Revealed: Facebook's internal rulebook on sex, terrorism and violence Leaked policies guiding moderators on what content to allow are likely to fuel debate about social media giant’s ethics https://www.theguardian.com/news/20...book-internal-rulebook-sex-terrorism-violence
Baidu requires real-name registration for its services China's leading search engine Baidu on Thursday required users of the company's services, including popular online forum Baidu Tieba and cloud storage service, to register their real identities before June, otherwise they may be prevented from accessing the services. http://www.ecns.cn/2017/05-12/257070.shtml Theresa May to create new internet that would be controlled and regulated by government Teresa May intends to change the internet to control what is said online http://www.independent.co.uk/life-s...ternet-conservatives-government-a7744176.html
Google Is About to Start Tracking Your Offline Behavior, Too "It’s no secret that Google already monitors its users’ online shopping activity, but now it will follow them out of their homes and keep a close eye on every interaction they make. The tech giant announced a new system to track users’ in-store credit card purchases Tuesday in a statement published on the company’s official blog." http://theantimedia.org/google-tracking-offline-behavior
You’ll never guess where Russian spies are hiding their control servers A Russian-speaking hacking group that, for years, has targeted governments around the world is experimenting with a clever new method that uses social media sites to conceal espionage malware once it infects a network of interest. According to a report published Tuesday by researchers from antivirus provider Eset, a recently discovered backdoor Trojan used comments posted to Britney Spears's official Instagram account to locate the control server that sends instructions and offloads stolen data to and from infected computers. The innovation—by a so-called advanced persistent threat group known as Turla—makes the malware harder to detect because attacker-controlled servers are never directly referenced in either the malware or in the comment it accesses... more
American military backs an entirely new kind of processor Virtually every processor you see is based on the same basic (Von Neumann) computing model: they're designed to access large chunks of sequential data and fill their caches as often as possible. This isn't the quickest way to accomplish every task, however, and the American military wants to explore an entirely different kind of chip. DARPA is spending $80 million to fund the development of the world's first graph analytic processor. The HIVE (Hierarchical Identify Verify Exploit) accesses random, 8-byte data points from the system's global memory, crunching each of those points individually. That's a much faster approach for handling large data, which frequently involves many relationships between info sets. It's also extremely scalable, so you can use as many HIVE chips as you need to accomplish your goals. The agency isn't alone in its work: Intel, Qualcomm and Northrop Grumman are involved, as are researchers at Georgia Tech and Pacific Northwest National Laboratory. It's going to take a long time before you see a HIVE chip in service -- DARPA and its allies are effectively reinventing the wheel. If the concept works as promised, though, it could quickly spot problems before they become especially dire. The military could catch the first signs of a cyberattack, while disease control experts could detect an imminent outbreak. Simply speaking, massive amounts of data shouldn't be quite so intimidating -- you could just ask a computer to connect the dots. Source Via: EETimes Source: DARPA (1), (2)
1,000-Year-Old Colored Glass Beads Discovered in West Africa https://www.livescience.com/59462-early-glassmaking-west-africa.html
https://electrek.co/2017/06/13/tesl...964c31b5ec7f0&uid=917878446&nid=244 272699400 Science, it is...
The CIA has lots of ways to hack your router Routers sit at the front gate of nearly every network, offering total access and few security measures to prevent remote attacks. If you can compromise someone’s router, you’ve got a window into everything they’re doing online. According to new documents published by WikiLeaks, the CIA has been building and maintaining a host of tools to do just that. This morning, the group published new documents describing a program called Cherry Blossom, which uses a modified version of a given router’s firmware to turn it into a surveillance tool. Once in place, Cherry Blossom lets a remote agent monitor the target’s internet traffic, scan for useful information like passwords, and even redirect the target to a desired website... more
Long, long ago, an acquaintance of mine, allegedly with friends in some Scandinavian intelligence services, told me they were hacking through most modems, back then (some 15 years ago) like a hot knife through butter.... Cisco was their man, as it were, from the start...
Spooky action at a record-breaking distance From a Chinese satellite drifting through suborbital space, a laser beamed pairs of entangled photons to two separate locations on the ground. Although 746 miles separated each member of the pair, the light particles remained mysteriously connected. The experiment, the results of which were published today in the journal Science, smashed the previous distance record for a phenomenon called entanglement. It may sound esoteric, but it could pave the way for breakthroughs, most specifically a super-secure global communications network with uncrackable quantum encryption that protects every message from prying eyes... more
Either that or Trump could eventually maybe even clone himself and claim he is God, since he'll appear in more places than one, at once... No Scotties, please, to tinker with this idea any more!!!
Triggering specific cells fixes broken brain circuit, shuts off chronic pain Chronic, aching pain after an injury or operation may be all in your head. Researchers now think they’ve figured out exactly how brain wiring goes haywire to cause persistent pain—and how to fix it. In mice with peripheral nerve damage and chronic pain from a leg surgery, a broken circuit in a pain-processing region of mammalian brains caused hyperactive pain signals that persisted for more than a month. Specifically, the peripheral nerve damage seemed to deactivate a type of interconnected brain cells, called somatostatin (SOM) interneurons, which normally dampen pain signals. Without the restraints, neurons that fire off pain signals—cortical pyramidal neurons—went wild, researchers report in Nature Neuroscience. But the circuitry could be repaired, the researchers found. Just by manually activating those pain-stifling SOM interneurons, the researchers could shut down the rodents’ chronic pain and keep the system working properly—preventing centralized, chronic pain from ever developing... more
Medication mistakes getting more Americans sick. https://www.livescience.com/59763-medication-errors.html I would imaging that this happens just about everywhere.
The Machines Are Getting Ready to Play Doctor An algorithm that spots heart arrhythmia shows how AI will revolutionize medicine—but patients must trust machines with their lives... more
Why Bad Things Happen to Clean-Energy Startups New technologies for storing power from wind and solar farms will be key to a clean-energy future. But Aquion Energy’s recent bankruptcy shows the market challenge of making that happen... more
Starting manufacture of a costly, immature product for an unready market is a formula for failure. It seems to me, governments should offer some support, e.g. by financing the research that will make the product marketable.
@Katzen: They (the US) used to, but many of the tax incentive programs have been scaled back. Also, many cities have put laws in place prohibiting tech like vertical wind mills from being used. In NYC it's against the law because, of all the stupid reasons, it might affect the pigeon population.