The Internet

Amazon To Remove More Content That Violates Rules From Cloud Service (reuters.com) 187

An anonymous reader quotes a report from Reuters: Amazon.com plans to take a more proactive approach to determine what types of content violate its cloud service policies, such as rules against promoting violence, and enforce its removal, according to two sources, a move likely to renew debate about how much power tech companies should have to restrict free speech. Over the coming months, Amazon will hire a small group of people in its Amazon Web Services (AWS) division to develop expertise and work with outside researchers to monitor for future threats, one of the sources familiar with the matter said. It could turn Amazon, the leading cloud service provider worldwide with 40% market share according to research firm Gartner, into one of the world's most powerful arbiters of content allowed on the internet, experts say.

AWS already prohibits its services from being used in a variety of ways, such as illegal or fraudulent activity, to incite or threaten violence or promote child sexual exploitation and abuse, according to its acceptable use policy. Amazon first requests customers remove content violating its policies or have a system to moderate content. If Amazon cannot reach an acceptable agreement with the customer, it may take down the website. Amazon aims to develop an approach toward content issues that it and other cloud providers are more frequently confronting, such as determining when misinformation on a company's website reaches a scale that requires AWS action, the source said. The new team within AWS does not plan to sift through the vast amounts of content that companies host on the cloud, but will aim to get ahead of future threats, such as emerging extremist groups whose content could make it onto the AWS cloud, the source added.

Space

Virgin Galactic Flights Grounded After New Yorker Story On Branson Spaceflight (bbc.com) 39

"The US Federal Aviation Administration has grounded Virgin Galactic flights as it investigates how Sir Richard Branson's recent space flight drifted off course during its climb skyward," reports the BBC. The New Yorker first broke the news about Branson's flight veering off course in a piece published yesterday. Virgin Galactic has strongly disputed the article. From the BBC: The rocket plane Unity which carried Sir Richard into space landed safely and Virgin Galactic says it is co-operating with the FAA. In a short statement, the FAA said it was overseeing the Virgin Galactic investigation of its "July 11 SpaceShipTwo mishap that occurred over Spaceport America, New Mexico." "Virgin Galactic may not return the SpaceShipTwo vehicle to flight until the FAA approves the final mishap investigation report or determines the issues related to the mishap do not affect public safety," it added. In its statement issued before the FAA announcement, Virgin Galactic spoke of "misleading characterizations and conclusions" in the New Yorker article and vowed to push ahead with its flight program.

Thursday saw it announce details of its next mission -- a research flight for the Italian Air Force. This was likely to be conducted at the end of September or in early October, a Virgin Galactic spokesperson told BBC News. And it now looks like the Unity's next mission is to be put on hold. [...] This is meant to take aloft three Italian nationals - Walter Villadei and Angelo Landolfi from the Italian Air Force; and Pantaleone Carlucci, an Italian national research council engineer. The three men plan to conduct 13 experiments during the flight, and in particular during those few minutes of weightlessness they'll experience at the top of Unity's climb.

Under the plan, the Italians are to be supervised in the back of the rocket plane by Virgin Galactic's chief astronaut instructor, Beth Moses. If and when it happens, it will be her third mission to the edge of space. After this mission, Virgin Galactic is expected to enter an extended period of maintenance and upgrades for both Unity and its carrier/launch plane, known as Eve. If the schedule is not disrupted by the latest FAA ban, these vehicles are expected to resume space missions by the middle of next year. The company said one further test outing would be conducted before full commercial service began, probably in the second half of 2022. Some 600 individuals put down deposits a number of years ago to buy seat tickets costing $200,000-250,000. Tickets sales resumed last month with prices from $450,000 per seat.

United States

New Boss of US Digital Service: Mina Hsiang (axios.com) 36

Mina Hsiang will lead the U.S. Digital Service, the Office of Management and Budget told Axios Thursday, as the Biden administration beefs up its cadre of technological special forces tasked with solving problems across the federal government. From the report: Washington is preparing to spend trillions in infrastructure money allocated by the president's top-priority legislation, and building and tuning the digital systems for those programs will demand know-how. Hsiang will be the first woman and first Asian-American to be the administrator of USDS, which was launched in 2014 in the aftermath of the troubled rollout of the HealthCare.gov website.

