Aviation Headsets Guide

It starts with the type of headset you need. You have PNR = passive noise reduction, ANR = active noise reduction and earpiece type headsets.

PNR relies on the shell and the seal (which is gel or foam [gel when broken will leak and requires a full replacement of the seal, foam will live through it. Apparently foam also works better around spectacles / sunglasses. Gel tends to offer slightly better noise cancellation]) to cancel the noise of the propeller. ANR send out noise cancellation signals to cancel the noise of the prop. These require batteries. The noise cancellation qualities are usually measured in db (eg 24 dB NRR)

Other differences are
* Are there volume buttons on one or both earpieces
* can you select mono / stereo? Usually you just want mono
* is there a music input for your ipod / phone
* bluetooth onboard?
* weight
* adjustability of the headband (NB large adjustable screws are prone to breakage and banging into stuff)
* material of the headband (you want metal, as it is more adjustable and less prone to breaking)
* quality and materiaal of the padding around the headband (for comfort)
* the quality of the speakers
* is it a fixed or adjustable boom for the mic
* the quality of the mic (how well the mic filters ambient noise and automatically starts transmitting when you start speaking)
* price

Some more information can be found in 2015 plane and pilot headset buyers guide

NB. If you get gel ear seals, make sure you get some protective covers: they will help save the gel seals and also keep your ears at a more comfortable temperature. The covers are very cheap and replacement ear seals are pretty expensive.

Apparently it’s better to have PNR than a poor ANR headset, poor ANR headsets are pretty disastrous.

Bose headsets are the absolute best in ANR, followed closely by Lightspeed. Prices vary from $ 800,- to $ 1300,-

In the PNR world, David Clark is the old world standard but they are quite expensive (and expensive!)

So the one I originally wanted was the Kore Aviation KA-1 $ 150,- with carrying case and foam ear seals. Unfortunately they wouldn’t ship to the Netherlands, so there was no way. (the ear covers are here)

In the end I bought the Rugged Air RA900 headset with ear covers. They retail at $199 but I found them at Mypilotstore for $165 I am very happy with these, even though the first set they delivered had a broken speaker lead. Rugged Radios replaced the entire unit quickly and hassle free and I have had no problems since. The mic picks up spoken words immediately and the speakers are high quality.

Finally you have child headsets in prices ranging from $ 80 to upwards. I quite like the Rugged Air RA250 Child’s Headset but it doesn’t have a flexible boom mike, which I think is a drawback.

There is also the possibility to turn any headset into a bluetooth compatible unit for streaming music or picking up phone calls with this bluetooth streamer for $24,-

Happy flying!

Viruses, spyware found in ‘alarming’ number of Android VPN apps

A team from CSIRO’s Data 61, University of NSW and UC Berkley in the US found a whole bunch of Android VPN apps contain viruses, spyware and other adware.

Researchers analysed the apps available for Android to look for nasties like trojans, spyware and adware — giving each an “anti-virus rank (AV)” based on what they found. The lower the rank, the better.

They found of the 283 apps they analysed, 38 per cent contained malware or malvertising (malicious advertising containing viruses).

“The findings are alarming and showing some very, very serious security and privacy issues,” Data61 researcher Dali Kaafar said.

“If they embed some malware that means that particular malware can see all the other traffic that is originating from your device.

Source: Viruses, spyware found in ‘alarming’ number of Android VPN apps

Dropbox: Oops, yeah, we didn’t actually delete all your files – this bug kept them in the cloud

“Typically, we permanently remove files and folders from our servers within 60 days of a user deleting them. However, the deleted files and folders impacted by this bug had metadata inconsistencies,” Dropbox employee Ross S said on the company’s support forum.

“So we quarantined and excluded them from the permanent deletion process until the metadata could be fixed.”

Dropbox noted that the data was only visible to the accounts of the users, and at no time did any third party have access to the exposed files.

This after users had been complaining that old files, some more than a half-decade in the past, had been showing up.

“Several different folders of old files from 2009–2011, deleted years ago but suddenly reappearing overnight,” wrote one user. “And I definitely haven’t connected to an old computer, either.”

Source: Dropbox: Oops, yeah, we didn’t actually delete all your files – this bug kept them in the cloud • The Register

Ouch, that’s pretty nasty: who knows how many other old files Dropbox (which makes money off analysing your data) has “accidentally” not deleted. Or maybe the bug was that they suddenly became visible to the user?

google/glazier: A tool for automating the installation of the Microsoft Windows operating system on various device platforms.

