SpaceX Rocket Failure Cost NASA $110 Million

An anonymous reader writes: On June 28th, a SpaceX Falcon 9 rocket exploded just over two minutes into its attempt to reach the International Space Station. It was a contracted mission from NASA to resupply the astronauts living there. Today, NASA associate administrator William Gerstenmaier said the price tag to taxpayers for that failed launch is $110 million. SpaceX is leading the investigation into the cause of the failure, and NASA officials faced tough questions about whether private companies should be allowed to direct investigations into their own failed launches. A similar inquiry is underway at Orbital ATK. NASA inspector general Paul Martin said his office is looking into the matter. Gerstenmaier added that NASA is thinking about making these companies take out insurance policies that would cover the cost to taxpayers in the event of another failure. Read more of this story at Slashdot.

Follow this link:
SpaceX Rocket Failure Cost NASA $110 Million

iPhone 6S New Feature: Force Touch

New submitter WarJolt writes: Apple is adding Force Touch to their iPhone 6S and iPhone 6S Plus. I’m not sure if Force Touch enough to convince an Android user like myself to switch, but there are definitely some interesting possibilities for app developers. A challenge for App developers will be to make apps compatible with both Force Touch iPhones and non-force touch iPhones. (Here’s the Bloomberg report Forbes draws from.) Read more of this story at Slashdot.

Continued here:
iPhone 6S New Feature: Force Touch

NIST Workshop Explores Automated Tattoo Identification

chicksdaddy writes: Security Ledger reports on a recent NIST workshop dedicated to improving the art of automated tattoo identification. It used to be that the only place you’d commonly see tattoos was at your local VA hospital. No more. In the last 30 years, body art has gone mainstream. One in five adults in the U.S. has one. For law enforcement and forensics experts, this is a good thing; tattoos are a great way to identify both perpetrators and their victims. Given the number and variety of tattoos, though, how to describe and catalog them? Clearly this is an area where technology can help, but it’s also one of those “fuzzy” problems that challenges the limits of artificial intelligence. The National Institute of Standards and Technology (NIST) Tattoo Recognition Technology Challenge Workshop challenged industry and academia to work towards developing an automated image-based tattoo matching technology. Participating organizations in the challenge used a FBI -supplied dataset of thousands of images of tattoos from government databases. They were challenged to develop methods for identifying a tattoo in an image, identifying visually similar or related tattoos from different subjects; identifying the same tattoo image from the same subject over time; identifying a small region of interest that is contained in a larger image; and identifying a tattoo from a visually similar image like a sketch or scanned print. Read more of this story at Slashdot.

More:
NIST Workshop Explores Automated Tattoo Identification

Malware Attacks Give Criminals 1,425% Return On Investment

An anonymous reader writes: Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends. According to their findings, attackers receive an estimated 1, 425 percent return on investment for exploit kit and ransomware schemes ($84, 100 net revenue for each $5, 900 investment). Retail was the most compromised industry making up 43 percent of investigations followed by food and beverage (13 percent) and hospitality (12 percent). Read more of this story at Slashdot.

Visit link:
Malware Attacks Give Criminals 1,425% Return On Investment

Surface Pro 3 Handily Outperforms iPad Air 2 and Nexus 9

An anonymous reader points to an interesting comparison of current tablets’ peformance, as measured with the Geekbench benchmarking tool, which boils down various aspects of performance to produce a single number. The clear winner from the models fielded wasn’t from Apple of Samsung (Samsung’s entrants came much lower down, in fact), but from Microsoft: the i5-equipped Surface Pro 3, with a Geekbench score of 5069.; second place goes to the Apple iPad Air 2, with 4046. The Nexus 9 rated third, with 3537. One model on the list that U.S. buyers may not be familiar with is the Tesco Hudl 2, a bargain tablet which Trusted Reviews seems quite taken by. Read more of this story at Slashdot.

