Mathematical conjecture generates beautiful lifelike form

The deceptively simple Collatz Conjecture is one of mathematics’ most difficult puzzles. Alex Bellos shows off a cool rendering by Edmund Harris that looks like a beautiful life form from the sea. (more…)

Visit link:
Mathematical conjecture generates beautiful lifelike form

Final Stage: incredible graphical demo shows what you can do with 4 kilobytes of source code

Graphical demos created with severe code-length limitations sometimes betray the techniques used to fit a world into a few kilobytes: tessellating textures, featureless fractals, repetitive sequences, and so on. Final Stage , by 0x4015 , is not one of those demos. [ via ] Here it is rendered on a XEON x560 with a GTX 1070 video card and 24GB of RAM. Check out all the other uploads from the Revision 2017 demoparty. Eidolon , by Poo-brain, won in the 64k category: https://www.youtube.com/watch?v=-bwLkEwLIgQ

View original post here:
Final Stage: incredible graphical demo shows what you can do with 4 kilobytes of source code

Blue horseshoe crab blood sells for up to $14,000 per quart

Unfortunately for horseshoe crabs, their blue blood is so good at detecting harmful bacteria that the hapless critters are being scooped up by the hundreds to be attached to industrial horseshoe crab blood milking stations. Now the International Union for Conservation of Nature has categorized the American horseshoe crab is “vulnerable” to extinction. From Popular Mechanics : Their distinctive blue blood is used to detect dangerous Gram-negative bacteria such as E. coli in injectable drugs such as insulin, implantable medical devices such as knee replacements, and hospital instruments such as scalpels and IVs. Components of this crab blood have a unique and invaluable talent for finding infection, and that has driven up an insatiable demand. Every year the medical testing industry catches a half-million horseshoe crabs to sample their blood. But that demand cannot climb forever. There’s a growing concern among scientists that the biomedical industry’s bleeding of these crabs may be endangering a creature that’s been around since dinosaur days. There are currently no quotas on how many crabs one can bleed because biomedical laboratories drain only a third of the crab’s blood, then put them back into the water, alive. But no one really knows what happens to the crabs once they’re slipped back into the sea. Do they survive? Are they ever the same?

View post:
Blue horseshoe crab blood sells for up to $14,000 per quart

New materials allow 2.8l/day of solar-powered desert water-vapor extraction

Researchers from MIT, UC Berkeley, Lawrence Berkeley, and King Abdulaziz City for Science and Technology published a paper in Science describing a solar-powered device that uses a new type of metal organic framework (MOF) to extract up to three litres of water per day from even the most arid desert air. (more…)

Continue reading here:
New materials allow 2.8l/day of solar-powered desert water-vapor extraction

Prison inmates built working PCs out of ewaste, networked them, and hid them in a closet ceiling

Inmates in Ohio’s Marion Correctional Institution smuggled computer parts out of an ewaste recycling workshop and built two working computers out of them, hiding them in the ceiling of a training room closet ceiling and covertly patching them into the prison’s network. (more…)

Originally posted here:
Prison inmates built working PCs out of ewaste, networked them, and hid them in a closet ceiling

Hackers hijacked a bank’s DNS and spent 5 hours raiding its customers’ accounts

Kaspersky Labs reports that an unnamed large Brazilian financial institution with $27B in assets was compromised by hackers who took over its DNS — by hijacking its NIC.br account — and for 5 hours were able to impersonate the bank to all its online customers (and possibly to control its ATMs) in order to plunder their accounts and steal their credit card details. (more…)

Original post:
Hackers hijacked a bank’s DNS and spent 5 hours raiding its customers’ accounts

Do you want to play a game? Ransomware asks for high score instead of money

Rensenware’s warning screen asks for a high score, rather than the usual pay off, to decrypt your files. At this point, Ars readers have heard countless tales of computer users being forced to pay significant sums to unlock files encrypted with malicious ransomware . So we were a bit surprised when word started to trickle out about a new bit of ransomware that doesn’t ask for money. Instead, “Rensenware” forces players to get a high score in a difficult PC shoot-em-up to decrypt their files. As Malware Hunter Team noted yesterday , users on systems infected with Rensenware are faced with the usual ransomware-style warning that “your precious data like documents, musics, pictures, and some kinda project files” have been “encrypted with highly strong encryption algorithm.” The only way to break the encryption lock, according to the warning, is to “score 0.2 billion in LUNATIC level” on TH12 ~ Undefined Fantastic Object . That’s easier said than done, as this gameplay video of the “bullet hell” style Japanese shooter shows. Gameplay from TH12 ~ Undefined Fantastic Object on Lunatic difficulty. Players needed to get 200 million points to unlock the “Rensenware” malware. As you may have guessed from the specifics here, the Rensenware bug was created more in the spirit of fun than maliciousness. After Rensenware was publicized on Twitter, its creator, who goes by Tvple Eraser on Twitter and often posts in Korean, released an apology for releasing what he admitted was “a kind of highly-fatal malware.” Read 5 remaining paragraphs | Comments

Read More:
Do you want to play a game? Ransomware asks for high score instead of money

Inuit cartography: maps carved in driftwood

The Inuit carve portable, waterproof, floating maps out of driftwood for use in navigating the littoral. These three wooden maps show the journey from Sermiligaaq to Kangertittivatsiaq, on Greenland’s East Coast. The map to the right shows the islands along the coast, while the map in the middle shows the mainland and is read from one side of the block around to the other. The map to the left shows the peninsula between the Sermiligaaq and Kangertivartikajik fjords. From The Decolonial Atlas , an antidote to all the other ones: Kurdistan in Kurdish , Lakota Territory , Agricultural Maps .

Read more here:
Inuit cartography: maps carved in driftwood

A startup wants to fill your house with projection-mapped effects, which are the cooolest thing ever

The most reliably impressive technology I’ve played with this decade is projection-mapping: using powerful LCD projectors to paint 3D surfaces with images tailored to map exactly over those surfaces, turning plaster and paint into stone, wood, or animated surfaces. (more…)

View original post here:
A startup wants to fill your house with projection-mapped effects, which are the cooolest thing ever

Poisoned wifi signals can take over all Android devices in range, no user intervention required

Vulnerabilities in the Broadcom system-on-a-chip that provides wifi for many Android devices mean that simply lighting up a malicious wifi access point can allow an attacker to compromise every vulnerable device in range, without the users having to take any action — they don’t have to try to connect to the malicious network. (more…)

Taken from:
Poisoned wifi signals can take over all Android devices in range, no user intervention required