Open-electronics.com article tipped that Ultimate Arduino Handbook creator, Mark Maffei has has published a 200 page book under a Creative Commons BY SA license via the Internet Archive. Download Ultimate Arduino Handbook Neurohackers Edition v1.0 to see yourself what interesting stuff it has in it. The book covers entire spectrum of Arduino awesomeness, with a distinct focus on neurohacking.
One in 10 communications companies claim to have deployed 5G technology already, according to a recent survey (see: With 5G technology, the time is now).
Some parts of the 5G standard are close to being finalized, but nothing has been ratified yet.
Furthermore, many of the constituent technologies (e.g., mmWave RF, beamforming, MIMO, etc.) are either new or not commonly used. SDN and NFV are considered critical enablers of the heightened utility and expanded flexibility that will be hallmarks of 5G networks.
Maintenance is a good idea for every website, but it’s a requirement for websites using open source code. The upside of open source is that everyone can participate. The downside is that means keeping up with everyone’s changes.
Maintenance is a simple process, but there are basic mistakes that many people make at least once.
Keeping time in Linux is not simple, and virtualization adds additional challenges and opportunities. This article reviews KVM, Xen, and Hyper-V related time-keeping techniques and the corresponding parts of the Linux kernel.
Swap is used to give processes room, even when the physical RAM of the system is already used up. In the past, some application vendors recommended swap of a size equal to the RAM, or even twice the RAM. Once the physical memory is used up, swap gets used. As the swap disk is much slower than RAM, the performance goes down, and thrashing occurs.
A typical reference to RAM is in the area of 100ns, accessing data on a SSD 150μs (so 1500 times of the RAM) and accessing data on a rotating disk 10ms (so 100.000 times the RAM).
With no swap configured as the system runs out of RAM, it has no swap to hand out. There is almost no time frame of reduced performance – the OOM kicks in immediately.
This article gives size recommendation for most modern Red Hat Linux systems ‘a part of the physical RAM’, for example, 20%. With this, the painfully slow phase of operation will not last as long, and the OOM kicks in earlier. Of course, there are scenarios when different behaviour is desired. Systems without swap can make sense.
Rules that prohibit photos or videos can prove almost impossible to enforce when nearly everyone carries a smartphone. But a new indoor privacy system has shown how the power of smart LED lighting could prevent people from taking illegal videos of a live events. LiShield has a capability to corrupt digital camera images and videos without interfering with human eyesight.
The prototype privacy measure uses a smart LED to give off a high-frequency flickering pattern that interferes with the camera sensors on mobile devices such as smartphones. Such flickering creates a vertical striped pattern effect in the photo or video frames taken by digital smartphone cameras without interfering with human eyesight or harming human eyes.
Such a privacy system is imperceptible to human eyes because it uses high-frequency flickering patterns beyond the limits of human eye sensitivity at around 80 Hertz. The current LiShield prototype relies upon custom-built smart LED hardware and software. Even if bars do not make video unuseable, such barcodes could then be automatically detected by the online servers of social media networks.
There are many interesting features of the Linux directory structure. This article covers some fascinating aspects of the /dev directory.
Device files are also known as device special files. Device files are employed to provide the operating system and users an interface to the devices that they represent. All Linux device files are located in the /dev directory, which is an integral part of the root (/) filesystem.
A crippling flaw in a widely used code library has fatally undermined the security of millions of encryption keys used in some of the highest-stakes settings, including national identity cards, software- and application-signing, and trusted platform modules protecting government and corporate computers. The weakness allows attackers to calculate the private portion of any vulnerable key using nothing more than the corresponding public portion.
The flaw is the one Estonia’s government obliquely referred to last month when it warned that 750,000 digital IDs issued since 2014 were vulnerable to attack. Last week, Microsoft, Google, and Infineon all warned how the weakness can impair the protections built into TPM products.
An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severe vulnerabilities in the Wi-Fi Protected Access II protocol that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points.
There is a proof-of-concept exploit called KRACK, short for Key Reinstallation Attacks. KRACK attack allows nasties, including eavesdropping, connection hijacking and malicious injection.
