Why Paper Jams Persist

A trivial problem reveals the limits of technology. Fascinating story from The New Yorker: Unsurprisingly, the engineers who specialize in paper jams see them differently. Engineers tend to work in narrow subspecialties, but solving a jam requires knowledge of physics, chemistry, mechanical engineering, computer programming, and interface design. “It’s the ultimate challenge, ” Ruiz said. “I wouldn’t characterize it as annoying, ” Vicki Warner, who leads a team of printer engineers at Xerox, said of discovering a new kind of paper jam. “I would characterize it as almost exciting.” When she graduated from the Rochester Institute of Technology, in 2006, her friends took jobs in trendy fields, such as automotive design. During her interview at Xerox, however, another engineer showed her the inside of a printing press. All Xerox printers look basically the same: a million-dollar printing press is like an office copier, but twenty-four feet long and eight feet high. Warner watched as the heavy, pale-gray double doors swung open to reveal a steampunk wonderland of gears, wheels, conveyor belts, and circuit boards. As in an office copier, green plastic handles offer access to the “paper path” — the winding route, from “feeder” to “stacker, ” along which sheets of paper are shocked and soaked, curled and decurled, vacuumed and superheated. “Printers are essentially paper torture chambers, ” Warner said, smiling behind her glasses. “I thought, This is the coolest thing I’ve ever seen.” Read more of this story at Slashdot.

Originally posted here:
Why Paper Jams Persist

Amateur Astronomer Discovers Long-Dead NASA Satellite Has Come Back To Life

schwit1 shares a report from Behind The Black: In his hunt to locate Zuma, an amateur astronomer has discovered that a long-dead NASA satellite, designed to study the magnetosphere, has come back to life. IMAGE went dead in 2005, and though NASA thought it might come back to life after experiencing a total eclipse in 2007 that would force a reboot, no evidence of life was seen then. It now appears that the satellite came to life sometime between then and 2018, and was chattering away at Earth waiting for a response. NASA is now looking at what it must do to take control of the spacecraft and resume science operations. Zuma is the secret U.S. government payload that was launched by SpaceX earlier this month and reportedly lost. As for why Scott Tilley — the amateur radio astronomer — decided to have a look for the present of secret military satellites, Ars Technica reports that he apparently does this semi-regularly as a hobby and, in this case, was inspired by the Zuma satellite. Read more of this story at Slashdot.

See more here:
Amateur Astronomer Discovers Long-Dead NASA Satellite Has Come Back To Life

Elon Musk’s Boring Company Delivers $600 Flamethrower

Last December, Boring Company CEO Elon Musk promised to sell a Boring Company-branded flamethrower after selling 50, 000 Boring Company hats. Well, sure enough, 50, 000 hats were sold and Musk is delivering on his promise. The Verge reports: Mark this down as one of the promises Elon delivers on, apparently, because it looks like the Boring Company flamethrower is here. Redditors in a few SpaceX, Boring Company, and Musk-related subreddits noticed earlier this week that the URL “boringcompany.com/flamethrower” started redirecting to a page with a password box. And at least one user was able to guess the original password, too: “flame.” (It’s since been changed.) Behind that password was a shop page that looks just like the one for The Boring Company’s hat. But instead of a $20 cap, they found a preorder prompt for a $600 flamethrower. “Prototype pictured above, ” the listing reads. “Final production flamethrower will be better.” Read more of this story at Slashdot.

Read the original:
Elon Musk’s Boring Company Delivers $600 Flamethrower

$500 Million Worth of Cryptocurrency Stolen From Japanese Exchange

Locke2005 shares a report from CNBC: Hackers stole several hundred million dollars’ worth of a lesser-known cryptocurrency from a major Japanese exchange Friday. Coincheck said that around 523 million of the exchange’s NEM coins were sent to another account around 3 a.m. local time (1 p.m. ET Thursday), according to a Google translate of a Japanese transcript of the Friday press conference from Logmi. The exchange has about 6 percent of yen-bitcoin trading, ranking fourth by market share on CryptoCompare. The stolen NEM coins were worth about 58 billion yen at the time of detection, or roughly $534.8 million, according to the exchange. Coincheck subsequently restricted withdrawals of all currencies, including yen, and trading of cryptocurrencies other than bitcoin. Locke2005 adds, “That, my friends, is the prime reason why speculating in cryptocurrency is a bad idea!” Read more of this story at Slashdot.

More:
$500 Million Worth of Cryptocurrency Stolen From Japanese Exchange

How a PhD Student Unlocked 1 Bitcoin Hidden In DNA

dmoberhaus writes: A 26-year-old Belgian PhD student named Sander Wuytz recently solved a 3-year-old puzzle that had locked the private key to 1 Bitcoin in a strand of synthetic DNA. Motherboard spoke with the student about how they managed to crack the puzzle, just days before it was set to expire. From the report: “As detailed by Nick Goldman, a researcher at the European Bioinformatics Institute, in his pioneering Nature paper on DNA storage, to encode information into DNA you take a text or binary file and rewrite it in base-3 (so rather than just ones and zeroes, there are zeroes, ones, and twos). This is then used to encode the data in the building blocks of life, the four nucleobases cytosine, thymine, adenine and guanine. As Wuyts explained to me, coding the data as nucleobases depended upon which nucleobase came before. So, for instance, if the previous base was adenine and the next pieces of data is a 0, it is coded as cytosine. If the next piece of data is a 1, it’s coded as guanine, and so on. After the data is encoded as synthetic DNA fragments, these fragments are used to identify and read the actual files stored in the DNA. In the case of the Bitcoin challenge, there were a total of nine files contained in the DNA fragments. The files were encrypted with a keystream, which is a random series of characters that is included with the actual plain text message to obfuscate its meaning. The keystream code had been provided by Goldman in a document explaining the competition. After running the code, Wuyts was able to combine the DNA fragments in the correct order to form one long piece of DNA. After working out some technical kinks, Wuyts was able to convert the DNA sequence into plain text, revealing the private key and unlocking the bitcoin (as well as some artefacts, including a drawing of James Joyce and the logo for the European Bioinformatics Institute). He had cracked the puzzle just five days before it was set to expire.” Read more of this story at Slashdot.

