Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission + - Scientists Discover New Pain-Sensing Organ (theguardian.com)

An anonymous reader writes: A new organ involved in the sensation of pain has been discovered by scientists, raising hopes that it could lead to the development of new painkilling drugs. Researchers say they have discovered that the special cells that surround the pain-sensing nerve cells that extend into the outer layer of skin appear to be involved in sensing pain. The scientists say the finding offers new insight into pain and could help answer longstanding conundrums.

Writing in the journal Science, the researchers reveal how they examined the nature of cells in the skin that, they say, have largely been overlooked. These are a type of Schwann cell, which wrap around and engulf nerve cells and help to keep them alive. The study has revealed these Schwann cells have an octopus-like shape. After examining tissues, the team found the body of the cells sits below the outer layer of the skin, but that the cells have long extensions that wrap around the ends of pain-sensing nerve cells that extend up into the epidermis, the outer layer of the skin. The scientists were surprised at the findings because it has long been believed that the endings of nerve cells in the epidermis were bare or unwrapped. With the special Schwann cells and the nerves they engulf forming a mesh-like network, the researchers say they have essentially discovered a new pain-sensing organ. “It is a two-cell receptor organ: the nerve and Schwann cell together,” Prof Patrik Ernfors, a co-author of the research from the Karolinska Institute in Sweden, said.

Submission + - America's Elderly Seem More Screen-Obsessed Than the Young (economist.com)

An anonymous reader writes: Many parents and grandparents will grumble about today’s screen-obsessed youth. Indeed, researchers find that millennials look at their phones more than 150 times a day; half of them check their devices in the middle of the night; a third glance at them immediately after waking up. And yet, when all screens are accounted for, it is in fact older folk who seem most addicted. According to Nielsen, a market-research firm, Americans aged 65 and over spend nearly ten hours a day consuming media on their televisions, computers and smartphones. That is 12% more than Americans aged 35 to 49, and a third more than those aged 18 to 34 (the youngest cohort for whom Nielsen has data).

Submission + - SPAM: Advertisers Blacklist News Stories Containing Forbidden Words

Zorro writes: Companies are increasingly insisting their ads do not appear near articles or videos that contain any of a long list of words.

Like many advertisers, Fidelity Investments wants to avoid advertising online near controversial content. The Boston-based financial-services company has a lengthy blacklist of words it considers off-limits.

If one of those words is in an article’s headline, Fidelity won’t place an ad there. Its list earlier this year, reviewed by The Wall Street Journal, contained more than 400 words, including “bomb,” “immigration” and “racism.” Also off-limits: “Trump.”

Top 15 Forbidden Words: Dead, Shooting, Murder, Gun, Rape, Bomb, Died, Attack, Killed, Suicide, Trump, Crash, Crime, Explosion, Accident.

Link to Original Source

Submission + - Microsoft Surface Pro 6 and Surface Book 2 are throttle locking to 400 MHz (zdnet.com)

intensivevocoder writes: Owners of Microsoft's Surface Pro 6 and Surface Book 2 systems are finding themselves stuck at Pentium 2 speeds, as numerous user complaints indicate that the ultra-portables are throttling the processor down to 400 MHz, a state that—in some instances—persists across reboots. While similar issues with Surface devices have occurred in the past, reports of issues have increased in frequency following a firmware update for the Surface Pro 6.

The throttle-lock appears to be caused by an Intel CPU flag called BD PROCHOT (bi-directional processor hot), which can be set by any peripheral, telling the processor to throttle down in order to decrease system temperature—a useful flag in cases where the CPU is operating within thermal limits, but other components tied to the CPU are running too hot, because of the demands placed on other components by processes on the CPU.

Submission + - The fashion line designed to trick surveillance cameras (theguardian.com)

Freshly Exhumed writes: Automatic license plate readers, which use networked surveillance cameras and simple image recognition to track the movements of cars around a city, may have met their match, in the form of a T-shirt. Or a dress. Or a hoodie. The anti-surveillance garments were revealed at the DefCon cybersecurity conference in Las Vegas on Saturday by the hacker and fashion designer Kate Rose, who presented the inaugural collection of her Adversarial Fashion line. Rose credits a conversation with a friend, the Electronic Frontier Foundation researcher Dave Maass, for inspiring the project: “He mentioned that the readers themselves are not very good,” she said. “They already read in things like picket fences and other junk. I thought that if they’re fooled by a fence, then maybe I could take a crack at it.”

Submission + - June Windows Security Patch Broke Many EMF Files (microsoft.com)

reg writes: A Windows security patch in June broke the display of many Windows Metafile graphics across all supported versions of Windows, resulting in many old PowerPoint files and Word documents not displaying figures, and graphics from some popular applications not displaying, including at least some ESRI GIS products and files created using the devEMF driver in R. This likely also impacts EMF files created with Open Source Office suites. While the problem can be fixed by recreating the files using a newer set of options, or resorting to using bitmaps, it means that presentations or documents that used to display perfectly no longer do. Microsoft promised a fix in July, but there is still no news of when it will be available.