Glazier

Glazier is a tool for automating the installation of the Microsoft Windows operating system on various device platforms.

Why Glazier?

Glazier was created with certain principles in mind.

Text-based & Code-driven

With Glazier, imaging is configured entirely via text files. This allows technicians to leverage source control systems to maintain and develop their imaging platform. By keeping imaging configs in source control, we gain peer review, change history, rollback/forward, and all the other benefits normally reserved for writing code.

Reuse and templating allows for config sharing across multiple image types.

Configs can be consumed by unit tests, build simulators, and other helper infrastructure to build a robust, automated imaging pipeline.

Source controlled text makes it easy to integrate configs across multiple branches, making it easy to QA new changes before releasing them to the general population.

Scalability

Glazier distributes all data over HTTPS, which means you can use as simple or as advanced of a distribution platform as you need. Run it from a simple free web server or a large cloud-based CDN.

Proxies make it easy to accelerate image deployment to remote sites.

Extensible

Glazier makes it simple to extend the installer by writing a bit of Python or Powershell code.

Source: GitHub – google/glazier: A tool for automating the installation of the Microsoft Windows operating system on various device platforms.

Wine 2.0 Released

The Wine team is proud to announce that the stable release Wine 2.0 is now available. This release represents over a year of development effort and around 6,600 individual changes. The main highlights are the support for Microsoft Office 2013, and the 64-bit support on macOS. It also contains a lot of improvements across the board, as well as support for many new applications and games.

Source: WineHQ – News – Wine 2.0 Released

Wine stands for Wine is not an emulator and can be used to run windows and mac programmes on a linux OS

Boffins perfect 3D bioprinter that produces slabs of human skin

In a paper for the journal Biofabrication, the team details how the printer lays down bioinks containing human plasma as well as primary human fibroblasts and keratinocytes. The printer first lays down a layer of external epidermis and then a thicker layer of fibroblasts that produce collagen, which will make the flesh strong and elastic.

“Knowing how to mix the biological components, in what conditions to work with them so that the cells don’t deteriorate, and how to correctly deposit the product is critical to the system,” said Juan Francisco del Cañizo, of the Hospital General Universitario.

The end result is a 100-cm2 slab of skin, printed in 35 minutes, that can be transplanted onto patients. Its production can be automated to a large degree. The skin can also be used to test the irritant qualities of consumer products without having to shave animals and use them as test subjects.

“We use only human cells and components to produce skin that is bioactive and can generate its own human collagen, thereby avoiding the use of the animal collagen that is found in other methods,” the team notes in its paper.

Source: Gimme some skin: Boffins perfect 3D bioprinter that produces slabs of human flesh • The Register

Introducing Malwarebytes Anti-Ransomware Beta

a completely proactive and signature-less technology that is able to detect and block even the most dangerous of ransomware variants like CryptoWall4, CryptoLocker, Tesla, and CTB-Locker.

Malwarebytes Anti-Ransomware monitors all activity in the computer and identifies actions which are typical of ransomware activity. It keeps track of all activity and, once it has enough evidence to determine a certain process or thread to be ransomware, blocks the infection and quarantines the ransomware before it has a chance to encrypt users’ files. During development Malwarebytes Anti-Ransomware has blocked every single ransomware variant we have thrown at it. We are extremely satisfied with its results and are excited to bring this technology to our user community for further testing.

As this is the very first beta we do encourage beta users to install the product in non-production environments for testing purposes only.

Source: Introducing Malwarebytes Anti-Ransomware Beta – Anti-Ransomware Beta – Malwarebytes Forums

Cryptostalker, a Tool to Detect Crypto-Ransomware on Linux

Cryptostalker and the original project randumb are the work of Sean Williams, a developer from San Francisco. Mr. Williams wanted to create a tool that monitored the filesystem for newly written files, and if the files contained random data, the sign of encrypted content, and they were written at high speed, it would alert the system’s owner.

Right now, the project is only available for Linux, but as you can read below in our interview with Mr. Williams, there’s a plan to port the tool for Windows.

If tests go well enough, then Windows users may have a new method of getting warned against the deadly wave of crypto-ransomware that’s been recently hitting users around the globe.

Source: Cryptostalker, a Tool to Detect Crypto-Ransomware on Linux – EXCLUSIVE

The No More Ransom Project: tools and howtos to decrypt ransomware from the EU

Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections.

