Shared posts

25 Jun 11:39

16 core computer made of ATMegas

by Brian Benchoff

atmega

Your desktop has two, four, or even eight cores, but when’s the last time you’ve seen a multicore homebrew computer? [Jack] did just that, constructing the DUO Mega, a 16 core computer out of a handful of ATMega microcontrollers.

From [Jack]‘s description, there are 15 ‘worker’ cores, each with their own 16MHz crystal and connection to an 8-bit data bus. When the machine is turned on, the  single ‘manager’ core – also an ATMega328 – polls all the workers and loads a program written in a custom bytecode onto each core. The cores themselves have access to a shared pool of RAM (32k), a bit of Flash, a VGA out port, and an Ethernet controller attached to the the master core.

Since [Jack]‘s DUO Mega computer has multiple cores, it excels at multitasking. In the video below, you can see the computer moving between a calculator app, a weird Tetris-like game, and a notepad app. The 16 cores in the DUO Mega also makes difficult calculations a lot faster; he can generate Mandelbrot patterns faster than any 8-bit microcontroller can alone, and also generates prime numbers at a good click.


Filed under: Microcontrollers
24 Jun 09:56

Tesla's 90 second battery swaps will power EVs faster than gas pumps fill tanks (video)

by Richard Lawler

Tesla demonstrates fast battery swaps full charge in less time than a fillup

Tesla founder Elon Musk has mentioned battery swap service stations as an even faster alternative to charging for EV drivers, and tonight the company showed just how efficiently it can be done. In a demonstration at its design studio, it beat what it claims is the fastest gas pump in LA by exchanging a drained car battery pack for a fresh fully charged one in just 90 seconds. When the $500,000 stations start rolling out, owners will stay in the car the whole time then either swap the battery back for their original on a return trip, or get a bill for the difference based on how new their battery is. According to Reuters, the exchange is expected to cost owners between $60 - $80 each time or about the cost of 15 gallons of gas

Of course, failed outfit Better Place proposed a similar service before it shut down, but Tesla is betting that it can make it work this time. The first service stations are coming to busy corridors, with some planned for I5 in California. Still need more proof? Elon Musk tweeted that video of the event will be available in "about an hour," so check back then.

Update: We're still waiting on the official video, but reader Weapon sent in a link to video shot by an event attendee, which can be viewed after the break. Take a peek and see a pair Tesla's Model S sedans get quick battery service, one after the other in less time than a fuel pump can deliver one tank of gas.

Filed under: Transportation

Comments

Source: Tesla Motors (Twitter)

24 Jun 09:55

Court documents reveal secret rules allowing NSA to use US data without a warrant

by Mat Smith

NSA's information gathering practices have been further detailed in court papers revealed by The Guardian. While the agency has continued to reiterate that it doesn't collect its data indiscriminately, the leaked papers detail several loopholes that allow it to gather data from both American and foreign origins without the need for a warrant. If you use data encryption or other privacy tools, your communications are likely to receive extra attention, and the agency can indefinitely keep any information assembled for "crypto-analytic, traffic analysis or signal exploitation purposes" -- in short, if the NSA believes may be relevant in the future.

One reason to hold onto said files could simply be the fact that the data is encrypted and NSA wants to be able to analyze its protection. The security agency can also give the FBI and other government organizations any data if it contains a significant amount of foreign intelligence, or information about a crime that has (or will be) committed. Any data that's "inadvertently acquired" through the NSA's methods -- and could potentially contain details of US citizens -- can be held for up to five years before it has to be deleted. The Guardian's uploaded the leaked papers in full -- hit the source links for more.

Filed under: Internet

Comments

Via: The Guardian, Forbes

Source: The Guardian (1), (2)

24 Jun 09:53

Nissan shows off 185 mph ZEOD RC electric prototype, plans to race it at Le Mans

by Steve Dent

Nissan shows off prototype electric car design, plans to race it at Le Mans

Nissan's just pulled the covers off its fancifully styled ZEOD RC race car that may eventually hit speeds of up to 300km/h (about 185mph). Though the acronym stands for "zero emissions, on demand," the vehicle could end up being a hybrid model that switches between gas and EV modes (as opposed to a pure electric car) by the time it hits Le Mans in 2014. Regardless, the company's Nismo racing division (creator of the all-electric Nismo RC) plans to enter it in the so-called Garage 56 class of the famed race, reserved for vehicles that showcase breakthrough technology. While the company flaunted the design at Circuit de la Sarthe in France today, the car won't start trials until later this summer, after which the final drivetrain will be chosen. Prior to hitting the track, though, it'll have its work cut out just to top Toyota's P001, the current EV lap-speed champ.

