NTSB: SpaceShipTwo broke apart when “feathering” activated early

Ground imagery showing the destruction of SpaceShipTwo. Kenneth Brown/Reuters The Guardian has a good summary of how things are proceeding with the two-day-old National Transportation Safety Board (NTSB) investigation into the destruction of Virgin Galactic’s SpaceShipTwo , which occurred at approximately 10:12am PDT on October 31. Some eyewitnesses reported seeing an explosion when the craft broke up, prompting speculation that the accident had something to do with SpaceShipTwo’s hybrid rocket engine—an engine that was making its first flight with its new fuel. However, at a press conference Sunday afternoon, acting NTSB chairman Christopher Hart said that crash investigators had already located the cause of the accident that injured 43-year old pilot Peter Siebold and took the life of 39-year old co-pilot Michael Alsbury: the spacecraft’s “feathering” mode had been engaged early. This put SpaceShipTwo in a high-drag configuration unsuitable for powered flight, and the craft then broke apart. The feathering functionality is designed to be used in the later stage of SpaceShipTwo’s flight. It changes the shape of the craft, swinging its wings upward and allowing them to move to the optimum angle to slow the craft down on descent, like a shuttlecock falling to the ground in a game of badminton. Read 6 remaining paragraphs | Comments

Read this article:
NTSB: SpaceShipTwo broke apart when “feathering” activated early

“The Devil had possessed his netbook”—and other tales of IT terror

Few things are scarier than 4Chan. But our readers told a few stories that spooked us. Paul van der Werf Earlier this week, we asked readers to share their most frightening tales of technology terror and support horror. And via both comments and Twitter (using the hashtag #ITTalesofTerror), in poured stories that raised goosebumps from those of us who have worked in IT at one point or another. After reading through them, we’ve picked out some reader favorites and a few of our own. Some of us at Ars were inspired to recount further tales of horror from our own IT careers—including one of mine that I’ve saved for last; it should cause a shudder of recognition from our more veteran readers and a bit of schadenfreude from those too young to remember five-and-a-quarter-inch floppy disks. The chamber of horrors Many readers had short tales of terror about mishaps in the closed spaces where we hide our network infrastructure. Eli Jacobowitz (@creepdr on Twitter) shared a short, shocking scenario by tweet : “Raccoons in the network closet (not kidding).” David Mohundro shared another story of a somewhat more smelly infrastructure invasion that brings new meaning to “data scrubbing”: “I saw our IT guys lugging shop vacs through the lower parking deck one day. There was a sewage backup into the server room.” Read 24 remaining paragraphs | Comments

Original post:
“The Devil had possessed his netbook”—and other tales of IT terror

It came from the server room: Halloween tales of tech terror

It’s never a good day when the Halon discharges in the server room. Keith4048 It all began when the monitors started bursting into flames. Well, at least that’s when I knew I had walked into a tech support horror story. Back in the day when the cathode-ray tube was still the display of choice and SVGA really was super, I was working as a network engineer and tech support manager for a government contractor at a large military research lab. I spent two years on the job, and I learned in the process that Murphy was an optimist. The experience would provide me with enough tech horror stories and tales of narrow escape through the most kludged of hardware and software hacks ever conceived to last a lifetime—and to know that I would much rather be a writer than work in tech support ever again. Of course, all of us have tech horror stories to tell, especially those of us who were “early adopters” before the term was de rigueur. So we’re looking for you, our readers, to share yours. The most bone-chilling and entertaining of which we’ll publish tomorrow in honor of Halloween—that day each year when some people change their Twitter handles to pseudo-spooky puns, and others just buy bags of candy to have ready for the traditional wave of costumed home invaders. Read 10 remaining paragraphs | Comments

