Canada Upholds Net Neutrality Rules In Wireless TV Case 6

Posted by timothy
from the as-long-as-we-can-spy-on-you-too dept.
An anonymous reader writes Canada's telecom regulator has issued a major new decision with implications for net neutrality, ruling that Bell and Videotron violated the Telecommunications Act by granting their own wireless television services an undue preference by exempting them from data charges. Michael Geist examines the decision, noting that the Commission grounded the decision in net neutrality concerns, stating the Bell and Videotron services "may end up inhibiting the introduction and growth of other mobile TV services accessed over the Internet, which reduces innovation and consumer choice."
Data Storage

Proposed Disk Array With 99.999% Availablity For 4 Years, Sans Maintenance 70

Posted by timothy
from the with-enough-disks-all-rooms-are-full dept. writes with this paper from four researchers (Jehan-François Pâris, Ahmed Amer, Darrell D. E. Long, and Thomas Schwarz, S. J.), with an interesting approach to long-term, fault-tolerant storage: As the prices of magnetic storage continue to decrease, the cost of replacing failed disks becomes increasingly dominated by the cost of the service call itself. We propose to eliminate these calls by building disk arrays that contain enough spare disks to operate without any human intervention during their whole lifetime. To evaluate the feasibility of this approach, we have simulated the behaviour of two-dimensional disk arrays with N parity disks and N(N – 1)/2 data disks under realistic failure and repair assumptions. Our conclusion is that having N(N + 1)/2 spare disks is more than enough to achieve a 99.999 percent probability of not losing data over four years. We observe that the same objectives cannot be reached with RAID level 6 organizations and would require RAID stripes that could tolerate triple disk failures.

The Quantum Experiment That Simulates a Time Machine 48

Posted by timothy
from the already-been-done dept.
KentuckyFC writes One of the extraordinary features of quantum mechanics is that one quantum system can simulate the behaviour of another that might otherwise be difficult to create. That's exactly what a group of physicists in Australia have done in creating a quantum system that simulates a quantum time machine. Back in the early 90s, physicists showed that a quantum particle could enter a region of spacetime that loops back on itself, known as a closed timelike curve, without creating grandfather-type paradoxes in which time travellers kill their grandfathers thereby ensuring they could never have existed to travel back in time in the first place. Nobody has ever built a quantum closed time-like curve but now they don't have to. The Australian team have simulated its behaviour by allowing two entangled photons to interfere with each other in a way that recreates the behaviour of a single photon interacting with an older version of itself. The results are in perfect agreement with predictions from the 1990s--there are no grandfather-type paradoxes. Interestingly, the results are entirely compatible with relativity, suggesting that this type of experiment might be an interesting way of reconciling it with quantum mechanics.

Georgia Institute of Technology Researchers Bridge the Airgap 46

Posted by timothy
from the always-type-in-gibberish dept.
An anonymous reader writes Hacked has a piece about Georgia Institute of Technology researchers keylogging from a distance using the electromagnetic radiation of CPUs. They can reportedly do this from up to 6 meters away. In this video, using two Ubuntu laptops, they demonstrate that keystrokes are easily interpreted with the software they have developed. In their white paper they talk about the need for more research in this area so that hardware and software manufacturers will be able to develop more secure devices. For now, Farraday cages don't seem as crazy as they used to, or do they?

Why ATM Bombs May Be Coming Soon To the United States 164

Posted by samzenpus
from the almost-worth-the-troub;e dept. writes Nick Summers has an interesting article at Bloomberg about the epidemic of 90 ATM bombings that has hit Britain since 2013. ATM machines are vulnerable because the strongbox inside an ATM has two essential holes: a small slot in front that spits out bills to customers and a big door in back through which employees load reams of cash in large cassettes. "Criminals have learned to see this simple enclosure as a physics problem," writes Summers. "Gas is pumped in, and when it's detonated, the weakest part—the large hinged door—is forced open. After an ATM blast, thieves force their way into the bank itself, where the now gaping rear of the cash machine is either exposed in the lobby or inside a trivially secured room. Set off with skill, the shock wave leaves the money neatly stacked, sometimes with a whiff of the distinctive acetylene odor of garlic." The rise in gas attacks has created a market opportunity for the companies that construct ATM components. Several manufacturers now make various anti-gas-attack modules: Some absorb shock waves, some detect gas and render it harmless, and some emit sound, fog, or dye to discourage thieves in the act.

