Space

Astronomers Find Star Orbiting a Black Hole At 1 Percent the Speed of Light (sciencealert.com) 124

schwit1 writes: Astronomers have spotted a star whizzing around a vast black hole at about 2.5 times the distance between Earth and the Moon, and it takes only half an hour to complete one orbit. To put that into perspective, it takes roughly 28 days for our Moon to do a single lap around our relatively tiny planet at speeds of 3,683 km(2,288 miles) per hour. Using data from an array of deep space telescopes, a team of astronomers have measured the X-rays pouring from a binary star system called 47 Tuc X9, which sits in a cluster of stars about 14,800 light-years away. The pair of stars aren't new to astronomers -- they were identified as a binary system way back in 1989 -- but it's now finally becoming clear what's actually going on here. When a white dwarf pulls material from another star, the system is described as a cataclysmic variable star. But back in 2015, one of the objects was found to be a black hole, throwing that hypothesis into serious doubt. Data from Chandra has confirmed large amounts of oxygen in the pair's neighborhood, which is commonly associated with white dwarf stars. But instead of a white dwarf ripping apart another star, it now seems to be a black hole stripping the gases from a white dwarf. The real exciting news, however, is regular changes in the X-rays' intensity suggest this white dwarf takes just 28 minutes to complete an orbit, making it the current champion of cataclysmic dirty dancers. To put it in perspective, the distance between the two objects in X9 is about 1 million kilometers (about 600,000 miles), or about 2.5 times the distance from here to the Moon. Crunching the numbers, that's a journey of roughly 6.3 million kilometers (about 4 million miles) in half an hour, giving us a speed of 12,600,000 km/hr (8,000,000 miles/hr) - about 1 percent of the speed of light.
Businesses

Proof Daylight Saving Time Is Dumb, Dangerous, and Costly (bloomberg.com) 352

From a report on Bloomberg: The case for daylight saving time has been shaky for a while. The biannual time change was originally implemented to save energy. Yet dozens of studies around the world have found that changing the clocks has either minuscule or non-existent effects on energy use. [...] The latest research suggests the time change can be harmful to our health and cost us money. The suffering of the spring time change begins with the loss of an hour of sleep. That might not seem like a big deal, but researchers have found it can be dangerous to mess with sleep schedules. Car accidents, strokes, and heart attacks spike in the days after the March time change. It turns out that judges, sleep deprived by daylight saving, impose harsher sentences. [...] Some of the last defenders of daylight saving time have been a cluster of business groups who assume the change helps stimulate consumer spending. That's not true either, according to recent analysis of 380 million bank and credit-card transactions by the JPMorgan Chase Institute.
Education

Some Colleges Have More Students From the Top 1 Percent Than the Bottom 60 (nytimes.com) 314

Students at elite colleges are even richer than experts realized, according to a new study based on millions of anonymous tax filings and tuition records. At 38 colleges in America, including five in the Ivy League -- Dartmouth, Princeton, Yale, Penn and Brown -- more students came from the top 1 percent of the income scale than from the entire bottom 60 percent. From a report on the NYTimes (alternate non-paywall link): Roughly one in four of the richest students attend an elite college -- universities that typically cluster toward the top of annual rankings (you can find more on our definition of "elite" at the bottom). In contrast, less than one-half of 1 percent of children from the bottom fifth of American families attend an elite college; less than half attend any college at all. Colleges often promote their role in helping poorer students rise in life, and their commitments to affordability. But some elite colleges have focused more on being affordable to low-income families than on expanding access. "Free tuition only helps if you can get in," said Danny Yagan, an assistant professor of economics at the University of California, Berkeley, and one of the authors of the study.
Medicine

