astroengine writes: New observations from NASA's Saturn-orbiting Cassini spacecraft have revealed at least 101 individual geysers erupting from Enceladus' crust and, through careful analysis, planetary scientists have uncovered their origin. From the cracked ice in this region, fissures blast out water vapor mixed with organic compounds as huge geysers. Associated with these geysers are surface "hotspots" but until now there has been some ambiguity as to whether the hotspots are creating the geysers or whether the geysers are creating the hotspots. "Once we had these results in hand, we knew right away heat was not causing the geysers, but vice versa," said Carolyn Porco, leader of the Cassini imaging team from the Space Science Institute in Boulder, Colo., and lead author of one of the research papers. "It also told us the geysers are not a near-surface phenomenon, but have much deeper roots." And those roots point to a large subsurface source of liquid water — adding Enceladus as one of the few tantalizing destinations for future astrobiology missions.
An anonymous reader writes: Today Senator Patrick Leahy (D-VT) introduced a bill that would ban bulk collection of telephone records and internet data for U.S. citizens. This is a stronger version of the legislation that passed the U.S. House in May, and it has support from the executive branch as well. "The bill, called the USA Freedom Act, would prohibit the government from collecting all information from a particular service provider or a broad geographic area, such as a city or area code, according to a release from Leahy's office. It would expand government and company reporting to the public and reform the Foreign Intelligence Surveillance Court, which reviews NSA intelligence activities. Both House and Senate measures would keep information out of NSA computers, but the Senate bill would impose stricter limits on how much data the spy agency could seek."
cartechboy writes: Tesla's been pretty quiet regarding its upcoming gigafactory lately, but that's about to change. It seems the Silicon Valley startup has reached an agreement with Panasonic in regards to the gigafactory, and Panasonic's going to end up having skin in the game. While the electronics giant was originally skeptical of Tesla's battery factory, it now isn't just on board, it's actually going to participate in the construction of this new facility. It's reported that Panasonic will invest 20 billion to 30 billion yen (194 million to $291 million at current exchange rates), and supply fabrication machinery necessary for cell production. That means Pansonic could end up footing the bill for $1 billion of the total $5 billion anticipated investment required for the gigafactory to get off the ground. If things continue to move forward, the Gigafactory should be online by the end of 2017.
An anonymous reader writes Promising "an appstore for the physical world," Amazon has just unveiled their new online market for products created using a 3-D printer. "Customization gives customers the power to remix their world," explains the co-founder of Mixee Labs (an Amazon partner), "and we want to change the way people shop online." Amazon's ability to sell you things before they've even been built is currently limited mostly to novelties like iPhone cases, jewelry, and bobbleheads that look like you. But this could be the beginning of mainstream 3D printing.
Qbertino (265505) writes I've been musing about a security setup to allow my coworkers/users access to files from the outside. I want security to be a little safer than pure key- or password-based SSH access, and some super-expensive RSA Token setup is out of question. I've been wondering whether there are any feasible and working FOSS and open hardware-based security token generator projects out there. It'd be best with ready-made server-side scripts/daemons. Perhaps something Arduino or Raspberry Pi based? Has anybody tried something like this? What are your experiences? What do you use? How would you attempt an open hardware FOSS solution to this problem?
jradavenport (3020071) writes "Using two years of continuous monitoring of my MacBook Air battery usage (once every minute), I have been able to study my own computer use patterns in amazing detail. This dataset includes 293k measurements, or more than 204 days of use over two years. I use the laptop over 50 hours per week on average, and my most productive day is Tuesday. Changes in my work/life balance have begun to appear over the two-year span, and I am curious whether such data can help inform how much computer use is healthy/productive."
Vigile (99919) writes "Last week NVIDIA announced the SHIELD Tablet and SHIELD Controller, and reviews are finally appearing this morning. Based on the high performance Tegra K1 SoC that integrates 192 Kepler architecture CUDA cores, benchmarks reveal that that the SHIELD Tablet is basically unmatched by any other mobile device on the market when it comes to graphics performance — it is more than 2.5x the performance of the Apple A7 in some instances. With that power NVIDIA is able to showcase full OpenGL versions of games like Portal and Half-Life 2 running at 1080p locally on the 19:12 display or output to a TV in a "console mode." PC Perspective has impressions of that experience as well as using the NVIDIA Game Stream technology to play your PC games on the SHIELD Tablet and controller. To go even further down the rabbit hole, you can stream your PC games from your desktop to your tablet, output them to the TV in console mode, stream your game play to Twitch from the tablet while overlaying your image through the front facing camera AND record your sessions locally via ShadowPlay and using the Wi-Fi Direct powered controller to send and receive audio. It is incredibly impressive hardware but the question remains as to whether or not there is, or will be, a market for Android-based gaming devices, even those with the power and performance that NVIDIA has built."