Submission + - What Does It Take to Keep a Classic IBM 1401 Mainframe Alive? (ieee.org)

corrosive_nf writes: Think your vintage computer hardware is old? Ken Shirriff, Robert Garne, and their associates probably have you beat. The IBM 1401 was introduced in 1959, and these guys are keeping one alive in a computer museum. The system is reportedly a pain to maintain, as the volunteers have to go digging through historical archives and do some detective work to figure out solutions to pretty much anything. Many things that we take for granted are done very differently in old computers. For instance, the IBM 1401 uses 6-bit characters, not bytes. It used decimal memory addressing, not binary. It’s also interesting how much people could accomplish with limited resources, running a Fortran compiler on the 1401 with just 8K of memory. Finally, working on the 1401 has given them a deeper understanding of how computers really work. It's not a black box; you can see the individual transistors that are performing operations and each ferrite core that stores a bit.

Submission + - Energy Cost of 'Mining' Bitcoin More Than Twice That of Copper Or Gold (theguardian.com)

An anonymous reader writes: The amount of energy required to “mine” one dollar’s worth of bitcoin is more than twice that required to mine the same value of copper, gold or platinum, according to a new paper, suggesting that the virtual work that underpins bitcoin, ethereum and similar projects is more similar to real mining than anyone intended. One dollar’s worth of bitcoin takes about 17 megajoules of energy to mine, according to researchers from the Oak Ridge Institute in Cincinnati, Ohio, compared with four, five and seven megajoules for copper, gold and platinum.

Other cryptocurrencies also fair poorly in comparison, the researchers write in the journal Nature Sustainability, ascribing a cost-per-dollar of 7MJ for ethereum and 14MJ for the privacy focused cryptocurrency monero. But all the cryptocurrencies examined come off well compared with aluminium, which takes an astonishing 122MJ to mine one dollar’s worth of ore. [...] To account for the wild fluctuations in cryptocurrency price, and therefore effort expended by miners, the researchers used a median of all the values between January 1, 2016 and June 30, 2018, and attempted to account for the geographic dispersal of bitcoin miners. “Any cryptocurrency mined in China would generate four times the amount of CO2 compared to the amount generated in Canada,” they write, highlighting the importance of such country-dependent accounting.

Submission + - Voting Machine Manual Instructed Election Officials To Use Weak Passwords (vice.com)

An anonymous reader writes: An election security expert who has done risk-assessments in several states since 2016 recently found a reference manual that appears to have been created by one voting machine vendor for county election officials and that lists critical usernames and passwords for the vendor's tabulation system. The passwords, including a system administrator and root password, are trivial and easy to crack, including one composed from the vendor’s name. And although the document indicates that customers will be prompted periodically by the system to change the passwords, the document instructs customers to re-use passwords in some cases—alternating between two of them—and in other cases to simply change a number appended to the end of some passwords to change them.

The vendor, California-based Unisyn Voting Solutions, makes an optical-scan system called OpenElect Voting System for use in both precincts and central election offices. The passwords in the manual appear to be for the Open Elect Central Suite, the backend election-management system used to create election definition files for each voting machine before every election—the files that tell the machine how to apportion votes based on the marks voters make on a ballot. The suite also tabulates votes collected from all of a county’s Unisyn optical scan systems. The credentials listed in the manual include usernames and passwords for the initial log-in to the system as well as credentials to log into the client software used to tabulate and store official election results.

Submission + - Do older I.T. workers doing end-user support find it gets harder with age? 2

King_TJ writes: I've worked in I.T. for almost 30 years now in various capacities, from bench PC technician to web page designer, support specialist, network manager, and was self-employed for a while doing on-site service and consulting too. In all that time, I've always felt like I had a good handle on troubleshooting and problem-solving while providing good, friendly customer service at the same time. But recently, I've started feeling like there's just a little too much knowledge to keep straight in my brain. If I'm able to work on a project on my own terms, without interruptions or distractions? Sure, I can get almost anything figured out. But it's the stress of users needing immediate assistance with random problems, thrown out willy-nilly in the constant barrage of trouble tickets, that I'm starting to struggle with.

For example, just this morning, a user had a question about whether or not she should open an email about quarantined junk mail to actually look through it. I briefly noted a screen shot she attached that showed a typical MS Office quarantined email message and replied that she could absolutely view them at her discretion. (I also noted that I tend to ignore and delete those myself, unless I'm actually expecting a specific piece of email that I didn't receive — in case it was actually in the junk mail filter.) Well, that was the wrong answer, because that message was a nicely done phishing attempt; not a legit message — and she tried to sign in through it. Then, I had to do a mad scramble to change her password and help her get the new one working on her phone and computer. With more time to think about what happened, I'm realizing now that I should have known the email was fake because we recently made some changes to our Office 365 environment so junk mail is going directly into Junk folders in Outlook — and those types of messages aren't really coming in to people anymore. On top of that? We're trying to migrate people to using 2 factor authentication so I was instructed to get this user on it while I'm changing her account info. Makes sense, but I had to dig all over to find our document with instructions on how to do that too. I just couldn't remember where they told me they saved the thing, several weeks ago, when they talked about creating the new document in one of our weekly meetings. Am I just getting old and starting to lose it? Is everybody feeling this way about I.T. support these days? Are things just changing at too quick a pace for anyone to stay on top of it all?