The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security – with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals.

Since it is much easier to avoid the threat than to fight against it once the system is affected, the project also aims to educate users about how ransomware works and what countermeasures can be taken to effectively prevent infection. The more parties supporting this project the better the results can be. This initiative is open to other public and private parties.

Source: The No More Ransom Project

Cybereason Introduces: Free Behavioral-Based Ransomware Blocking

Edit: It seems that this system creates a whole load of bogus files and dirs and monitors them, not the whole file system. This pollutes the file system and means that people can quite easily write around it.

Every ransomware program goes over files, chooses the ones that look interesting, encrypts them and destroys the originals. You know what else does this? Compression software, legitimate encryption applications and backup and cloud-sync solutions in addition to many more programs. The same behavior is exhibited even if you manually compress a directory with a password and then delete it. Since ransomware encrypts any file anywhere on a computer, it’s extremely difficult to distinguish a legitimate file activity from a malicious one. While every encrypted file increases the likelihood that the ransomware will be detected, each encrypted file equals another important piece of information lost. Every second counts when ransomware starts encrypting files.

Cybereason RansomFree: Behavior – Based Ransomware Blocking Freeware

Cybereason researched more than 40 ransomware strains, including Locky, Cryptowall, TeslaCrypt, Jigsaw and Cerber and identified the behavioral patterns that distinguish ransomware from legitimate applications. Whether a criminal group or nation created the program, all ransomware functions the same way and encrypts as many files as possible. These programs can’t determine what files are important so they encrypt everything based on file extensions.

RansomFree, Cybereason’s behavioral anti-ransomware free tool, takes all these challenges into consideration. By putting multiple deception methods in place, RansomFree detects ransomware as soon as encryption occurs either on a computer or network drive. Once encryption is detected, RansomFree suspends it, displays a popup that warns users their files are at risk and enables them to stop the attack.

RansomFree protects against local encryption as well as the encryption of files on network or shared drives. The encryption of shared files is among the doomsday scenarios an organization can imagine. It takes only one employee on the network to execute ransomware and affect the entire company.

Source: Cybereason Introduces: Free Behavioral-Based Ransomware Blocking

Interesting. Unfortunately Windows only.

Don’t smile too big to be effective in online marketing ads, study funds

“We found that broad smiles lead people to be perceived as warmer but less competent,” said Jessica Li, a KU assistant professor of marketing in the School of Business. “We ask how that can influence consumer behavior and in what situations might marketers want to smile more broadly.”
[…]
Li said broader smiles that tend to elicit more warmth seem to be more effective in promotional ads for a service that would carry less risk. But photos with a slight smile did better in marketing scenarios where services were higher risk, such as a medical procedure, legal representation or investment in a startup company.

“If I see an ad with a heart surgeon who smiles really broadly at me, I might think she is really warm, but not choose her to be my doctor because she seems less competent than a surgeon with a slight smile,” Li said. “If the risk is really low, such as going to the store to get a new shirt, then the competence of the salesperson isn’t as important and I respond more positively to the broad smile.”

In their analysis of Kickstarter.com, when the page creator’s profile photo exhibited a broad smile that tended to elicit perceptions of warmth, the total amount of money pledged decreased by more than 50 percent, and the average contribution per backer was 30 percent less than when the creator’s photo included only a slight smile.

“Project creators with a slight smile are perceived as more competent,” Li said. “More people wanted to donate to their project because they believe this competent person is able to deliver the product.”

However, a more intense smile does appear to elicit more buzz on social media or other low-cost behaviors. Profile photos with a broader smile received twice as many Facebook shares than someone with a slight smile.

Source: Don’t smile too big to be effective in online marketing ads, study funds

Scientists create first stable semisynthetic organism

Scientists at The Scripps Research Institute (TSRI) have announced the development of the first stable semisynthetic organism. Building on their 2014 study in which they synthesized a DNA base pair, the researchers created a new bacterium that uses the four natural bases (called A, T, C and G), which every living organism possesses, but that also holds as a pair two synthetic bases called X and Y in its genetic code.