Caffeine May Counter Age-Related Inflammation, Says Study (stanford.edu) 99

According to a new Stanford study published in the journal Nature Medicine, caffeine may help to counter the inflammatory process that occurs in some older people. The researchers have found a connection between advancing age, systemic inflammation, cardiovascular disease and coffee consumption by analyzing blood samples, survey data and medical and family histories obtained from more than 100 human participants in a multiyear study. Stanford Medical Center Report adds: The study implicates this inflammatory process as a driver of cardiovascular disease and increased rates of mortality overall. Metabolites, or breakdown products, of nucleic acids -- the molecules that serve as building blocks for our genes -- circulating in the blood can trigger this inflammatory process, the study found. The study also provides evidence that caffeine and its own metabolites may counter the action of these circulating nucleic-acid metabolites, possibly explaining why coffee drinkers tend to live longer than abstainers. Notably, this inflammatory mechanism was found to be activated only in some, but not all, of the older study participants. Those in whom it was relatively quiescent tended to drink more caffeinated beverages. Laboratory experiments revealed that the mechanism was directly countered by caffeine and associated compounds. For the new study, the researchers compared blood drawn from older versus younger study participants to see which genes tended to be more highly activated in older people. They zeroed in on two clusters of genes whose activity was associated with the production of a potent circulating inflammatory protein called IL-1-beta. The genes within each cluster appeared to work in coordination with one another. The researchers found that incubating a type of immune cell with two of those nucleic-acid metabolites boosted activity in one of the gene clusters, resulting in increased IL-1-beta production. When injected into mice, the substances triggered massive systemic inflammation, along with high blood pressure. In addition, immune cells infiltrated and clogged the animals' kidneys, increasing renal pressure substantially. Intrigued by the correlation between older participants' health, gene-cluster activation and self-reported rates of caffeine consumption, the researchers followed up and verified that blood from the group with low cluster activity was enriched for caffeine and a number of its metabolites, compared with blood from the group with high cluster activity. (Examples of these metabolites are theophylline, also found in tea, and theobromine, which abounds in chocolate.) Incubating immune cells with caffeine and its breakdown products along with the inflammation-triggering nucleic acid metabolites substantially prevented the latter from exerting their powerful inflammatory effect on the cells.
Biotech

Our Brains Use Binary Logic, Say Neuroscientists (sciencedaily.com) 69

"The brain's basic computational algorithm is organized by power-of-two-based logic," reports Sci-News, citing a neuroscientist at Augusta University's Medical College. hackingbear writes: He and his colleagues from the U.S. and China have documented the algorithm at work in seven different brain regions involved with basics like food and fear in mice and hamsters. "Intelligence is really about dealing with uncertainty and infinite possibilities," he said. "It appears to be enabled when a group of similar neurons form a variety of cliques to handle each basic like recognizing food, shelter, friends and foes. Groups of cliques then cluster into functional connectivity motifs to handle every possibility in each of these basics. The more complex the thought, the more cliques join in."
Twitter

Reuters Built An Algorithm That Can Identify Real News On Twitter (popsci.com) 122

Reuters has built an algorithm called News Tracer that flags and verifies breaking news on Twitter. The algorithm weeds through all 500 million tweets that are posted on a daily basis to "sort real news from spam, nonsense, ads, and noise," writes Corinne Iozzio via Popular Science: In development since 2014, reports the Columbia Journalism Review, News Tracer's work starts by identifying clusters of tweets that are topically similar. Politics goes with politics; sports with sports; and so on. The system then uses language-processing to produce a coherent summary of each cluster. What differentiates News Tracer from other popular monitoring tools, is that it was built to think like a reporter. That virtual mindset takes 40 factors into account, according to Harvard's NiemanLab. It uses information like the location and status of the original poster (e.g. is she verified?) and how the news is spreading to establish a "credibility" rating for the news item in question. The system also does a kind of cross-check against sources that reporters have identified as reliable, and uses that initial network to identify other potentially reliable sources. News Tracer can also tell the difference between a trending hashtag and real news. The mix of data points News Tracer takes into account means it works best with actual, physical events -- crashes, protests, bombings -- as opposed to the he-said-she-said that can dominate news cycles.
Programming

Which Programming Language Is Most Popular - The Final Answer? (zdnet.com) 401

An anonymous Slashdot reader writes: Following a common technique among political pollsters, a technology columnist combined the results from various measures of programming language popularity for a more definitive answer about the most important languages to study. He used IEEE Spectrum's interactive list of the top programming languages, which lets you adjust the weight given to the number of job listings and number or open source projects, then combined it with the TIOBE Index (which is based on search engine results), and the PYPL Index, which checks the number of tutorials for each programming language on Google.

