DOE, commercial partners start world’s largest carbon capture project

Earlier this week, the US Department of Energy announced that work has started on what when finished will be the world’s largest carbon capture facility. Located in Thompsons, Texas, the project will capture a portion of the emissions from the coal-fired W.A. Parish Generating Station. The CO 2 will then be compressed and piped to the West Ranch oil field, where it will be injected under ground. This will help liberate oil that’s otherwise difficult to extract, but has the added benefit that the carbon dioxide typically stays underground, sequestered. The project was originally planned as a small pilot that would only extract CO 2 from the equivalent of 60 megawatts of the plant’s 3,500MW of generating capacity. When it was realized that the amount of CO 2 from 60MW of would be too little CO 2 to supply the oil field’s needs, the project scope was expanded to 240MW. At that scale, the facility would become the largest of its type in the world. The exhaust gas will have its sulfates removed before being bubbled through a solution of amines, which will bind the CO 2 . Once separated from the rest of the gasses, the carbon dioxide will be released by heating the amine solution, which can be recycled. The CO 2 is then sent under pressure via a pipeline. Read 1 remaining paragraphs | Comments

See more here:
DOE, commercial partners start world’s largest carbon capture project

Why Google took years to address a battery-draining “bug” in Chrome

Aurich Lawson A recent Forbes report  says that Chrome on Windows uses up more battery than competing browsers, thanks to a high system timer setting. Unlike Linux or Mac OS X, Windows uses a timer to schedule tasks. At idle, the timer on Windows is set to about 15 ms, so if it has no work to do, it will go to sleep and only wake up every 15 ms to check if it needs to do something. Applications can change this timer, and other browsers like Firefox and Internet Explorer don’t mess with it until they need to do something processor intensive, like playing a video. After the video is done, the timer is set to return to 15 ms so that the computer can idle again. Chrome, though, boosts the timer to 1 ms and keeps it there forever. The difference means that on Firefox at idle, the CPU only wakes 64 times a second. On Chrome, it wakes up 1,000 times a second. In its Windows documentation, Microsoft notes that setting the system timer to a high value can increase power consumption by “as much as 25 percent.” This means that on a laptop, you’ll get a shorter runtime with Chrome than you will on a competing browser. And the issue has been around for a long time. Forbes links to a bug report documenting the problem that was first filed in 2010. Read 7 remaining paragraphs | Comments

View article:
Why Google took years to address a battery-draining “bug” in Chrome

Id shows off double-jumping, skull-crushing new Doom at QuakeCon

If you weren’t at QuakeCon, this content-free teaser is all you get to see of the new Doom for the time being. The bad news is that only people who were actually at Dallas’ QuakeCon last night were able to see the world-premiere gameplay footage from the next Doom game, which somehow hasn’t been leaked online yet. The good news is that plenty of people that were there are reporting on the unveiling, which seemed to include a number of extremely un- Doom -like additions. One of the bigger changes brought by the new Doom (which is notably not being called Doom 4 anymore ) is a jet-pack powered double-jump, à la Crysis 3 , Titanfall , Destiny and, now, presumably, every first-person shooter to come out in the next year or two. Players can also climb up the sides of “large crates and gaps” according to PC Gamer’s report , adding even more ability to go vertical. But it’s the Mortal Kombat -style melee finishing moves that seem to have gotten the crowd the most riled up. PC Gamer describes how, once an enemy is low on health, the player can get close and activate moves that see “lower jaws pulled off, skulls stomped on, and hearts torn out with the level of detail usually reserved for those slow-mo bullet cams in the Sniper Elite series.” Rock Paper Shotgun noted  that “enemies break apart like moldy bread… literally tearing them in half sometimes.” The outlet also reported scenes with “crushing heads, chunks flying everywhere.” Read 3 remaining paragraphs | Comments

