walterbyrd writes "A team of engineers at Microsoft Research have developed a high-tech bra that's intended to monitor women's stress levels and dissuade them from emotional over-eating. The undergarment has sensors that track the user's heart rate, respiration, skin conductance and movement — all of which can indicate the type of stressful emotions that lead to over-eating, according to Microsoft researchers. The data is sent to a smartphone app, which then alerts users about their mood."
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Hugh Pickens DOT Com writes "Ellen Nakashima reports at the Washington Post that morale has taken a hit at the National Security Agency in the wake of controversy over the agency's surveillance activities and officials are dismayed that President Obama has not visited the agency to show his support. 'It is not clear whether or when Obama might travel the 23 miles up the Baltimore-Washington Parkway to visit Fort Meade, the NSA's headquarters in Maryland,' writes Nakashima, 'but agency employees are privately voicing frustration at what they perceive as White House ambivalence amid the pounding the agency has taken from critics.' Though Obama has asserted that the NSA's collection of virtually all Americans' phone records is lawful and has saved lives, the administration has not endorsed legislation that would codify it. And his recent statements suggest Obama thinks some of the NSA's activities should be constrained. 'The agency, from top to bottom, leadership to rank and file, feels that it is had no support from the White House even though it's been carrying out publicly approved intelligence missions,' says Joel Brenner, NSA inspector general from 2002 to 2006. 'They feel they've been hung out to dry, and they're right.' Former officials note how President George W. Bush paid a visit to the NSA in January 2006, in the wake of revelations by the New York Times that the agency engaged in a counterterrorism program of warrantless surveillance on U.S. soil beginning after the Sept. 11, 2001, terrorist attacks. 'Bush came out and spoke to the workforce, and the effect on morale was tremendous,' Brenner said. 'There's been nothing like that from this White House.' Morale is 'bad overall' says another former NSA official. 'It's become very public and very personal. Literally, neighbors are asking people, 'Why are you spying on Grandma?'"
Taco Cowboy writes in with a link about the remnants of some well-aged wine recently uncovered in Israel. "Scientists have uncovered a 3,700-year-old wine cellar in the ruins of a Canaanite palace in Israel, chemical analysis from the samples from the ceramic jars suggest they held a luxurious beverage that was evidently reserved for banquets. The good stuff contains a blend of ingredients that may have included honey, mint, cedar, tree resins and cinnamon bark. The discovery confirms how sophisticated wines were at that time, something suggested only by ancient texts. The wine cellar was found this summer in palace ruins near the modern town of Nahariya in northern Israel. Researchers found 40 ceramic jars, each big enough to hold about 13 gallons, in a single room. There may be more wine stored elsewhere, but the amount found so far wouldn't be enough to supply the local population, which is why the researchers believe it was reserved for palace use. The unmarked jars are all similar as if made by the same potter. Chemical analysis indicates that the jars held red wine and possibly white wine. There was no liquid left; analyses were done on residues removed from the jars. An expert in ancient winemaking said the discovery 'sheds important new light' on the development of winemaking in ancient Canaan, from which it later spread to Egypt and across the Mediterranean."
An anonymous reader writes "High-temperature superconductors exhibit a frustratingly varied catalog of odd behavior, such as electrons that arrange themselves into stripes or refuse to arrange themselves symmetrically around atoms. Now two physicists propose that such behaviors – and superconductivity itself – can all be traced to a single starting point, and they explain why there are so many variations. Most subatomic particles have a tiny magnetic field – a property physicists call 'spin' – and electrical resistance happens when the fields of electrons carrying current interact with those of surrounding atoms. Two electrons can join like two bar magnets, the north pole of one clamping to the south pole of the other, and this 'Cooper pair' is magnetically neutral and can move without resistance. Lee and Davis propose that this 'antiferromagnetic' interaction is the universal cause not only for superconductivity but also for all the observed intertwined ordering. They show how their 'unified' theory can predict the phenomena observed in copper-based, iron-based and so-called 'heavy fermion' materials."
First time accepted submitter prajendran writes "James Hansen, the former director of the Goddard Institute of Space Sciences, has been a strong defender of using nuclear energy to replace coal and renewable energy. He and three other researchers had written a letter, arguing just this. In this interview with rediff.com, an Indian news site, he was asked to address some concerns surrounding the issue, especially given the strong feelings generated by it. It may not be Hansen's best interview, but it did bring out his passionate side."
Fnord666 writes in with this link about one the development of a new unmanned toy for the U.S. Air Force. "A large, classified unmanned aircraft developed by Northrop Grumman is now flying—and it demonstrates a major advance in combining stealth and aerodynamic efficiency. Defense and intelligence officials say the secret unmanned aerial system (UAS), designed for intelligence, surveillance and reconnaissance (ISR) missions, is scheduled to enter production for the U.S. Air Force and could be operational by 2015. Funded through the Air Force's classified budget, the program to build this new UAS, dubbed the RQ-180, was awarded to Northrop Grumman after a competition that included Boeing and Lockheed Martin. The aircraft will conduct the penetrating ISR mission that has been left unaddressed, and under wide debate, since retirement of the Lockheed SR-71 in 1998."
An anonymous reader writes "The Hackaday writer Mathieu Stephan (alias limpkin) has just launched a new open source/hardware project together with the Hackaday community. The concept behind this product is to minimize the number of ways your passwords can be compromised, while generating long and complex random passwords for the different websites people use daily. It consists of a main device where users' credentials are encrypted, and a PIN locked smartcard containing the encryption key. Simply visit a website and the device will ask for confirmation to enter your credentials when you need to login. All development steps will be documented and all resources available for review."
sciencehabit writes "A simple model of forest fires could help explain the distribution of the sizes of earthquakes and their aftershocks, a theoretical physicist says. In the so-called Drössel-Schwabl model, trees sprout at random on a square grid like a vast checkerboard. Once the forest gets dense enough, lightning sets a random tree on fire, and fire spreads instantaneously among trees that occupy adjacent squares. The conflagration continues until there are no more neighbors to jump to. Then, the process starts all over again. In the team's model, the 'forest' is the plane of a fault cutting through Earth's crust, divided into a 10,000-by-10,000 grid. Sprouting trees correspond to the buildup of stress along the fault; burning areas, to the part of the fault that moves during a quake."
