Beautiful video inside a zebrafish embryo brain

Researchers borrowed optical techniques from astronomy and ophthalmology to dramatically improve imaging of biological samples. This video, created by scientists at the HHMI Janelia Farm Research Campus, shows neurons in the brain of a living zebrafish embryo. You can see the difference in quality when their new technique of “adaptive optics” is switched on and off. According to physicist/engineer Eric Betzig who led the research, “The results are pretty eye-popping.” Yes. Yes they are. ( HHMI News , via National Geographic )

More here:
Beautiful video inside a zebrafish embryo brain

Turkish government blocks Youtube to shut down spread of phone recording in which PM conspires to hide millions from investigators

The Turkish government has doubled down on its Internet censorship program, blocking all of Youtube in addition to its ban on Twitter . Despite theories about the political theatre of blocking Twitter , it seems like Prime Minister Recep Tayyip Erdoğan is also genuinely concerned with suppressing a recording of a conversation with his son in which he conspires to hide the money he is thought to have received through corrupt dealing. As with the Twitter block, this one was undertaken as an administrative order from the PM’s office, without judicial oversight. The Twitter ban has since been rescinded by the Turkish courts, but the block may not be lifted before the elections. There is still no official announcement by TİB, the government authority in charge of internet regulation and the organ who implements blocking decisions. However, YouTube’s URL and title appeared on BTK’s (higher organ that includes TİB) web page where the blocked URLs are listed. The site is still accessible through some ISPs, but the blocking is expected to be implemented fully in an hour’s time by all ISPs. The government banned Twitter last week on the grounds that the company fails to remove ‘illegal’ content according to Turkish authorities. Yesterday, an administrative court ruled for the suspension of the execution of Twitter blocking. Last week, Google Inc. has announced that it declined the requests coming from the Turkish government in recent weeks to remove YouTube videos revealing extensive corruption involving PM, his family, ministers, businessmen and several government officials, the Wall Street Journal reported. Turkish government takes down YouTube too [updated] [Noyan Ayan/Webrazzi] ( via Engadget )        

More here:
Turkish government blocks Youtube to shut down spread of phone recording in which PM conspires to hide millions from investigators

Turkey orders block of Twitter’s IP addresses

Just a few days after Turkey’s scandal-rocked government banned Twitter by tweaking national DNS settings, the state has doubled down by ordering ISPs to block Twitter’s IP addresses , in response to the widespread dissemination of alternative DNS servers, especially Google’s 8.8.8.8 and 8.8.4.4 (these numbers were even graffitied on walls ). Following the ban, Turkey’s Twitter usage grew by 138 percent. Now that Twitter’s IP range is blocked, more Turkish Internet users are making use of Tor and VPNs, and they continue to use SMS for access to the service. It’s interesting that Prime Minister Recep Tayyip Erdoğan has singled out Twitter for his attacks (“Twitter, schmitter! We will wipe out Twitter . I don’t care what the international community says.”) Why not Facebook or Google Plus? I’m not certain, but my hypothesis is that Facebook and Google’s “real names” policy — which make you liable to disconnection from the service if you’re caught using an alias — make them less useful for political dissidents operating in an environment in which they fear reprisals. According to the Internet activist collective Telecomix, there also were reports that devices configured to use Google’s DNS service or other DNS providers outside the country were being hijacked to a local DNS server by the Wi-Fi network at Istanbul’s airport. The move has driven up the usage of VPN services and the Tor anonymizing network in Turkey. Telecomix has been providing a list of Tor gateways for Turkish users. Tor network metrics show a huge spike in users directly connecting to the Tor network over the past few days, growing from 25,000 users to 35,000 since March 19. Downloads of VPN software have also exploded with VPN apps for Apple’s iOS and Google’s Android becoming the most downloaded apps from their respective app stores in Turkey. After DNS change fails, Turkish government steps up Twitter censorship [Sean Gallagher/Ars Technica]        

