Read more at: http://phys.org/news/2014-03-w...
Read more at: http://phys.org/news/2014-03-w...
How is this feasible? Hint: A public/private partnership between NASA and and a private space travel company.
The bill, which would restrict Tesla's ability to sell cars directly to consumers, moved out of the Assembly Codes Committee on Wednesday, one of several necessary steps on its way to a full vote.
Most of this legislation is driven by lobbying from traditional auto dealers working aggressively to protect their business model against an innovative but threatening incursion. Those dealers claim to have the full support of the Cuomo administration. For those keeping score, NY joins Texas and New Jersey in its efforts to keep product that is good for the environment as far away from consumers as possible.
Lidzborski said that 100 percent of email messages that Gmail users send or receive are encrypted while moving internally. “This ensures that your messages are safe not only when they move between you and Gmail's servers, but also as they move between Google's data centers—something we made a top priority after last summer’s revelations,” he said.
Joseph Hall, chief technologist at the Center for Democracy and Technology, told AFP that Google's encryption "would make it very difficult" for the NSA or others to tap into email traffic directly. "I'm reluctant to say anything is NSA-proof," Hall said. "But I think what Google is trying to do is make sure they come through the front door and not the back door."
In December, Microsoft said it would “pursue a comprehensive engineering effort to strengthen the encryption of customer data” in order to protect its customers from prying eyes and increase transparency.
In April 2013, Bennett, told attendees at its own Vision Conference, that the company was changing, and acknowledged that Symantec “lacked strategy” when it came to dealing with acquisitions. His plan was to move the company forward slowly, but consistently and make Symantec easier to do business with. That strategy, or at least the execution of it, hasn't impressed the board of directors, it seems.
Now we're asking for help to go through it: See something worth digging into? Say something, and share it with others so we know what to FOIA next.
Critics of the aerospace industry are now calling out its "outdated" accident investigation process and asking for data from the black box to be streamed in-flight to the cloud, which could be expensive, but Inmarsat's Senior VP Chris McLaughlin says that the plane could have been found by now if the communications box buried in the plane's avionics had been configured to send out more frequent reports.
"What we have at the moment would have been fine if the airlines had been mandated to provide data on all their flights. The only area where data is mandated is on the transatlantic route, which is so busy that everyone needs to know where all the other planes are," he said. "We may never know what happened to the plane because the cockpit is not mandated to be monitored in other areas, and we urge regulators to look into this."
The change is a significant one, especially given the fact that Google also has encrypted all of the links between its data centers. Those two modifications mean that Gmail messages are encrypted from the time they leave a user’s machine to the time they leave Google’s infrastructure. This makes life much more difficult for anyone–including the NSA–who is trying to snoop on those Gmail sessions.
Silver’s FiveThirtyEight published its first article about climate change on Wednesday, entitled “Disasters Cost More Than Ever — But Not Because of Climate Change.” But climate scientists are condemning the article and its author, Roger Pielke Jr., saying he ignored critical data to produce a “deeply misleading” result.
The crux of Pielke’s article is this: Extreme weather events are costing us more and more money, but that is not because climate change is making extreme weather more frequent or intense. The reason we are losing more money, rather, is because we have more money to lose. Pielke came to this conclusion by measuring rising disaster damage costs alongside the rising global Gross Domestic Product. He also cited a U.N. climate report, along with his own research, to assert that extreme weather events have not been increasing in frequency or intensity.
Researchers from Indiana University and Microsoft published a paper that describes a new set of Android vulnerabilities they call Pileup flaws, and also introduces a new scanner called SecUP that detects malicious apps already on a device lying in wait for elevated privileges.
The vulnerability occurs in the way PMS handles updates to the myriad flavors of Android in circulation today. The researchers say PMS improperly vets apps on lower versions of Android that request OS or app privileges that may not exist on the older Android version, but are granted automatically once the system is updated.
The researchers said they found a half-dozen different Pileup flaws within Android’s Package Management Service, and confirmed those vulnerabilities are present in all Android Open Source Project versions and more than 3,500 customized versions of Android developed by handset makers and carriers; more than one billion Android devices are likely impacted, they said.
Air France Flight 447 crashed into the Atlantic Ocean in 2009, killing all 228 people onboard. Although some major wreckage was removed from the sea within five days of the crash, it took another two years and €32m for the black boxes to be recovered from the ocean floor.
"There's a tombstone mentality at times. You actually have to have a very tragic event to get things done. I predict that this is one of those events," said Bob Benzon, a former US Air Force pilot and NTSB investigator. He said it would cost billions of dollars to fit out every single plane in the world with flight data real-time streaming capabilities.
Several options are available for trying musl. Compiler toolchains are available from the musl-cross project, and several new musl-based Linux distributions are already available (Sabotage and Snowflake, among others). Some well-established distributions including OpenWRT and Gentoo are in the process of adding musl-based variants, and others (Aboriginal, Alpine, Bedrock, Dragora) are adopting musl as their default libc.
If you're wondering how exactly the accused got caught, it's because