The results? "The top cluster contains Java, C, Python, and C++. Without a doubt, you should attain familiarity with these four languages." He points out they're not tied to a specific programming platform, unlike languages in the second cluster -- JavaScript, C#, PHP, and Swift -- while the last two languages in the top 10 were Objective-C and R. "The C-family of languages still dominates. Java, C++, C, C#, and even Objective-C are all C-based languages. If you're only going to learn one language, you should pick one of those." But his ultimate advice is to "learn multiple languages and multiple frameworks... Programming is not just an intellectual exercise. You have to actually make stuff."

Space

New Research Reveals Hundreds of Undiscovered Black Holes (phys.org) 75

An anonymous reader quotes a report from Phys.Org: New research by the University of Surrey published in the journal Monthly Notices of the Royal Astronomical Society has shone light on a globular cluster of stars that could host several hundred black holes, a phenomenon that until recently was thought impossible. Globular clusters are spherical collections of stars which orbit around a galactic center such as our Milky-way galaxy. Using advanced computer simulations, the team at the University of Surrey were able to see the un-see-able by mapping a globular cluster known as NGC 6101, from which the existence of black holes within the system was deduced. These black holes are a few times larger than the Sun, and form in the gravitational collapse of massive stars at the end of their lives. It was previously thought that these black holes would almost all be expelled from their parent cluster due to the effects of supernova explosion, during the death of a star. It is only as recently as 2013 that astrophysicists found individual black holes in globular clusters via rare phenomena in which a companion star donates material to the black hole. This work, which was supported by the European Research Council (ERC), has shown that in NGC 6101 there could be several hundred black holes, overturning old theories as to how black holes form.
Software

Audi's Traffic Light Information System Tells You When The Lights Are Going To Turn Green (pcworld.com) 203

An anonymous reader quotes a report from PCWorld: Audi's Traffic light information system offers a first: the ability to tell you when the stoplight is going to change from red to green. This is a big thing for the impatient driver, but it's an even bigger thing for the automotive industry. The new feature, announced Monday, will be available on 2017 Q7, A4, and A4 allroad models built from June, 2016 onward. As your car nears a traffic light, it will receive real-time data about the signals at that location. Because the data can be complex, Audi says the car's computer will decide whether it has enough information to know when the traffic light you're sitting at will turn green. If so, it'll display a countdown clock on the instrument cluster. Audi's General Manager of Connectivity, Pom Malhotra, said Audi tested the service on 100 cars for over a year. The company's working closely with the agencies that manage the 300,000 or so traffic lights in the United States, and data provider Traffic Technology Solutions (TTS) of Portland, Oregon. TTS processes a constant stream of traffic signal status in real time and sends it to Audi's own servers, which then send it to the car. Malhotra said, "A few things have been implemented that we think of as safeguards." For example, the countdown timer will disappear several seconds before the red light changes to green, forcing you to put down your phone or stop whatever you may be doing in the meantime and look at the light yourself. The feature will be available in the three models mentioned via Audi's Connect Prime infotainment package, which costs $199 for 6 months or $750 for 30 months.
NASA

