‘Energy Beet’ Power Is Coming To America

Hugh Pickens writes writes “Gosia Wonzniacka reports that farmers in Fresno County, California, supported by university experts and a $5 million state grant, are set to start construction of the nation’s first commercial-scale bio-refinery to turn beets into biofuel with farmers saying the so-called ‘energy beets’ can deliver ethanol yields more than twice those of corn per acre because beets have a higher sugar content per ton than corn. ‘We’re trying to reduce greenhouse gas emissions and to shift our transportation fuels to a lower carbon content,’ says Robert Weisenmiller. ‘The beets have the potential to provide that.’ Europe already has more than a dozen such plants, so the bio-refinery would resurrect a crop that has nearly vanished. The birthplace of the sugar beet industry, California once grew over 330,000 acres of the gnarly root vegetable (PDF), with 11 sugar mills processing the beets but as sugar prices collapsed, the mills shut down. So what’s the difference between sugar beets and energy beets? To produce table sugar, producers are looking for sucrose, sucrose and more sucrose. Energy beets, on the other hand, contain multiple sugars, meaning sucrose as well as glucose, fructose and other minor sugars, called invert sugars. To create energy beet hybrids, plant breeders select for traits such as high sugar yield, not just sucrose production. America’s first commercial energy beet bio-refinery will be capable of producing 40 million gallons of ethanol annually but the bio-refinery will also bring jobs and investment, putting about 80 beet growers and 35,000 acres back into production.” Read more of this story at Slashdot.

More:
‘Energy Beet’ Power Is Coming To America

Google Implements DNSSEC Validation For Public DNS

wiredmikey writes “Google on Tuesday announced that it now fully supports DNSSEC (Domain Name System Security Extensions) validation on its Google Public DNS resolvers. Previously, the search giant accepted and forwarded DNSSEC-formatted messages but didn’t actually perform validation. ‘With this new security feature, we can better protect people from DNS-based attacks and make DNS more secure overall by identifying and rejecting invalid responses from DNSSEC-protected domains,’ Yunhong Gu, Team Lead, Google Public DNS, wrote in a blog post. According to Gu, about 1/3 of top-level domains have been signed, but most second-level domains remain unsigned. According to NIST, there has been no progress in enabling DNSSEC on 98 percent of all 1,070 industry domains tested as of March 18, 2013. ‘Overall, DNSSEC is still at an early stage and we hope that our support will help expedite its deployment,’ Gu said.” Read more of this story at Slashdot.

Read More:
Google Implements DNSSEC Validation For Public DNS

First Ever Cellular-Level Video of a Whole Brain Working

This video is the first time scientists have ever been able to image the whole brain of a vertebrate creature in such a way that you can see individual cells and simultaneously how they’re firing and behaving in real time. This is how the brain really, really works—and it’s amazing. More »

Continue Reading:
First Ever Cellular-Level Video of a Whole Brain Working

Researcher: Hackers Can Jam Traffic By Manipulating Real-Time Traffic Data

An anonymous reader writes “Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat Europe. ‘If, for example, an attacker drives a route and collects the data packets sent to Google, the hacker can replay them later with a modified cookie, platform key and time stamps, Jeske explained in his research paper (PDF). The attack can be intensified by sending several delayed transmissions with different cookies and platform keys, simulating multiple cars, Jeske added. An attacker does not have to drive a route to manipulate data, because Google also accepts data from phones without information from surrounding access points, thus enabling an attacker to influence traffic data worldwide, he added.’ ‘You don’t need special equipment for this and you can manipulate traffic data worldwide,’ Jeske said.” Read more of this story at Slashdot.

Visit link:
Researcher: Hackers Can Jam Traffic By Manipulating Real-Time Traffic Data

A Quarter of Sun-Like Stars Host Earth-Size Worlds

astroengine writes “Although there appears to be a mysterious dearth of exoplanets smaller than Earth, astronomers using data from NASA’s Kepler space telescope have estimated that nearly a quarter of all sun-like stars in our galaxy play host to worlds 1-3 times the size of our planet. These astonishing results were discussed by Geoff Marcy, professor of astronomy at the University of California, Berkeley, during a talk the W. M. Keck Observatory 20th Anniversary Science Meeting on Thursday. ’23 percent of sun-like stars have a planet within (1-2.8 Earth radii) just within Mercury’s orbit,’ said Marcy. ‘I’ll say that again, because that number really surprised me: 23 percent of sun-like stars have a nearly-Earth-sized planet orbiting in tight orbits within 0.25 AU of the host stars.'” Read more of this story at Slashdot.

Continue Reading:
A Quarter of Sun-Like Stars Host Earth-Size Worlds

US Vulnerability Database Yanked Over Malware Infestation

hypnosec writes “The US government’s National Vulnerability Database (NVD) maintained by National Institute of Standards and Technology (NIST) has been offline for a few days because of malware infestation. The public-facing site has been taken offline because traces of malware were found on two of the web servers that house it. A post on Google+ containing an email from Gail Porter details the discovery of suspicious activity and subsequent steps taken by NIST. As of this writing the NVD website is still serving a page not found message.” Read more of this story at Slashdot.

Read the article:
US Vulnerability Database Yanked Over Malware Infestation

Massive Email Crash Hits Canadian ISP Shaw

rueger writes “One of Canada’s biggest cable/Internet providers has their customers in an outrage. ‘… after an interruption of Shaw’s email services Thursday led to millions of emails being deleted … About 70 per cent of Shaw’s email customers were affected when the company was troubleshooting an unrelated email delay problem and an attempted solution caused incoming emails to be deleted … Emails were deleted for a 10-hour period between 7:45 a.m. and 6:15 p.m. Thursday, although customers did not learn about the problem until Friday, and only then by calling customer service or accessing an online forum for Shaw Internet subscribers.’ To top it off, when Shaw did send out notices about this, they looked so much like every day phishing spam that many people deleted them unread.” Read more of this story at Slashdot.

Read More:
Massive Email Crash Hits Canadian ISP Shaw

QuickShoot Takes Secret Photos from Your iPhone’s Home Screen

iOS ( jailbroken ): Waiting for the camera app to load (and having other people see it on your screen) doesn’t exactly make for good covert photos. QuickShoot is a jailbreak tweak that takes a picture from your home screen without even opening the camera app. More »

Read More:
QuickShoot Takes Secret Photos from Your iPhone’s Home Screen

This Cheat Sheet Makes Learning Your Way Around Linux Easy

Whether you’re experimenting with Linux or making the switch, you’ll need to get your bearings. This Linux cheat sheet runs you through common and helpful commands you’ll need to know as you get comfortable with the command line. More »

Original post:
This Cheat Sheet Makes Learning Your Way Around Linux Easy

Watch this lizard shoot a five-foot stream of blood from its freaking eyeballs

Yes, blood . Blood out the eyes. It’s a display that’s as impressive as it is shocking — in a last-ditch effort to ward off predators, several species of horned lizards will increase the blood pressure in vessels surrounding their eyes, to the point that they actually rupture, gushing five-foot fountains of hemoglobin at the faces of coyotes, bobcats, and other beasts of prey native to the Sonoran desert. More »

Read More:
Watch this lizard shoot a five-foot stream of blood from its freaking eyeballs