This T2K observation is the first of its kind in that an explicit appearance of a unique flavor of neutrino at a detection point is unequivocally observed from a different flavor of neutrino at its production point.
This result clears the way for CP-violation neutrino studies which could show that "regular" neutrinos act differently than their antimatter counterparts, a phenomenon that so far has only been observed in quarks. If neutrino CP-violation is found, it could explain why there is such a large predominance of matter over antimatter in the universe.
Shares of Microsoft dropped 11.4 percent today, representing the biggest single-day drop in over 13 years. The last time it occurred was on April 24, 2000, when shares plunged 15.6 percent as the world's largest software company locked itself in an antitrust dispute with the U.S. government. Since then, Microsoft has never experienced such a shelling, until today that is. This came after the software company posted dismal quarterly results due to weak demand for its latest Windows system and poor sales of its Surface tablet.
A lot of links available, below is only a very limited list
Fermín Serna, a researcher in Google’s Mountain View, California headquarters, told The Security Ledger that he received a bounty issued by Microsoft this week for information on an Internet Explorer information leak that could allow a malicious hacker to bypass Microsoft’s Address Space Layout Randomization (or ASLR) technology.
His bounty followed the first ever (officially) paid to a researcher by Microsoft (https://securityledger.com/2013/07/microsoft-set-to-pay-first-bug-bounty-for-ie-hole/): a bounty that went to Serna’s colleague, Ivan Fratic, a Google engineer based in Zurich, Switzerland, for information about a vulnerability in Internet Explorer 11 Preview. Fratic (@ifsecure) acknowledged the honor in a July 11 post on his Twitter account.
In an e-mail exchange with The Security Ledger, Serna declined to discuss the details of his discovery until Microsoft had a patch ready to release. But he said that any weakness in ASLR warranted attention. “Mainly all security mitigations in place depend on ASLR. So bringing that one down, weakens the system a lot and makes it easy the exploitation of other vulnerabilities,” he said.
Microsoft announced its first bounty on July 10 and said it had many more submissions that were likely to earn pay-outs. Serna said that other bounties had been issued in addition to the one he received. Microsoft told The Security Ledger that it has, in accordance with the program, "notified some researchers that they will receive bounties."
As for his bounty, Serna (whose resume includes work for Microsoft on the MSRC Engineering team) said it was “way less” than the maximum $11,000 bounty for a full, working exploit that bypasses all the Windows 8 mitigations (which includes ASLR as well as the Data Execution Prevention or DEP technology). “But stillnice!” He plans to donate his windfall to a local animal shelter in Seattle. Awwww!!!!
Disney will release a press release shortly of a new technology called AIREAL, featured at this year's SIGGRAPH 2013 conference in Anaheim, CA. Here is a link:
The project page is located here:
Paper and Demo:
After a year of monitoring, the researchers found that the chemical-laced fluids used to free gas trapped deep below the surface stayed thousands of feet below the shallower areas that supply drinking water.
"More than 40 percent of fresh water used in the United States is withdrawn to cool power plants. Renewable energy generally uses far less water, but there are glaring exceptions, such as geothermal and concentrating solar."
The article also mentions that power plants have to shut down if the incoming water is too warm to cool the plant.
At that time, the town realized that it couldn't attract technology-based businesses and that bandwidth was a challenge even to ordinary businesses. It came up with a plan — it would install a fibre network throughout the town that would connect to the larger inter-community network being built by the government at that time — the Alberta Supernet.
From the European Space Agency comes the news that researchers from its Advanced Concepts Team have recently won the Gold "Humies" award for their use of Evolutionary Algorithms to design a spacecraft’s trajectory for exploring the Galilean moons of Jupiter (Io, Europa, Ganymede and Callisto).
The problem addressed in the awarded article was put forward by NASA/JPL in the latest edition of the Global Trajectory Optimization Competition. The team from ESA was able to automatically evolve a solution that outperforms all the entries submitted to the competition by human experts from across the world.
Interestingly, as noted in the presentation to the award's jury, the team conducted their work on top of open-source tools (PaGMO / PyGMO and PyKEP).
Some users have started noticing that in the Promotions tab new emails are appearing that they haven’t singed up to receive. These emails as marked as “Ad” under the sender name. A little further investigation reveals they are actually Google adverts packaged as emails.
Courts had just ruled that the files must be processed and released as a result of successful litigation by Wired editor Kevin Poulson. MIT released a statement saying the delays were necessary to protect its employee and its network security.
What is the best way to protect your privacy for a pc and a smartphone from google, ad-networks and the isp. What tools are you using? What is the "best"? Is someone here actually running such a setup? What would the costs amount to? What would be involved?
Please be specific. I could not really find anything like "the n00b guide to online privacy"...
The Anonymous hacking group is claiming to have hacked the US Federal Emergency Management Agency servers after posting staff details online.
The group said it posted the details online because 'oblique and cowardly implied threats against Anonymous very much back into the forefront of the hive's consciousness'.
In a document published online Wednesday, the hacker collective revealed data that includes information on user accounts and passwords of what appear to be government employees.
According to motherboard.com, the document contains email addresses and contact details for hundreds of contacts including police and fire departments, FBI special agents and a 'Bioterrorism Coordinator Chair.'
Anonymous said it redacted social security numbers and login information because its 'intent is not to harm, merely to issue a firm warning,' reported the Guardian.
'Anonymous does not wave the white flag. Not while we are faced with a daily stream of abominable revelations from Edward Snowden and others, not while the battle for the very soul, the very original purpose, of the internet escalates in severity daily,' read a statement by a representative of Anonymous and obtained by GlobalPost.
How long would you be willing to wait for a drop of the black stuff in Dublin? After 69 years, one of the longest-running laboratory investigations in the world has finally captured the fall of a drop of tar pitch on camera for the first time. A similar, better-known and older experiment in Australia missed filming its latest drop in 2000 because the camera was offline at the time.