Businesses

Apple's Next Frontier Is Your Body 6

Posted by samzenpus
from the i-and-you dept.
Lashdots writes: Amid the unveiling of the Apple Watch, Tim Cook's wrist distracted from another new product last month: ResearchKit, an open source iOS platform designed to help researchers design apps for medical studies—and reach millions of potential research subjects through their iPhones. Alongside the company's new frontiers, like the car and the home, Cook told Jim Cramer last month that health "may be the biggest one of all." As Fast Company reports, Cook says Apple's devices could could help pinpoint diseases within decades—and position the company at the center of a "significantly underestimated" mobile-health industry.
Facebook

Nepal Earthquake: Facebook To Google, How Tech Is Helping Survivors Reach Out 20

Posted by samzenpus
from the safe-status-update dept.
An anonymous reader writes: In the aftermath of the earthquake that struck Nepal, many social media sites and mobile applications have come up with features that could help locate friends and loved ones. From the Times of India: "Social networking website Facebook, and Google's Person Finder have helped locate the whereabouts of those stranded in quake-hit areas. For instance, members of one Himmatramka family residing in Birgunj in Nepal marked themselves safe on Facebook. 'Our relatives back in India were worried about our safety. So, we marked ourselves safe to inform them,' said Nitesh Himmatramka.
Robotics

Tiny Robots Climb Walls Carrying More Than 100 Times Their Weight 12

Posted by samzenpus
from the carrying-a-heavy-load dept.
schwit1 writes: Mighty things come in small packages. The little robots in this video can haul things that weigh over 100 times more than themselves. The super-strong bots — built by mechanical engineers at Stanford — will be presented next month at the International Conference on Robotics and Automation in Seattle, Washington. The secret is in the adhesives on the robots' feet. Their design is inspired by geckos, which have climbing skills that are legendary in the animal kingdom. The adhesives are covered in minute rubber spikes that grip firmly onto the wall as the robot climbs. When pressure is applied, the spikes bend, increasing their surface area and thus their stickiness. When the robot picks its foot back up, the spikes straighten out again and detach easily.
AI

In New AI Benchmark, Computer Takes On Four Top Professional Poker Players 42

Posted by Soulskill
from the i'm-sorry-dave,-i-can't-let-you-take-that-pot dept.
HughPickens.com writes: Stephen Jordan reports at the National Monitor that four of the world's greatest poker players are going into battle against a computer program that researchers are calling Claudico in the "Brains Vs. Artificial Intelligence" competition at Rivers Casino in Pittsburgh. Claudico, the first machine program to play heads-up no-limit Texas Hold'em against top human players, will play nearly 20,000 hands with each human poker player over the next two weeks. "Poker is now a benchmark for artificial intelligence research, just as chess once was. It's a game of exceeding complexity that requires a machine to make decisions based on incomplete and often misleading information, thanks to bluffing, slow play and other decoys," says Tuomas Sandholm, developer of the program. "And to win, the machine has to out-smart its human opponents." In total, that will be 1,500 hands played per day until May 8, with just one day off to allow the real-life players to rest.

An earlier version of the software called Tartanian 7 (PDF) was successful in winning the heads-up, no-limit Texas Hold'em category against other computers in July, but Sandholm says that does not necessarily mean it will be able to defeat a human in the complex game. "I think it's a 50-50 proposition," says Sandholm. "My strategy will change more so than when playing against human players," says competitor Doug Polk, widely considered the world's best player, with total live tournament earnings of more than $3.6 million. "I think there will be less hand reading so to speak, and less mind games. In some ways I think it will be nice as I can focus on playing a more pure game, and not have to worry about if he thinks that I think, etc."
United States

Declassified Report From 2009 Questions Effectiveness of NSA Spying 31

Posted by Soulskill
from the moving-at-the-speed-of-government dept.
schwit1 writes: With debate gearing up over the coming expiration of the Patriot Act surveillance law, the Obama administration on Saturday unveiled a 6-year-old report examining the once-secret program code-named Stellarwind, which collected information on Americans' calls and emails. The report was from the inspectors general of various intelligence and law enforcement agencies.

They found that while many senior intelligence officials believe the program filled a gap by increasing access to international communications, others including FBI agents, CIA analysts and managers "had difficulty evaluating the precise contribution of the [the surveillance system] to counterterrorism efforts because it was most often viewed as one source among many available analytic and intelligence-gathering tools in these efforts."