Filed under: Transportation

Comments

Via: Pocket Lint

Source: Nissan

24 Jun 09:40

Meet B, the flying car that'll make it even easier to terrorize local wildlife (video)

by Melissa Grey

DNP Meet B, the flying car that'll make it even easier to terrorize local wildlife

Sometimes, when a remote-control car and a remote-control helicopter love each other very much, they come together and produce something like the B. Well, okay, that's not exactly how this small flying car came about, but it's a nice story. Witold Mielniczek, a computational engineering Ph.D. candidate at the University of Southampton, is currently running a Kickstarter for the simply named B, a hybrid car-helicopter that can handle both challenging terrains and limited air travel. Equipped with a sleek polycarbonate chassis, four propeller driving units (a fancy way of saying wheels) and an HD 1,280 x 720 camera to record one's travels, B seems to be the little flying car that could. In the greater scheme of things, Mielniczek hopes that B will one day be able to operate on water in addition to land and air. While it's no Avengers helicarrier, we suppose every journey begins with a single step. To see B in action, check out the video after the break.

Filed under: Misc

Comments

Source: Kickstarter

19 Jun 12:59

Flames In Microgravity

by ZapperZ
This is actually an interesting video on the physics of flames, and the physics of flames in microgravity. It shows a flame experiment on the International Space Station.



Zz.
19 Jun 09:11

Gaming the System

Economists have long used game theory to make sense of the world. Now engineers and computer scientists are using it to rethink their work.

Source: Technology Review - Discipline: Computer Science
19 Jun 09:11

Materials Scientists Build Chlorophyll-based Phototransistor

Coat a layer of graphene with chlorophyll and you get a remarkably sensitive light-activated switch, say physicists 

Source: Technology Review - Discipline: Energy
19 Jun 09:11

These Imaging Satellites Will Give Us Data That Could Upend Industries, Transform Economies

Skybox's fleet of cheap, ultra-efficient satellites will give us real-time data that could upend industries, transform economies, and predict the future.    

Source: Wired - Discipline: Space
19 Jun 08:27

Public Resource wants to liberate tax records for US nonprofits - converting 100lbs of scanned bitmaps on DVDs into searchable data on $1.5T worth of activity

by Cory Doctorow


Rogue archivist Carl Malamud sez,

On November 1, Public.Resource.Org released a new service which put 6,461,326 US nonprofit tax returns on the net for bulk download, developers, and search engines to access. We offered to give the working system to the government, and also sent them a few suggestions on ways they could better meet their mission and save themselves a boatload of money. Since then, we've been frantically trying to get the government's attention to take decisive action, but to no avail.

The way the government makes the nonprofit tax returns available to the public is broken in many ways. The IRS insists on selling the tax returns as a monthly feed of DVDs costing $2,580 per year. Each month, I get a stack of a dozen DVDs, each one has 60,000 1-page TIFF files on it. This is just so lacking in clue, and even simple suggestions like using Dropbox instead of mailing us DVDs have been ignored.

In terms of breakage though, the truly big problem is the deliberate dumbing down of tax returns for large nonprofits in order to avoid what an IRS official actually said to us would be "too much transparency." All the big nonprofits have to e-file their tax returns. E-filing means they submit actual machine-processable data encoded in XML.

The way the IRS releases that information is mind-boggling. They image the data onto tax forms and then release them as 200 dot per inch TIFF files. So, instead of having a computer program extract the gross revenue, or the CEO salaries, or whether or not the nonprofit operates a tanning salon on premises (an actual question on the form!), you get something that is so bad that OCR is difficult. Nonprofits are a $1.5 trillion chunk of the U.S. economy, yet we're deliberately dumbing down data that could make that sector more efficient and more vibrant. That's dumb.

Since November, we've been trying to get the IRS and the Obama Administration to release this information, but they've refused. We've met with all sorts of IRS officials such as Lois Lerner and Joseph Grant of Tea Party fame, and we've also met with a ton of boldface names in the White House, such as Todd Park (the President's CTO) and Steve VanRoekel (the Federal CIO). Nobody will release the data. The IRS is worried the big nonprofits will be upset if information such as multimillion-dollar CEO salaries is more readily available.