The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.
Physicists Will Be Announcing An “Unprecedented Discovery” On Monday – Here’s How To Watch Live | IFLScience
In the space of just a few weeks, the LIGO and VIRGO collaborations have announced the fourth detection of gravitational waves and three of their most prominent physicists received a Nobel Prize for their work.
And on Monday they will announce something new.
So how would warning labels on IoT devices that have had serious security vulnerabilities look?
Hilarious and also so needed. “Intrusions can occur anywhere”…
Or maybe it doesn’t need to be tech/legalspeak. WARNING! This connects to the INTERNET and BAD THINGS may happen!
Magically seeing around corners to spot moving people or objects may not rank first in most people’s superhero daydreams. But MIT researchers have shown how they could someday bestow that superpower upon anyone with a smartphone.
Their secret to peeking around corners is detecting slight differences in light patterns reflected from moving objects or people. Those reflected light patterns form subtle variations in the shadowy area near the base of each corner.
New camera technology: See around corners
Why Solar Microgrids May Fall Short in Replacing the Caribbean’s Devastated Power Systems – IEEE Spectrum
After the destruction inflicted across the Caribbean by hurricanes Harvey, Irma, and Maria, renewable energy advocates are calling for a rethink of the region’s devastated power systems. Renewables advocates argue that the island grids should leapfrog into the future by interconnecting hundreds or thousands of self-sufficient solar microgrids.
Some power system experts, however, say the solar-plus-batteries vision may be oversold.
What is clear is that several firms are trying to move fast while they talk, equipping rooftop solar systems with battery storage that enables consumers to operate independently of stricken grids. Such solar microgrids will deliver power to solar system owners far faster than grid restoration.
Giving up big transmission lines sounds optimistic to Rockwell at the Kauaʻi Island Utility Cooperative (KIUC), because batteries are still a rather costly way to balance variable renewable generation.
“You can build community-type microgrids that have some combination of natural gas generation, solar and storage,” says Enchanted Rock CEO Thomas McAndrew.
The LilyPad Arduino was designed for e-textiles and wearables projects. It along with an accompanying collection of power supplies, sensors, and actuators share unique design with large conductive sew tabs around the edges. These allow the boards to be sewn onto fabrics, and soft surfaces, using conductive thread to build working circuits. Essentially it’s a specially packaged Arduino, a sewable computer.
Today is a special day:
Friday the 13th is considered an unlucky day in Western superstition. It occurs when the 13th day of the month in the Gregorian calendar falls on a Friday, which can be the case at least once every year, and up to three times a year. The superstition surrounding this day may have arisen in the Middle Ages.
The fear of the number 13 has been given a scientific name: “triskaidekaphobia“; and on analogy to this the fear of Friday the 13th is called paraskevidekatriaphobia.
Japan has hundreds of mascots, or Yuru-chara, to promote companies, local culture, history or produce. It’s not an easy life, especially if you’re using public transport… but you might find some of the pictures of those occasions funny.
Oxford’s chief computer scientist says there hasn’t been any substantial progress towards general AI – NS Tech
Breakthroughs in narrow AI, no progress towards general AI. I think he’s a bit optimistic on self-driving cars, at least for Finnish winter driving
“We’re beginning to get there with better ideas about the brain, but all the progress in AI over the last decade which is real and exciting has been on narrow AI.”
While solving general intelligence could lead to the invention of machines that are self-aware, narrow AI involves computers carrying out focused tasks such as facial recognition.
A new type of laser cavity that builds off a Nobel-winning development in physics can take on any shape and switch the flow of light with a magnetic field. Kante and his colleagues describe their so-called topological cavities in the current issue of Science.
Normally, a laser cavity, where light amplification takes place, is shaped like a ring. In this case, the researchers made two types of photonic crystals that had different topologies.
They’ve essentially created a world in which anyone can make amazing hardware - Technotopia talked to Massimo Banzi and Fabio Violante, the co-creators of Arduino.