Continue reading here:
Turkey orders block of Twitter’s IP addresses

Unless companies pay, their Facebook updates reach 6 percent of followers

Facebook continues to tighten the screws on the businesses that use the service to market to their customers. Independent research shows that new updates from businesses reach about six percent of the people who follow those businesses. It is rumored that Facebook intends to reduce this number to “between one and two percent” over time. Businesses that want to reach the people who follow them at higher rates will have to pay Facebook to reach them through paid advertisements. If you’re building your business’s marketing and customer relations strategy atop Facebook, take note — and remember that if you have a real website, all your readers see your posts, even if you don’t pay Facebook! Facebook declined to comment on the percentage of fans that see posts from a typical Facebook page (the last publicly disclosed figure was 16 percent in the summer of 2012), but the company admitted in December that posts from Pages are reaching less users. Facebook attributes this change to increased competition as more people and companies join its service. The typical user is inundated with 1,500 posts per day from friends and Pages, and Facebook picks 300 to present in the News Feed. Getting squeezed out are both posts from Pages and meme photos as Facebook shifts its focus to what it deems “high quality” content. The solution for brands with declining engagement, according to Facebook, is to buy ads. “Like many mediums, if businesses want to make sure that people see their content, the best strategy is, and always has been, paid advertising,” a spokeswoman said in an emailed statement. The Free Marketing Gravy Train Is Over on Facebook [Victor Luckerson/Time] ( Image: flaming LIKE , a Creative Commons Attribution Share-Alike (2.0) image from zaigee’s photostream )        

View the original here:
Unless companies pay, their Facebook updates reach 6 percent of followers

Lost Bakshi Lord of the Rings footage found

If you remember the first film adaptation of The Lord of the Rings , the 1978 animated version by Ralph Bakshi–the legendary outsider director behind Fritz the Cat , Wizards , American Pop and Fire and Ice –you’ll recall the experience was a mixed bag. The movie was a dark, moody, oversaturated vision of Tolkien’s world, with stunning design and many memorable scenes. Bakshi used rotoscoping to trace live footage for animation, and posterization to give it a rough, hand-made look. Both techniques allowed many corners to be cut, but at the time, the film’s PR claimed Rings was the “the first movie painting.” Sadly, Bakshi’s 133-minute film left viewers stranded after the battle at Helm’s Deep, just as Gollum is about to lead Sam and Frodo into Mordor. Roughly two-thirds through Tolkien’s three-part story, Bakshi didn’t get to made the final installment. Rankin-Bass, the studio behind the 1977 TV adaptation of The Hobbit , churned out The Return of the King as a “sequel” in 1980, with little artistic resemblance to Bakshi’s vision. Now, quietly, some of the scenes from that 1978 classic have been rescued from the “cutting room floor,” Bakshi, now 75, said when I reached him via email this week. Eddie Bakshi, Bakshi’s son, has been busy scanning in original “cel” artwork from Bakshi’s archives, timing them to the cartoon’s original exposure sheets, and posting the scenes on Bakshi’s Facebook page . (The Facebook page also includes clips from Bakshi’s other films, though it appears none of these are new.) The particular Rings footage that has been restored comes from the Gandalf vs. Balrog fight sequence, and it is brief. One clip is a three-shot, 12-second sequence of the two characters falling into the void, titled “ Gandalf recalls fighting the Balrog. ” The other is a 10-second shot described as “ Gandalf duels with the Balrog and smashes into the endless staircase. ” In the film, the Balrog battle was recounted via minimally-animated still images. “If you’re getting close to delivery, it’s better to cut the animation out to make the scene work, than racing to reanimate it to make the cut work,” Bakshi said, recalling the hectic atmosphere as the film’s deadline loomed. Asked why Gandalf and the Balrog look quite different in these new scenes, compared to the rotoscoped Gandalf and Balrog seen on The Bridge of Khazad-dûm, Bakshi said, “Well, it’s hazy, but I was trying to make memories different than the real time story. I was wrestling with trying to separate the styles.” It’s unclear what other lost scenes from The Lord of the Rings might be found, shot and posted. Due to low budgets and little wiggle room to fix, reanimate or make cuts, “Very little or nothing ended up on the floor,” Bakshi said. If any gems are discovered, Eddie Bakshi will decide whether they are worthy of reshooting. For the elder Bakshi, it’s “been there, done it.” Bakshi fans should feel nostalgia for this old footage, which evoked the days of hand-drawn animation: “It was great to see it again,” he added, “but I got aggravated at the animator again for making the mistake 30 years later.” Still, Bakshi was effusive in his praise for his team of artists who made the movie, which included a young Tim Burton, in his first job out of college. “My animators–old school–were the greatest ever,” Bakshi said, “barring none.”        