As far as anyone knows, there has never been a gas attack on an American ATM. The leading theory points to the country's primitive ATM cards. Along with Mongolia, Papua New Guinea, and not many other countries, the U.S. doesn't require its plastic to contain an encryption chip, so stealing cards remains an effective, nonviolent way to get at the cash in an ATM. Encryption chip requirements are coming to the U.S. later this year, though. And given the gas raid's many advantages, it may be only a matter of time until the back of an American ATM comes rocketing off.

The Big Bang By Balloon 21

Posted by samzenpus
from the in-the-beginning dept.
StartsWithABang writes If you want to map the entire sky — whether you're looking in the visible, ultraviolet, infrared or microwave, your best bet is to go to space. Only high above the Earth's atmosphere can you map out the entire sky, with your vision unobscured by anything terrestrial. But that costs millions of dollars for the launch alone! What if you've got new technology you want to test? What if you still want to defeat most of the atmosphere? (Which you need to do, for most wavelengths of light.) And what if you want to make observations on large angular scales, something by-and-large impossible from the ground in microwave wavelengths? You launch a balloon! The Spider telescope has just completed its data-taking operations, and is poised to take the next step — beyond Planck and BICEP2 — in understanding the polarization of the cosmic microwave background.

Drone Maker Enforces No-Fly Zone Over DC, Hijacking Malware Demonstrated 110

Posted by samzenpus
from the fly-that-anywhere dept.
An anonymous reader writes A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. Rahul Sasi, a security engineer at Citrix R&D, created MalDrone, the first backdoor malware for the AR drone ARM Linux system to target Parrot AR Drones, but says it can be modified to target others as well. The malware can be silently installed on a drone, and be used to control the drone remotely and to conduct remote surveillance. Meanwhile, the Chinese company that created the drone that crashed on the White House grounds has announced a software update for its "Phantom" series that will prohibit flight within 25 kilometers of the capital.

Brain Implants Get Brainier 37

Posted by samzenpus
from the thinking-better dept.
the_newsbeagle writes "Did my head just beep?" wonders a woman who just received a brain implant to treat her intractable epilepsy. We're entering a cyborg age of medicine, with implanted stimulators that send pulses of electricity into the brain or nervous system to prevent seizures or block pain. The first generation of devices sent out pulses in a constant and invariable rhythm, but device-makers are now inventing smart stimulators that monitor the body for signs of trouble and fire when necessary.

One In Five Developers Now Works On IoT Projects 211

Posted by samzenpus
from the that's-a-whole-lot-of-things dept.
dcblogs writes Evans Data Corp., which provides research and intelligence for the software development industry, said that of the estimated 19 million developers worldwide, 19% are now doing IoT-related work. A year ago, the first year IoT-specific data was collected, that figure was 17%. But when developers were asked whether they plan to work in IoT development over the next year, 44% of the respondents said they are planning to do so, said Michael Rasalan, director of research at Evans.