"The report said that the secrecy surrounding the program made it less useful. Very few working-level C.I.A. analysts were told about it. ... Another part of the newly disclosed report provides an explanation for a change in F.B.I. rules during the Bush administration. Previously, F.B.I. agents had only two types of cases: "preliminary" and "full" investigations. But the Bush administration created a third, lower-level type called an "assessment." This development, it turns out, was a result of Stellarwind.
It's funny.  Laugh.

Random Generator Parodies Vapid Startup Websites 109

Posted by Soulskill
from the leveraging-your-synergies dept.
alphadogg writes: A pair of Georgia Tech computer science students have created a Random Startup Website Generator that spits out a different jargon-laden startup website every time you click on the URL. Mike Bradley and Tiffany Zhang's project "serves as a parody of startups that have websites full of vague praise and little information about their actual business, often because they have little to show in that regard."
Displays

Oculus Rift: 2015 Launch Unlikely, But Not Impossible 53

Posted by Soulskill
from the is-the-future-here-yet dept.
An anonymous reader writes: Earlier this week during Facebook's 2015 Q1 earnings call, the company seemed to suggest that a 2015 Oculus Rift release date was unlikely. At least, that's what a report about the call from Gamasutra indicated, saying, "It doesn't sound like Oculus will ship the consumer version of its Oculus Rift VR headset this year, or at least not in very large quantities." However, an equity analyst has chimed in to say that the language used during the call shouldn't be interpreted colloquially, concluding that "...there is no information here that rules out Oculus shipping in 2015."
Government

A Guide To the 5 Cybersecurity Bills Now Before Congress 14

Posted by Soulskill
from the better-know-a-bill dept.
blottsie writes: At press time, the House had passed two cybersecurity bills, one Senate bill had been passed out of committee and reported to the full chamber for a final vote, and a third House bill and a second Senate bill were awaiting review by the appropriate committee. The two House bills that passed earlier this week will be combined and sent to the Senate, but the Senate won't take up them up directly; instead, it will vote on its own two bills. It's complicated, so here's a quick breakdown of the key details.
Earth

Giant Survival Ball Will Help Explorer Survive a Year On an Iceberg 113

Posted by Soulskill
from the rolling-the-seven-seas dept.
HughPickens.com writes: Ben Yeager reports in Outside Magazine that Italian explorer Alex Bellini plans to travel to Greenland's west coast, pick an iceberg, and live on it for a year as it melts out in the Atlantic. It's a precarious idea. Bellini will be completely isolated, and his adopted dwelling is liable to roll or fall apart at any moment, thrusting him into the icy sea or crushing him under hundreds of tons of ice. His solution: an indestructible survival capsule built by an aeronautics company that specializes in tsunami-proof escape pods. "I knew since the beginning I needed to minimize the risk. An iceberg can flip over, and those events can be catastrophic." Bellini plans to use a lightweight, indestructible floating capsules, or "personal safety systems" made from aircraft-grade aluminum in what's called a continuous monocoque structure, an interlocking frame of aluminum spars that evenly distribute force, underneath a brightly painted and highly visible aluminum shell. The inner frame can be stationary or mounted on roller balls so it rotates, allowing the passengers to remain upright at all times.

Aeronautical engineer Julian Sharpe, founder of Survival Capsule, got the idea for his capsules after the 2004 Indonesian tsunami. He believes fewer people would have died had some sort of escape pod existed. Sharpe hopes the products will be universal—in schools, retirement homes, and private residences, anywhere there is severe weather. The product appeals to Bellini because it's strong enough to survive a storm at sea or getting crushed between two icebergs. Bellini will spend almost all of his time in the capsule with the hatch closed, which will pose major challenges because he'll have to stay active without venturing out onto a slippery, unstable iceberg. If it flips, he'll have no time to react. "Any step away from [the iceberg] will be in unknown territory," says Bellini. "You want to stretch your body. But then you risk your life."
Cellphones

Turning a Smartphone Display Into a Biometric Scanner 13

Posted by Soulskill
from the don't-make-the-obvious-jokes dept.
New submitter jan_jes writes: Recent mobile phones integrate fingerprint scanners to authenticate users biometrically and replace passwords, making authentication more convenient. Researchers at Yahoo Labs have created a new technology called "Bodyprint," which turns your smartphone's touchscreen display into a biometric scanner. It allows the touch sensor to scan users' body parts (PDF) such as ears, fingers, fists, and palms by pressing them against the display. Bodyprint implements the four-eye principle for locking sensitive documents — accessing the document can require the presence of two or more people involved with the project. Another application is authenticating a user to answer a call by scanning their ear pressed against the phone.
Piracy