I mean, in just the last few weeks, we've dealt with users failing to get their single sign-on passwords to work because something broke that only an upgrade to the latest build of Windows 10 corrected. We've had an office network go bezerk and randomly drop people's Internet access, ability to print, etc. — because one of the switches started intermittently failing under load. We've had online training to set up a new MDM solution, company-wide. And I had to single-handedly set up a new server running the latest version of vCenter for our ESXi servers. And all of that's while trying to get in some studying on the side to get my Security Plus cert., getting Macs with broken screens mailed out for service, a couple of new computers deployed, and accounts properly shut down for an employee who left, plus the usual grind of "mindless" tickets like requests to create new shared DropBox team folders for groups. It's a LOT to juggle, but I was pretty happy with my ability to keep all of it moving right along for years. Now — I'm starting to have doubts.

Submission + - Flaws In Popular SSD Drives Bypass Hardware Disk Encryption (zdnet.com)

An anonymous reader writes: Researchers have found flaws that can be exploited to bypass hardware encryption in well known and popular SSD drives. Master passwords and faulty standards implementations allow attackers access to encrypted data without needing to know the user-chosen password.

SSDs from Micron (Crucial) and Samsung are affected. These are SSDs that support hardware-level encryption via a local built-in chip, separate from the main CPU. Some of these devices have a factory-set master password that bypasses the user-set password, while other SSDs store the encryption key on the hard drive, from where it can be retrieved. The issue is worse on Windows, where BitLocker defers software-level encryption to hardware encryption-capable SSDs, meaning user data is vulnerable to attacks without the user's knowledge. More in the research paper.

Submission + - Microsoft Working On Porting Sysinternals To Linux (zdnet.com)

An anonymous reader writes: A Microsoft exec has confirmed yesterday that the company's engineers are working on porting the highly popular Sysinternals software package to Linux. Microsoft engineers have already ported the ProcDump utility and are currently working on porting ProcMon as well. More tools to follow.

Microsoft's decision to port this highly popular debugging utility to Linux comes after two months ago, in September, Scott Guthrie, Microsoft's executive vice president of the cloud and enterprise group, revealed that "sometimes slightly over half of Azure VMs are Linux." With Linux's growing adoption as the preferred OS for running Azure VMs, it's only natural that Azure engineers are now looking into porting their favorite debugging utilities to Linux, for both themselves but also for the company's customers.

Submission + - It's Not Your Imagination: Smartphone Battery Life is Getting Worse (washingtonpost.com)

An anonymous reader writes: For the last few weeks, I’ve been performing the same battery test over and over again on 13 phones. With a few notable exceptions, this year’s top models underperformed last year’s. The new iPhone XS died 21 minutes earlier than last year’s iPhone X. Google’s Pixel 3 lasted nearly an hour and a half less than its Pixel 2. Phone makers tout all sorts of tricks to boost battery life, including more-efficient processors, low-power modes and artificial intelligence to manage app drain. Yet my results, and tests by other reviewers I spoke with, reveal an open secret in the industry: the lithium-ion batteries in smartphones are hitting an inflection point where they simply can’t keep up.

“Batteries improve at a very slow pace, about 5 percent per year,” says Nadim Maluf, the CEO of a Silicon Valley firm called Qnovo that helps optimize batteries. “But phone power consumption is growing up faster than 5 percent.” Blame it on the demands of high-resolution screens, more complicated apps and, most of all, our seeming inability to put the darn phone down. Lithium-ion batteries, for all their rechargeable wonder, also have some physical limitations, including capacity that declines over time — and the risk of explosion if they’re damaged or improperly disposed. And the phone power situation is likely about to get worse. New ultrafast wireless technology called 5G, coming to the U.S. neighborhoods soon, will make even greater demands on our beleaguered batteries.

Submission + - Ask Slashdot: What Happened To The Prank Apps That Used To Be Popular?

OpenSourceAllTheWay writes: Back when PCs were more boxy looking than today and people used floppy disks to store stuff there were a bunch of prank apps around that one could put on a DOS or Windows computer to annoy the hell out of siblings, classmates, coworkers and others. (Here is a listing of some older prank apps: https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.prank-ideas-centra... and some more recent Android prank apps https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.androidheadlines.c... ) Some prank apps would flip the Windows desktop upside down. Some would make the mouse pointer move in strange ways or make it give you the middle finger. Some would cause you to hit the right keyboard key and still mistype a word. Some would play an audio file in the background every now and then that gave the impression of your computer making strange noises for unknown reasons, even turning the OS volume up before the sound, and then down again, making it impossible to make the sounds stop. There are many more computer users today than there were back then. Yet there doesn't seem to be much new in the way of prank apps — at least for Windows. Why is that? Did Windows 8 cause PC users to lose their humor?

Slashdot Top Deals

Doubt isn't the opposite of faith; it is an element of faith. - Paul Tillich, German theologian and historian

Working...