The Oldest Known Human Remains In the Americas Have Been Found In a Mexican Cave

schwit1 shares a report from Seeker: An ice-free corridor between the Americas and Asia opened up about 12, 500 years ago, allowing humans to cross over the Bering land bridge to settle what is now the United States and places beyond to the south. History books have conveyed that information for years to explain how the Americas were supposedly first settled by people, such as those from the Clovis culture. At least one part of the Americas was already occupied by humans before that time, however, says new research on the skeleton of a male youth found in Chan Hol cave near Tulum, Mexico. Dubbed the Young Man of Chan Hol, the remains date to 13, 000 years ago, according to a paper published in the journal PLOS ONE. How he arrived at the location remains a great mystery given the timing and the fact that Mexico is well over 4, 000 miles away from the Bering land crossing. For the new study, Gonzalez, Stinnesbeck, and their colleagues dated the Young Man of Chan Hol’s remains by analyzing the bones’ uranium, carbon, and oxygen isotopes, which were also found in stalagmite that had grown through the pelvic bone. The scientists believe that the resulting age of 13, 000 years could apply to at least two other skeletons found in caves around Tulum: a teenage female named Naia and a 25-30-year-old female named Eve of Naharon. Gonzalez said that the shape of the skulls suggests that Eve and the others “have more of an affinity with people from Southeast Asia.” He and his team further speculated that the individuals could have originated in Indonesia. Read more of this story at Slashdot.

Visit site:
The Oldest Known Human Remains In the Americas Have Been Found In a Mexican Cave

How the NSA Identified Satoshi Nakamoto

An anonymous reader shares a report: The ‘creator’ of Bitcoin, Satoshi Nakamoto, is the world’s most elusive billionaire. Very few people outside of the Department of Homeland Security know Satoshi’s real name. In fact, DHS will not publicly confirm that even THEY know the billionaire’s identity. Satoshi has taken great care to keep his identity secret employing the latest encryption and obfuscation methods in his communications. Despite these efforts (according to my source at the DHS) Satoshi Nakamoto gave investigators the only tool they needed to find him — his own words. Using stylometry one is able to compare texts to determine authorship of a particular work. Throughout the years Satoshi wrote thousands of posts and emails and most of which are publicly available. According to my source, the NSA was able to the use the ‘writer invariant’ method of stylometry to compare Satoshi’s ‘known’ writings with trillions of writing samples from people across the globe. By taking Satoshi’s texts and finding the 50 most common words, the NSA was able to break down his text into 5, 000 word chunks and analyse each to find the frequency of those 50 words. This would result in a unique 50-number identifier for each chunk. The NSA then placed each of these numbers into a 50-dimensional space and flatten them into a plane using principal components analysis. The result is a ‘fingerprint’ for anything written by Satoshi that could easily be compared to any other writing. The NSA then took bulk emails and texts collected from their mass surveillance efforts. First through PRISM and then through MUSCULAR, the NSA was able to place trillions of writings from more than a billion people in the same plane as Satoshi’s writings to find his true identity. The effort took less than a month and resulted in positive match. Read more of this story at Slashdot.

Visit site:
How the NSA Identified Satoshi Nakamoto

Ancient Tablet Reveals Babylonians Discovered Trigonometry

An anonymous reader quotes a report from Science Magazine: Trigonometry, the study of the lengths and angles of triangles, sends most modern high schoolers scurrying to their cellphones to look up angles, sines, and cosines. Now, a fresh look at a 3700-year-old clay tablet suggests that Babylonian mathematicians not only developed the first trig table, beating the Greeks to the punch by more than 1000 years, but that they also figured out an entirely new way to look at the subject. However, other experts on the clay tablet, known as Plimpton 322 (P322), say the new work is speculative at best. Consisting of four columns and 15 rows of numbers inscribed in cuneiform, the famous P322 tablet was discovered in the early 1900s in what is now southern Iraq by archaeologist, antiquities dealer, and diplomat Edgar Banks, the inspiration for the fictional character Indiana Jones. Now stored at Columbia University, the tablet first garnered attention in the 1940s, when historians recognized that its cuneiform inscriptions contain a series of numbers echoing the Pythagorean theorem, which explains the relationship of the lengths of the sides of a right triangle. (The theorem: The square of the hypotenuse equals the sum of the square of the other two sides.) But why ancient scribes generated and sorted these numbers in the first place has been debated for decades. Mathematician Daniel Mansfield of the University of New South Wales (UNSW) realized that the information he needed was in missing pieces of P322 that had been reconstructed by other researchers. He and UNSW mathematician Norman Wildberger concluded that the Babylonians expressed trigonometry in terms of exact ratios of the lengths of the sides of right triangles, rather than by angles, using their base 60 form of mathematics, they report today in Historia Mathematica. Read more of this story at Slashdot.