Pirate Bay Blockade Censors CloudFlare Customers 133

Posted by timothy
from the broad-brush-swung-wildly dept.
An anonymous reader writes: The blockade of the Pirate Bay by UK ISPs is causing trouble for CloudFlare customers. Several websites have been inadvertently blocked by Sky because a Pirate Bay proxy is hosted behind the same IP-addresses. In a response, CloudFlare threatened to disconnect the proxy site from its network. Like any form of censorship web blockades can sometime lead to overblocking, targeting perfectly legitimate websites by mistake. This is also happening in the UK where Sky's blocking technology is inadvertently blocking sites that have nothing to do with piracy.
Security

Microsoft Opens Vulnerability Bounty Program For Spartan Browser 52

Posted by timothy
from the why-not-leave-the-code-to-survive-infancy-alone? dept.
jones_supa writes: As it did in the past when it tried to make Internet Explorer more secure, Microsoft has launched a new bug bounty program for Spartan browser, the default application of Windows 10 for surfing the information highway. A typical remote code execution flaw can bring between $1,500 and $15,000, and for the top payment you also need to provide a functioning exploit. The company says that it could pay even more than that, if you convince the jury on the entry quality and complexity. Sandbox escape vulnerabilities with Enhanced Protected Mode enabled, important or higher severity vulnerabilities in Spartan or its engine, and ASLR info disclosure vulnerabilities are also eligible. If you want to accept the challenge, Microsoft provides more information on how to participate.
Windows

Buggy Win 95 Code Almost Wrecked Stuxnet Campaign 83

Posted by timothy
from the when-governments-attack dept.
mask.of.sanity writes: Super-worm Stuxnet could have blown its cover and failed its sabotage mission due to a bug that allowed it to spread to ancient Windows boxes, malware analysts say. Stuxnet was on the brink of failure thanks to buggy code allowing it to spread to PCs running older and unsupported versions of Windows, and probably causing them to crash as a result. Those blue screens of death would have raised suspicions at the Natanz nuclear lab.
Cellphones

Patents Show Google Fi Was Envisioned Before the iPhone Was Released 31

Posted by timothy
from the I-could-show-you-my-notes-from-7th-grade dept.
smaxp writes: Contrary to reports, Google didn't become a mobile carrier with the introduction of Google Fi. Google Fi was launched to prove that a network-of-networks serves smartphone users better than a single mobile carrier's network. Patents related to Google Fi, filed in early 2007, explain Google's vision – smartphones negotiate for and connect to the fastest network available. The patent and Google Fi share a common notion that the smartphone should connect to the fastest network available, not a single carrier's network that may not provide the best performance. It breaks the exclusive relationship between a smartphone and a single carrier. Meanwhile, a story at BostInno points out that Google's not the only one with a network-hopping hybrid approach to phone calls.
China

Github DDoS Attack As Seen By Google 50

Posted by Soulskill
from the i-can-see-my-house-from-here dept.
New submitter opensec writes: Last month GitHub was hit by a massive DDoS attack originating from China. On this occasion the public discovered that the NSA was not the only one with a QUANTUM-like capability. China has its own "Great Cannon" that can inject malicious JavaScript inside HTTP traffic. That weapon was used in the GitHub attack. People using Baidu services were unwitting participants in the denial of service, their bandwidth used to flood the website. But such a massive subversion of the Internet could not evade Google's watchful eye. Niels Provos, engineer at Google, tells us how it happened. Showing that such attacks cannot be made covertly, Provos hopes that the public shaming will act as a deterrent.
Apple

Apple Watch Launches 165

Posted by Soulskill
from the it's-all-in-the-wrist dept.
An anonymous reader writes: The Apple Watch's release date has arrived: retailers around the world have quietly begun putting them on their shelves, and customers are beginning to receive their shipments. Reviews have been out for a while, including thoughtful ones from John Gruber and Nilay Patel. Apple has published a full user guide for the software, and iFixit has put up a full teardown to take a look at the hardware. They give it a repairability score of 5 out of 10, saying that the screen and battery are easily replaced, but not much else is. Though Apple designated the watch "water-resistant" rather than "waterproof", early tests show it's able to withstand a shower and a swim in the pool without failing. Ars has an article about the difficulty of making games for the Apple Watch, and Wired has a piece detailing its creation.
Government

German Intelligence Helped NSA Spy On EU Politicians and Companies 74

Posted by Soulskill
from the der-rubberschtampen dept.
An anonymous reader writes: We've known for some time already that intelligence agencies operate beyond rules, laws, and regulations. Now, we learn that the NSA and the German intelligence service, BND, lied and withheld information about misuse from the German Chancellor's Office.