Read the original:
It came from the server room: Halloween tales of tech terror

Leader of “most sophisticated cybercrime ring” sentenced to 11 years

An Estonian man who US authorities said was a leader in one of the world’s “most sophisticated” illegal hacking organizations was handed an 11-year prison sentence in connection to a scheme that got away with $9.4 million from ATMs across the globe. The sentence handed to Sergei Nicolaevich Tšurikov on Friday is among the largest ever given a hacker in the US. The biggest term , 20 years, was first given to Albert Gonzalez in 2010 for being the ringleader of the hack of retail outlet TJX . “A leader of one of the most sophisticated cybercrime rings in the world has been brought to justice and sentenced,” United States Attorney Sally Quillian Yates of Atlanta  said  about Tšurikov’s sentencing. “In just one day in 2008, an American credit card processor was hacked in perhaps one of the most sophisticated and organized computer fraud attacks ever conducted.” Read 4 remaining paragraphs | Comments

Taken from:
Leader of “most sophisticated cybercrime ring” sentenced to 11 years

Bluetooth-tracking beacon programs uncovered in LA, Chicago

The Logan Square stop on the Chicago Transit Authority blue line. Kumar McMillan A report from BuzzFeed News Wednesday suggests that the tracking beacons that cropped up in New York phone booths last year have spread to new cities, including Los Angeles and Chicago. The beacons have been sprinkled around transit centers, including Chicago Transit Authority rail stops and LA bus stops. The beacons, created by Gimbal, connect with devices like smartphones via Bluetooth and can harvest information like the device’s Bluetooth address, as well as the date, time, and location of connection. The beacons in New York were installed as a “test” by advertising company Titan 360. Though officials called for their removal over a year ago, they were not taken out of phone booths until earlier this month, after they were used in promotions for the Tribeca Film Festival and shopping app ShopAdvisor. Marketing company Martin Outdoor Media confirmed the beacons’ existence in LA to BuzzFeed News, as did the CTA in Chicago. Martin called the beacons part of a “pilot program” in a press release last week, while the CTA stated its beacons were part of a “two-week test,” to be followed up by a bigger test for a longer period with beacons placed and tracked by Titan. Read 1 remaining paragraphs | Comments

Follow this link:
Bluetooth-tracking beacon programs uncovered in LA, Chicago

45,000-year-old modern human bone yields a genome

The femur from which the DNA samples originated. Bence Viola, MPI EVA Svante Pääbo’s lab at the Max Planck Institute for Evolutionary Anthropology in Germany has mastered the process of obtaining DNA from ancient bones. With the techniques in hand, the research group has set about obtaining samples from just about any bones they can find that come from the ancestors and relatives of modern humans. In their latest feat, they’ve obtained a genome from a human femur found in Siberia that dates from roughly the time of our species’ earliest arrival there. The genome indicates that the individual it came from lived at a time where our interbreeding with Neanderthals was relatively recent, and Europeans and Asians hadn’t yet split into distinct populations. The femur comes from near the town of Ust’-Ishim in western Siberia. It eroded out of a riverbank that contains a mixture of bones, some from the time where the sediments were deposited (roughly 30-50,000 years ago), and some likely older that had been washed into the sediments from other sites. The femur shows features that are a mixture of those of paleolithic and modern humans, and lacks features that are typical of Neanderthal skeletons. Two separate samples gave identical carbon radioisotope dates; after calibration to the 14 C record, this places the bone at 45,000 years old, give or take a thousand years. That’s roughly when modern humans first arrived in the region. That also turned out to be consistent with dates estimated by looking at the DNA sequence, which placed it at 49,000 years old (the 95 percent confidence interval was 30-65,000 years). Read 11 remaining paragraphs | Comments

Read this article:
45,000-year-old modern human bone yields a genome

Microsoft “loves Linux” as it makes Azure bigger, better

Wait, what happened at this thing?!? Microsoft In San Francisco today, Microsoft CEO Satya Nadella said something that was more than a little surprising: Microsoft loves Linux. The operating system once described as a “cancer” by Nadella’s predecessor, Steve Ballmer, is now being embraced (if not extended) with open arms, at least when it comes to Redmond’s Azure cloud platform. Nadella told us that some 20 percent of VMs on Azure use the open source operating system. The San Francisco event served dual purpose. First, it was an opportunity for Microsoft to tell the world just how much Azure had grown—Microsoft may not have been first to the cloud computing scene, but a ton of investment and development means that the company is now credible, and, if Gartner’s magic quadrants are to be believed, world-leading. Second, the event served to introduce new features and partnerships. Microsoft’s major sales pitch for Azure is essentially a three-pronged argument that Microsoft is the only company that can really do cloud right. Read 10 remaining paragraphs | Comments

