Now we can 3D print ceramics

Despite being able to build just about anything with 3D printing, until now items have been limited to polymer plastics, a handful of metals and glass . However, researchers at HRL Laboratories have announced a significant advancement in additive manufacturing: the ability to print ceramics . The trick, the HRL team figured out, was to not heat ceramic powder. Doing so generates too many microscopic flaws that can lead to cracks and fractures. Instead, the team developed a material they’re calling “preceramic polymers” that convert to ceramic when heated. Essentially, the HRL team prints out the 3D design using these preceramic polymers and then fires the resulting item (like in a kiln) to harden the material into ceramic. This material is compatible with stereolithography , a popular 3D printing method wherein a laser is used to solidify a liquid polymer. What’s more, the team figures it can print out a highly detailed and complex ceramic part 100 to 1000 times faster than conventional stereolithography by using an ultraviolet light and patterned masks. This advancement could prove a boon to the aerospace industry which already relies on ceramic components for everything from wing panels on planes to the internal mechanisms of orbital rockets. DARPA has awarded the team a development contract for an ablative ceramic aeroshell — essentially a heat shield for spacecraft as they enter an atmosphere — as HRL’s ceramics are reportedly 10 times stronger than the ceramic foam currently commercially available. [Image Credit: Getty] Source: MIT Tech Review

Continue Reading:
Now we can 3D print ceramics

Microsoft will warn users targeted by government hackers (update)

Microsoft promises to notify its users if it believes that the government’s targeting their account. In its announcement post , the company says it already notifies subscribers if an unauthorized person’s trying to access their Outlook email and OneDrive. But from now on, it will also specify if it suspects the attacker is sponsored by a government. Microsoft VP Scott Charney writes: We’re taking this additional step of specifically letting you know if we have evidence that the attacker may be “state-sponsored” because it is likely that the attack could be more sophisticated or more sustained than attacks from cybercriminals and others. These notifications do not mean that Microsoft’s own systems have in any way been compromised. According to Reuters , Redmond has changed its policy after the news outlet made a series of inquiries over the past few days regarding a Hotmail attack that was discovered in 2011. Apparently, Microsoft had evidence that Chinese authorities were behind that campaign targeting the emails of China’s Tibetan and Uighur minority leaders, but it never told the victims. (*see update below) In addition to announcing the new policy, the company has also listed steps people can take to prevent their accounts from being accessed by outsiders, state-sponsored or not. These include switching on two-step verification, using strong passwords and keeping their OS and anti-virus program up to date. Microsoft is the latest addition in the growing list of tech corporations that had chosen to tell their customers if they’re being hacked by the government. Google has been doing so since 2012, and Facebook announced its intention to warn people of state-sponsored attacks in October. Update: A Microsoft spokesperson has reached out and told Engadget that it isn’t true that it was able to pinpoint the source of the 2011 Hotmail attacks: Our focus is on helping customers keep personal information secure and private. Our primary concern was ensuring that our customers quickly took practical steps to secure their accounts, including by forcing a password reset. We weighed several factors in responding to this incident, including the fact that neither Microsoft nor the U.S. Government were able to identify the source of the attacks , which did not come from any single country. We also considered the potential impact on any subsequent investigation and ongoing measures we were taking to prevent potential future attacks. [Image credit: AP Photo/Ted S. Warren] Source: Microsoft , Reuters (1) , (2)

Follow this link:
Microsoft will warn users targeted by government hackers (update)

List of Major Linux Desktop Problems Updated For 2016

An anonymous reader writes: Phoronix reports that Artem S. Tashkinov’s Major Linux Problems on the Desktop has been updated for 2016. It is a comprehensive list of various papercut issues and other inconveniences of Linux on the PC desktop. Among the issues cited for Linux not being ready for the desktop include graphics driver issues, audio problems, hardware compatibility problems, X11 troubles, a few issues with Wayland, and font problems. At the project management side, there is also cited a lack of cooperation among open source developers and fragmentation of desktops. Let’s discuss. Read more of this story at Slashdot.

Read More:
List of Major Linux Desktop Problems Updated For 2016

Oculus Rift will ship with VR platformer ‘Lucky’s Tale’

Evoking the days of when consoles shipped with actual games, Oculus just announced a second bundled title for its upcoming Rift VR headset: Lucky’s Tale , a platformer from Words with Friends creator Paul Bettner. Earlier this month, the company also revealed that Eve: Valkyrie will also come every Oculus Rift. For the most part, Lucky’s Tale looks like a typical platforming title along the lines of Mario 64 and Banjo Kazooie — the big difference is that the Rift serves as a virtual camera. But even if it doesn’t look very original, another free game will certainly make the Rift more appealing to mainstream consumers. While there’s still no official launch date or price, Oculus says the Rift will launch in the first quarter of 2016. Source: Oculus

View article:
Oculus Rift will ship with VR platformer ‘Lucky’s Tale’