Read More:
Lost Bakshi Lord of the Rings footage found

Zuckerberg phones Obama to complain about NSA spying

The day after a Snowden leak revealed that the NSA builds fake versions of Facebook and uses them to seed malicious software in attacks intended to hijack “millions” of computers, Facebook CEO and founder Mark Zuckerberg telephoned President Obama to complain about the NSA’s undermining of the Internet’s integrity. As many have pointed out, it would have been nice to hear Zuckerberg taking the Internet’s side before his own stock portfolio was directly affected, but better late than never. Zuckerberg’s post on his conversation excoriates the US government for its Internet sabotage campaign, and calls on the USG to “be the champion for the internet, not a threat.” Curiously, Zuckerberg calls for “transparency” into the NSA’s attacks on the Internet, but stops short of calling for an end to government-sponsored attacks against the net. In the end, though, Zuckerberg calls on companies to do a better job of securing themselves and their users against intrusive spying. It’s not clear how that will work for Facebook, though: its business model is predicated on tricking, cajoling, and siphoning personal data out of its users and warehousing it forever in a neat package that governments are unlikely to ignore. I’m told that 90% of US divorce proceedings today include Facebook data; this is a microcosm of the wider reality when you make it your business to stockpile the evidentiary chain of every human being’s actions. The internet works because most people and companies do the same. We work together to create this secure environment and make our shared space even better for the world. This is why I’ve been so confused and frustrated by the repeated reports of the behavior of the US government. When our engineers work tirelessly to improve security, we imagine we’re protecting you against criminals, not our own government. The US government should be the champion for the internet, not a threat. They need to be much more transparent about what they’re doing, or otherwise people will believe the worst. I’ve called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform. So it’s up to us — all of us — to build the internet we want. Together, we can build a space that is greater and a more important part of the world than anything we have today, but is also safe and secure. I’m committed to seeing this happen, and you can count on Facebook to do our part. As the world becomes more complex and governments everywhere struggle, trust in the internet is more important today than ever. ( Image: Mark Zuckerberg Facebook SXSWi 2008 Keynote , a Creative Commons Attribution (2.0) image from deneyterrio’s photostream )        

Link:
Zuckerberg phones Obama to complain about NSA spying

Samsung Galaxy back-door allows for over-the-air filesystem access

Developers from the Replicant project (a free Android offshoot) have documented a serious software back-door in Samsung’s Android phones , which “provides remote access to the data stored on the device.” They believe it is “likely” that the backdoor could provide “over-the-air remote control” to “access the phone’s file system.” At issue is Samsung’s proprietary IPC protocol, used in its modems. This protocol implements a set of commands called “RFS commands.” The Replicant team says that it can’t find “any particular legitimacy nor relevant use-case” for adding these commands, but adds that “it is possible that these were added for legitimate purposes, without the intent of doing harm by providing a back-door. Nevertheless, the result is the same and it allows the modem to access the phone’s storage.” The Replicant site includes proof-of-concept sourcecode for a program that will access the file-system over the modem. Replicant has created a replacement for the relevant Samsung software that does not allow for back-door access. Samsung Galaxy devices running proprietary Android versions come with a back-door that provides remote access to the data stored on the device. In particular, the proprietary software that is in charge of handling the communications with the modem, using the Samsung IPC protocol, implements a class of requests known as RFS commands, that allows the modem to perform remote I/O operations on the phone’s storage. As the modem is running proprietary software, it is likely that it offers over-the-air remote control, that could then be used to issue the incriminated RFS messages and access the phone’s file system. …The incriminated RFS messages of the Samsung IPC protocol were not found to have any particular legitimacy nor relevant use-case. However, it is possible that these were added for legitimate purposes, without the intent of doing harm by providing a back-door. Nevertheless, the result is the same and it allows the modem to access the phone’s storage. However, some RFS messages of the Samsung IPC protocol are legitimate (IPC_RFS_NV_READ_ITEM and IPC_RFS_NV_WRITE_ITEM) as they target a very precise file, known as the modem’s NV data. There should be no particular security concern about these as both the proprietary implementation and its free software replacement strictly limit actions to that particular file. Samsung Galaxy Back-door        

See more here:
Samsung Galaxy back-door allows for over-the-air filesystem access