Hsiang is a USDS veteran from the Obama administration and worked on the HealthCare.gov rescue team. More recently, she helped the Biden administration with the launch of the Vaccines.gov website to help Americans find COVID-19 vaccines. She will fill the vacancy left by the April departure of Matt Cutts, the Google veteran who led the service from 2017.

USDS teams are deployed for crisis work that needs a quick response -- such as assisting at the southern border or helping with the Afghanistan evacuation. They also help implement new programs like those created by the American Rescue Plan. "Government services -- and helping people access those services via many channels, including digitally -- are more critical now than ever," Hsiang told Axios. "The pandemic has been a catalyst to our country's collective awareness of this truth and has mobilized people to step up and act."
Earlier this week, the Biden administration announced a new program, the U.S. Digital Corps, aimed at bringing software engineers, data scientists and others into federal agencies for two-year fellowships.
Security

Gift Card Gang Extracts Cash From 100K Inboxes Daily (krebsonsecurity.com) 10

Cybercrime and computer security reporter Brian Krebs tells the story of a cybercrime group that compromises up to 100,000 email inboxes per day, and apparently does little else with this access except siphon gift card and customer loyalty program data that can be resold online. From the report: The data in this story come from a trusted source in the security industry who has visibility into a network of hacked machines that fraudsters in just about every corner of the Internet are using to anonymize their malicious Web traffic. For the past three years, the source -- we'll call him "Bill" to preserve his requested anonymity -- has been watching one group of threat actors that is mass-testing millions of usernames and passwords against the world's major email providers each day. Bill said he's not sure where the passwords are coming from, but he assumes they are tied to various databases for compromised websites that get posted to password cracking and hacking forums on a regular basis. Bill said this criminal group averages between five and ten million email authentication attempts daily, and comes away with anywhere from 50,000 to 100,000 of working inbox credentials.

In about half the cases the credentials are being checked via "IMAP," which is an email standard used by email software clients like Mozilla's Thunderbird and Microsoft Outlook. With his visibility into the proxy network, Bill can see whether or not an authentication attempt succeeds based on the network response from the email provider (e.g. mail server responds "OK" = successful access). You might think that whoever is behind such a sprawling crime machine would use their access to blast out spam, or conduct targeted phishing attacks against each victim's contacts. But based on interactions that Bill has had with several large email providers so far, this crime gang merely uses custom, automated scripts that periodically log in and search each inbox for digital items of value that can easily be resold. And they seem particularly focused on stealing gift card data.

"Sometimes they'll log in as much as two to three times a week for months at a time," Bill said. "These guys are looking for low-hanging fruit -- basically cash in your inbox. Whether it's related to hotel or airline rewards or just Amazon gift cards, after they successfully log in to the account their scripts start pilfering inboxes looking for things that could be of value." According to Bill, the fraudsters aren't downloading all of their victims' emails: That would quickly add up to a monstrous amount of data. Rather, they're using automated systems to log in to each inbox and search for a variety of domains and other terms related to companies that maintain loyalty and points programs, and/or issue gift cards and handle their fulfillment. Why go after hotel or airline rewards? Because these accounts can all be cleaned out and deposited onto a gift card number that can be resold quickly online for 80 percent of its value.

Security

Seemingly Normal Lightning Cable Will Leak Everything You Type (vice.com) 51

An anonymous reader quotes a report from Motherboard: It looks like a Lightning cable, it works like a Lightning cable, and I can use it to connect my keyboard to my Mac. But it is actually a malicious cable that can record everything I type, including passwords, and wirelessly send that data to a hacker who could be more than a mile away. This is the new version of a series of penetration testing tools made by the security researcher known as MG. MG previously demoed an earlier version of the cables for Motherboard at the DEF CON hacking conference in 2019. Shortly after that, MG said he had successfully moved the cables into mass production, and cybersecurity vendor Hak5 started selling the cables. But the more recent cables come in new physical variations, including Lightning to USB-C, and include more capabilities for hackers to play with.

"There were people who said that Type C cables were safe from this type of implant because there isn't enough space. So, clearly, I had to prove that wrong. :)," MG told Motherboard in an online chat. The OMG Cables, as they're called, work by creating a Wi-Fi hotspot itself that a hacker can connect to from their own device. From here, an interface in an ordinary web browser lets the hacker start recording keystrokes. The malicious implant itself takes up around half the length of the plastic shell, MG said. MG said that the new cables now have geofencing features, where a user can trigger or block the device's payloads based on the physical location of the cable. "It pairs well with the self-destruct feature if an OMG Cable leaves the scope of your engagement and you do not want your payloads leaking or being accidentally run against random computers," he said. "We tested this out in downtown Oakland and were able to trigger payloads at over 1 mile," he added. He said that the Type C cables allow the same sort of attacks to be carried out against smartphones and tablets. Various other improvements include being able to change keyboard mappings, the ability to forge the identity of specific USB devices, such as pretending to be a device that leverages a particular vulnerability on a system.