Google will strip Oracle’s Java code out of Android

Google has confirmed that it will no longer use Java application programming interfaces (APIs) from Oracle in future versions of Android, according to VentureBeat . Instead, it will switch to OpenJDK, an open-source version of Oracle’s own Java Development Kit. While you might ask, “Who actually cares?”, Google says the change will simplify app development by creating a common codebase for Java. It’s hard to imagine that such a huge change (8, 902 files are supposedly affected) isn’t related to Google’s ongoing legal dispute with Oracle, though. That dispute, depending on how it’s resolved, could adversely affect Android development and app coding in general. The epic dispute started when Oracle sued Google for copyright back in 2010, claiming that Google improperly used its Java APIs. Google argued that the APIs in question were essential for to software innovation, and therefore couldn’t be copyrighted. In 2012, a jury found that Google didn’t infringe Oracle’s copyright, but a Federal court mostly reversed the decision in 2014. The US Supreme court didn’t want to touch the case and sent it back to a lower court, where it currently sits. Users on Y Combinator’s Hacker News who first spotted the code have theorized that it may mean that Google and Oracle have settled the lawsuit out of court. However, Google told VentureBeat that the legal dispute is still ongoing, so it couldn’t comment on whether the code change is related. As for how this affects you or me, the new code should make it a touch simpler for Android N developers, possibly resulting in better apps and quicker updates. However, the court’s upcoming decision could have much wider ramifications. If they decide that API’s from the likes of Java can be copyrighted, it could turn the patent wars into even more of a cluster-you-know-what. Source: VentureBeat

Read More:
Google will strip Oracle’s Java code out of Android

HAMR Hard Disk Drives Postponed To 2018

An anonymous reader writes: Unfortunately the hard disk drive industry is not ready to go live with Heat-assisted Magnetic Recording (HAMR). The technology is yet not reliable enough for mass production. Over the years, producers of hard drives, platters and recording heads have revealed various possible timeframes for commercial availability of drives with HAMR technology. Their predictions were not accurate. The current goalpost is set to year 2018. While solid state disks based on Flash memory keep seeing rapid improvements as well, HDDs still kick butt in scenarios where high areal density is more important than ripping transfer speeds. The areal density of HAMR products is predicted to exceed 1.5 Tb per square inch. Read more of this story at Slashdot.

More:
HAMR Hard Disk Drives Postponed To 2018

Social media led police straight to movie pirates

How can law enforcement agencies track down some of the world’s most (in)famous pirates? The same way that we find out how our school frenemies are doing: stalking them on social media. TorrentFreak has investigated the recent convictions of three of the UK’s biggest file-sharers to learn how exactly they were caught. It turns out that copyright enforcement officials are doing the same sort of armchair-sleuthing that we all do, only that they’ve got a hotline straight to the police. For instance, 22-year-old Reece Baker was more commonly known by his online alias, Baker92. According to the report, his fatal mistake was to include a shout-out to his “baby momzie Ria” in an NFO (info) file. Officials at the UK’s Federation Against Copyright Theft guessed that Baker92 was a surname/year of birth combination. They then searched Equifax’s credit-rating database to find anyone born in 1992 with that surname and, potentially, a child with a woman named Ria. Similarly, 24-year-old Sahil Rafiq posted torrents under a wide variety of usernames, including memory100, hail_alpha and sohail20. Unfortunately, the sohail20 identity was also used on the customer support website for an online retailer. Rafiq had posted a question concerning his laptop, but signed the piece “Kind Regards, Sahil Rafiq.” With his real name, authorities took very little time in finding his Facebook profile and, from there, were able to alert the police. Facebook was also the petard by which 40-year-old Graeme ‘Reidy’ Reid was hoisted, since he used the same anonymous e-mail account on his profile as he did his piracy. FACT bods simply searched for his Hushmail address and his Facebook page popped up — where he’d obligingly listed his occupation as “encoder.” We’ve not checked, but presumably bank robbers are going to start making similarly honest alternations to their social media pages in the near future. As much as FACT would like you to think twice about sharing illegally-obtained material around the web, there’s another moral here. After all, if enforcement officers were able to find these people with a few well-chosen Google searches, then perhaps the secret is to not be so forthcoming with your personal information. Source: TorrentFreak , FACT

More:
Social media led police straight to movie pirates

Pwnd Aethra Routers Used To Brute-Force WordPress Sites

An anonymous reader writes: Security researchers found around 8, 000 Aethra routers (with no admin passwords) as part of a botnet that attacked WordPress sites, trying to brute-force admin accounts. Most routers were deployed in enterprise networks in Italy. Each device could have be used to launch DDoS attacks with a capability between 1 to 10 Gbps for each device, based on the company’s bandwidth. Things could be worse, though: Additional investigation also revealed that some of the routers were also susceptible to various reflected XSS and CSRF attacks that would also allow attackers to take control of the device, even if using different login credentials. Using Shodan, a search engine for locating Internet-connected devices, researchers found over 12, 000 of Aethra routers around the world, 10, 866 in Italy alone, and over 8, 000 of these devices were of the model detected in the initial brute-force attack (Aethra Telecommunications PBX series). At that time, 70% of these Aethra routers were still using their default login credentials Read more of this story at Slashdot.

Read the article:
Pwnd Aethra Routers Used To Brute-Force WordPress Sites

The Essential Cyberpunk Reading List

It’s now been over three decades since cyberpunk first exploded, and in that time we’ve seen gorgeous movies, read fascinating books, and seen dozens of offshoots like steampunk (and my new favorite, deco punk) develop. Here are the 21 cyberpunk books you absolutely must read. Read more…

See the article here:
The Essential Cyberpunk Reading List

Tardigrades Survive Intense Deyhdration By Coating Themselves in Glass

Tardigrades are tough little critters, and now one of their secrets for longevity has been revealed. It might sound like something out of a sci-fi movie, but the creatures seem to turn coat themselves in glass when they don’t have enough water to live normally. Read more…

More here:
Tardigrades Survive Intense Deyhdration By Coating Themselves in Glass