AmiMoJo writes: This morning, the United Launch Alliance (ULA) successfully launched a Boeing-built satellite into orbit as part of the U.S. Air Force's Global Positioning System (GPS). This $131 million satellite was the final addition to the Air Force's most recent 12-satellite GPS series, known as the Block IIF satellites. The GPS Block IIF satellites were launched to improve the accuracy of GPS. Before the Block IIF series, the accuracy of GPS could be off by 1 meter. With the new Block IIF satellites in place that error is down to 42 centimeters.
An anonymous reader writes: A new paper from researchers in India and Australia, "Automatic Sarcasm Detection: A Survey," highlights one of the strangest and ironically most humorous facets of the problems in machine learning and humour. The paper outlines ten years of research efforts from groups interested in detecting sarcasm in online sources. It details the ways that academia has approached the sarcasm problem, including flagging authors and ring-fencing sarcastic data. However, the report concludes that the solution to the problem is not necessarily one of pattern recognition [PDF], but rather a more sophisticated matrix that has some ability to understand context.
Carly Page writes with a story from The Inquirer, where: As part of its Surface Pro charger recall, Microsoft has chosen to replace the sleek, shapely matt[e] plastic original with a cable approximately half the length and ordered from an off-brand manufacturer, in our case China's I-Sheng Electric Wire and Cable Company. Writer Peter Gothard points out a plausible reason for the length, though: "The extraordinarily short length of the cord is presumably to discourage behaviour that resulted in the "tightly wrapped" or "repeatedly bent" cables catching fire in at least 56 separate incidents."
jones_supa writes: Gordon F. Kelly of Forbes whipped up a frenzy over Windows 10 when a Voat user found out in a little experiment that the operating system phones home thousands of times a day. ZDNet's Ed Bott has written a follow-up where he points out how the experiment should not be taken too dramatically. 602 connection attempts were to 192.168.1.255 using UDP port 137, which means local NetBIOS broadcasts. Another 630 were DNS requests. Next up was 1,619 dropped connection attempts to address 188.8.131.52, which is a Microsoft Teredo server. The list goes on with NTP, random HTTP requests, and various cloud hosts which probably are reached by UWP apps. He summarizes by saying that a lot of connections are not at all about telemetry. However, what kind of telemetry and data-mined information Windows specifically sends still remains largely a mystery; hopefully curious people will do analysis on the operating system and network traffic sent by it.
An anonymous reader writes: In an epic smack-down, Simon Phipps examines a recent article by some VCs with an apparently strong track record in open source startups and finds the way they see the world makes them plain wrong about Red Hat, OSI licenses, Apache and probably everything else they talk about.
Patrick O'Neill writes: Election time in Iran means increased censorship for the country's tens of millions of Internet users. But this months parliamentary election, experts say, comes with a new level of aggressive censorship from a government notorious for authoritarianism in cyberspace. "What's happening [right now] is far more advanced than anything we've seen before," said Karl Kathuria, CEO of Psiphon Inc., the company behind the widely popular encryption and circumvention tool Psiphon. "It's a lot more concentrated attempt to stop these services from working."
itwbennett writes: Cisco has published an advisory for a vulnerability with a CVSS (Common Vulnerability Scoring System) score of 10 that was discovered by researchers from Exodus Intelligence. According to the advisory, 'a vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and IKE version 2 (v2) code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.' As CSO's Dave Lewis points out, 'the part of this that is most pressing is that Cisco claims that there are over a million of these deployed.'
And attackers have not been sitting on their thumbs.
And attackers have not been sitting on their thumbs.
campuscodi writes: The Node.js Foundation has taken the Express Node.js framework under its wing. Express will be a new incubation project for the Foundation. IBM, which purchased Express maintainer StrongLoop last September, is contributing the code. Part of the reason for allowing the foundation to oversee Express is to build a diverse contributor base, which is important given the framework's popularity.
A few days ago, we posted reports that a major finding -- the discovery of the long-predicted gravity waves -- was expected to be formally announced today, and reader universe520 is the first to note this coverage in the Economist : It is 1.3 billion years after two black holes merged and sent out gravitational waves. On Earth in September 2015, the faintest slice of those waves was caught. That slice, called GW150914 and announced to the world on February 11th, is the first gravitational wave to be detected directly by human scientists. It is a triumph that has been a century in the making, opening a new window onto the universe and giving researchers a means to peer at hitherto inaccessible happenings, perhaps as far back in time as the Big Bang. Reader DudeTheMath adds: NPR has a nice write-up of the newly-published results: "[R]esearchers say they have detected rumblings from that cataclysmic collision as ripples in the very fabric of space-time itself. The discovery comes a century after Albert Einstein first predicted such ripples should exist. ... The signal in the detector matches well with what's predicted by Einstein's original theory, according to [Saul] Teukolsky [of Cornell], who was briefed on the results." Update: 02/11 18:08 GMT by T : Worth reading: this letter, inspirational and informative, from MIT president L. Rafael Reif, about the discovery. (Hat tip to Brian Kulak.)
Mark.JUK writes: A group of Japanese scientists working on a project managed by Hiroshima University claim to have successfully built a Terahertz (THz) transmitter, which is implemented as a silicon CMOS integrated circuit and can transmit a signal running at 10Gbps per data channel over multiple channels in the 275-305GHz band for a top speed of 100Gbps (Gigabits per second). But crucially nobody has mentioned the distance at which this speed could be achieved, particularly since the THz band isn't likely to have much of a reach. It also sits very close to the region used by lasers.
Patrick O'Neill writes: As U.S. legislatures posture toward legally mandating backdoored encryption, a new Harvard study suggests that a ban would push the market overseas because most encryption products come from over non-U.S. tech companies. "Cryptography is very much a worldwide academic discipline, as evidenced by the quantity and quality of research papers and academic conferences from countries other than the U.S.," the researchers wrote.
An anonymous reader writes: Google has confirmed that it will be updating its 'right to be forgotten' so that any hidden content under the ruling is removed from all versions of its search engine in countries where it has been approved. Until now Google had only been removing results from the originating country and European versions of its search engine, such as google.co.uk and google.de. The EU had previously asked for an extension of the rule to include all versions of Google. Last year, French data protection authority CNIL threatened the tech giant with a sanction should it not remove data from all of its global platforms – such as google.com – in addition to its European sites. Now, Google's new extension of the 'right to be forgotten' is expected to come into force over the next few weeks.
An anonymous reader writes: Three researchers have published a paper that details a new method of cracking Bitcoin "brain wallet passwords," which is 2.5 times speedier than previous techniques and incredibly cheap to perform. The researcher revealed that by using a run-of-the-mill Amazon EC2 account, an attacker would be able to check over 500,000 Bitcoin passwords per second. For each US dollar spent on renting the EC2 server, an attacker would be able to check 17.9 billion password strings. To check a trillion passwords, it would cost the attacker only $55.86 (€49.63). In the end, they managed to crack around 18,000 passwords used for real accounts.
David Rothman writes: Props to Amazon. The Helvetica font will be restored to a more readable weight than the anorexic one in the latest update for E Ink Kindles. Let's hope that an all-bold switch—or, better, a font weight adjuster of the kind that Kobo now offers—will also happen. I've queried Amazon about that possibility. Meanwhile thanks to Slashdot community members who spoke up against the anorexic Helvetica!