Games console/phone refurbishing kit with specialized case-opening tools

Thinkgeek have teamed up with Ifixit to create a Game Console & Electronics Refurbishing Kit , with all the tools you need to crack the case on most games consoles, phones and other gadgets. The 3.5lb box also includes a bunch of cleaning stuff for removing scuffs and marks, to spruce up your old gear to look like the day you unboxed it. Game Console & Electronics Refurbishing Kit gives you both opening and cleaning tools Works with * Xbox One (also Xbox 360) * PlayStation 4 (also PS Vita, PS3, PSP, PS2, and the original PlayStation) * Wii U (also Wii), NES, SNES, Gamecube, N64 * Nintendo 3DS (also DSi, DS Lite, and the Nintendo DS) * Dreamcast * Game Boy Advance SP (also Game Boy Advance, Game Boy Cartridges) * PC building and repair * Smartphone repair * and a bazillion other electronic devices Includes: * 26 Bit Driver Kit   * 4 mm Driver Handle – rubberized for a sturdy grip and magnetized to hold bits and screws   * 60 mm Driver Extension – increase your reach into smaller devices   * Metal Tweezers – grab hold of small screws and components   * 26 bits in the following sizes:     * Flathead sizes 1.5, 2, 2.5, 3 mm     * Phillips sizes #000, #00, #0, #1, #2     * Torx sizes T4, T5, T6     * Torx Security sizes TR7, TR8, TR9, TR10, TR15, TR20 (compatible with non-security)     * Hex sizes 1.5, 2, 2.5, 3, 4 mm     * Tri-wing sizes #0, #1     * Spanner size U3.0   * Anti-Static Wrist Strap   * Dust Blower   * ESD-safe Tweezers (electrostatic damage)   * Plastic Spudger   * Metal Spudger Set   * Xbox 360 Opening Tool   * Cleaning Swabs   * Plastic Opening Tools   * Surface Detailing Block (great for refreshing old or dirty plastic parts)   * German Detailing Eraser with Brush   * Pencil Sharpener   * Small ESD-safe Brush (electrostatic damage)   * Large ESD-safe Brush (electrostatic damage)   * 1/4″ Driver Handle     * Phillips #2     * Flathead 6 mm     * Game Bit 4.5 mm (Nintendo Nut Setter #6)     * Game Bit 3.8 mm (Nintendo Nut Setter #8) Game Console & Electronics Refurbishing Kit        

View article:
Games console/phone refurbishing kit with specialized case-opening tools

Delhi police lost password for complaints portal in 2006, haven’t checked it since

The Delhi police lost the password for a portal that hosted complaints that had been passed on by the Central Vigilance Commission after an initial vetting. 667 complaints had been judged serious enough to be passed onto the police since the password was lost in 2006, but none have been acted upon, because no one had the password. Now they have the password. Presumably, the 667 unserved complainants believed the police to be either too slow or incompetent to have gotten back to them. Each Delhi government department under the CVC, including the MCD, DDA and several investigating agencies, have a chief vigilance officer to look into complaints. If a complaint reaches the CVC, either it tackles it independently or it sends it to the concerned department. In 2006, a portal monitored by the CVC was created, putting the complaints it sent to departments online. Each department could access the portal with a password. Complaints regarding the Delhi Police were also sent to the portal. Every year, the CVC holds meetings with government departments to take stock of the complaints with them. Sources said that since 2006, the CVC had got no feedback on complaints pending with the police. Vigilance complaints pile up as Delhi Police doesn’t know password [Shalini Narayan/Indian Express] ( via BBC News )        

See the original article here:
Delhi police lost password for complaints portal in 2006, haven’t checked it since

Work to begin on 180-mile "Nicaragua Canal" to rival Panama

Wired’s Greg Miller takes a look at the huge risks involved in digging enormous, container-ship size canals . There are many lingering questions. How HKND–apparently the only company to submit a bid–managed to land the deal, isn’t clear, leaving many Nicaraguans frustrated by their government’s lack of transparency. … Exactly where the money to build the canal will come from is another mystery, as is the role, if any, the Chinese government will play. Wang Jing has denied that the government is involved in the project, as have government officials. But some analysts suspect otherwise. … Nor has any assessment of the environmental impacts of the project.        

Continue Reading:
Work to begin on 180-mile "Nicaragua Canal" to rival Panama