Transportation

GM Suspends Production At North American Plants Amid Ongoing Chip Shortages (engadget.com) 84

Starting on Monday, General Motors will temporarily halt production at all but four of its North American factories due to chip supply constraints. Engadget reports: The halt in production will affect many of the automaker's most profitable vehicles, including the Chevy Silverado and GMC Sierra. "During the downtime, we will repair and ship unfinished vehicles from many impacted plants, including Fort Wayne and Silao, to dealers to help meet the strong customer demand for our products," a spokesperson for GM told the Detroit Free Press. "Although the situation remains complex and very fluid, we remain confident in our team's ability to continue finding creative solutions to minimize the impact on our highest-demand and capacity-constrained vehicles."
Yahoo!

Yahoo Is Yahoo Once More After New Owners Complete Acquisition (theverge.com) 79

Yahoo and AOL, formerly known as Verizon Media, have officially been acquired by their new owners and renamed as simply "Yahoo." The Verge reports: Verizon announced it was selling the properties to Apollo Global Management in May in a deal said to be worth $5 billion, around half of the nearly $9 billion the telecom giant originally paid for them, and a fraction of the hundreds of billions the two companies were worth at their peaks.

Yahoo will now be run by CEO Guru Gowrappan, and will operate as a standalone company under Apollo Funds. Apollo is a private equity firm that owns assets like crafts retailer Michaels, Chuck E. Cheese restaurants, and the Venetian resort in Las Vegas. "The close of the deal heralds an exciting time of renewed opportunity for us as a standalone entity," Gowrappan said. "We anticipate that the coming months and years will bring fresh growth and innovation for Yahoo as a business and a brand, and we look forward to creating that future with our new partners."

United Kingdom

UK ISP Sky Broadband Feeds Realtime Customer Bandwidth Data To Litigious Anti-Piracy Firm (torrentfreak.com) 30

UK ISP Sky Broadband is monitoring the IP addresses of servers suspected of streaming pirated content to subscribers and supplying that data to an anti-piracy company working with the Premier League. That inside knowledge is then processed and used to create blocklists used by the country's leading ISPs, to prevent subscribers from watching pirated events. An anonymous reader shares the report from Torrent Freak: In recent weeks, an anonymous source shared a small trove of information relating to the systems used to find, positively identity, and then ultimately block pirate streams at ISPs. According to the documents, the module related to the Premier League work is codenamed 'RedBeard.' The activity appears to start during the week football matches or PPV events take place. A set of scripts at anti-piracy company Friend MTS are tasked with producing lists of IP addresses that are suspected of being connected to copyright infringement. These addresses are subsequently dumped to Amazon S3 buckets and the data is used by ISPs to block access to infringing video streams, the documents indicate. During actual event scanning, content is either manually or fingerprint matched, with IP addresses extracted from DNS information related to hostnames in media URLs, load balancers, and servers hosting Electronic Program Guides (EPG), all of which are used by unlicensed IPTV services.

The big question then is how the Premier League's anti-piracy partner discovers the initial server IP addresses that it subsequently puts forward for ISP blocking. According to documents reviewed by TF, information comes from three sources -- the anti-piracy company's regular monitoring (which identifies IP addresses and their /24 range), manually entered IP addresses (IP addresses and ports), and a third, potentially more intriguing source -- ISPs themselves. The document revealing this information is not dated but other documents in the batch reference dates in 2021. At the time of publishing date, the document indicates that ISP cooperation is currently limited to Sky Broadband only. TorrentFreak asked Friend MTS if that remains the case or whether additional ISPs are now involved. It appears that instead of monitoring customer IP addresses, Sky is compiling data on which IP addresses subscribers are pulling most data from during (and potentially before) match or event times. Sky then uploads the highest-trafficked IP addresses along with the port the traffic is streamed on to the S3 bucket mentioned above, every five minutes. It is then accessed by the anti-piracy company which, every five minutes, extracts the IP, bandwidth rate, and the port number that bandwidth is on. At the time of the document's publication, the Sky 'Top Talker' threshold for the Premier League's 'RedBeard' module was 100mbps. The IP address information provided by the ISP that exceeds this limit then appears to be cross-referenced by IP address and port number with data obtained during game week scanning at Friend MTS. It is then processed accordingly.
Torrent Freak goes on to note that the Premier League is "seeking cooperation from additional ISPs too."