Read the original post:
Surface Pro 3 Handily Outperforms iPad Air 2 and Nexus 9

Google Calendar Ends SMS Notifications

LuserOnFire writes: Google has sent out an email this morning that says in part: “Starting on June 27th, 2015, SMS notifications from Google Calendar will no longer be sent. SMS notifications launched before smartphones were available. Now, in a world with smartphones and notifications, you can get richer, more reliable experience on your mobile device, even offline.” You can find the announcement on Google’s support pages as well. “Richer” may be accurate, but I’m not sure that “more reliable” describes web-based notifications; that may be why the announcement linked does not apply for Google’s “Work, Education and Government customers.” Read more of this story at Slashdot.

Originally posted here:
Google Calendar Ends SMS Notifications

Emulator Now Runs x86 Apps On All Raspberry Pi Models

DeviceGuru writes: Russia-based Eltechs announced its ExaGear Desktop virtual machine last August, enabling Linux/ARMv7 SBCs and mini-PCs to run x86 software. That meant that users of the quad-core, Cortex-A7-based Raspberry Pi 2 Model B, could use it as well, although the software was not yet optimized for it. Now Eltechs has extended extended ExaGear to support earlier ARMv6 versions of the Raspberry Pi. The company also optimized the emulator for the Pi 2 allowing, for example, Pi 2 users to use automatically forwarding startup scripts. Read more of this story at Slashdot.

More:
Emulator Now Runs x86 Apps On All Raspberry Pi Models

Academics Build a New Tor Client Designed To Beat the NSA

An anonymous reader writes: In response to a slew of new research about network-level attacks against Tor, academics from the U.S. and Israel built a new Tor client called Astoria designed to beat adversaries like the NSA, GCHQ, or Chinese intelligence who can monitor a user’s Tor traffic from entry to exit. Astoria differs most significantly from Tor’s default client in how it selects the circuits that connect a user to the network and then to the outside Internet. The tool is an algorithm designed to more accurately predict attacks and then securely select relays that mitigate timing attack opportunities for top-tier adversaries. Read more of this story at Slashdot.

Continue reading here:
Academics Build a New Tor Client Designed To Beat the NSA

How 1990s Encryption Backdoors Put Today’s Internet In Jeopardy

An anonymous reader writes: While debate swirls in Washington D.C. about new encryption laws, the consequences of the last crypto war is still being felt. Logjam vulnerabilities making headlines today is “a direct result of weakening cryptography legislation in the 1990s, ” researcher J. Alex Halderman said. “Thanks to Moore’s law and improvements in cryptanalysis, the ability to break that crypto is something really anyone can do with open-source software. The backdoor might have seemed like a good idea at the time. Maybe the arguments 20 years ago convinced people this was going to be safe. History has shown otherwise. This is the second time in two months we’ve seen 90s era crypto blow up and put the safety of everyone on the internet in jeopardy.” Read more of this story at Slashdot.

Visit link:
How 1990s Encryption Backdoors Put Today’s Internet In Jeopardy

Wind Turbines With No Blades

An anonymous reader writes: Wired has a profile of Spanish company Vortex Bladeless and their unusual new wind turbine tech. “Their idea is the Vortex, a bladeless wind turbine that looks like a giant rolled joint shooting into the sky. The Vortex has the same goals as conventional wind turbines: To turn breezes into kinetic energy that can be used as electricity.” Instead of relying on wind to push a propeller in a circular motion, these turbines rely on vorticity — how wind can strike an object in a particular way to generate spinning vortices of air. Engineers usually try to avoid this — it’s what brought down the Tacoma Narrows Bridge. But this Spanish company designed the turbine computationally to have the vortices occur at the same time along its entire height. “In its current prototype, the elongated cone is made from a composite of fiberglass and carbon fiber, which allows the mast to vibrate as much as possible (an increase in mass reduces natural frequency). At the base of the cone are two rings of repelling magnets, which act as a sort of nonelectrical motor. When the cone oscillates one way, the repelling magnets pull it in the other direction, like a slight nudge to boost the mast’s movement regardless of wind speed. This kinetic energy is then converted into electricity via an alternator that multiplies the frequency of the mast’s oscillation to improve the energy-gathering efficiency.” Read more of this story at Slashdot.

Originally posted here:
Wind Turbines With No Blades