Since discussion hasn't worked so far, we've retained the services of Thomas R. Burke, an eminent First Amendment attorney at Davis Wright Tremaine and he's been working with our own counselor David Halperin. Today, they filed suit in the U.S. District Court for the Northern District of California. One reason we picked the Northern District because they have a requirement that the parties try and work out their problems out of court using what is known as Alternative Dispute Resolution (ADR), which includes techniques such as mediation and arbitration. The ADR rules in this District Court require each party to bring to the mediation an official who has the authority to resolve this issue.

So, I'm reaching out to my good friends Todd Park and Steve VanRoekel, the architects of the President's great new machine-processable data directive, and I'm personally asking them to help us resolve this dispute with the administration. We're all on the same side here, let's work this out and get on with the real job at hand!

Links:
Our complaint in district court
Copies of our letters back and forth to the White House and the IRS
Sunlight Foundation: Nonprofit E-file Data Should Be Open
Think Progress: How the IRS Could Make it Easier to Track Dark Money, Right Now
Forbes: IRS: Turn Over a New Leaf, Open Up Data

    


18 Jun 12:11

Discovering Names Of Secret NSA Surveillance Programs Via LinkedIn

by Mike Masnick
So, over the weekend, the Washington Post revealed some of the code names for various NSA surveillance programs, including NUCLEON, MARINA and MAINWAY. Chris Soghoian has pointed out that a quick LinkedIn search for profiles of people in Maryland with codenames like MARINA and NUCLEON happen to turn up profiles like this one which appear to reveal more codenames:
+Skilled in the use of several Intelligence tools and resources: ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE, FASTSCOPE, OCTAVE/CONTRAOCTAVE, PINWALE, UTT, WEBCANDID, MICHIGAN, PLUS, ASSOCIATION, MAINWAY, FASCIA, OCTSKYWARD, INTELINK, METRICS, BANYAN, MARINA
TRAFFICTHIEF, eh? WEBCANDID? Hmm... Apparently, NSA employees don't realize that information they post online can be revealed.

Permalink | Comments | Email This Story
    
18 Jun 10:06

The World's Most Efficient Solar Cell Is a Tiny Little Miracle

by Jamie Condliffe

The World's Most Efficient Solar Cell Is a Tiny Little Miracle

While solar power promises a lot, it's only ever going to help satisfy our energy needs if it becomes efficient enough. Fortunately, Sharp has just made the world's most efficient solar cell, which converts a staggering 44.4 percent of incident light into electricity. Take that, fossil fuels.

Read more...

    


18 Jun 10:02

The Future of Civil Disobedience Online

by Annalee Newitz on io9, shared by Brian Barrett to Gizmodo

The Future of Civil Disobedience Online

Familiar political tools like petitions, fundraisers, mass letter-writing, call-in campaigns now have online equivalents. But what about protest tactics like street marches, picket lines, sit-ins, and occupations? Where is the room on the internet for civil disobedience?

Read more...

    
18 Jun 09:54

NSA admits it listens in on US phone calls and reads US emails without a warrant

by Cory Doctorow


It's a pity that so many senators skipped the NSA's classified briefing on its secret spying program, because if they'd attended, they'd have heard something shocking: the NSA can and does access the content of emails and phone calls of Americans on US soil without a warrant. It's an important insight into the President's secret interpretation of FISA, one of America's most notorious spying laws.

Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed "simply based on an analyst deciding that."

If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he learned. "I was rather startled," said Nadler, an attorney and congressman who serves on the House Judiciary committee.

Not only does this disclosure shed more light on how the NSA's formidable eavesdropping apparatus works domestically, it also suggests the Justice Department has secretly interpreted federal surveillance law to permit thousands of low-ranking analysts to eavesdrop on phone calls.

Because the same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages, Nadler's disclosure indicates the NSA analysts could also access the contents of Internet communications without going before a court and seeking approval.

The NSA is supposed to only spy on us dirty foreigners. As sketchy as it is to divide the world into the spied-upon and the un-spied-upon, it is nevertheless the law, and should be comforting to those the latter category. This revelation confirms that the Obama administration has doubled down on GW Bush's project of lawless, authoritarian surveillance, treating the Constitution and Congress's laws as mere formalities. So much for "the most transparent administration in history."

NSA admits listening to U.S. phone calls without warrants [Declan McCullagh/Cnet]

    


18 Jun 09:47

Hollow spy-coins milled out of real currency

by Cory Doctorow


A company called "Covert Coins" mills hollow coins out of real currency and turns them into hidden, spook-tastic secret compartments. Reviews say that the coins are indistinguishable from undoctored items on casual inspection.