Read More:
Id shows off double-jumping, skull-crushing new Doom at QuakeCon

Faulty red light cameras produced thousands of bogus traffic tickets

At least 13,000 Chicago motorists have been cited with undeserved tickets thanks to malfunctioning red-light cameras, according to a 10-month investigation published Friday by the Chicago Tribune . The report found that the $100 fines were a result of “faulty equipment, human tinkering or both.” According to the investigation: Cameras that for years generated just a few tickets daily suddenly caught dozens of drivers a day. One camera near the United Center rocketed from generating one ticket per day to 56 per day for a two-week period last summer before mysteriously dropping back to normal. Tickets for so-called rolling right turns on red shot up during some of the most dramatic spikes, suggesting an unannounced change in enforcement. One North Side camera generated only a dozen tickets for rolling rights out of 100 total tickets in the entire second half of 2011. Then, over a 12-day spike, it spewed 563 tickets—560 of them for rolling rights. Many of the spikes were marked by periods immediately before or after when no tickets were issued—downtimes suggesting human intervention that should have been documented. City officials said they cannot explain the absence of such records. City officials and Redflex Traffic Systems of Arizona, the report said, “acknowledged oversight failures and said the explosions of tickets should have been detected and resolved as they occurred. But they said that doesn’t mean the drivers weren’t breaking the law, and they defended the red light camera program overall as a safety success story. The program has generated nearly $500 million in revenue since it began in 2003.” Read 1 remaining paragraphs | Comments

View post:
Faulty red light cameras produced thousands of bogus traffic tickets

GHCQ’s “Chinese menu” of tools spreads disinformation across Internet

Just a few of the “weaponized” capabilities from GCHQ’s catalog of information warfare tools. What appears to be an internal Wiki page detailing the cyber-weaponry used by the British spy agency GCHQ was published today by Glenn Greenwald of The Intercept . The page, taken from the documents obtained by former NSA contractor Edward Snowden, lists dozens of tools used by GCHQ to target individuals and their computing devices, spread disinformation posing as others, and “shape” opinion and information available online. The page had been maintained by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) Covert Internet Technical Development team, but it fell out of use by the time Snowden copied it.  Greenwald and NBC previously reported on JTRIG’s “dirty tricks” tactics for psychological operations and information warfare, and the new documents provide a hint at how those tactics were executed. GCHQ’s capabilities included tools for manipulating social media, spoofing communications from individuals and groups, and warping the perception of content online through manipulation of polls and web pages’ traffic and search rankings. Originally intended to inform other organizations within GCHQ (and possibly NSA) of new capabilities being developed by the group, the JTRIG CITD team noted on the page, “We don’t update this page anymore, it became somewhat of a Chinese menu for effects operations.” The page lists 33 “effects capability” tools, as well as a host of other capabilities for collecting information, tracking individuals, attacking computers, and extracting information from seized devices. Read 8 remaining paragraphs | Comments

Read More:
GHCQ’s “Chinese menu” of tools spreads disinformation across Internet

It may be “barely an operating system,” but DOS still matters (to some people)

By your command. Sean Gallagher Earlier this month, I spent a day working in the throwback world of DOS. More specifically, it was FreeDOS version 1.1, the open source version of the long-defunct Microsoft MS-DOS operating system. It’s a platform that in the minds of many should’ve died a long time ago. But after 20 years, a few dozen core developers and a broader, much larger contributor community continue furthering the FreeDOS project by gradually adding utilities, accessories, compilers, and open-source applications. All this labor of love begs one question: why? What is it about a single-tasking command-line driven operating system—one that is barely up to the most basic of network-driven tasks—that has kept people’s talents engaged for two decades? Haven’t most developers abandoned it for Windows (or, tragically, for IBM OS/2 )? Who still uses DOS, and for what? To find out, Ars reached out to two members of the FreeDOS core development team to learn more about who was behind this seemingly quixotic quest. These devs choose to keep an open-source DOS alive rather than working on something similar but more modern—like Linux. So, needless to say, the answers we got weren’t necessarily expected. Read 22 remaining paragraphs | Comments

