Weekly tech bulletin for week ending 2015-05-17. Verizon buys AOL.
Published: Mon, 18 May 2015 by Rad
Published: May 11, 2015 mobile
Residential plants provide enough energy
E-Kaia, as the project was called, is a portable device using the residual energy of plants during photosynthesis and turning it into electrical energy. Different to other similar chargers which demand at least some 100 square meters of plants to generate enough electricity to charge a mobile phone, E-Kaia only needs one healthy plant.
The residual vegetable energy is captured by a biocircuit buried with outputs to the surface, reaching 5 volts and 600 milliampers, producing no damage to the plants. Under this circumstances, a mobile phone can be charged in just one hour and a half.
Although the exact details of the implemented technology are not public due to the patent being processed, the project has received numerous funds in innovation contests - such as in Jump Chile 2013 and the Avonni National Award to Innovation of 2014 - which give credit of its viability.
Follow en.institutomanquehue.org to read more.
Published: May 13, 2015 security
Security researchers say the zero-day flaw affects "millions" of machines in datacenters around the world.
The cause is a widely-ignored, legacy virtual floppy disk controller that, if sent specially crafted code, can crash the entire hypervisor. That can allow a hacker to break out of their own virtual machine to access other machines - including those owned by other people or companies.
The bug, found in open-source computer emulator QEMU, dates back to 2004. Many modern virtualization platforms, including Xen, KVM, and Oracle's VirtualBox, include the buggy code. VMware, Microsoft Hyper-V, and Bochs hypervisors are not affected.
The flaw may be one of the biggest vulnerabilities found this year. It comes just over a year after the notorious Heartbleed bug, which allowed malicious actors to grab data from the memory of servers running affected versions of the open-source OpenSSL encryption software.
Follow www.zdnet.com to read more.
Published: May 15, 2015 legal
Data retention will be a useful tool
The researchers examined Germany's former most popular pirate video streaming site Kino.to in 2011, which was shut down after police raided dozens of homes across Europe. Established in 2008, it became one of the most notorious illegal video-streaming sites in the world, allowing users to stream some of the latest movies for free.
But its shutdown by German police, though quick and effective, had a minimal effect on the black content market, the researchers say. Relying on clickstream data of more than 5,000 internet users across three countries, researchers determined that there was "little difficulty" for those users to switch to other sites.
When one pirate site was shut down, more emerged
When one pirate site was shut down, more emerged, turning a single site-blocking effort into a game of Whac-a-Mole. A number of governments, including Germany, France, and the UK, have enacted laws and fought cases in the courts to seek the shutdown of websites in recent years. A case against arguably the most famous piracy site, The Pirate Bay, at the UK's High Court resulted in the major Internet providers in the UK blocking access to the site. The block reportedly had little effect on the site's traffic, and remains one of the top 500 sites on the internet today, according to Alexa rankings.
Follow www.globalhacknews.com to read more.
Published: May 13, 2015 software
Excited to reach a milestsone. Probably much like the brain, the ImageIdentify neural network has many layers, containing a variety of different kinds of neurons.
Wolfram research is excited to be able to say that we've reached a milestone: there's finally a function called ImageIdentify built into the Wolfram Language that lets you ask, "What is this a picture of?" - and get an answer.
It won't always get it right, but most of the time I think it does remarkably well. And to me what's particularly fascinating is that when it does get something wrong, the mistakes it makes mostly seem remarkably human.
With ImageIdentify built right into the Wolfram Language, it's easy to create APIs, or apps, that use it. And with the Wolfram Cloud, it's also easy to create websites - like the Wolfram Language Image Identification Project.
What is image identification really about? There are some number of named kinds of things in the world, and the point is to tell which of them a particular picture is of. Or, more formally, to map all possible images into a certain set of symbolic names of objects.
We don't have any intrinsic way to describe an object like a chair. All we can do is just give lots of examples of chairs, and effectively say, "Anything that looks like one of these we want to identify as a chair." So in effect we want images that are "close" to our examples of chairs to map to the name "chair", and others not to.
Underneath, of course, it's just running code - with very simple inner loops that are pretty much the same as, for example, in my neural network programs from the beginning of the 1980s ...
It's a fascinating - and extremely unusual - example in the history of ideas: neural networks were studied for 70 years, and repeatedly dismissed. Yet now they are what has brought us success in such a quintessential example of an artificial intelligence task as image identification.
Follow blog.stephenwolfram.com to read more.
Published: May 14, 2015 science
Fix it's own cracks with a limestone-producing bacteria!
No matter how carefully it is mixed or reinforced, all concrete eventually cracks, and under some conditions, those cracks can lead to collapse.