First time accepted submitter biodata writes "The BBC is reporting that hundreds of UK commercial air flights have been delayed for most of Saturday due to an internal telephone systems problem in the National Air Traffic Control Service, and delays are likely to continue into the evening. A spokesperson said that it was a different software bug from the one which grounded flights in the summer."
dcblogs writes "IDC expects that anywhere from 25% to 30% of all the servers shipped next year will be delivered to cloud services providers. In three years, 2017, nearly 45% of all the servers leaving manufacturers will be bought by cloud providers. The shift is slowing the purchase of server sales to enterprise IT. The increased use of SaaS is a major reason for the market shift, but so is virtualization to increase server capacity. Data center consolidations are eliminating servers as well, along with the purchase of denser servers capable of handling larger loads. The increased use of cloud-based providers is roiling the server market, and is expected to help send server revenue down 3.5% this year, according to IDC."
tsu doh nimh writes "In early October, news leaked out of Russia that authorities there had arrested and charged the malware kingpin known as 'Paunch,' the alleged creator and distributor of the Blackhole exploit kit. Today, Russian police and computer security experts released additional details about this individual, revealing a much more vivid picture of the cybercrime underworld today. According to pictures of the guy published by Brian Krebs, if the Russian authorities are correct then his nickname is quite appropriate. Paunch allegedly made $50,000 a month selling his exploit kit, and worked with another guy to buy zero-day browser exploits. As of October 2013, the pair had budgeted $450,000 to purchase zero-days. From the story: 'The MVD estimates that Paunch and his gang earned more than 70 million rubles, or roughly USD $2.3 million. But this estimate is misleading because Blackhole was used as a means to perpetrate a vast array of cybercrimes. I would argue that Blackhole was perhaps the most important driving force behind an explosion of cyber fraud over the past three years. A majority of Paunchâ(TM)s customers were using the kit to grow botnets powered by Zeus and Citadel, banking Trojans that are typically used in cyberheists targeting consumers and small businesses.'"
An anonymous reader writes "There's an interesting story on CNN about the University of Pennsylvania's human trial results on curing intractable cancer by retraining the patient's own immune system. Quoting: 'Nick Wilkins was diagnosed with leukemia when he was 4 years old, and when the cancer kept bouncing back, impervious to all the different treatments the doctors tried, his father sat him down for a talk. John Wilkins explained to Nick, who was by then 14, that doctors had tried chemotherapy, radiation, even a bone marrow transplant from his sister. ... A few months later, Nick traveled from his home in Virginia to Philadelphia to become a part of the experiment. This new therapy was decidedly different from the treatments he'd received before: Instead of attacking his cancer with poisons like chemotherapy and radiation, the Philadelphia doctors taught Nick's own immune cells to become more adept at killing the cancer. Two months later, he emerged cancer-free. It's been six months since Nick, now 15, received the personalized cell therapy, and doctors still can find no trace of leukemia in his system. ... Twenty-one other young people received the same treatment at The Children's Hospital of Philadelphia, and 18 of them, like Nick, went into complete remission -- one of them has been disease-free for 20 months.'"
An anonymous reader writes "I'm looking to pick up a tablet for my father. He is in his 70s and the internet is a bit of a mystery to him, but he asked me about a way to send/receive email and watch online videos. He is not interested in getting a smartphone or changing his cheap phone plan that doesn't include data. But he is interested in getting a tablet and using the free Wi-Fi that is available in his building. Here is my question: can you recommend a tablet equivalent to those phones with the big numbers that they sell to older people? Does there exist a tablet with an interface that would be simple and easy to use for someone who has very little experience with computer GUIs?"
Hugh Pickens DOT Com writes "Lindsay Abrams reports at Salon that the Obama administration is offering wind farms 30 years of leeway to kill and harm bald and golden eagles. The new regulations, which were requested by the wind industry, will provide companies that seek a permit with legal protection, preventing them from having to pay penalties for eagle deaths (PDF). An investigation by the Associated Press earlier this year documented the illegal killing of eagles around wind farms, the Obama administration's reluctance to prosecute such cases and its willingness to help keep the scope of the eagle deaths secret. President Obama has championed the pollution-free energy, nearly doubling America's wind power in his first term as a way to tackle global warming. Scientists say wind farms in 10 states have killed at least 85 eagles since 1997, with most deaths occurring between 2008 and 2012, as the industry was greatly expanding. Most deaths — 79 — were golden eagles that struck wind turbines. However the scientists said their figure is likely to be 'substantially' underestimated, since companies report eagle deaths voluntarily and only a fraction of those included in their total were discovered during searches for dead birds by wind-energy companies. The National Audubon Society said it would challenge the decision."
An anonymous reader writes "Ekisto is an interactive network visualization of three online communities: StackOverflow, Github and Friendfeed. Ekisto tries to map our online habitats using graph algorithms and the city as a metaphor. A graph layout algorithm arranges users in 2D space based on their similarity. Cosine similarity is computed based on the users' network (Friendfeed), collaborate, watch, fork and follow relationships (Github), or based on the tags of posts contributed by users (StackOverflow). The height of each user represents the normalized value of the user's Pagerank (Github, Friendfeed) or their reputation points (StackOverflow)."