"In summary, it appears that Sky subscribers aren't being directly monitored per se, but the servers they draw most bandwidth from are being noted by Sky and that data is being forwarded for anti-piracy enforcement," the report adds. "This means that Sky subscribers' piracy habits are directly providing information to support Premier League, Matchroom Boxing, and Queensbury Promotions blocking efforts."
Privacy

Apple Will Ask Before it Targets You With Its Ads in iOS 15 (theverge.com) 29

Apple will start asking for permission to enable Personalized Ads in iOS 15, the company's method of serving relevant ads in the App Store and Apple News by analyzing what you read, purchase, and search for on your device. From a report: The company used to collect that information by default, but now it plans to ask for permission. Apple required other developers to seek users' permission with the debut of App Tracking Transparency, so it seems like it's showing that it will hold itself to a similar standard. The Personalized Ads pop-up should show up when you open the App Store if you're running the most recent iOS 15 beta. In the pop-up, Apple writes that the ads will help you discover relevant apps, products, and services while protecting your privacy by using "device-generated identifiers and not linking advertising information to your Apple ID."
China

China's Alibaba To Invest $15.5 Billion For 'Common Prosperity' (reuters.com) 66

China's Alibaba Group will invest 100 billion yuan ($15.5 billion) by 2025 in support of "common prosperity," it said, becoming the latest corporate giant to pledge support for the initiative driven by President Xi Jinping. From a report: Beijing has been encouraging companies to share wealth as part of the effort to ease inequality in the world's second-largest economy. Other companies that have made similar announcements include Tencent Holdings, which also pledged 100 billion yuan, and Geely Automobile. The government-backed Zhejiang News website said Alibaba's funds will go towards areas such as subsidies for small and medium-sized enterprises and improving insurance protection for gig economy workers such as couriers and ride-hailing drivers. It will also set up a 20 billion yuan "common prosperity development fund", the newspaper said, with Alibaba confirming the report.
Apple

Apple's Upcoming AR/VR Headset To Require Connection To iPhone (macrumors.com) 60

The first AR/VR headset that Apple has been in development will need to be wirelessly tethered to an iPhone or another Apple device to unlock full functionality, reports The Information. MacRumors: It will be similar to the WiFi-only version of the Apple Watch, which requires an iPhone connection to work. The headset is meant to wirelessly communicate with another Apple device, which will handle most of the powerful computing. According to The Information, Apple recently completed work on the 5-nanometer custom chips that are set to be used in the headset, and that's where the connectivity detail comes from. Apple has completed the key system on a chip (SoC) that will power the headset, along with two additional chips. All three chips have hit the tape-out stage, so work on the physical design has wrapped up and it's now time for trial production.
Hardware

ASUS Bets on OLED for All of Its New Creator Laptops (engadget.com) 93

ASUS has just four letters to sell you on its latest creator-focused notebooks: OLED. From a report: The company is bringing OLED screens to all of its new models, a move meant to differentiate them in the increasingly crowded PC market. Compared to traditional LCD screens, OLED offers deeper blacks levels, vastly better contrast, and more responsiveness. Even today, as LCDs have evolved to be brighter and faster, OLED offers a more pronounced visual "pop." We've been seeing notebooks with OLED for years, like on the XPS 15 and ZenBook, but they've typically been positioned as a premium feature for select models. Now ASUS is trying to make its name synonymous with OLED, so much so that it's bringing it to new mid-range notebooks like the VivoBook Pro 14X and 16X. It's also touting the first 16-inch 4K OLED HDR screens on notebooks across several models: the ProArt Studiobook Pro, ProArt Studiobook and the Vivobook Pro.