"The BND realized as early as 2008 that some of the selectors were not permitted according to its internal rules, or covered by a 2002 US-Germany anti-terrorism "Memorandum of Agreement" on intelligence cooperation. And yet it did nothing to check the NSA's requests systematically. It was only in the summer of 2013, after Edward Snowden's revelations of massive NSA and GCHQ surveillance, that the BND finally started an inquiry into all the selectors that had been processed. According to Der Spiegel, investigators found that the BND had provided information on around 2,000 selectors that were clearly against European and German interests. Not only were European businesses such as the giant aerospace and defense company EADS, best-known as the manufacturer of the Airbus planes, targeted, so were European politicians—including German ones.

However, the BND did not inform the German Chancellor's office, which only found out about the misuse of the selector request system in March 2015. Instead, the BND simply asked the NSA to make requests that were fully covered by the anti-terrorism agreement between the two countries. According to Die Zeit, this was because the BND was worried that the NSA might curtail the flow of its own intelligence data to the German secret services if the selector scheme became embroiled in controversy.
Cloud

Amazon's Profits Are Floating On a Cloud (Computing) 76

Posted by Soulskill
from the they're-hoping-the-weather-holds dept.
HughPickens.com writes: The NY Times reports that Amazon unveiled the financial performance of its powerful growth engine for the first time on Thursday, and the numbers looked good, energized primarily by renting processing power to start-ups and, increasingly, established businesses. Amazon said in its first-quarter earnings report that its cloud division, Amazon Web Services, had revenue of $1.57 billion during the first three months of the year. Even though the company often reports losses, the cloud business is generating substantial profits. The company said its operating income from AWS was $265 million.

Amazon helped popularize the field starting in 2006 and largely had commercial cloud computing to itself for years, an enormous advantage in an industry where rivals usually watch one another closely. At the moment, there is no contest: Amazon is dominant and might even be extending its lead. Microsoft ranks a distant No. 2 in cloud computing but hopes to pick up the slack with infrastructure-related services it sells through Azure, the name of its cloud service. Amazon executives have said they expect AWS to eventually rival the company's other businesses in size. The cloud business has been growing at about 40 percent a year, more than twice the rate of the overall company and many Wall Street analysts have been hoping for a spinoff.

As for Google, the cloud was barely mentioned in Google's earnings call. Nor did the search giant offer any cloud numbers, making it impossible to gauge how well it is doing. But the enthusiasm of Eric Schmidt, Google's executive chairman, was manifest when he spoke at an event for cloud software developers this week. "The entire world will be defined by smartphones, Android or Apple, a very fast network, and cloud computing," said Schmidt. "The space is very large, very vast, and no one is covering all of it."
Security

Pentagon Discloses Network Breach By Russian Hackers 62

Posted by Soulskill
from the digital-diplomatic-incident dept.
An anonymous reader writes: The Pentagon has disclosed that Russian hackers were able to breach one of its secure networks earlier this year, and referred to the attack as a "worrisome" incident. "Earlier this year, the sensors that guard DOD's unclassified networks detected Russian hackers accessing one of our networks," said defense secretary Ash Carter yesterday during a speech at Stanford University. Carter warned Russia that the U.S. Department of Defense would retaliate with cyber campaigns should it see fit. "Adversaries should know that our preference for deterrence and our defensive posture don't diminish our willingness to use cyber options if necessary," said Carter. He added in a prepared statement that the Russian hackers had been able to gain access to an "unclassified network" but had been "quickly identified" by a team of cyberattack experts who managed to block the hackers "within 24 hours." The cybersecurity response team had quickly analyzed the hack patterns and code and identified the intruders as Russian, before "kicking them off the network."
Medicine

Surgeon Swears Human Head Transplant Isn't a 'Metal Gear Solid' Publicity Stunt 113

Posted by Soulskill
from the life-imitates-viral-marketing dept.
Jason Koebler writes: Dr. Sergio Canavero wants to become the first surgeon to perform a human head transplant. But some discerning gamers noticed that a doctor shown in the trailer for Metal Gear Solid V looks almost exactly like Canavero, leading some to speculate that it's all a viral marketing campaign for the upcoming game. Canavero, however, filed a sworn affidavit with Italian police in which he said Konami illegally stole his likeness, and that he has nothing to do with the game.