though there is liquid present). But when the water pressure rises, these inter-particle forces reduce and the strength of the material decreases. When the friction is reduced to zero, the material acts like a liquid (even though the solid particles are still present). A solid bulk cargo that is apparently stable on the quayside can liquefy because pressures in the water between the particles build up as it is loaded onto the ship. This is especially likely if, as is common practice, the cargo is loaded with a conveyor belt from the quayside into the hold, which can involve a fall of significant height. The vibration and motion of the ship from the engine and the sea during the voyage can also increase the water pressure and lead to liquefaction of the cargo.
You can read more on this here.
Technology

Unpaid and Abused: Moderators Speak Out Against Reddit (engadget.com) 124

In a joint investigation, Engadget and Point spoke to 10 Reddit moderators, and all of them complained that Reddit is systematically failing to tackle the abuse they suffer. Keeping the front page of the internet clean has become a thankless and abusive task, and yet Reddit's administration has repeatedly neglected to respond to moderators who report offenses. From the report: "I've had a few death threats," said Emily, who asked to be referred to by her first name and her Reddit username, lolihull, to prevent the online harassment from spilling over into her real life. [...] "I had three death threats this past month," said abrownn, who moderates r/Futurology, with more than 13 million subscribers, and r/technology, with more than 6 million subscribers. abrownn asked only to be known by their username. All the moderators interviewed confirmed they had received death threats, which they said can take a toll.

[...] It's hard to pin down how many moderators there are: Even the moderators themselves don't know, but most estimate their numbers are into the tens of thousands. Some spend hours each day working for free on the site. Whatever the actual figure, they far outnumber the higher-ranking and paid administrators, whose job it is to respond to the evidence that the moderators collect.

Math

This is the Story of the 1970s Great Calculator Race (twitter.com) 102

An anonymous reader shares a thread [Editor's note: all links in the story will lead you to Twitter]: In the 1970s the cost -- and size -- of calculators tumbled. Business tools became toys; as a result prestige tech companies had to rapidly diversify into other products -- or die! This is the story of the 1970s great calculator race... Compact electronic calculators had been around since the mid-1960s, although 'compact' was a relative term. They were serious, expensive tools for business. So it was quite a breakthrough in 1967 when Texas Instruments presented the Cal-Tech: a prototype battery powered 'pocket' calculator using four integrated circuits. It sparked a wave of interest. Canon was one of the first to launch a pocket calculator in 1970. The Pocketronic used Texas Instruments integrated circuits, with calculations printed on a roll of thermal paper. Sharp was also an early producer of pocket calculators. Unlike Canon they used integrated circuits from Rockwell and showed the calculation on a vacuum fluorescent display. The carrying handle was a nice touch!

The next year brought another big leap: the Hewlet-Packard HP35. Not only did it use a microprocessor it was also the first scientific pocket calculator. Suddenly the slide rule was no longer king; the 35 buttons of the HP35 had taken its crown. The most stylish pocket calculator was undoubtedly the Olivetti Divisumma 18, designed by Mario Bellini. Its smooth look and soft shape has become something of a tech icon and an inspiration for many designers. It even featured in Space:1999! By 1974 Hewlett Packard had created another first: the HP-65 programmable pocket calculator. Programmes were stored on magnetic cards slotted into the unit. It was even used during the Apollo-Soyuz space mission to make manual course corrections. The biggest problem for pocket calculators was the power drain: LED displays ate up batteries. As LCD displays gained popularity in the late 1970s the size of battery needed began to reduce. The 1972 Sinclair Executive had been the first pocket calculator to use small circular watch batteries, allowing the case to be very thin. Once LCD displays took off watch batteries increasingly became the norm for calculators. Solar power was the next innovation for the calculator: Teal introduced the Photon in 1977, no batteries required or supplied!

But the biggest shake-up of the emerging calculator market came in 1975, when Texas Instruments -- who made the chips for most calculator companies -- decided to produce and sell their own models. As a vertically integrated company Texas Instruments could make and sell calculators at a much lower price than its competitors. Commodore almost went out of business trying to compete: it was paying more for its TI chips than TI was selling an entire calculator for. With prices falling the pocket calculator quickly moved from business tool to gizmo: every pupil, every student, every office worker wanted one, especially when they discovered the digital fun they could have! Calculator games suddenly became a 'thing', often combining a calculator with a deck of cards to create new games to play. Another popular pastime was finding numbers that spelt rude words if the calculator was turned upside down; the Samsung Secal even gave you a clue to one!

The calculator was quickly evolving into a lifestyle accessory. Hewlett Packard launched the first calculator watch in 1977... Casio launched the first credit card sized calculator in 1978, and by 1980 the pocket calculator and pocket computer were starting to merge. Peak calculator probably came in 1981, with Kraftwerk's Pocket Calculator released as a cassingle in a calculator-shaped box. Although the heyday of the pocket calculator may be over they are still quite collectable. Older models in good condition with the original packaging can command high prices online. So let's hear it for the pocket calculator: the future in the palm of your hand!