Micro SD Card Covert Spy Coin - Secret Compartment (Many Countries/Denominations) (via Oh Gizmo)

    


18 Jun 09:47

Onion Pi - Convert a Raspberry Pi into a Anonymizing Tor Proxy, for easy anonymous internet browsing

by Xeni Jardin

About this nifty "Onion Pi" HOWTO just published at Adafruit, Phil Torrone says, "Limor and I cooked up this project for folks. We are donating a portion of any sales for the pack we sell that helps do this to the EFF and Tor."

Browse anonymously anywhere you go with the Onion Pi Tor proxy. This is fun weekend project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi. Using it is easy-as-pie. First, plug the Ethernet cable into any Internet provider in your home, work, hotel or conference/event. Next, power up the Pi with the micro USB cable to your laptop or to the wall adapter. The Pi will boot up and create a new secure wireless access point called Onion Pi. Connecting to that access point will automatically route any web browsing from your computer through the anonymizing Tor network.
    


18 Jun 09:43

Home Lohas brings hydroponic gardening into your room, rabbit guard not included

by Richard Lai

Home Lohas brings hydroponic plantation to your living room

While running between booths at Computex earlier this month, we were momentarily distracted by these vegetable boxes (maybe it was lunch time as well). As it turned out, this product was launched by Taiwan-based Home Lohas around the same time as when the expo started. The company pitches its hydroponic gardening appliance -- so the vegetables rely on nutritious water instead of soil -- as a hassle-free, low-power solution for growing your own greens, plus it's apparently the only solution in the market that doesn't need water circulation. With its full spectrum LED light, air pump and timers, harvest time can apparently be reduced by about 30 percent. It's simply a matter of filling up the water tank, adding the necessary nutrients and placing the seeded sponge on the tray (the package includes three types of organic fertilizers and some seeds).

The only downside is that this system costs NT$15,800 (about US$530) in Taiwan, and for some reason, it'll eventually be priced at US$680 in other markets. If that's too much, then stay tuned for a half-size model that's due Q4 this year.

Filed under: Household

Comments

Source: Home Lohas (Chinese)

14 Jun 08:25

A multi-dimensional Szemer\’edi theorem for the primes via a correspondence principle

by Terence Tao

Tamar Ziegler and I have just uploaded to the arXiv our joint paper “A multi-dimensional Szemerédi theorem for the primes via a correspondence principle“. This paper is related to an earlier result of Ben Green and mine in which we established that the primes contain arbitrarily long arithmetic progressions. Actually, in that paper we proved a more general result:

Theorem 1 (Szemerédi’s theorem in the primes) Let {A} be a subset of the primes {{\mathcal P}} of positive relative density, thus {\limsup_{N \rightarrow \infty} \frac{|A \cap [N]|}{|{\mathcal P} \cap [N]|} > 0}. Then {A} contains arbitrarily long arithmetic progressions.

This result was based in part on an earlier paper of Green that handled the case of progressions of length three. With the primes replaced by the integers, this is of course the famous theorem of Szemerédi.

Szemerédi’s theorem has now been generalised in many different directions. One of these is the multidimensional Szemerédi theorem of Furstenberg and Katznelson, who used ergodic-theoretic techniques to show that any dense subset of {{\bf Z}^d} necessarily contained infinitely many constellations of any prescribed shape. Our main result is to relativise that theorem to the primes as well:

Theorem 2 (Multidimensional Szemerédi theorem in the primes) Let {d \geq 1}, and let {A} be a subset of the {d^{th}} Cartesian power {{\mathcal P}^d} of the primes of positive relative density, thus

\displaystyle  \limsup_{N \rightarrow \infty} \frac{|A \cap [N]^d|}{|{\mathcal P}^d \cap [N]^d|} > 0.

Then for any {v_1,\ldots,v_k \in {\bf Z}^d}, {A} contains infinitely many “constellations” of the form {a+r v_1, \ldots, a + rv_k} with {a \in {\bf Z}^k} and {r} a positive integer.

In the case when {A} is itself a Cartesian product of one-dimensional sets (in particular, if {A} is all of {{\mathcal P}^d}), this result already follows from Theorem 1, but there does not seem to be a similarly easy argument to deduce the general case of Theorem 2 from previous results. Simultaneously with this paper, an independent proof of Theorem 2 using a somewhat different method has been established by Cook, Maygar, and Titichetrakun.