See the article here:
It may be “barely an operating system,” but DOS still matters (to some people)

Human memory-saving devices get $37.5m research boost from DARPA

Flickr user: Dierk Schaefer Two teams creating devices that stimulate the brain to restore memory function have been  granted $37.5 million  by DARPA to develop the technology. Both will initially work with people with epilepsy who have been given implants to locate where their seizures originate. The researchers will reuse the data gathered during this process to monitor other brain activity, such as the patterns that occur when the brain stores and retrieves memories. One team will then attempt to map these patterns by recording the brain activity of epilepsy sufferers with mild memory problems while they play a computer game about remembering things. The pattern differences between the best and worst scores among these patents will be used to develop an algorithm for a personalized stimulation pattern to keep the brain performing at an optimal level. Read 6 remaining paragraphs | Comments

See the article here:
Human memory-saving devices get $37.5m research boost from DARPA

Seattle utility wants $17,500 refund after failure to scrub negative search results

John Tregoning Seattle’s publicly-owned electrical utility, City Light, is now demanding  a refund for the $17,500 that it paid to Brand.com  in a botched effort to boost the online reputation of its highly-paid chief executive, Jorge Carrasco. The project was concocted by the CEO’s chief of staff, Sephir Hamilton . In an interview with Ars, Hamilton said that the agency may even file a lawsuit to enforce this refund. “We’re leaving our options open,” he said. “I hope that they’ll see that what we signed up for was not the service that they delivered. We were sold one bill of goods and we were given another.” Read 26 remaining paragraphs | Comments

Link:
Seattle utility wants $17,500 refund after failure to scrub negative search results

Judge orders unmasking of Amazon.com “negative” reviewers

A federal judge has granted a nutritional supplement firm’s request to help it learn the identities of those who allegedly left “phony negative” reviews of its products on Amazon.com. The decision means that Ubervita may issue subpoena’s to Amazon.com and Cragslist to cough up the identities of those behind a “campaign of dirty tricks against Ubervita in a wrongful effort to put Ubervita at a competitive disadvantage in the marketplace .” (PDF). According to a lawsuit by the maker of testosterone boosters, multivitamins and weight loss supplements, unknown commenters  had placed fraudulent orders “to disrupt Ubervita’s inventory,” posted a Craigslist ad “to offer cash for favorable reviews of Ubervita products,” and posed “as dissatisfied Ubervita customers in posting phony negative reviews of Ubervita products, in part based on the false claim that Ubervita pays for positive reviews.” Read 2 remaining paragraphs | Comments

More:
Judge orders unmasking of Amazon.com “negative” reviewers

Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords

Context In the latest cautionary tale involving the so-called Internet of things, white-hat hackers have devised an attack against network-connected lightbulbs that exposes Wi-Fi passwords to anyone in proximity to one of the LED devices. The attack works against LIFX smart lightbulbs , which can be turned on and off and adjusted using iOS- and Android-based devices. Ars Senior Reviews Editor Lee Hutchinson gave a good overview here of the Philips Hue lights, which are programmable, controllable LED-powered bulbs that compete with LIFX. The bulbs are part of a growing trend in which manufacturers add computing and networking capabilities to appliances so people can manipulate them remotely using smartphones, computers, and other network-connected devices. A 2012 Kickstarter campaign raised more than $1.3 million for LIFX, more than 13 times the original goal of $100,000. According to a blog post published over the weekend , LIFX has updated the firmware used to control the bulbs after researchers discovered a weakness that allowed hackers within about 30 meters to obtain the passwords used to secure the connected Wi-Fi network. The credentials are passed from one networked bulb to another over a mesh network powered by 6LoWPAN , a wireless specification built on top of the IEEE 802.15.4 standard . While the bulbs used the Advanced Encryption Standard (AES) to encrypt the passwords, the underlying pre-shared key never changed, making it easy for the attacker to decipher the payload. Read 4 remaining paragraphs | Comments

More here:
Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords