Utility companies go to war against solar

Utility companies across America are fighting solar , imposing high fees on homeowners who install their own solar panels to feed back into the grid. This one was predictable from a long, long way out — energy companies being that special horror-burrito made from a core of hot, chewy greed wrapped in a fluffy blanket of regulatory protection, fixed in their belief that they have the right to profit from all power used, whether or not their supply it. Bruce Sterling once proposed that Americans should be encouraged to drive much larger trucks, big enough to house monster fuel-cells that are kept supplied with hydrogen by decentralized windmill and solar installations — when they are receiving more power than is immediately needed, they use the surplus to electrolyze water and store the hydrogen in any handy nearby monster-trucks’ cells. When the wind isn’t blowing or the sun isn’t shining, you just plug your house into your enormous American-Dream-mobile — no need for a two-way grid. This solution wasn’t just great because it aligned the core American value of driving really large cars with environmental protection, but also because it was less vulnerable to sabotage from hydrocarbon-addicted energy companies. HECO, despite criticism from Hawaii’s solar industry, denies the moratorium is anything more than an honest effort to address the technical challenges of integrating the solar flooding onto its grid. The slowdown comes in a state where 9 percent of the utility’s residential customers on Oahu are already generating most of their power from the sun and where connections have doubled yearly since 2008. In California, where solar already powers the equivalent of 626,000 homes, utilities continue to aggressively push for grid fees that would add about $120 a year to rooftop users’ bills and, solar advocates say, slow down solar adoptions. Similar skirmishes have broken out in as many as a dozen of the 43 states that have adopted net-metering policies as part of their push to promote renewable energy. In Colorado, Xcel Energy Inc. has proposed cutting the payments it makes for excess power generated by customers by about half, because it says higher payouts result in an unfair subsidy to solar users. Utilities Feeling Rooftop Solar Heat Start Fighting Back [Mark Chediak, Christopher Martin and Ken Wells/Bloomberg] ( via /. ) ( Image: Solar Panels All Done! , a Creative Commons Attribution (2.0) image from clownfish’s photostream )        

Read More:
Utility companies go to war against solar

Bunnie Huang explains the nuts-and-bolts of getting stuff made in Shenzhen

In this talk from Maker Faire New York, Bunnie Huang of Chibitronics gives an amazing run-down of the on-the-ground reality of having electronics manufactured in Shenzhen, China. It’s a wild 30 minutes, covering everything from choosing a supplier to coping with squat toilets and the special horrors awaiting vegetarians in the Pearl River Delta. There are some dropouts at the start of the video that you’ll need to scroll past, but it’s well worth the hassle. Getting it Made: Stories from Shenzhen ( via Make )        

Visit link:
Bunnie Huang explains the nuts-and-bolts of getting stuff made in Shenzhen

Android gives you the ability to deny your sensitive data to apps

Android privacy just got a lot better. The 4.3 version of Google’s mobile operating system now has hooks that allow you to override the permissions requested by the apps you install. So if you download a flashlight app that wants to harvest your location and phone ID , you can install it, and then use an app like AppOps Launcher to tell Android to withhold the information. Peter Ecklersley, a staff technologist at the Electronic Frontier Foundation, has written up a good explanation of how this works , and he attributes the decision to competitive pressure from Ios, which allows users to deny location data to apps, even if they “require” it during the installation process. I think that’s right, but not the whole story: Android has also always labored under competitive pressure from its free/open forks, like Cyanogenmod. In the days when Android didn’t allow tethering (as a sop to the mobile carriers, who are the gatekeepers to new phones for many people), Cyanogenmod signed up large numbers of users, simply by adding this functionality . Google added tethering to Android within a couple of versions. Some versions of Cyanogenmod have had the option tell your phone to lie to apps about its identity, location, and other sensitive information — a way to get around the “all or nothing” installation process whereby your the apps you install non-negotiably demand your “permission” to plunder this information. I’m not surprised to see the same feature moving into the main branch of Android. This dynamic is fascinating to me: Google has to balance all kinds of priorities in rolling out features and “anti-features” (no tethering, non-negotiable permissions) in Android, in order to please customers, carriers and developers. Free/open forks like Cyanogenmod really only need to please themselves and their users, and don’t have to worry so much about these other pressures (though now that Cyanogenmod is a commercial operation , they’ll probably need to start playing nice with carriers). But because Android competes with Cyanogenmod and the other open versions, Google can’t afford to ignore the featureset that makes them better than the official version. It’s a unique, and extremely beneficial outflow of the hybrid free/commercial Android ecosystem. In the early days, that model was at an improvement on its major competitor, Apple’s iOS, which didn’t even have a permissions model. But after various privacy scandals, Apple started forcing apps to ask for permission to collect data: first location and then other categories, like address books and photos. So for the past two years, the iPhone’s app privacy options have been miles ahead of Android’s. This changed with the release of Android 4.3, which added awesome new OS features to enhance privacy protection. You can unlock this functionality by installing a tool like App Ops Launcher. When you run it, you can easily control most of the privacy-threatening permissions your apps have tried to obtain. Want to install Shazam without having it track your location? Easy. Want to install SideCar without letting it read your address book? Done.2 Despite being overdue and not quite complete, App Ops Launcher is a huge advance in Android privacy. Its availability means Android 4.3+ a necessity for anyone who wants to use the OS while limiting how intrusive those apps can be. The Android team at Google deserves praise for giving users more control of the data that others can snatch from their pockets. Awesome Privacy Tools in Android 4.3+        