Befitting its name, you can expect to see the fastest hardware on the market in the StudioBook Pro 16 OLED (starting at $2,500). It'll be powered by H-series Ryzen 5000 processors, 3rd-gen Intel Xeon chips and NVIDIA's professional-grade RTX A2000 and A5000 GPUs. And if you don't need all of that power, there's also the Studiobook 16 OLED ($2,000), which has the same Ryzen chips, Intel Core i7 CPUs and either RTX 3070 or 3060 graphics. Both notebooks will be equipped with 4K OLED HDR screens that reach up to 550 nits and cover 100 percent of DCI-P3 color gamut. They'll also sport ASUS Dial, a new rotary accessory located at the top of their trackpads, offering similar functionality to Microsoft's forgotten Surface Dial.

Businesses

WhatsApp Fined Over $260 Million for EU Privacy Violations (cnet.com) 22

WhatsApp didn't fully explain to Europeans how it uses their data as called for by EU privacy law, Ireland's Data Protection Commission said on Thursday. The regulator hit the messaging app with a fine of 225 million euros, about $267 million. From a report: Partly at issue is how WhatsApp share information with parent company Facebook, according to the commission. The decision brings an end to a GDPR inquiry the privacy regulator started in December 2018. WhatsApp said it disagrees with the decision and plans to appeal. "We have worked to ensure the information we provide is transparent and comprehensive and will continue to do so," a WhatsApp spokesperson said via email.
Security

Juniper Breach Mystery Starts To Clear With New Details on Hackers and US Role (yahoo.com) 19

An anonymous reader shares a report: An anonymous reader Days before Christmas in 2015, Juniper Networks alerted users that it had been breached. In a brief statement, the company said it had discovered "unauthorized code" in one of its network security products, allowing hackers to decipher encrypted communications and gain high-level access to customers' computer systems. Further details were scant, but Juniper made clear the implications were serious: It urged users to download a software update "with the highest priority." More than five years later, the breach of Juniper's network remains an enduring mystery in computer security, an attack on America's software supply chain that potentially exposed highly sensitive customers including telecommunications companies and U.S. military agencies to years of spying before the company issued a patch.

Those intruders haven't yet been publicly identified, and if there were any victims other than Juniper, they haven't surfaced to date. But one crucial detail about the incident has long been known -- uncovered by independent researchers days after Juniper's alert in 2015 -- and continues to raise questions about the methods U.S. intelligence agencies use to monitor foreign adversaries. The Juniper product that was targeted, a popular firewall device called NetScreen, included an algorithm written by the National Security Agency. Security researchers have suggested that the algorithm contained an intentional flaw -- otherwise known as a backdoor -- that American spies could have used to eavesdrop on the communications of Juniper's overseas customers. NSA declined to address allegations about the algorithm.

Juniper's breach remains important -- and the subject of continued questions from Congress -- because it highlights the perils of governments inserting backdoors in technology products. "As government agencies and misguided politicians continue to push for backdoors into our personal devices, policymakers and the American people need a full understanding of how backdoors will be exploited by our adversaries," Senator Ron Wyden, a Democrat from Oregon, said in a statement to Bloomberg. He demanded answers in the last year from Juniper and from the NSA about the incident, in letters signed by 10 or more members of Congress.

Businesses

Apple Concedes To Let Apps Like Netflix, Spotify, and Kindle Link To the Web To Sign Up (theverge.com) 18

While vocal app developers accused Apple last week of spinning a lawsuit settlement into an App Store change that was barely a change at all, the company appears to be making a true, if small concession today: Apple says it will let developers of "reader" apps (think Netflix, Spotify, and Amazon's Kindle app) directly link their customers to their own sign-up website, where they could potentially skirt Apple's in-app payment system (and its 30 percent cut) entirely, in those cases where they haven't already. From a report: In a press release, Apple claims that the move will close an investigation by the Japan Fair Trade Commission (JFTC), and that it'll only apply to those sorts of "reader" apps right now -- a category that was originally designed by Apple to placate companies like Netflix and Hulu by allowing them to let users simply sign into their existing account instead of signing up for a new subscription via the App Store (and having to pay Apple's fees).

The JFTC has confirmed the agreement in a press release of its own, saying that the move by Apple "would eliminate the suspected violation of the Antimonopoly Act." The commission, which has been investigating Apple since 2016, says the company has pledged to report on the status of app review transparency once a year for the next three years. According to the JFTC, Apple proposed changing its app review guidelines in response to the investigation.