More:
How a PhD Student Unlocked 1 Bitcoin Hidden In DNA

Linux 4.15 Becomes Slowest Release Since 2011

An anonymous reader shares a report: Linus Torvalds has decided that Linux 4.15 needs a ninth release candidate, making it the first kernel release to need that much work since 2011. Torvalds flagged up the possibility of an extra release candidate last week, with the caveat that “it obviously requires this upcoming week to not come with any huge surprises” after “all the Meltdown and Spectre hoopla” made his job rather more complicated in recent weeks. Fast-forward another week and Torvalds has announced “I really really wanted to just release 4.15 today, but things haven’t calmed down enough for me to feel comfy about it.” Read more of this story at Slashdot.

Read this article:
Linux 4.15 Becomes Slowest Release Since 2011

Australian Birds of Prey Are Deliberately Setting Forests On Fire

An anonymous reader writes: If you’ve been counting the ways the Australian environment is trying to kill you, you can now add “arson” to the list. According to a six-year study published in The Journal of Ethnobiology, observers have confirmed what Aboriginal rangers have been observing for years: birds of prey routinely carry burning or smouldering sticks into dry grassy areas to scare small mammals into fleeing so they can be pack-hunted more effectively. This has implications for environmental management, since the best firebreak will not protect your controlled burn from a “firehawk” determined to breach it. Read more of this story at Slashdot.

Read More:
Australian Birds of Prey Are Deliberately Setting Forests On Fire

China Builds ‘World’s Biggest Air Purifier’ That Actually Works

The South China Morning Post shares an update on the status of an experimental tower in northern China, dubbed the world’s biggest air purifier by its operators. According to the scientist leading the project, the tower — which stands over 328 feet (100 meters) tall — has brought a noticeable improvement in air quality. From the report: The head of the research, Cao Junji, said improvements in air quality had been observed over an area of 10 square kilometers (3.86 square miles) in the city over the past few months and the tower has managed to produce more than 10 million cubic meters (353 million cubic feet) of clean air a day since its launch. Cao added that on severely polluted days the tower was able to reduce smog close to moderate levels. The system works through greenhouses covering about half the size of a soccer field around the base of the tower. Polluted air is sucked into the glasshouses and heated up by solar energy. The hot air then rises through the tower and passes through multiple layers of cleaning filters. The average reduction in PM2.5 — the fine particles in smog deemed most harmful to health — fell 15 per cent during heavy pollution. Cao said the results were preliminary because the experiment is still ongoing. The team plans to release more detailed data in March with a full scientific assessment of the facility’s overall performance. Read more of this story at Slashdot.

Continue Reading:
China Builds ‘World’s Biggest Air Purifier’ That Actually Works

AMD Is Releasing Spectre Firmware Updates To Fix CPU Vulnerabilities

An anonymous reader quotes a report from The Verge: AMD’s initial response to the Meltdown and Spectre CPU flaws made it clear “there is a near zero risk to AMD processors.” That zero risk doesn’t mean zero impact, as we’re starting to discover today. “We have defined additional steps through a combination of processor microcode updates and OS patches that we will make available to AMD customers and partners to further mitigate the threat, ” says Mark Papermaster, AMD’s chief technology officer. AMD is making firmware updates available for Ryzen and EPYC owners this week, and the company is planning to update older processors “over the coming weeks.” Like Intel, these firmware updates will be provided to PC makers, and it will be up to suppliers to ensure customers receive these. AMD isn’t saying whether there will be any performance impacts from applying these firmware updates, nor whether servers using EPYC processors will be greatly impacted or not. AMD is also revealing that its Radeon GPU architecture isn’t impacted by Meltdown or Spectre, simply because those GPUs “do not use speculative execution and thus are not susceptible to these threats.” AMD says it plans to issue further statements as it continues to develop security updates for its processors. Read more of this story at Slashdot.

Original post:
AMD Is Releasing Spectre Firmware Updates To Fix CPU Vulnerabilities

macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password

A bug report submitted on Open Radar this week reveals a security vulnerability in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. From a report: MacRumors is able to reproduce the issue on macOS High Sierra version 10.13.2, the latest public release of the operating system, on an administrator-level account by following these steps: 1. Click on System Preferences. 2. Click on App Store. 3. Click on the padlock icon to lock it if necessary. 4. Click on the padlock icon again. 5. Enter your username and any password. 6. Click Unlock. As mentioned in the radar, System Preferences does not accept an incorrect password with a non-administrator account. We also weren’t able to unlock any other System Preferences menus with an incorrect password. We’re unable to reproduce the issue on the third or fourth betas of macOS High Sierra 10.13.3, suggesting Apple has fixed the security vulnerability in the upcoming release. However, the update currently remains in testing. Read more of this story at Slashdot.

More:
macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password