Read More:
Microsoft “loves Linux” as it makes Azure bigger, better

Natural underground CO2 reservoir reveals clues about storage

Sandia National Lab Reducing our emissions of carbon dioxide quickly enough to minimize the effects of climate change may require more than just phasing out the use of fossil fuels. During the phase-out, we may need to keep the CO 2 we’re emitting from reaching the atmosphere—a process called carbon capture and sequestration. The biggest obstacle preventing us from using CCS is the lack of economic motivation to do it. But that doesn’t mean it’s free from technological constraints and scientific unknowns. One unknown relates to exactly what will happen to the CO 2 we pump deep underground. As a free gas, CO 2 would obviously be buoyant, fueling concerns about leakage. But CO 2 dissolves into the briny water found in saline aquifers at these depths. Once the gas dissolves, the result is actually more dense than the brine, meaning it will settle downward. With time, much of that dissolved CO 2 may precipitate as carbonate minerals. But how quickly does any of this happen? Having answers will be key to understanding how well we really sequester the carbon. Read 14 remaining paragraphs | Comments

Visit link:
Natural underground CO2 reservoir reveals clues about storage

Ferrari hit with lawsuit for taking over Facebook fan page

Ferrari You don’t need a degree in marketing to know that using social media right is an important part of building up any kind of brand these days. And the growing value of fan websites and Facebook fan pages seems to be leading to an increase in legal disputes over who controls them. The latest example involves Italian sports car manufacturer Ferrari. Last week, a Swiss father and son sued Facebook and Ferrari after control of their popular Ferrari fan page was taken away from them. In their lawsuit (PDF) , Olivier and Sammy Wasem claim they controlled “by far the most popular Facebook pages for Ferrari enthusiasts,” which they created in 2008. The complaint describes Sammy Wasem as an aspiring Formula One driver whose “passion for racing and Ferrari drew many fellow fans together.” By 2009, the Wasem’s Ferrari page had more than 500,000 fans. In February of that year, Olivier Wasem got an e-mail from a Ferrari employee stating that “legal issues force us [Ferrari] in taking over the formal administration of” the Ferrari fan page. The same employee promised “to preserve and even enhance your role in the Ferrari Web Presence and communities.” Read 16 remaining paragraphs | Comments

Visit link:
Ferrari hit with lawsuit for taking over Facebook fan page

Obama signs “BuySecure” initiative to speed EMV adoption in the US

A chip card and the inside of a card’s chip. Explain That Stuff On Friday, President Obama signed an executive order to speed the adoption of EMV-standard cards in the US. The transition to EMV—an acronym eponymous of Europay, MasterCard, and Visa, the companies that developed the standard—has been slow to gain traction in the US. The EMV standard will require credit card companies to do away with the magnetic stripe cards that are common today in favor of cards with embedded-chips that will offer more secure credit card transactions. Lawmakers and credit card companies confirmed earlier this year that the US would make the transition to EMV cards in October 2015. But over the past several months, retail stores like Target , Home Depot , Michaels , Neiman Marcus , and more have sustained major hacks that caused the retailers to loose credit card information and personal information of millions upon millions of customers, giving new urgency to the call for more secure credit cards. Speaking at the Consumer Financial Protection Bureau on Friday , President Obama said that the federal government would apply “chip-and-PIN technology to newly issued and existing government credit cards, as well as debit cards like Direct Express.” The White House also said that all payment terminals at federal agencies will soon be able to accept embedded chip cards. Read 7 remaining paragraphs | Comments

Read More:
Obama signs “BuySecure” initiative to speed EMV adoption in the US