Submission + - A Neural Network Simulation of a 1mm Nematode is Taught to Balance a Pole

ClockEndGooner writes: Researchers at the Technische Universität Wein have created a simulation of a simple worm's neural network, and have been able to replicate its natural behavior to completely mimic the worm's natural reflexive behavior. According to the article, using a simple neural network of 300 neurons, the simulation of "the worm can find its way, eat bacteria and react to certain external stimuli. It can, for example, react to a touch on its body. A reflexive response is triggered and the worm squirms away. This behaviour is determined by the worm's nerve cells and the strength of the connections between them. When this simple reflex network is recreated on a computer, the simulated worm reacts in exactly the same way to a virtual stimulation – not because anybody programmed it to do so, but because this kind of behaviour is hard-wired in its neural network." Using the same neural network without adding any additional nerve cells, Mathias Lechner, Radu Grosu, and Ramin Hasani were able to have the nematode simulation learn to balance a pole "just by tuning the strength of the synaptic connections. This basic idea (tuning the connections between nerve cells) is also the characteristic feature of any natural learning process."

Submission + - RPCS3, PS3 emulation on PC is real (kingofgng.com)

KingofGnG writes: Five years ago, the PlayStation 3 emulation promised by RPCS3 seemed like a dream still far away from becoming a reality. Indeed the aforementioned open source project had almost nothing interesting to say at least until the past year, but when the stars aligned and the reverse engineering-loving developers started to get serious everything changed. Nowadays RPCS3 can show that emulation of the powerful seventh generation Sony console is something real, a good number of games representing PS3’s rich software library is playable with no particular issues even though there is still a lot of work to do.

Submission + - 32 Senators Want To Know If US Regulators Halted Equifax Probe (engadget.com)

An anonymous reader writes: arlier this week, a Reuters report suggested that the Consumer Financial Protection Bureau (CFPB) had halted its investigation into last year's massive Equifax data breach. Reuters sources said that even basic steps expected in such a probe hadn't been taken and efforts had stalled since Mick Mulvaney took over as head of the CFPB late last year. Now, 31 Democratic senators and one Independent have written a letter to Mulvaney asking if that is indeed the case and if so, why.

In their letter, the senators expressed their concern over these reports and reiterated the duty the CFPB has to not only investigate the breach but to bring action against Equifax if deemed necessary. "Consumer reporting agencies and the data they collect play a central role in consumers' access to credit and the fair and competitive pricing of that credit," they wrote. "Therefore, the CFPB has a duty to supervise consumer reporting agencies, investigate how this breach has or will harm consumers and bring enforcement actions as necessary."

Submission + - German Navy experiences "LCS syndrome" in spades as new frigate fails sea trials (arstechnica.com)

schwit1 writes:

The Baden-Wurttemberg now bears the undesirable distinction of being the first ship the German Navy has ever refused to accept after delivery. In fact, the future of the whole class of German frigates is now in doubt because of the huge number of problems experienced with the first ship during sea trials. So the Baden-Wurttemberg won’t be shooting its guns at anything for the foreseeable future (and neither will the Zumwalt for the moment, since the US Navy cancelled orders for their $800,000-per-shot projectiles).

System integration issues are a major chunk of the Baden-Wurrenberg’s problems. About 90 percent of the ship’s systems are so new that they’ve never been deployed on a warship in fact—they’ve never been tested together as part of what the US Navy would call “a system of systems.” And all of that new hardware and software have not played well together—particularly with the ship’s command and control computer system, the Atlas Naval Combat System (ANCS).

Perhaps most inexcusable, the ship doesn't even float right it has a permanent list to starboard.

Submission + - Tesla burns through $2 billion in 2017 (theverge.com)

Eloking writes: Tesla reported record revenue for 2017, floated by customer deposits of the recently announced Semi truck and Roadster sports car. Despite its optimistic sales numbers, Model 3 production issues and cash flow problems haunt the company, but Tesla insists its on track to meet its production goals of 5,000 cars a week by mid-2018.

Tesla reported $3.3 billion in revenue, which was expected, but also posted a $771 million quarterly loss — its largest quarterly loss ever. The company reported a negative free cash flow of $276.7 million. And it reported a net loss of $2.24 billion in 2017, a significant increase over the $773 million net loss it reported in 2016.

Submission + - Congressman powers house DIY with Tesla batteries (ajc.com)

SonicSpike writes: “Constitutional Conservative with an MIT Pedigree” congressman Thomas Massie (R-Ky.) posted a YouTube video over the weekend illustrating how he recently experimented with powering his entire home off of a used Tesla car battery.

Massie converted a salvaged Tesla Model S battery to run his already off-the-grid home in Kentucky, using the proprietary Tesla battery management system to provide power for him and his family.

We thought this was an unusual accomplishment for anyone, particularly a Republican member of Congress with well-known libertarian leanings.

Submission + - New MAGNETO & ODINI Techniques Steal Data From Faraday Cage-Protected Equipm (bleepingcomputer.com)

An anonymous reader writes: Research published earlier today by a group of scientists from Israel with a prodigious history of extravagant and extraordinary hacks reveal that an attacker can steal data from air-gapped devices protected by Faraday cages. The two techniques are named MAGNETO and ODINI and are both the work of scientists from the Cyber Security Research Center at the Ben-Gurion University of the Negev in Israel. Both techniques function on the same premise —of using malware installed on air-gapped devices inside the Faraday cage to regulate the workloads on CPU cores in order to control the magnetic fields emanating from the computer. Binary data from the computer is encoded in the magnetic field frequencies, which are strong enough to penetrate Faraday cages. The technique is different and more powerful from previous data exfiltration systems relying on radio waves (electromagnetic waves). But both techniques hinge on an attacker's ability to infect air-gapped devices with malware in the first place, malware that would be responsible for generating the magnetic waves used for exfiltration. Both attacks can be thwarted in their early phases by proper network hygiene and good security practices.

Slashdot Top Deals