The result is reminiscent of an earlier result of mine on finding constellations in the Gaussian primes (or dense subsets thereof). That paper followed closely the arguments of my original paper with Ben Green, namely it first enclosed (a W-tricked version of) the primes or Gaussian primes (in a sieve theoretic-sense) by a slightly larger set (or more precisely, a weight function {\nu}) of almost primes or almost Gaussian primes, which one could then verify (using methods closely related to the sieve-theoretic methods in the ongoing Polymath8 project) to obey certain pseudorandomness conditions, known as the linear forms condition and the correlation condition. Very roughly speaking, these conditions assert statements of the following form: if {n} is a randomly selected integer, then the events of {n+h_1,\ldots,n+h_k} simultaneously being an almost prime (or almost Gaussian prime) are approximately independent for most choices of {h_1,\ldots,h_k}. Once these conditions are satisfied, one can then run a transference argument (initially based on ergodic-theory methods, but nowadays there are simpler transference results based on the Hahn-Banach theorem, due to Gowers and Reingold-Trevisan-Tulsiani-Vadhan) to obtain relative Szemerédi-type theorems from their absolute counterparts.

However, when one tries to adapt these arguments to sets such as {{\mathcal P}^2}, a new difficulty occurs: the natural analogue of the almost primes would be the Cartesian square {{\mathcal A}^2} of the almost primes – pairs {(n,m)} whose entries are both almost primes. (Actually, for technical reasons, one does not work directly with a set of almost primes, but would instead work with a weight function such as {\nu(n) \nu(m)} that is concentrated on a set such as {{\mathcal A}^2}, but let me ignore this distinction for now.) However, this set {{\mathcal A}^2} does not enjoy as many pseudorandomness conditions as one would need for a direct application of the transference strategy to work. More specifically, given any fixed {h, k}, and random {(n,m)}, the four events

\displaystyle  (n,m) \in {\mathcal A}^2

\displaystyle  (n+h,m) \in {\mathcal A}^2

\displaystyle  (n,m+k) \in {\mathcal A}^2

\displaystyle  (n+h,m+k) \in {\mathcal A}^2

do not behave independently (as they would if {{\mathcal A}^2} were replaced for instance by the Gaussian almost primes), because any three of these events imply the fourth. This blocks the transference strategy for constellations which contain some right-angles to them (e.g. constellations of the form {(n,m), (n+r,m), (n,m+r)}) as such constellations soon turn into rectangles such as the one above after applying Cauchy-Schwarz a few times. (But a few years ago, Cook and Magyar showed that if one restricted attention to constellations which were in general position in the sense that any coordinate hyperplane contained at most one element in the constellation, then this obstruction does not occur and one can establish Theorem 2 in this case through the transference argument.) It’s worth noting that very recently, Conlon, Fox, and Zhao have succeeded in removing of the pseudorandomness conditions (namely the correlation condition) from the transference principle, leaving only the linear forms condition as the remaining pseudorandomness condition to be verified, but unfortunately this does not completely solve the above problem because the linear forms condition also fails for {{\mathcal A}^2} (or for weights concentrated on {{\mathcal A}^2}) when applied to rectangular patterns.

There are now two ways known to get around this problem and establish Theorem 2 in full generality. The approach of Cook, Magyar, and Titichetrakun proceeds by starting with one of the known proofs of the multidimensional Szemerédi theorem – namely, the proof that proceeds through hypergraph regularity and hypergraph removal – and attach pseudorandom weights directly within the proof itself, rather than trying to add the weights to the result of that proof through a transference argument. (A key technical issue is that weights have to be added to all the levels of the hypergraph – not just the vertices and top-order edges – in order to circumvent the failure of naive pseudorandomness.) As one has to modify the entire proof of the multidimensional Szemerédi theorem, rather than use that theorem as a black box, the Cook-Magyar-Titichetrakun argument is lengthier than ours; on the other hand, it is more general and does not rely on some difficult theorems about primes that are used in our paper.

In our approach, we continue to use the multidimensional Szemerédi theorem (or more precisely, the equivalent theorem of Furstenberg and Katznelson concerning multiple recurrence for commuting shifts) as a black box. The difference is that instead of using a transference principle to connect the relative multidimensional Szemerédi theorem we need to the multiple recurrence theorem, we instead proceed by a version of the Furstenberg correspondence principle, similar to the one that connects the absolute multidimensional Szemerédi theorem to the multiple recurrence theorem. I had discovered this approach many years ago in an unpublished note, but had abandoned it because it required an infinite number of linear forms conditions (in contrast to the transference technique, which only needed a finite number of linear forms conditions and (until the recent work of Conlon-Fox-Zhao) a correlation condition). The reason for this infinite number of conditions is that the correspondence principle has to build a probability measure on an entire {\sigma}-algebra; for this, it is not enough to specify the measure {\mu(A)} of a single set such as {A}, but one also has to specify the measure {\mu( T^{n_1} A \cap \ldots \cap T^{n_m} A)} of “cylinder sets” such as {T^{n_1} A \cap \ldots \cap T^{n_m} A} where {m} could be arbitrarily large. The larger {m} gets, the more linear forms conditions one needs to keep the correspondence under control.