"If you have cracks, water comes through - in your basements, in a parking garage. Secondly, if this water gets to the steel reinforcements - in concrete we have all these steel rebars - if they corrode, the structure collapses."Professor Henk Jonkers, via cnn.com
"We have invented bioconcrete - that's concrete that heals itself using bacteria," says professor Henk Jonkers, of Delft University of Technology, in the Netherlands. The bioconcrete is mixed just like regular concrete, but with an extra ingredient - the "healing agent." It remains intact during mixing, only dissolving and becoming active if the concrete cracks and water gets in.
Concrete is extremely alkaline and the "healing" bacteria must wait dormant for years before being activated by water. Jonkers chose bacillus bacteria for the job, because they thrive in alkaline conditions and produce spores that can survive for decades without food or oxygen.
Follow edition.cnn.com to read more.
Published: May 11, 2015 tech
Russia joins China in seeking technological independence from the US.
Despite the company's name, the Elbrus-4C uses the Elbrus ISA (instruction set architecture), not SPARC. Elbrus is a closed and proprietary architecture, so exact details are hard to come by, but we do know about one particularly interesting feature: x86 emulation. If you remember the Transmeta Crusoe, it sounds like the Elbrus architecture does something very similar: at run-time, x86 program code can be translated and executed through a virtual machine. This method isn't as fast as providing x86 support in hardware, but it gets the job done.
The Elbrus-4C, while highly advanced by home-grown Russian standards, is by no means a bleeding-edge chip; it's a quad-core part built on TSMC's last-last-generation 65nm process. It's capable of hitting a rather heady clockspeed of 800MHz, which equates to (a fairly decent) 25 gigaflops of 64-bit double-precision math.
Pricing on the Elbrus-4C is unknown, but a report by the Russian website Kommersant says the chip is "cheaper" than chips out of the US. In recent years, there has been a marked move by countries such as Russia and China to use home-grown chips, rather than continuing to rely on American technology.
Follow arstechnica.com to read more.
Published: May 11, 2015 tech
The device will become one of the challengers of the currently well-known Raspberry Pi barebones computer.
The earliest version of the device comes with a 512 MB of RAM, 1 Ghz processor, and an onboard storage amounting to 4 GB. Chip contains some technical elements similar to that of Pi. One of these elements is that it is also built around an Arm chip. However, networking technologies have been incorporated in the Chip for improved performance. These include the Bluetooth 4.0 and wi-fi which are not customarily present in the configuration of a standard Raspberry.
The Chip is capable of running a Linux operating system. With the aid of a basic composite connector, the gadget is also capable of connecting to monitors and other display devices. A handheld version of the gadget called the Pocket Chip, is also being developed by Next Thing. The company plans to make this version commercially available at a price of about $49.
In his writing on Bit-Tech, a hardware news site, Gareth Halfacree stressed out that there will be a need to raise the price of Chip to $24 in the effort of matching Pi's graphical abilities. This cost is closer to the price of the newest version of Pi which costs $35, the Raspberry Pi 2.
Follow www.dailytimesgazette.com to read more.
Published: May 13, 2015 tech
The deal disclosed this Tuesday is projected to be completed this summer. Regulators will still need to approve this deal to be finalized.
Verizon will purchase every share of AOL at $50. AOL has been focusing on video advertising for the past months since their disastrous split with Time Warner back in 2000. Verizon will pay 17 percent more than the closing stock price of AOL last Monday, which is at $42.59.
Reports said Tim Armstrong, AOL's CEO and chairman, will remain in order to run AOL's operations after the acquisition.
AOL has a number of digital properties under its belt, which include the brands Engadget, TechCrunch and The Huffington Post, but the development of AOL's advertising was the trigger of the acquisition.
Follow www.techtimes.com to read more.
Published: May 12, 2015 open source
That's a remarkable increase in usage in a relatively short period of time. In fact, it's doubled over the last five years, and has become a critical part of the way companies of all sizes work today.
Just for fun, I took a look at survey responses from 2007 to find that some actually labeled open source as a "gimmick," and a majority believed that a startup software vendor could ONLY be successful with a product/service that is NOT open source.
- 78% run part or all of its operations on OpenSource
- 93% said their organizatio's use of open source increased
- 64% of companies currently participate in open source projects
- 55% believe open source delivers superior security
Follow opensource.com to read more.
Published: May 11, 2015 privacy concerns
"Why has Google refused to be transparent about its ability to provide wiretaps for Hangouts?"Christopher Soghoia asked Richard Salgado, Google's director for law enforcement, via www.reddit.com
But Salgado dodged the question, saying Hangouts is encrypted "in transit" and that "there are legal authorities that allow the government to wiretap communications." As a Redditor eloquently put it, "this means that Hangouts are only encrypted on their way between your computer and Google's servers. Once they arrive at Google's end, Google has full access."
Follow motherboard.vice.com to read more.
Our previous bulletins stories
- Weekly tech bulletin for week ending on 2015-05-10. 11 Technology news as it happened.
- Weekly tech bulletin 2015-05-03. Top 12 Technology news from previous week.
- Weekly tech bulletin 2015-04-26. Top 15 news in Tech from previous week.