Excerpt from:
Ancient Tablet Reveals Babylonians Discovered Trigonometry

Wisconsin Lawmakers Vote To Pay Foxconn $3 Billion To Get New Factory

An anonymous reader quotes a report from Ars Technica: The Wisconsin Assembly voted 59-30 on Thursday to approve a bill to give incentives worth $3 billion to Taiwan-based Foxconn so that the company would open its first U.S. plant in the state. Foxconn, best known for supplying parts of Apple’s iPhones, will open the $10 billion liquid-crystal display plant in 2020, according to Reuters. The bill still has to be approved by a joint finance committee and the state Senate. Both houses of Wisconsin’s legislature are controlled by Republicans, and the deal is supported by Wisconsin Governor Scott Walker, a Republican who negotiated the deal. The vote was largely, but not entirely, along party lines. Three Democrats joined 56 Republicans in supporting the deal. Two Republicans and 28 Democrats voted against it. Opponents said the deal wasn’t a good use of taxpayer funds. The $3 billion incentives package includes about $2.85 billion in cash payments from taxpayers and tax breaks valued at about $150 million. The state is also waiving certain environmental rules. Read more of this story at Slashdot.

Read More:
Wisconsin Lawmakers Vote To Pay Foxconn $3 Billion To Get New Factory

Bitcoin Is Forking. Again.

Merely weeks after it was announced that Bitcoin was splitting into two separate entities, the initial version of bitcoin and it’s new “bitcoin cash, ” the network is adding a third version, according to a report. From the article: On Wednesday, a group of bitcoiners scheduled yet another split for the network in November, which would create a third version of bitcoin. So, what makes this version different from the others? Right now, the bitcoin network can sometimes take a long time to process transactions due to so many people using it. This is because the “blocks” of transaction data that get added to bitcoin’s public ledger, the blockchain, are getting full. In the weeks preceding the fork, bitcoin coalesced around a solution called “segregated witness, ” which will change how data is stored in blocks to free up some space when it kicks in later in August. But the size of the blocks themselves will stay at one megabyte on the original bitcoin blockchain. Still, some bitcoiners maintained that the only way to speed bitcoin up for the foreseeable future was to increase the size of blocks themselves. So, a group of bitcoin companies and developers got together and launched a fork called bitcoin cash, which does not include segregated witness. It bumped the size of blocks up to a maximum of eight megabytes. That fork was widely anticipated to be a failure before it happened, but at the time of writing, bitcoin cash is trading above $300 USD per coin, which is comparable to cryptocurrencies like ethereum. Sounds like everyone got what they wanted, right? Oh, no. There’s a third group of bitcoin developers, companies, and users who advocate for a “best of both worlds approach.” This group includes Bitmain, the largest bitcoin infrastructure company in the world, and legendary bitcoin developer Jeff Garzik. They got together back in May and signed what is known as the “New York Agreement, ” which bound them to implement a two megabyte block size increase alongside segregated witness via a hard fork within six months of the time of signing. They call the fork Segwit2x. Now, that’s exactly what’s happening. According to an announcement posted to the Segwit2x GitHub repository, a bitcoin block between one and two megabytes will be created at block 494, 784. Read more of this story at Slashdot.

Read More:
Bitcoin Is Forking. Again.

Online Critics Decry Even More Wells Fargo Fraud Scandals

On Saturday author/blogger Cory Doctorow launched a new barrage of criticism towards Wells Fargo: It’s been a whole day since we learned about another example of systematic, widespread fraud by America’s largest bank Wells Fargo (ripping off small merchants with credit card fees), so it’s definitely time to learn about another one: scamming mortgage borrowers out of $43/month for an unrequested and pointless “home warranty service” from American Home Shield, a billion-dollar scam-factory that considers you a customer if you throw away its junk-mail instead of ticking the “no” box and sending it back. $43/month gets you pretty much nothing: people who tried to actually use their AHS insurance found it impossible to get them to actually do anything in exchange for this money. Here’s a quick Wells Fargo fraud scorecard: stealing thousand of cars with fraudulent repos; defrauding mortgage borrowers; blackballing whistelblowers; creating 2, 000, 000+ fraudulent accounts, and stealing millions with fraudulent fees and penalties. Life Pro Tip: if you don’t like banks, join a credit union. Read more of this story at Slashdot.