With the sieve weights {\nu} we were using at the time, standard sieve theory methods could indeed provide a finite number of linear forms conditions, but not an infinite number, so my idea was abandoned. However, with my later work with Green and Ziegler on linear equations in primes (and related work on the Mobius-nilsequences conjecture and the inverse conjecture on the Gowers norm), Tamar and I realised that the primes themselves obey an infinite number of linear forms conditions, so one can basically use the primes (or a proxy for the primes, such as the von Mangoldt function {\Lambda}) as the enveloping sieve weight, rather than a classical sieve. Thus my old idea of using the Furstenberg correspondence principle to transfer Szemerédi-type theorems to the primes could actually be realised. In the one-dimensional case, this simply produces a much more complicated proof of Theorem 1 than the existing one; but it turns out that the argument works as well in higher dimensions and yields Theorem 2 relatively painlessly, except for the fact that it needs the results on linear equations in primes, the known proofs of which are extremely lengthy (and also require some of the transference machinery mentioned earlier). The problem of correlations in rectangles is avoided in the correspondence principle approach because one can compensate for such correlations by performing a suitable weighted limit to compute the measure {\mu( T^{n_1} A \cap \ldots \cap T^{n_m} A)} of cylinder sets, with each {m} requiring a different weighted correction. (This may be related to the Cook-Magyar-Titichetrakun strategy of weighting all of the facets of the hypergraph in order to recover pseudorandomness, although our contexts are rather different.)


Filed under: math.DS, math.NT, paper Tagged: constellations, correspondence principle, prime numbers, Szemeredi's theorem, Tamar Ziegler, transference principle
14 Jun 08:23

New Eruption at Alaska’s Veniaminof Caldera

by Erik Klemetti
New Eruption at Alaska’s Veniaminof Caldera
Quick bit of news today — the Alaska Volcano Observatory has raised the aviation alert status at Veniaminof to Orange after indications that a new eruption may have started inside the caldera. There are currently no direct observations of the ...
14 Jun 08:17

Graphene Can Work in Real Life Electronics--With One-Atom-Thin Wires

by Eric Limer

Graphene Can Work in Real Life Electronics--With One-Atom-Thin WiresBy now we all know that graphene has tons of potential applications, from virtually no-light camera sensors, to terabit upload speeds, to all your wildest dreams. Now, researchers have figured out how to chemically spot-weld graphene, wiring tiny graphene structures to real electronics with one-atom wires.

Read more...

    


14 Jun 07:54

Beautiful video of a supercell thunderstorm

by Maggie Koerth-Baker

It took photographer Mike Oblinski four years of traveling to Plains States to capture this fantastic time lapse footage of a supercell thunderstorm near Booker, Texas.

Supercells are a type of thunderstorm, specifically the type that contains a rotating mass of rising air called a mesocyclone. These are the storms that form tornadoes (although Oblinski says this one did not). Watching the video, I just kept thinking about the title of that Flannery O'Connor story: Everything that rises must converge.

The timelapse was shot on a Canon 5D Mark II with a Rokinon 14mm 2.8 lens. It's broken up into four parts. One thing to note early on in the first part is the way the rain is coming down on the right and actually being sucked back into the rotation. Amazing.

A few miles south is where part two picks up. And I didn't realize how fast it was moving south, so part three is just me panning the camera to the left. During that third part you can see dust along the cornfield being pulled into the storm as well...part of the strong inflow. The final part is when the storm had started dying out and we shot lightning as it passed over us.

Video Link

    


14 Jun 07:52

Accused bank robber wants NSA phone records for his defense

by Cory Doctorow

Defense lawyers for Terrance Brown, a south Florida man facing bank robbery charges, have asked for NSA mobile phone surveillance records to be supplied in order to support his claim that he was not in the vicinity of the bank at the time it was robbed. He's referring to the leaked court order revealing that the NSA requires American phone companies to turn over the complete records of all their calls, including the location data about the callers.

The prosecution had told defense attorneys that they were unable to obtain Brown's cellphone records from the period before September 2010 because his carrier, MetroPCS, had not held on to them.