Social Networks

Inside Twitter's Long, Slow Struggle To Police Bad Actors (wsj.com) 143

Twitter CEO Jack Dorsey has personally weighed in on high-profile decisions, frustrating some employees. An anonymous reader shares a report: When Twitter Chief Executive Jack Dorsey testifies before Congress this week, he'll likely be asked about an issue that has been hovering over the company: Just who decides whether a user gets kicked off the site? To some Twitter users -- and even some employees -- it is a mystery. In policing content on the site and punishing bad actors, Twitter relies primarily on its users to report abuses and has a consistent set of policies so that decisions aren't made by just one person, its executives say. Yet, in some cases, Mr. Dorsey has weighed in on content decisions at the last minute or after they were made, sometimes resulting in changes and frustrating other executives and employees [Editor's note: the link may be paywalled; alternative source], according to people familiar with the matter. Understanding Mr. Dorsey's role in making content decisions is crucial, as Twitter tries to become more transparent to its 335 million users, as well as lawmakers about how it polices toxic content on its site.

Last month, after Twitter's controversial decision to allow far-right conspiracy theorist Alex Jones to remain on its platform, Mr. Dorsey told one person that he had overruled a decision by his staff to kick Mr. Jones off, according to a person familiar with the discussion. Twitter disputes that account and says Mr. Dorsey wasn't involved in those discussions. Twitter's initial inaction on Mr. Jones, after several other major tech companies banned or limited his content, drew fierce backlash from the public and Twitter's own employees, some of whom tweeted in protest. [...] "Any suggestion that Jack made or overruled any of these decisions is completely and totally false," Twitter's chief legal officer, Vijaya Gadde, said in a statement. "Our service can only operate fairly if it's run through consistent application of our rules, rather than the personal views of any executive, including our CEO."

Security

US Health Insurer Premera Blue Cross Accused of Destroying Evidence in Data Breach Lawsuit (zdnet.com) 46

Catalin Cimpanu, reporting for ZDNet: The plaintiffs of a class-action lawsuit against health insurance provider Premera Blue Cross are accusing the organization of "willfully destroying" evidence that was crucial for establishing accurate details in a security breach incident. In court documents filed last week obtained by ZDNet, plaintiffs claim that Premera intentionally destroyed a computer that was in a key position to reveal more details about the breach, but also software logs from a security product that may have shown evidence of data exfiltration. Establishing if hackers stole data from Premera's systems is crucial for the legal case. Breach victims part of the class-action will be to claim a right for monetary compensation, while Premera may argue that since hackers did not steal data from its servers, there is no tangible harm to victims. The class-action lawsuit is in connection to a March 2015 announcement. Back then, Premera announced that hackers breached its systems and gained access to computers holding the personal and medical data of over 11 million Americans.
Privacy

Five Eyes Intelligence Alliance Argues 'Privacy is Not Absolute' in Push For Encryption Backdoors (itnews.com.au) 289

The Five Eyes, the intelligence alliance between the U.S., U.K., Canada, Australia, and New Zealand, issued a statement warning they believe "privacy is not absolute" and tech companies must give law enforcement access to encrypted data or face "technological, enforcement, legislative or other measures to achieve lawful access solutions." Slashdot reader Bismillah shares a report: The governments of Australia, United States, United Kingdom, Canada and New Zealand have made the strongest statement yet that they intend to force technology providers to provide lawful access to users' encrypted communications. At the Five Country Ministerial meeting on the Gold Coast last week, security and immigration ministers put forward a range of proposals to combat terrorism and crime, with a particular emphasis on the internet. As part of that, the countries that share intelligence with each other under the Five-Eyes umbrella agreement, intend to "encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services." Such solutions will apply to products and services operated in the Five-Eyes countries which could legislate to compel their implementation. "Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions," the Five-Eyes joint statement on encryption said.
Hardware

Samsung Plans To Overhaul Its Smartphone Strategy at the Mid-range Price Point (cnbc.com) 60

Samsung Electronics plans to overhaul its smartphone strategy at the mid-range price point in order to appeal more to millennials, the company's mobile CEO has told CNBC. From the report: DJ Koh said the South Korean giant is changing its smartphone strategy for its mid-priced Galaxy A series of smartphones amid a slowdown in the handset market. Instead of introducing new technology into the flagship Galaxy S and Note series of devices, Koh said Samsung will look to bring in cutting-edge features to its cheaper models first. The first of these devices will come later this year. "In the past, I brought the new technology and differentiation to the flagship model and then moved to the mid-end. But I have changed my strategy from this year to bring technology and differentiation points starting from the mid-end," Koh told CNBC in an exclusive interview last week. The move comes amid a global smartphone slowdown with Samsung feeling a bit of the pressure. Sales in its mobile division fell 20 percent year-on-year in the second quarter of 2018 with the company attributing it to lower-than-expected sales of its high-end Galaxy S9 device.
Google

