Categories
Technology

The Coming Terrorist Threat From Autonomous Vehicles

HughPickens.com writes: Alex Rubalcava writes that autonomous vehicles are the greatest force multiplier to emerge in decades for criminals and terrorists and open the door for new types of crime not possible today. According to Rubalcava, the biggest barrier to carrying out terrorist plans until now has been the risk of getting caught or killed […]

Categories
Technology

Lights, Camera, Experiment!

theodp writes: The New Yorker’s Jamie Holmes takes a look at How Methods Videos Are Making Science Smarter, helping scientists replicate elaborate experiments in a way that the text format of traditional journals simply can’t. The Journal of Visualized Experiments (JOVE), for instance, is a peer-reviewed scientific journal that now has a database of more […]

Categories
Technology

Magnet-Steered Nano-Fish Could Deliver Drugs and Sweep Body Toxins

dkatana writes: David Warner writes on InformationWeek how “nanoengineers” from UC San Diego have created microscopic fish powered by hydrogen peroxide that use magnets to steer themselves. “The “fish” are powerful enough to swim through your bloodstream, removing toxins or bringing medicine directly to crucial parts of your body, as cells in your blood stream […]

Categories
Technology

Chris Christie Proposes Tracking Immigrants the Way FedEx Tracks Packages

PolygamousRanchKid submits the news that New Jersey governor (and Republican presidential candidate) Chris Christie said yesterday that he would, if elected president, create a system to track foreign visitors the way FedEx tracks packages. The NYT writes: Mr. Christie, who is far back in the pack of candidates for the Republican presidential nomination, said at […]

Categories
Technology

A FreeBSD "Spork" With Touches of NeXT and OS X: NeXTBSD

There are a lot of open source operating systems out there; being open source, they lend themselves to forks, clones or near clones, and friendly offshoots. There are even services to let you customize, download, and (if you choose) bulk-install your own OS based on common components. Phoronix notes a new project called NeXTBSD that […]

Categories
Technology

Do We Need More Emojis?

mikejuk writes to note that the Unicode Consortium has accepted 38 new emoji characters as candidates for Unicode 9.0, including characters depicting bacon and a duck.”Why could we possibly need a duck? Many of the new characters are the ‘other half’ of gender-matched pairs, so the Dancer emoji (which is usually rendered as Apple’s salsa […]

Categories
Technology

New Horizons’ New Target: Kuiper Belt Ice Chunk 2014 MU69

Vox reports on the next target destination for NASA’s New Horizons probe, an ice chunk in the Kuiper Belt designated 2014 MU69. The plan is not yet final; like any space mission, complications are bound to come up. But if this selection sticks, New Horizons should reach 2014 MU69 in 2019. (Re/Code has the story, […]

Categories
Technology

MIAOW Open Source GPU Debuts At Hot Chips

alexvoica writes: The first general-purpose graphics processor (GPGPU) now available as open-source RTL was unveiled at the Hot Chips event. Although the GPGPU is in an early and relatively crude stage, it is another piece of an emerging open-source hardware platform, said Karu Sankaralingam, an associate professor of computer science at the University of Wisconsin-Madison. […]

Categories
Technology

Cliff Bleszinski’s Boss Key Productions Unveils <em>LawBreakers</em> Game Trailer

MojoKid writes: Boss Key Productions has posted its first trailer of LawBreakers (formerly Project Bluestreak), a futuristic game title that’s set to release on multiple platforms in 2016. The trailer shows off some of the characters and classes that you’ll have access to on both sides of the law — yes, you’ll have to decide […]

Categories
Technology

Abusing Symbolic Links Like It’s 1999

An anonymous reader writes with this snippet from James Forshaw’s recent post at Google’s Project Zero, which begins For the past couple of years I’ve been researching Windows elevation of privilege attacks. This might be escaping sandboxing or gaining system privileges. One of the techniques I’ve used multiple times is abusing the symbolic link facilities […]

Codice amico Very Mobile Diagonal Media Digital Marketing