Class of Large But Very Dim Galaxies Discovered (nature.com) 105

schwit1 writes from a report via Nature: Astronomers have now detected and measured a new class of large but very dim galaxy that previously was not expected to exist. Nature reports: "'[Ultradiffuse]' galaxies came to attention only last year, after Pieter van Dokkum of Yale University in New Haven, Connecticut, and Roberto Abraham of the University of Toronto in Canada built an array of sensitive telephoto lenses named Dragonfly. The astronomers and their colleagues observed the Coma galaxy cluster 101 megaparsecs (330 million light years) away and detected 47 faint smudges. 'They can't be real,' van Dokkum recalls thinking when he first saw the galaxies on his laptop computer. But their distribution in space matched that of the cluster's other galaxies, indicating that they were true members. Since then, hundreds more of these galaxies have turned up in the Coma cluster and elsewhere. Ultradiffuse galaxies are large like the Milky Way -- which is much bigger than most -- but they glow as dimly as mere dwarf galaxies. It's as though a city as big as London emitted as little light as Kalamazoo, Michigan." More significantly, they have now found that these dim galaxies can be as big and as massive as the biggest bright galaxies, suggesting that there are a lot more stars and mass hidden out there and unseen than anyone had previously predicted.
Security

Password Reuse Tool Makes It Easy To ID Vulnerable Accounts On Other Sites (arstechnica.com) 60

Dan Goodin, reporting for Ars Technica: Over the past few months, a cluster of megabreaches has dumped account credentials for a mind-boggling 642 million accounts into the public domain, where they can then be used to compromise other accounts that are protected by the same password. Now, there's software that can streamline this vicious cycle by testing for reused passcodes on Facebook and other popular sites. Shard, as the command-line tool has been dubbed, is designed to allow end users to test if a password they use for one site is also used on Facebook, LinkedIn, Reddit, Twitter, or Instagram, its creator, Philip O'Keefe, told Ars. The security researcher said he developed the tool after discovering that the randomly generated eight-character password protecting several of his accounts was among the more than 177 million LinkedIn passwords that were leaked in May. "I used that password as a general password for many services," he wrote in an e-mail. "It was a pain to remember which sites it was shared and to change them all. I use a password manager now."
Open Source

CoreOS Launches Torus, a New Open Source Distributed Storage System (infoworld.com) 26

CoreOS on Wednesday launched Torus, an open source project that provides storage primitives designed for cloud-native apps and can be deployed like a containerized app via Kubernetes. With Torus, startups and enterprises get access to the same kind of technologies that web-scale companies such as Google already use internally. NetworkWorld reports: Torus is deployed by Kubernetes, side by side with the apps to which it provides storage, and it uses Kubernetes's Flexvolume plugin to allow dynamic mounting of volumes for nodes in the cluster. This allows, for example, PostgreSQL to run atop Torus storage volumes. Torus also demonstrates how CoreOS is working on what happens around containers, not only what happens inside them. A key part of Torus is etcd, a distributed key/value store used by CoreOS to automatically keep configuration data consistent across all machines in a cluster. In Torus, etcd is used to store and replicate metadata for all the files and objects stored in the pool.
Cellphones

ARM Announces Next-Gen 64-Bit Artemis Mobile Chip On 10nm TSMC FinFET Process (hothardware.com) 51

MojoKid writes from a report via Hot Hardware: ARM has been working closely with TSMC for years now. Over the last six years or so especially, ARM and TSMC have collaborated to ensure that TSMC's cutting-edge process technologies work well with ARM's processor IP. However recently, ARM just announced the successful tape-out of a test chip featuring next-generation, 64-Bit ARM v8-A mobile processor cores, codenamed Artemis, manufactured using TSMC's upcoming 10nm FinFET process technology. The test chip features what ARM calls an Artemis cluster. It's essentially a quad-core processor with power management IP, a single-shader Mali graphics core, AMBA AXI interconnect, and test ROMs connected to a second cluster by an asynchronous bridge that features the memory subsystem, which is stacked with a Cortex M core that handles control logic, some timers, SRAM, and external IO. Compared to 16nm FinFET+, at nominal voltage, the 10nm test chip offered a 12% performance improvement in a similar power envelope. In super-overdrive mode (Vsod), the Artemis test chip offered similar performance, but at 30% lower power.SoCs for premium mobile devices with next-generation cores produced on the 10nm process node are expected to arrive later in the second half of this year.
AI