Spider Spins Electrically Charged Silk 37

Posted by samzenpus
from the will-you-walk-into-my-electric-parlour? dept.
sciencehabit writes In their quest to make ultrastrong yet ultrasmall fibers, the polymer industry may soon take a lesson from Uloborus spiders. Uloborids are cribellate spiders, meaning that instead of spinning wet, sticky webs to catch their prey, they produce a fluffy, charged, wool-like silk. A paper published online today in Biology Letters details the process for the first time. It all starts with the silk-producing cribellar gland. In contrast with other spiders, whose silk comes out of the gland intact, scientists were surprised to discover that uloborids' silk is in a liquid state when it surfaces. As the spider yanks the silk from the duct, it solidifies into nanoscale filaments. This "violent hackling" has the effect of stretching and freezing the fibers into shape. It may even be responsible for increasing their strength, because filaments on the nanoscale become stronger as they are stretched. In order to endow the fibers with an electrostatic charge, the spider pulls them over a comblike plate located on its hind legs. The technique is not unlike the so-called hackling of flax stems over a metal brush in order to soften and prepare them for thread-spinning, but in the spider's case it also gives them a charge. The electrostatic fibers are thought to attract prey to the web in the same way a towel pulled from the dryer is able to attract stray socks.

Amazon Takes On Microsoft, Google With WorkMail For Businesses 49

Posted by samzenpus
from the new-mail dept.
alphadogg writes Amazon Web Services today launched a new product to its expansive service catalog in the cloud: WorkMail is a hosted email platform for enterprises that could wind up as a replacement for Microsoft and Google messaging systems. The service is expected to cost $4 per user per month for a 50GB email inbox. It's integrated with many of AWS's other cloud services too, including its Zocalo file synchronization and sharing platform. The combination will allow IT shops to set up a hosted email platform and link it to a file sharing system.

Snowden Documents: CSE Tracks Millions of Downloads Daily 91

Posted by samzenpus
from the keeping-an-eye-on-things dept.
Advocatus Diaboli writes Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed 'Levitation' are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.

Scientists Discover How To Track Natural Errors In DNA Replication 19

Posted by samzenpus
from the points-of-failure dept.
BarbaraHudson writes Researchers figured out how to label and keep track of new pieces of DNA, and learned to follow the enzyme responsible for copying those pieces. Their research focused on enzymes called polymerases. These enzymes create small regions in DNA that act as scaffolds for the copied DNA. Scientists assumed that the body deletes the scaffolds containing errors, or mutations, and the standard computer models supported this theory. However, the actual research showed that about 1.5 percent of those erroneous scaffolds are left over, trapped within the DNA. After running models, scientists now believe they can track how DNA replicates and find the most likely areas where these scaffolds with errors turn up. The erroneous scaffolds usually appear close to genetic switches, those regions that turn on when genes activate. The mutations damage the switch, which results in genetic disease, as well as increasing the likelihood of cancer.

Adobe's Latest Zero-Day Exploit Repurposed, Targeting Adult Websites 176

Posted by samzenpus
from the watch-what-you-watch dept.
MojoKid writes Adobe issued a patch for bug CVE-2015-0311, one that exposes a user's browser to become vulnerable to code injection, and the now infamous Angler EK (Exploit Kit). To fall victim to this kind of attack, all someone needs to do is visit a website with compromised Flash files, at which point the attacker can inject code and utilize Angler EK, which has proven to be an extremely popular tool over the past year. This particular version of Angler EK is different, however. For starters, it makes use of obfuscated JavaScript and attempts to detect virtual machines and anti-virus products. Its target audience is also rather specific: porn watchers. According to FireEye, which has researched the CVE-2015-0311 vulnerability extensively, this exploit has reached people via banner ads on popular adult websites. It was also noted that even a top 1000 website was affected, so it's not as though victims are surfing to the murkiest depths of the web to come in contact with it.

Scientists 3D-Printing Cartilage For Medical Implants 23

Posted by samzenpus
from the body-printing dept.
Molly McHugh writes Scientists and physicians at The Feinstein Institute for Medical Research have discovered a way to use MakerBot's 3D-printing technologies to create cartilage and repair tissue damage in the trachea. From the article: "Researchers found that it’s possible to use the MakerBot Replicator 2X Experimental 3D Printer to print what’s called 'scaffolding,' made up of PLA, a bioplastic commonly used in in surgical implant devices. The team customized the printer so that living cells could be printed onto the scaffolding. The 3D-printed mixture of healthy cells found in cartilage, and collagen, eventually grew into the shape of a trachea that could be implanted into a patient."