TSRI Professor Floyd Romesberg and his colleagues have now shown that their single-celled organism can hold on indefinitely to the synthetic base pair as it divides. Their research was published January 23, 2017, online ahead of print in the journal Proceedings of the National Academy of Sciences.
[…]
First, Zhang and Lamb, co-first authors of the study, optimized a tool called a nucleotide transporter, which brings the materials necessary for the unnatural base pair to be copied across the cell membrane. “The transporter was used in the 2014 study, but it made the semisynthetic organism very sick,” Zhang explained. The researchers discovered a modification to the transporter that alleviated this problem, making it much easier for the organism to grow and divide while holding on to X and Y.

Next, the researchers optimized their previous version of Y. The new Y was a chemically different molecule that could be better recognized by the enzymes that synthesize DNA molecules during DNA replication. This made it easier for cells to copy the synthetic base pair.

A New Use for CRISPR-Cas9

Finally, the researchers set up a “spell check” system for the organism using CRISPR-Cas9, an increasingly popular tool in human genome editing experiments. But instead of editing a genome, the researchers took advantage of CRISPR-Cas9’s original role in bacteria.

The genetic tools in CRISPR-Cas9 (a DNA segment and an enzyme) originated in bacteria as a kind of immune response. When a bacterium encounters a threat, like a virus, it takes fragments of the invader genome and pastes them into its own genome—a bit like posting a “wanted” poster on the off chance it sees the invader again. Later, it can use those pasted genes to direct an enzyme to attack if the invader returns.

Knowing this, the researchers designed their organism to see a genetic sequence without X and Y as a foreign invader. A cell that dropped X and Y would be marked for destruction, leaving the scientists with an organism that could hold on to the new bases. It was like the organism was immune to unnatural base pair loss.
[…]
Romesberg emphasized that this work is only in single cells and is not meant to be used in more complex organisms. He added that the actual applications for this semisynthetic organism are “zero” at this point. So far, scientists can only get the organism to store genetic information.

Source: Scientists create first stable semisynthetic organism

Physicists show that real-time error correction in quantum communications is possible

Now researchers have shown that there is a grey area where Nature cannot tell the difference between the classical and the quantum. This opens the possibility of first performing quantum experiments with a type of classical light called “classically entangled” light.

By preparing and sending a so-called “classically entangled” beam the team could show that this was identical to sending a quantum state. This means that the observed quantum entanglement decay due to noise in the link can be reversed, paving the way for major advances in secure quantum links in fibre and free-space.

“We showed for the first time that classical light can be used to analyse a quantum link, acting as a direct equivalent to the behavior of the quantum state,” says Bienvenu Ndagano, lead author and PhD student at Wits University.

“Not similar, or mimicking, but equivalent. To show this, we exploited a particular type of laser beam, called vector beams, that have the property of being non-separable and sometimes called ‘classically entangled’.”

Ndagano explains that the quintessential property of quantum entanglement is the non-separability of the state, meaning that one part of the system cannot be separated from the other. “But non-separability is not unique to the quantum world: you can find it in weather maps where the locations on the map and the temperatures at those locations can’t be separated.”

More intriguingly, classical vector beams have this property too, which the team calls “classically entangled” light.

Says Forbes, “What we asked was: does this mean that classical light can be used in quantum systems – a grey area between the two worlds that we call classical entanglement?”.

[…]

This work allows for long distance quantum links to be established and tested with classically entangled light: as there is no shortage of photons in the classical light, all the measurements needed to fix the errors in the quantum state can be done in real-time without destroying the quantum information.

Thus, real-time error correction is possible as you can run experiments in the classical world that will tell you how to fix the error in the quantum world.

Source: Physicists show that real-time error correction in quantum communications is possible

Your Android device’s Pattern Lock can be cracked within five attempts

New research from Lancaster University, Northwest University in China, and the University of Bath, which benefitted from funding from the Engineering and Physical Sciences Research Council (EPSRC), shows for the first time that attackers can crack Pattern Lock reliably within five attempts by using video and computer vision algorithm software.

By covertly videoing the owner drawing their Pattern Lock shape to unlock their device, while enjoying a coffee in a busy café for example, the attacker, who is pretending to play with their phone, can then use software to quickly track the owner’s fingertip movements relative to the position of the device. Within seconds the algorithm produces a small number of candidate patterns to access the Android phone or tablet.

The attack works even without the video footage being able to see any of the on-screen content, and regardless of the size of the screen. Results are accurate on video recorded on a mobile phone from up to two and a half metres away – and so attacks are more covert than shoulder-surfing. It also works reliably with footage recorded on a digital SLR camera at distances up to nine metres away.