View article:
Online Critics Decry Even More Wells Fargo Fraud Scandals

Russian Group That Hacked DNC Used NSA Attack Code In Attack On Hotels

An anonymous reader quotes a report from Ars Technica: A Russian government-sponsored group accused of hacking the Democratic National Committee last year has likely been infecting other targets of interest with the help of a potent Windows exploit developed by, and later stolen from, the National Security Agency, researchers said Friday. Eternal Blue, as the exploit is code-named, is one of scores of advanced NSA attacks that have been released over the past year by a mysterious group calling itself the Shadow Brokers. It was published in April in the group’s most damaging release to date. Its ability to spread from computer to computer without any user action was the engine that allowed the WCry ransomware worm, which appropriated the leaked exploit, to shut down computers worldwide in May. Eternal Blue also played a role in the spread of NotPetya, a follow-on worm that caused major disruptions in June. Now, researchers at security firm FireEye say they’re moderately confident the Russian hacking group known as Fancy Bear, APT 28, and other names has also used Eternal Blue, this time in a campaign that targeted people of interest as they connected to hotel Wi-Fi networks. In July, the campaign started using Eternal Blue to spread from computer to computer inside various staff and guest networks, company researchers Lindsay Smith and Ben Read wrote in a blog post. While the researchers didn’t directly observe those attacks being used to infect guest computers connected to the network, they said a related campaign from last year used the control of hotel Wi-Fi services to obtain login credentials from guest devices. Read more of this story at Slashdot.

More:
Russian Group That Hacked DNC Used NSA Attack Code In Attack On Hotels

Intel Unveils One-Petabyte Storage Servers For Data Centers

Slashdot reader #9, 219 Guy Smiley shared this report on a new breed of high-density flash storage. The Inquirer reports: Intel has unveiled a brand new form factor for solid state disc drives (SSDs)… Intel Optane’s new “ruler” format will allow up to a petabyte of storage on a single 1U server rack… By using 3D-NAND, the ruler crams in even more data and will provide more stability with less chance of catastrophic failure with data loss. The company has promised that the Ruler will have more bandwidth, input/output operations per second and lower latency than SAS… As part of the announcement, Intel also announced a range of “hard drive replacement” SSDs — the S4500 and S4600 0 which are said to have the highest density 32-layer 3D NAND on the market, and are specifically aimed at data centres that want to move to solid state simply and if necessary, in stages. Read more of this story at Slashdot.

Read the original post:
Intel Unveils One-Petabyte Storage Servers For Data Centers

AMD Ryzen Threadripper Launched: Performance Benchmarks Vs Intel Skylake-X

Reader MojoKid writes: AMD continues its attack on the desktop CPU market versus Intel today, with the official launch of the company’s Ryzen Threadripper processors. Threadripper is AMD’s high-end, many-core desktop processor, that leverages the same Zen microarchitecture that debuted with Ryzen 7. The top-end Ryzen Threadripper 1950X is a multi-chip module featuring 16 processor cores (two discrete die), with support for 32 threads. The base frequency for the 1950X is 3.4GHz, with all-core boost clocks of up to 3.7GHz. Four of the cores will regularly boost up to 4GHz, however, and power and temperature permitting, those four cores will reach 4.2GHz when XFR kicks in. The 12-core Threadripper 1920X has very similar clocks and its boost and XFR frequencies are exactly the same. The Threadripper 1920X’s base-clock, however, is 100MHz higher than its big brother, at 3.5GHz. In a litany of benchmarks with multi-threaded workloads, Threadripper 1950X and 1920X high core-counts, in addition to strong SMT scaling, result in the best multi-threaded scores seen from any single CPU to date. Threadripper also offers massive amounts of memory bandwidth and more IO than other Intel processors. Though absolute power consumption is somewhat high, Threadrippers are significantly more efficient than AMD’s previous-generation processors. In lightly-threaded workloads, Threadripper trails Intel’s latest Skylake-X CPUs, however, which translates to lower performance in applications and games that can’t leverage all of Threadripper’s additional compute resources. Threadripper 1950X and 1920X processors are available starting today at $999 and $799, respectively. On a per-core basis, they’re less expensive than Intel Skylake-X and very competitively priced. Read more of this story at Slashdot.

View original post here:
AMD Ryzen Threadripper Launched: Performance Benchmarks Vs Intel Skylake-X

Cisco Meraki Loses Customer Data in Engineering Gaffe

Cisco has admitted to losing customer data during a configuration change its enginners applied to its Meraki cloud managed IT service. From a report: Specific data uploaded to Cisco Meraki before 11:20 am PT last Thursday was deleted after engineers created an erroneous policy in a configuration change to its US object storage service, Cisco admitted on Friday. The company did say that the issue has been fixed, and while the error will not affect network operations in most cases, it admitted the faulty policy “but will be an inconvenience as some of your data may have been lost.” Cisco hasn’t said how many of its 140, 000+ Meraki customers have been affected. The deleted data includes custom floor plans, logos, enterprise apps and voicemail greetings found on users’ dashboard, systems manager and phones. The engineering team was working over the weekend to find out whether the data can be recovered and potentially build tools so that customers can find out what data has been lost. Read more of this story at Slashdot.

Original post:
Cisco Meraki Loses Customer Data in Engineering Gaffe