Not so fast, Brown's attorney Marshall Dore Louis argued in court documents filed in Fort Lauderdale days after the National Security Agency surveillance program was revealed last week...

...Louis argued in court Wednesday that the government should be forced to turn over phone location records for two cellphones Brown may have used because it could prove he was not present for one of the attempted bank robberies, on July 26 on Federal Highway in Lighthouse Point.

"The president of the United States has recognized this program has been ongoing since 2006 … to gather the phone numbers [and related information] of everybody including my client in 2010," Louis said.

Bank robbery suspect wants NSA phone records for his defense [Paula McMahon/Sun Sentinel]

    


11 Jun 13:26

A User's Guide to Neglectful Parenting, by Guy Delisle

by Mark Frauenfelder

A User's Guide to Neglectful Parenting is a funny and truthful book about being a parent, and as a bonus, it's told in cartoons. Guy Delisle, a French Canadian cartoonist and animator, is best known for his award-winning graphic travelogues about Jerusalem, Pyongyang, Burma, and Shenzen.

This book is closer to home -- it contains 190 pages worth of light-hearted stories about his relationship with his adorable, smart kids. To give you a taste, our friends at Drawn & Quarterly gave me one of the stories to share with you. It's about Delisle, his daughter, and a box of Shredded Wheat. Enjoy!

A User's Guide to Neglectful Parenting, by Guy Delisle

    


10 Jun 12:13

Omniwheel robot build uses a bit of everything

by Mike Szczys

building-an-omniwheel-robot

Machinist, electronics engineer, programmer, and factory worker are all skills you can wield if you take on a project like building this omniwheel robot (translated).

The omniwheels work in this tripod orientation because they include rollers which turn perpendicular to the wheel’s axis. This avoids the differential issue cause by fixed-position wheels. When the three motors are driven correctly, as shown in the video below, this design makes for the most maneuverable of wheeled robots.

An aluminum plate serves as the chassis. [Malte] milled the plate, cutting out slots for the motor with threaded holes to receive the mounting screws. A few stand-offs hold the hunk of protoboard which makes up the electronic side of the build. The large DIP chip is an ATmega168. It drives the motors via the trio of red stepper motor driver boards which he picked up on eBay.

So far the vehicle is tethered, using a knock-off of a SixAxis style controller. But as we said before, driving the motors correctly is the hard part and he’s definitely solved that problem.


Filed under: robots hacks
10 Jun 12:12

Learning letters, particularly R, F, I, & D

by Brian Benchoff

8993376562_55ff3846b3

After [yohanes] picked up a toy at a yard sale – a Leap Frog Letter Factory Phonics – he thought he could do better. The toy originally asked a child to find a letter, and after digging one of 26 plastic characters out of a plastic tub and placing them on the Letter Factory’s sensor, would play a short musical ditty. [yohanes]‘ version does the same, but because he made it himself it is infinitely more expandable.

The letters for [yohanes]‘ version are RFID tagged. This, combined with a cheap RFID module and a bluetooth module means a Raspberry Pi can read RFID cards from across the room. From there, it’s a simple matter of writing up some Python to ask his toddler for a letter, reading the bits coming from a bluetooth, and keeping score.

The build isn’t over by a long shot. [yohanes] still needs to make his build multilingual by adding Indonesian and Thai. There’s also a possibility of adding a spelling game to make it more interesting.


Filed under: Raspberry Pi
06 Jun 07:56

The Secret Languages of Microbes

by Jeffrey Marlow
The Secret Languages of Microbes
When bacteria get together, they’re capable of some pretty extraordinary things: they can form vast carpets of cells and cause deadly diseases. The reason, it turns out, is that they’re speaking a secret language – a code only similar organisms ...
06 Jun 07:26

Google Go In Banks?

by Matt Davey

Investment banks have historically been quite restricted on what languages can/can’t be used within the software development stack – Java/C#/Flex/JavaScript possibly being the main choices.  This has opened up a little in the last time period, with various banks making large jumps into the Python pond,  smaller jumps into Scala (Scala vs Go), and even smaller jumps into Clojure.  With the recent release of Go 1.1, the usual spike on the web to accompany such an event, is it time to investment in this language?