Television

TV Streaming Service Locast Suspends Service After Court Ruling (theverge.com) 75

Locast has announced that it is suspending its TV streaming service starting today, following a court ruling earlier this week in a lawsuit from ABC, CBS, Fox, and NBC, which jointly sued the nonprofit service shortly after it launched. From a report: "As a non-profit, Locast was designed from the very beginning to operate in accordance with the strict letter of the law, but in response to the court's recent rulings, with which we respectfully disagree, we are hereby suspending operations, effective immediately," an email to Locast users sent out this morning reads. Locast was launched in 2019 as an internet-based alternative to over-the-air television, rebroadcasting local, free over-the-air signals over the internet to users in those areas. Unlike Aereo, a similar service that was shut down after a lawsuit ruled it was violating copyright by rebroadcasting over-the-air networks online, Locast relied on a loophole, using its status as a nonprofit to retransmit broadcasts. Further reading: Locast, a Free App Streaming Network TV, Would Love to Get Sued (2019).
Technology

India Launches Account Aggregator To Extend Financial Services To Millions (techcrunch.com) 23

On Thursday, eight Indian banks announced that they are rolling out -- or about to roll out -- a system called Account Aggregator to enable consumers to consolidate all their financial data in one place. From a report: The objective of Account Aggregator (AA) is to aggregate all financial information of an individual, said M Rajeshwar Rao, Deputy Governor of India's central bank -- Reserve Bank of India -- at a virtual event Thursday.

The new system makes it possible for banks, tax authorities, insurers, and other finance firms to aggregate data of customers -- who have provided their consent -- to get better understanding about their potential customers, make informed decisions and ensure smoother transactions. Users who provide consent -- and it only takes a few taps to do so -- will be able to share their financial information from one Account Aggregator participant to another through a centralized API-based repository. Users get to decide for how long they wish their data to be shared with a particular Account Aggregator participant.

EU

Top EU Court Plunges Dagger Into Controversial 'Zero Rating' Practice (fortune.com) 33

Europe's top court has struck what could be a mortal blow to the practice of zero rating -- where mobile operators exempt data associated with specific services, such as Spotify or Facebook, from counting towards users' overall data caps. From a report: In a Thursday ruling, the Court of Justice of the European Union ruled against the German providers Vodafone and Telekom, saying their "zero tariff" options broke the EU's net-neutrality law -- legislation designed to ensure that operators treat Internet traffic equally, without favoring certain online providers due to commercial considerations. This is not the first time the court has weighed in on the topic, but the ruling is its most definitive repudiation of the practice of zero rating.
Businesses

FTC Bans Spyware Maker SpyFone, and Orders It To Notify Hacked Victims (techcrunch.com) 9

The Federal Trade Commission has unanimously voted to ban the spyware maker SpyFone and its chief executive Scott Zuckerman from the surveillance industry, the first order of its kind, after the agency accused the company of harvesting mobile data on thousands of people and leaving it on the open internet. From a report: The agency said SpyFone "secretly harvested and shared data on people's physical movements, phone use, and online activities through a hidden device hack," allowing the spyware purchaser to "see the device's live location and view the device user's emails and video chats."

SpyFone is one of many so-called "stalkerware" apps that are marketed under the guise of parental control but are often used by spouses to spy on their partners. The spyware works by being surreptitiously installed on someone's phone, often without their permission, to steal their messages, photos, web browsing history, and real-time location data. The FTC also charged that the spyware maker exposed victims to additional security risks because the spyware runs at the "root" level of the phone, which allows the spyware to access off-limits parts of the device's operating system. A premium version of the app included a keylogger and "live screen viewing," the FTC says.

Power

Wooden Floors Laced With Silicon Generate Electricity From Footsteps (newscientist.com) 110

An anonymous reader quotes a report from New Scientist: Wooden floors infused with silicon and metal ions can generate enough electrical power from human footsteps to light LED bulbs. Researchers hope that they could provide a green energy source for homes. [...] Guido Panzarasa at ETH Zurich in Switzerland and his colleagues found that although wood sits in the middle of this spectrum and doesn't readily pass electrons, it can be altered to generate larger charges. The team infused one panel of wood with silicon, which picks up electrons on contact with an object. A second panel was infused with nanocrystals of zeolitic imidazolate framework-8 (ZIF-8), a compound containing metal ions and organic molecules, and these crystals tend to lose electrons. They called this impregnation process "functionalization."