Continue reading here:
Android gives you the ability to deny your sensitive data to apps

Life from the near future of location surveillance

In Meet Jack. Or, What The Government Could Do With All That Location Data , the ACLU’s Jay Stanley presents a slide deck from the near future in which a government intelligence service presents a glowing account of how it convicted “Jack R Benjamin” of DUI pre-crime, by watching all the places he went, all the people he interacted with, and using an algorithm to predict that he would commit a DUI, and, on that basis, to peer into every corner of his personal life. The use of the slide deck is inspired here, echoing as it does the Snowden leaks (Snowden had been tasked with consolidating training documents from across the NSA, which is why he had access to such a wide variety of documents, and why they’re all in powerpoint form). And the kind of data-mining here is not only plausible, it’s likely — it’s hard to imagine cops not availing themselves of this capability. Just out of curiosity, who else has been visiting Mary Smith’s house? Looks like Mary has a few close friends. Wonder if Mr. Benjamin is aware of this Bill Montgomery character who spent a few nights with her? Going back to the main screen, looks like Mr. Benjamin is quite a union activist. Perhaps we should notify George over at BigCorp (he serves at the Fusion Center with us). Just in case our man has been involved in the trouble they’ve been having over there. Meet Jack. Or, What The Government Could Do With All That Location Data [Jay Stanley/ACLU] ( via MeFi )        

Follow this link:
Life from the near future of location surveillance

Medieval kids’ birch-bark doodles

Michael sez, “Apparently medieval Russian schoolroooms used birch bark for things like writing practice. Erik Kwakkel, medieval book historian at Leiden University, Netherlands, has some charming photos of stick-figure illustrations on bark by kids who, like kids everywhere, got a bit bored with the lesson and started doodling in the margins. There are links to more images (and an interesting scholarly article) at the bottom of the post .” The most special items, however, are the ones shown above, which are from a medieval classroom. In the 13th century, young schoolboys learning to write filled these scraps with alphabets and short texts. Bark was ideal material for writing down things with such a short half-life. Then the pupils got bored and started to doodle, as kids do: crude drawings of individuals with big hands, as well as a figure with a raised sword standing next to a defeated beast (lower image). The last one was drawn by Onfim, who put his name next to the victorious warrior. The snippets provide a delightful and most unusual peek into a 13th-century classroom, with kids learning to read – and getting bored in the process. Medieval kids’ doodles on birch bark [Erik Kwakkel] ( Thanks, Michael ! )        

See the article here:
Medieval kids’ birch-bark doodles

China launches lunar probe

The China National Space Administration has launched Chang’e 3, a plutonium-powered lunar lander on-board at 185-foot-tall Long March 3B rocket. The lander is on a four-day trajectory for the lunar surface, and will brake and enter lunar orbit on December 6th. It is scheduled to land on December 14th, in the Bay of Rainbows (Sinus Iridum). The rover masses 140kg, with nuclear heaters to keep systems alive during the two-week-long lunar nights, and will use radar to probe the lunascape as it roves during its mission. It is also outfitted with high-resolution panoramic cameras and telescopes. The Chinese space program’s stated goal is to establish a space-station and autonomous landers that can return to Earth with samples. “On behalf of the Xichang Satellite Launch Center and the command headquarters, I would like to extend my gratitude to all those who have been part of the project,” said Zhang Zhenzhong, director of the Xichang launch base. “And my thanks also go to all the friends who have been helping us throughout the whole process. “The Chang’e probe is on the way to the moon. Of course, it’s a symbol of China’s national power and prowess,” Zhang said in post-launch remarks translated into English on China’s state-run television. Over the next few days, Chang’e 3 will adjust its path toward the moon three times to set up for a critical rocket burn to enter lunar orbit Dec. 6. Landing on the moon is scheduled for Dec. 14 in a region known as Bay of Rainbows, or Sinus Iridum, on the upper-left part of the moon as viewed from Earth. Many of the mission’s specifications and objectives remained secret until the week of launch, when China rolled out details in a press briefing and through official state-owned media outlets. The lander carries a bipropellant rocket engine designed to adjust its power level and pivot to control the probe’s descent from an altitude of 15 kilometers, or about 9 miles, according to China’s state-run Xinhua news agency. Long March rocket blasts off with Chinese lunar rover [Stephen Clark/Spaceflight Now]        

More:
China launches lunar probe

Apps come bundled with secret Bitcoin mining programs, paper over the practice with EULAs