First off, if you’re not familiar with Google Go, try these links:

  • The Go Programming Language
  • Rob Pike on Google Go: Concurrency, Type System, Memory Management and GC
  • “My favorite programming language:” Google’s Go has some coders raving
  • Google Go: A Primer
  • Go Projects

A few obvious observations about Go:

  • Go’s main aim appears on the server side
  • Performance, concurrency (language primitive), and simplicity are a few of the attributes that Go offers
  • The compiler is quick

Everyone has their IDE preference, I’m using the Intellij golang IDE plug-in.  Prior to writing any server application in Go, you may want to look at the Wiki Go projects.  Of interest ;) are:

  • memcache and Redis
  • MongoDB and Neo4j
  • ZeroMQ, Kafka and RabbitMQ

If you prepared to stretch the Go solution you are considering, and the architecture would benefit, then you might want to glance ;) at:

Today I suspect nobody is really considering Go within the investment banking arena.  Thus if nothing else, Go is an interesting language to PoC a few idea with if you happen to have a bit of spare time

06 Jun 07:22

Ask Hackaday: How are these thieves exploiting automotive keyless entry?

by Mike Szczys

keyless-entry-vulnerability

A new attack on automotive keyless entry systems is making headlines and we want to know how you think it’s being done. The Today Show reports that vehicles of different makes and models are being broken into using keyless entry on the passenger’s side of the car. It sounds like thieves steal items found inside rather than the vehicles themselves which makes these crimes distinctly different from the keyless ignition thefts of a year ago.

So how are they doing this? Here are the clues: The thieves have been filmed entering only the passenger side of the car. They hold a small device in their hand to unlock the doors and disable the alarm. And there is evidence that it doesn’t work on 100% of vehicles they try. Could it be some hidden manufacturer code reset? Has an encryption algorithm been hacked to sniff the keyfob identifier at a previous time? Or do you think we’re completely off track? Let us know your opinion by leaving a comment.

[Thanks Mom]


Filed under: security hacks, transportation hacks
06 Jun 07:13

How Antarctica Would Look Completely Naked

by Eric Limer

Anatarctica is frigid, self-consciously cloaked in a sheet of ice that's miles thick. But underneath, there's a wonderland of bedrock human eyes have never laid eyes on, and this is what it looks like.

Read more...

    


06 Jun 07:09

Leaked top-secret court order shows that NSA engages in bulk, sustained, warrantless surveillance of Americans

by Cory Doctorow

In an explosive investigative piece published in the Guardian, Glenn Greenwald details a top-secret US court order that gave the NSA the ability to gather call records for every phone call completed on Verizon's network, even calls that originated and terminated in the USA (the NSA is legally prohibited from spying on Americans). This kind of dragnet surveillance has long been rumored; Senators Ron Wyden and Mark Udall published an open letter to US Attorney General Holden saying that "most Americans would be stunned to learn the details of how these secret court opinions have interpreted...the Patriot Act." Here, at last, are the details:

The order, signed by Judge Roger Vinson, compels Verizon to produce to the NSA electronic copies of "all call detail records or 'telephony metadata' created by Verizon for communications between the United States and abroad" or "wholly within the United States, including local telephone calls".

The order directs Verizon to "continue production on an ongoing daily basis thereafter for the duration of this order". It specifies that the records to be produced include "session identifying information", such as "originating and terminating number", the duration of each call, telephone calling card numbers, trunk identifiers, International Mobile Subscriber Identity (IMSI) number, and "comprehensive communication routing information".

The information is classed as "metadata", or transactional information, rather than communications, and so does not require individual warrants to access. The document also specifies that such "metadata" is not limited to the aforementioned items. A 2005 court ruling judged that cell site location data – the nearest cell tower a phone was connected to – was also transactional data, and so could potentially fall under the scope of the order.

Revealed: NSA collecting phone records of millions of Americans daily

As the Electronic Frontier Foundation's Cindy Cohn and Mark Rumold point out, this kind of surveillance is at the heart of several of its ongoing cases, and the Obama administration has done everything in its power to stop the American people from finding out how it interprets the Constitution:

This type of untargeted, wholly domestic surveillance is exactly what EFF, and others have been suing about for years. In 2006, USA Today published a story disclosing that the NSA had compiled a massive database of call records from American telecommunications companies. Our case, Jewel v. NSA, challenging the legality of the NSA’s domestic spying program, has been pending since 2008, but it's predecessor, Hepting v. AT&T filed in 2006, alleged the same surveillance. In 2011, on the 10th Anniversary of the Patriot Act, we filed a FOIA lawsuit against the Department of Justice for records about the government’s use of Section 215 – the legal authority the government was relying on to perform this type of untargeted surveillance.

But at each step of the way, the government has tried to hide the truth from the American public: in Jewel, behind the state secrets privilege; in the FOIA case, by claiming the information is classified top secret.