The team found that this treatment made a device that contained both wooden panels 80 times more efficient than standard wood at transferring electrons, meaning it was powerful enough to light LED bulbs when human footsteps compressed the device and brought the two wooden panels into contact. The engineered wood was fitted with electrodes from which the charge could be directed, and the team found that a 2-centimeter-by-3.5-centimeter sample that was placed under 50 newtons of compression -- an order of magnitude less than the force of a human footstep -- was able to generate 24.3 volts. A larger sample that was around the size of an A4 piece of paper was able to produce enough energy to drive household LED lamps and small electronic devices such as calculators.
The findings have been published in the journal Matter.
Patents

New AMD Patent Proposes Teleportation To Make Quantum Computing More Efficient (tomshardware.com) 48

A team of researchers with AMD have filed a patent application that looks toward a more efficient and reliable quantum computing architecture, thanks to a conventional multi-SIMD (Single Instruction Multiple Data) approach. Tom's Hardware reports: According to the application, AMD is researching a system that aims to use quantum teleportation to increase a quantum system's reliability, while simultaneously reducing the number of qubits necessary for a given calculation. The aim is to both alleviate scaling problems and calculation errors stemming from system instability. The AMD patent, titled "Look Ahead Teleportation for Reliable Computation in Multi-SIMD Quantum Processor," aims to improve quantum stability, scalability, and performance in novel, more efficient ways. It describes a quantum architecture based on quantum processing regions: areas of the chip that hold or can hold qubits, lying in wait for their turn on the processing pipeline. AMD's approach aims to improve on existing quantum architectures by actually reducing the number of qubits needed to perform complex calculations -- via the science fiction-esque concept of quantum teleportation.

AMD's design aims to teleport qubits across regions, enabling workloads that would theoretically require in-order execution to become capable of being processed in an out-of-order philosophy. As a quick refresher, in-order execution features dependencies between one instruction and the next, meaning that a workload has to be processed sequentially, with later steps dependent on the previous step being fully processed and its result being known before the chip can move ahead with the computation. As you may imagine, there are chip resources (in this case, qubits) that sit idle until it's their time to perform the next calculation step. On the other hand, Out-of-order execution analyzes a given workload, figures out which parts of it are dependent on previous results and which are not, and executes every step of the instruction that doesn't require a previous result, thus improving performance via increased parallelism.

AMD's patent also includes a look-ahead processor embedded into the architecture, tasked to analyze the input workload, predict what steps can be tackled in parallel (and those that can't), and appropriately distribute the workload across qubits, using a quantum teleporting technique to deliver them to the required quantum processing, SIMD-based region. How this quantum teleportation occurs isn't described in the patent -- it looks like AMD is playing its cards close to its chest on this one.

Space

The Red Warning Light On Richard Branson's Space Flight (newyorker.com) 76

Nicholas Schmidle writes via the New Yorker: On July 11th, nearly a minute into the rocket trip carrying Richard Branson, the British billionaire, to space, a yellow caution light appeared on the ship's console. The craft was about twenty miles in the air above the White Sands Missile Range, in New Mexico, and climbing, traveling more than twice the speed of sound. But it was veering off course, and the light was a warning to the pilots that their flight path was too shallow and the nose of the ship was insufficiently vertical. If they didn't fix it, they risked a perilous emergency landing in the desert on their descent. [...] Virgin Galactic's space vehicle is unique among its competitors. Whereas SpaceX and Blue Origin operate traditional, vertical-launch rockets that are automated by engineers, Virgin Galactic uses a piloted, winged rocket ship. Every test flight is crewed, which makes each one a matter of life and death. The success of Virgin Galactic's program, therefore, will ultimately depend on its pilots, high-calibre but nonetheless fallible, making the right decisions and adjustments in specific moments -- like when a yellow caution light comes on.

Alerts on the console can be triggered by any number of issues. On the July 11th flight, with Branson on board, it was a trajectory problem, or what's known as the "entry glide cone." The ship uses rocket power to get into space, but glides back to Earth and lands on a runway, like the space shuttle would do. This method, mimicking water circling a drain, enables a controlled descent. But the ship must begin its descent within a specified, imaginary "cone" to have enough glide energy to reach its destination. The pilots basically weren't flying steeply enough. Not only was the ship's trajectory endangering the mission, it was also imperiling the ship's chances of staying inside its mandated airspace.