Chrome Browser Turns 10 (theverge.com) 117

Google first released its Chrome browser 10 years ago today. Marketed as a "fresh take on the browser," Chrome debuted with a web comic from Google to mark the company's first web browser. From a report: It was originally launched as a Windows-only beta app before making its way to Linux and macOS more than a year later in 2009. Chrome debuted at a time when developers and internet users were growing frustrated with Internet Explorer, and Firefox had been steadily building momentum. Google used components from Apple's WebKit rendering engine and Mozilla's Firefox to help bring Chrome to life, and it made all of Chrome's source code available openly as its Chromium project. Chrome focused on web standards and respected HTML5, and it even passed both the Acid1 and Acid2 tests at the time of its release. This was a significant step as Microsoft was struggling to adhere to open web standards with its Internet Explorer browser.

Another significant part of Chrome's first release was the idea of "sandboxing" individual browser tabs so that if one crashed it wouldn't affect the others. This helped improve the speed and stability of Chrome in general, alongside Google's V8 JavaScript engine that the company constantly tweaked to try and push the web forwards. After a decade of Chrome, this browser now dominates as the primary way most people browse the web. Chrome has secured more than 60 percent of browser market share on desktop, and Google's Chrome engineers continue to improve it with new features and push the latest web standards.
To mark the milestone, Google said it would make a surprise announcement on Tuesday -- some improvements coming to Chrome.
Hardware

Like Smartphone Vendors, Laptop OEMs Are Increasingly Moving To Near Bezel-Less Displays (theverge.com) 112

An anonymous reader shares a report: In the past few years, IFA has become a laptop show. It may not be the place where companies like Apple or Microsoft show off their flashiest hardware, but when it comes to the midrange, workhorse laptops that dominate the shelves at Best Buy and desks at schools, IFA is where you'll find them. That's why it's so interesting that there's been what feels like an overnight revolution in laptop screens at this year's show: bezels are dead, and IFA killed them. [...] Now, that wave is coming to laptops: Acer's Swift 7 and Swift 5, Asus' new ZenBook line, Lenovo's updated Yoga laptops, and even Dell's midrange Inspiron computers are all getting their screen borders whittled down. These new laptops are pushing the screen-to-body ratio higher than ever: the Swift 5 is 87.6 percent screen, while the newly teased Swift 7 checks in at 92 percent. And Asus' ZenBooks feature a new ErgoLift hinge design, which is (in theory) to improve typing, but it also cleverly hides the lower bezel so that Asus can claim it's up to 95 percent screen.
Communications

After Making Skype Convoluted and Difficult To Use, Microsoft is Now Rolling Out Features To Restore Simplicity (thurrott.com) 118

From a report: Microsoft just announced a number of changes the company is rolling out to restore Skype's simplicity and familiarity. When the company introduced the modern Skype, it introduced radical changes that turned the app into an actual, modern app. But of course, that didn't really work too well with some of Skype's classic users. Although Microsoft has made numerous changes to the modern Skype to work better for all users, there were still a bunch of things in the app that no one really needed. And one of that was Highlights -- it was a complete clone of Snapchat where you could post pictures/videos that last for a limited time. Unlike other Snapchat clones like Instagram Stories, no one actually used Skype Highlights. [...] The navigation has been drastically improved, now only consisting of Chats, Calls, and Contacts -- the three core parts of Skype. Along with Highlights, Microsoft's also removed the Capture button which opened the Skype camera -- another useless feature that was already accessible from within chats.
Google

Google's Doors Hacked Wide Open By Own Employee (forbes.com) 95

Last July, in Google's Sunnyvale offices, a hacker found a way to trick doors into opening without the requisite RFID keycard, Forbes reported Monday. Luckily for Google, it was David Tomaschik, an employee at the tech giant, who only had good intentions. From the report: When he sent his malicious code across the Google network, he saw the lights turn from red to green on the door to his office. Then came the satisfying thunk as the lock opened. It was the culmination of work in which Tomaschik had uncovered vulnerabilities in technology made by Software House, the creator of the office controllers managing the physical security of the California site.

Last summer, when Tomaschik looked at the encrypted messages the Software House devices (called iStar Ultra and IP-ACM) were sending across the Google network, he discovered they were non-random; encrypted messages should always look random if they're properly protected. He was intrigued and digging deeper discovered a "hardcoded" encryption key was used by all Software House devices. That meant he could effectively replicate the key and forge commands, such as those asking a door to unlock. Or he could simply replay legitimate unlocking commands, which had much the same effect. Tomaschik also discovered he could do all this without any record of his actions. And he could prevent legitimate Google employees from opening doors. "Once I had my findings it became a priority. It was pretty bad," he told Forbes. Google then moved quickly to prevent attacks on its offices, according to Tomaschik.