redletterdave (2493036) writes "Sharron Laverne Parrish Jr., 24, allegedly scammed Apple not once, but 42 times, cheating the company out of more than $300,000 — and his scam was breathtakingly simple. According to a Secret Service criminal complaint, Parrish allegedly visited Apple Stores and tried to buy products with four different debit cards, which were all closed by his respective financial institutions. When his debit card was inevitably declined by the Apple Store, he would protest and offer to call his bank — except, he wasn't really calling his bank. So he would allegedly offer the Apple Store employees a fake authorization code with a certain number of digits, which is normally provided by credit card issuers to create a record of the credit or debit override. But that's the problem with this system: as long as the number of digits is correct, the override code itself doesn't matter."
hawkinspeter (831501) writes Amazon has given the green light to produce the Hugo award-winning "The Man in the High Castle". This is after the four-hour mini-series was rejected by Syfy and afterwards by the BBC. Philip K Dick's novel takes place in an alternate universe where the Axis Powers won the Second World War. It's one of his most successful works, probably due to him actually spending the time to do some editing on it (most of his fiction was produced rapidly in order to get some money). Ridley Scott has previously adapted PKD's "Do Androids Dream of Electric Sheep" as the film Blade Runner, so it will be interesting to see how close he keeps to the source material this time. This news has been picked up by a few sites: International Business Times; The Register and Deadline.
cold fjord (826450) writes with an excerpt from ZDNet At OSCon, The Department of Homeland Security (DHS) ... quietly announced that they're now offering a service for checking out your open-source code for security holes and bugs: the Software Assurance Marketplace (SWAMP). ... Patrick Beyer, SWAMP's Project Manager at Morgridge Institute for Research, the project's prime contractor, explained, "With open source's popularity, more and more government branches are using open-source code. Some are grabbing code from here, there, and everywhere." Understandably, "there's more and more concern about the safety and quality of this code. We're the one place you can go to check into the code" ... funded by a $23.4 million grant from the Department of Homeland Security Science & Technology Directorate (DHS S&T), SWAMP is designed by researchers from the Morgridge Institute, the University of Illinois-Champaign/Urbana, Indiana University, and the University of Wisconsin-Madison. Each brings broad experience in software assurance, security, open source software development, national distributed facilities and identity management to the project. ... SWAMP opened its services to the community in February of 2014 offering five open-source static analysis tools that analyze source code for possible security defects without having to execute the program. ... In addition, SWAMP hosts almost 400 open source software packages to enable tool developers to add enhancements in both the precision and scope of their tools. On top of that the SWAMP provides developers with software packages from the National Institute for Standards and Technology's (NIST) Juliet Test Suite. I got a chance to talk with Beyer at OSCON, and he emphasized that anyone's code is eligible — and that there's no cost to participants, while the center is covered by a grant.
necro81 (917438) writes "Gaza's only power plant (see this profile at IEEE Spectrum — duct tape and bailing wire not included) has been knocked offline following an Israeli strike. Reports vary, but it appears that Israeli tank shells caused a fuel bunker at the plant to explode. Gaza, already short on electricity despite imports from Israel and Egpyt, now faces widening blackouts."
mrspoonsi (2955715) writes "The City of London police has started placing banner advertisements on websites believed to be offering pirated content illegally. The messages, which will appear instead of paid-for ads, will ask users to close their web browsers. The move comes as part of a continuing effort to stop piracy sites from earning money through advertising. Police said the ads would make it harder for piracy site owners to make their pages look authentic. "When adverts from well known brands appear on illegal websites, they lend them a look of legitimacy and inadvertently fool consumers into thinking the site is authentic," said Detective Chief Inspector Andy Fyfe from the City of London Police Intellectual Property Crime Unit (Pipcu). "This new initiative is another step forward for the unit in tackling IP crime and disrupting criminal profits. "Copyright infringing websites are making huge sums of money though advert placement, therefore disrupting advertising on these sites is crucial and this is why it is an integral part of Operation Creative.""
An anonymous reader writes "Sunday was the birthday of the late great Gary Gygax, co-creator of Dungeons & Dragons and Futurama guest star. With the fifth edition of D&D soon to come out at Gen Con this year, Jon Peterson, author of Playing at the World, has released a new piece to answer a historical question: how was it, back in 1985, that Gary was ousted from TSR and control of D&D was taken away from him? Drawn from board meeting minutes, stock certificates, letters, and other first-hand sources, it's not a quick read or a very cheery one, but it shows how the greatest success of hobby games of the 1980s fell apart and marginalized its most famous designer."
dotarray (1747900) writes By now, everybody should know that if something looks too good to be true, it probably is. Let's apply that to EA, shall we? The publisher is giving away copies of The Sims 2: Ultimate Collection, for free... and not mentioning that it includes the controversial SecuROM anti-piracy software. Nobody likes SecuROM.