MIT Reveals AI Platform Which Detects 85 Percent of Cyberattacks (zdnet.com) 44

An anonymous reader writes: MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) says that while many 'analyst-driven solutions' rely on rules created by human experts and therefore may miss attacks which do not match established patterns, a new artificial intelligence platform changes the rules of the game. The platform, dubbed AI Squared (AI2), is able to detect 85 percent of attacks -- roughly three times better than current benchmarks -- and also reduces the number of false positives by a factor of five, according to MIT. The latter is important as when anomaly detection triggers false positives, this can lead to lessened trust in protective systems and also wastes the time of IT experts which need to investigate the matter. AI2 was tested using 3.6 billion log lines generated by over 20 million users in a period of three months. The AI trawled through this information and used machine learning to cluster data together to find suspicious activity. Anything which flagged up as unusual was then presented to a human operator and feedback was issued.Fast Co Design has an interesting take on this.
Crime

VPN Provider's No-Logging Claims Tested In FBI Case (torrentfreak.com) 67

An anonymous reader writes from an article published on TorrentFreak: [A] criminal complaint details the FBI's suspicions that 25-year-old Preston McWaters had conveyed "false or misleading information regarding an explosive device." The FBI started digging and in February 2016 two search warrants against Twitter and Facebook required them to turn over information on several accounts. Both did and the criminal complaint makes it clear that the FBI believes that McWaters was behind the accounts and the threats. With McWaters apparently leaving incriminating evidence all over the place (including CCTV at Walmart where he allegedly purchased a pre-paid Tracfone after arriving in his own car), the FBI turned to IP address evidence available elsewhere. "During the course of the investigation, subpoenas and search warrants have been directed to various companies in an attempt to identify the internet protocol (IP) address from where the email messages are being sent," the complaint reads. "All the responses from [email provider] 1&1, Facebook, Twitter, and Tracfone have been traced by IP address back to a company named London Trust Media [doing business as] PrivateInternetAccess.com. A subpoena was sent to London Trust Media and the only information they could provide is that the cluster of IP addresses being used was from the east coast of the United States," the FBI's complain reads. "However, London Trust did provide that they accept payment for their services through credit card with a vendor company of Stripe and/or Amazon. They also accept forms of payment online through PayPal, Bitpay, Bit Coin, Cash You, Ripple, Ok Pay, and Pay Garden."

While McWaters is yet to be found guilty, it's a sad fact that some people will use anonymizing services such as VPNs, pre-paid phones and anonymous email providers to harass others. And thankfully, as this case shows, they'll need to hide a lot more than their IP address to get away with that level of crime.

Hardware Hacking

Using Kexec Allows Starting Linux In PlayStation 4 70

jones_supa writes: Team fail0verflow, the hacker group who made Sony PlayStation 4, has introduced another method to start Linux in the game console. Instead of the previous exploit which was based on a security hole in an old PS4 firmware version, the new trick allows a kexec call to start Linux through Orbis OS (the FreeBSD-based system software of PS4). The code can be found in GitHub. Maybe this will lead to more and better PlayStation clusters.
Cloud

CloudBees Releases Jenkins-based Platform For CDaaS (theregister.co.uk) 17

An anonymous reader writes: As a way to address the many challenges associated with supporting DevOps and adopting Continuous Delivery (CD), CloudBees has released a new Jenkins platform to help teams deliver software.The new platform provides other cloud-native capabilities, including Docker deployment and Mesos large-scale cluster management, which will allow enterprises to run and manage Jenkins across the enterprise on their own private cloud, or by using dedicated AWS resources.
Space

NASA Announces That Pluto Has Icebergs Floating On Glaciers of Nitrogen Ice (blastingnews.com) 50

MarkWhittington writes: The most recent finding from New Horizons show that icebergs have broken off from the hills surrounding the Sputnik Planum, a glacier of nitrogen ice, and are floating slowly across its surface, eventually to cluster together in places like the Challenger Colles, informally named after the crew of the space shuttle Challenger, which was lost just over 30 years ago. The feature is an especially high concentration of icebergs, measuring 37 by 22 miles. The icebergs float on the nitrogen ice plain because water ice is less dense than nitrogen ice.

Slashdot Top Deals