Researchers at Malwarebytes have discovered that some programs covertly install Bitcoin-mining software on users’ computers , papering over the practice by including sneaky language in their license agreements allowing for “computer calculations, security.” The malicious programs include YourFreeProxy from Mutual Public, AKA We Build Toolbars, LLC, AKA WBT. YourFreeProxy comes with a program called Monitor.exe, which repeatedly phones home to WBT, eventually silently downloading and installing a Bitcoin mining program called “jhProtominer.” So now that we have proof that a PUP is installing miners on users systems, do they do it without ever letting the user know? Well not exactly, their EULA specifically covers a section on Computer Calculations: COMPUTER CALCULATIONS, SECURITY: as part of downloading a Mutual Public, your computer may do mathematical calculations for our affiliated networks to confirm transactions and increase security. Any rewards or fees collected by WBT or our affiliates are the sole property of WBT and our affiliates. Their explanation is basically the purpose of Bitcoin Miners and that they will install this software on the system, run it, use up your system resources and finally keep all rewards from the effort YOUR system puts in. Talk about sneaky. In my opinion, PUPs have gone to a new low with the inclusion of this type of scheme, they already collected information on your browsing and purchasing habits with search toolbars and redirectors. They assault users with pop-up ads and unnecessary software to make a buck from their affiliates. Now they are just putting the nails in the coffin by stealing resources and driving user systems to the grave. Potentially Unwanted Miners – Toolbar Peddlers Use Your System To Make BTC [Adam Kujawa/Malwarebytes] ( via /. )        

Originally posted here:
Apps come bundled with secret Bitcoin mining programs, paper over the practice with EULAs

New CC licenses: tighter, shorter, more readable, more global

Creative Commons has released version 4.0 of its sharing-friendly, easy-to-use copyright licenses . The new licenses represent a significant improvement over earlier versions. They work in over 60 jurisdictions out of the box, without having to choose different versions depending on which country you’re in; they’re more clearly worded; they eliminate confusion over jurisdiction-specific rights like the European database right and moral rights. They clarify how license users are meant to attribute the works they use; provide for anonymity in license use; and give license users a 30 day window to correct violations, making enforcement simpler. Amazingly, they’re also shorter than the previous licenses, and easier to read, to boot. 30-day window to correct license violations All CC licenses terminate when a licensee breaks their terms, but under 4.0, a licensee’s rights are reinstated automatically if she corrects a breach within 30 days of discovering it. The cure period in version 4.0 resembles similar provisions in a some other public licenses and better reflects how licensors and licensees resolve compliance issues in practice. It also assures users that provided they act promptly, they can continue using the CC-licensed work without worry that they may have lost their rights permanently. Increased readability The 4.0 license suite is decidedly easier to read and understand than prior versions, not to mention much shorter and better organized. The simplified license structure and use of plain language whenever possible increases the likelihood that licensors and reusers will understand their rights and obligations. This improves enforceability of the licenses and reduces confusion and disagreement about how the licenses operate. Clarity about adaptations The BY and BY-NC 4.0 licenses are clearer about how adaptations are to be licensed, a source of confusion for some under the earlier versions of those licenses. These licenses now clarify that you can apply any license to your contributions you want so long as your license doesn’t prevent users of the remix from complying with the original license. While this is how 3.0 and earlier versions are understood, the 4.0 licenses make it abundantly clear and will help remixers in understanding their licensing obligations. What’s New in 4.0        

More:
New CC licenses: tighter, shorter, more readable, more global

TSA blows a billion bucks on unscientific "behavioral detection" program, reinvents phrenology

10 years and $900M later, the TSA’s behavioral analysis program is a debacle . Here’s the US General Accountability Office on the program : “Ten years after the development of the SPOT program, TSA cannot demonstrate the effectiveness of its behavior detection activities. Until TSA can provide scientifically validated evidence demonstrating that behavioral indicators can be used to identify passengers who may pose threat to aviation security, the agency risks funding activities [that] have not been determined to be effective.” Basically, the TSA has spent a decade and nearly a billion dollars reinventing phrenology. I feel safer already. For the report, GAO auditors looked at the outside scientific literature, speaking to behavioral researchers and examining meta-analyses of 400 separate academic studies on unmasking liars. That literature suggests that “the ability of human observers to accurately identify deceptive behavior based on behavioral cues or indicators is the same as or slightly better than chance (54 percent).” That result holds whether or not the observer is a member of law enforcement. It turns out that all of those signs you instinctively “know” to indicate deception usually don’t. Lack of eye contact for instance simply does not correlate with deception when examined in empirical studies. Nor do increases in body movements such as tapping fingers or toes; the literature shows that people’s movements actually decrease when lying. A 2008 study for the Department of Defense found that “no compelling evidence exists to support remote observation of physiological signals that may indicate fear or nervousness in an operational scenario by human observers.” TSA’s got 94 signs to ID terrorists, but they’re unproven by science [Nate Anderson/Ars Technica]        

Continued here:
TSA blows a billion bucks on unscientific "behavioral detection" program, reinvents phrenology