The rocket motor on Virgin Galactic's ship is programmed to burn for a minute. On July 11th, it had a few more seconds to go when a red light also appeared on the console: an entry glide-cone warning. This was a big deal. I once sat in on a meeting, in 2015, during which the pilots on the July 11th mission -- Dave Mackay, a former Virgin Atlantic pilot and veteran of the U.K.'s Royal Air Force, and Mike Masucci, a retired Air Force pilot -- and others discussed procedures for responding to an entry glide-cone warning. C. J. Sturckow, a former marine and nasa astronaut, said that a yellow light should "scare the shit out of you," because "when it turns red it's gonna be too late." Masucci was less concerned about the yellow light but said, "Red should scare the crap out of you." Based on pilot procedures, Mackay and Masucci had basically two options: implement immediate corrective action, or abort the rocket motor. According to multiple sources in the company, the safest way to respond to the warning would have been to abort. (A Virgin Galactic spokesperson disputed this contention.)

Aborting at that moment, however, would have dashed Branson's hopes of beating his rival Bezos, whose flight was scheduled for later in the month, into space. Mackay and Masucci did not abort. Whether or not their decision was motivated by programmatic pressures and the hopes of their billionaire bankroller sitting in the back remains unclear. Virgin Galactic officials told me that the firm's top priority is the safety of its crew and passengers. Branson, however, is known for his flamboyance and showmanship. [...] Fortunately for Branson and the three other crew members in the back, the pilots got the ship into space and landed safely. But data retrieved from Flightradar24 shows the vehicle flying outside its designated airspace. An F.A.A. spokesperson confirmed that Virgin Galactic "deviated from its Air Traffic Control clearance" and that an "investigation is ongoing."
Virgin Galactic described the July 11th flight as "a safe and successful test flight that adhered to our flight procedures and training protocols." The statement added, "When the vehicle encountered high altitude winds which changed the trajectory, the pilots and systems monitored the trajectory to ensure it remained within mission parameters. Our pilots responded appropriately to these changing flight conditions exactly as they have been trained and in strict accordance with our established procedures."
Science

Man Can Change His Pupil Size On Command (livescience.com) 84

An anonymous reader quotes a report from Live Science: A 23-year-old student in Germany can shrink and enlarge his pupils on demand, according to a new case report -- a feat that was previously thought to be impossible. Two tiny opposing muscles in the eye act as puppeteers of each pupil (the dark center of the eye), dilating or enlarging them in a dark environment to let in more light and constricting them in a bright environment to limit the amount of light that flows in. This process was thought to be completely automatic; when you step into a dark room, you don't have to consciously tell your pupils to change size. Pupils can also change size in response to other factors, such as increases in arousal. It was previously known that some people can change their pupil size at will, but by using indirect methods.

[N]o one thought it was possible to change pupil size by directly controlling it like a muscle -- that is, until a student of psychology at Ulm University in Germany contacted Strauch after taking one of his courses. (Strauch was previously a doctoral student at Ulm University). When he was about 15 or 16 years old, the young man -- identified in the case report by his initials, D.W. -- realized that he could change the size of his pupils. "I showed a friend that I can 'tremble' with my eyeballs, and he noticed that my pupils became small," D.W. told Strauch and his colleagues at Ulm University. But D.W. didn't notice that he had this ability until he played computer games for long periods of time. "Constricting the pupil feels like gripping, tensing something; making it larger feels like fully releasing, relaxing the eye," D.W. told the researchers.

Through a series of tests, the researchers confirmed that D.W. indeed had this ability -- and they found no indication that he was changing the size of his pupils indirectly. In one test, the researchers measured the electrical properties of the skin by applying voltage to test whether he was aroused by increased mental effort, which also might have increased his pupil size indirectly. Without using any indirect method, D.W. could dilate his pupils up to 0.09 inches (2.4 millimeters) in diameter and constrict them to 0.03 inches (0.88 mm) in diameter. What's more, even at the closest point an object can be for the eye to still see it in focus, in which the pupil is already "maximally" constricted, D.W. could voluntarily constrict his pupil even more. By doing this, D.W. improved his focus and could see objects clearly nearly two times closer to his face than he could if he wasn't controlling his pupil size. Using a type of brain scan known as functional magnetic resonance imaging (fMRI), the researchers found increased activation of certain parts of the brain involved in volition, or the ability to decide and do something out of free will. The researchers can't say for sure that D.W. was directly controlling his pupils, but from their many tests, they did not find any evidence that he was using indirect strategies.
The findings were published in the International Journal of Psychophysiology.

Slashdot Top Deals