Security

Germany, Seeking Independence From US, Pushes Cyber Security Research (reuters.com) 141

Germany announced a new agency earlier this week to fund research on cyber security and to end its reliance on digital technologies from the United States, China and other countries. From a report: Interior Minister Horst Seehofer told reporters that Germany needed new tools to become a top player in cyber security and shore up European security and independence. "It is our joint goal for Germany to take a leading role in cyber security on an international level," Seehofer told a news conference with Defence Minister Ursula von der Leyen. "We have to acknowledge we're lagging behind, and when one is lagging, one needs completely new approaches."
China

Bullet, China's Latest Messaging App, Pops Shots at Top Local Rival WeChat (fortune.com) 46

This week, China's most downloaded app wasn't a game or a short-video app like normal but a new messaging service called Bullet. The app's startling assent to the top marks a rare challenge to Tencent's WeChat -- China's go-to choice for messaging. From a report: Bullet, so called for the swiftness of its service, specializes in instant voice messaging, whereby users communicate through a rally of short audio clips. That method hasn't caught on in the West, but in China, it's the norm. WeChat popularized that style of communication during its early days, in 2012, but its system has always been comparably limited. For one, WeChat only allows voice messages to be played in full, so if a listener misses a vital word towards the end of a clip, they have to start over from the beginning. Also, sending audio files makes it harder to scan through previous messages and check what's already been said, in case you've forgotten an important detail.

Bullet has smartly solved both of these problems. Firstly, it allows users to scrub through audio files and start playback at any point -- a simple enough fix that it's surprising WeChat hasn't introduced this function itself. (Scrubbing through voice messages is even a feature on Facebook-owned WhatsApp, which introduced voice messages after WeChat did.) Bullet's second solution is more impressive, but also not inimitable. The app instantly transcribes audio into a text message and sends the text along with the voice clip, leaving a visible record of the conversation.

Social Networks

SAP Founder Hasso Plattner Fears the Scourge of Social Media (afr.com) 118

In a wide-ranging interview, Hasso Plattner, the 74-year-old co-founder and chairman of global business software powerhouse SAP, talked about his apprehension of the social media. From the story: He saves his greatest condemnation for the scourge of fake news and societal manipulation on large social media platforms such as Facebook and Twitter. Despite the founders of the social giants pledging to do more to ensure public debate is not artificially skewed, Plattner believes the solution will have to come from law enforcement and criminal penalties. He says humans are genetically wired to thrive on rumours, dating back to ancient times when rumours about what was going on in the next village would be on everyone's mind. He fears social platforms have simply become rumour distribution machines of unbelievable power.

"I was very optimistic that social networks would improve access to information and democracy in general, but I am very disappointed that the opposite is happening," he says. "Professional information producers undermine the social networks, undermine states and elections. It is unbelievable what is happening and we have a huge problem." Plattner draws a parallel with insider trading, which he says is as easy to commit as social media manipulation, but is not so common because people know they will be slugged with criminal convictions. "This is all before we look at the exploitation of personal data, where we are naked in front of the social networks, because we undress ourselves, and not only literally," he says. "I think this will continue until we have the legal systems properly looking at it, and have strong laws that people have to obey."

Government

India Pushes Back Against Tech 'Colonization' by Internet Giants (nytimes.com) 140

In India, American companies dominate the internet. Facebook's WhatsApp is the most popular app on phones. Virtually every smartphone runs on Google's Android system. YouTube is the favorite video platform and Amazon is the No. 2 online retailer. For some Indian political leaders, it is as if their nation --which was ruled by Britain for a century until 1947 -- is being conquered by colonial powers all over again. And they are determined to stop it. From a report: "As a country, we have to all grow up and say that, you know, enough of this," Vinit Goenka, a railways official who works on technology policy for India's governing Bharatiya Janata Party, said at a conference last week. In recent months, regulators and ministers across India's government have declared their intention to impose tough new rules on the technology industry. Collectively, the regulations would end the free rein that American tech giants have long enjoyed in this country of 1.3 billion people, which is the world's fastest-growing market for new internet users. The proposals include European-style limits on what big internet companies can do with users' personal data, a requirement that tech firms store certain sensitive data about Indians only within the country, and restrictions on the ability of foreign-owned e-commerce companies to undercut local businesses on price. Matthew Prince, CEO of Cloudflare, commented on the story, saying, "India is currently the most important country in term of defining the future of Internet policy. It sits at the fulcrum between the United States and China. As it goes, so goes the world."

Slashdot Top Deals