Researchers evaluated the attack using 120 unique patterns collected from independent users. They were able to crack more than 95 per cent of patterns within five attempts.

Complex patterns, which use more lines between dots, are used by many to make it harder for observers to replicate. However, researchers found that these complex shapes were easier to crack because they help the fingertip algorithm to narrow down the possible options.

During tests, researchers were able to crack all but one of the patterns categorised as complex within the first attempt. They were able to successfully crack 87.5 per cent of median complex patterns and 60 per cent of simple patterns with the first attempt.

Source: Your Android device’s Pattern Lock can be cracked within five attempts

dataviz.tools – a curated guide to the best tools, resources and technologies for data visualization

This site features a curated selection of data visualization tools meant to bridge the gap between programmers/statisticians and the general public by only highlighting free/freemium, responsive and relatively simple-to-learn technologies for displaying both basic and complex, multivariate datasets. It leans heavily toward open-source software and plugins, rather than enterprise, expensive B.I. solutions.
Why?

Well, information visualization, or InfoVis, has for the past three decades been mostly regarded as a specialty skill relegated to the ranks of researchers and scientists. But in recent years, the proliferation of Big Data combined with a surge of new, open-source tools for data display have given rise to the democratization of “data visualization” and “data journalism.” It’s something anyone can do. As such, all resources that may require basic programming knowledge are labeled as such.

As Simon Rogers of The Guardian so artfully stated in 2008, “Anyone can do it. Data journalism is the new punk.”

Source: dataviz.tools

Researchers Uncover Twitter Bot Army That’s 350,000 Strong

Two researchers from University College London claim to have discovered an army of 350,000 such bots hiding in plain sight, distinguished by their affinity for tweeting quotes from Star Wars novels. And, like Aragorn bursting into the throne room at Helm’s Deep to deliver the news of an encroaching orc army, they have come to warn us.

Source: Researchers Uncover Twitter Bot Army That’s 350,000 Strong – D-brief

Galileo satellites experiencing multiple clock failures

The onboard atomic clocks that drive the satellite-navigation signals on Europe’s Galileo network have been failing at an alarming rate.

Across the 18 satellites now in orbit, nine clocks have stopped operating.

Three are traditional rubidium devices; six are the more precise hydrogen maser instruments that were designed to give Galileo superior performance to the American GPS network.

Galileo was declared up and running in December.

However, it is still short of the number of satellites considered to represent a fully functioning constellation, and a decision must now be made about whether to suspend the launch of further spacecraft while the issue is investigated.

Source: Galileo satellites experiencing multiple clock failures – BBC News

CMU AI Is Tough Poker Player

As the “Brains vs. Artificial Intelligence: Upping the Ante” poker competition nears its halfway point, Carnegie Mellon University’s AI program, Libratus, is opening a lead over its human opponents — four of the world’s best professional poker players.One of the pros, Jimmy Chou, said he and his colleagues initially underestimated Libratus, but have come to regard it as one tough player.”The bot gets better and better every day,” Chou said. “It’s like a tougher version of us.”
[…]
In the first Brains vs. AI contest in 2015, four leading pros amassed more chips than the AI, called Claudico. But in the latest contest, Libratus had amassed a lead of $459,154 in chips in the 49,240 hands played by the end of Day Nine.

“I’m feeling good,” Sandholm said of Libratus’ chances as the competition proceeds. “The algorithms are performing great. They’re better at solving strategy ahead of time, better at driving strategy during play and better at improving strategy on the fly.”

Source: CMU AI Is Tough Poker Player | Carnegie Mellon School of Computer Science

CIA FOIA Electronic Reading Room releases 12m new documents

Welcome to the Central Intelligence Agency’s Freedom of Information Act Electronic Reading Room. Do UFOs fascinate you? Are you a history buff who wants to learn more about the Bay of Pigs, Vietnam or the A-12 Oxcart? Have stories about spies always fascinated you? You can find information about all of these topics and more in the Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Electronic Reading Room.

Source: Freedom of Information Act Electronic Reading Room | CIA FOIA (foia.cia.gov)

Apparently the CIA has just released 12m documents into this

The CIA Just Dumped 12 Million Declassified Documents Online

Does More Money Change What We Value at Work? – Glassdoor Economic Research

For employers, this research bolsters the idea that pay and benefits—while important—are only one factor when it comes to keeping employees engaged over the long term.

As pay rises, compensation and benefits become less important as drivers of employee satisfaction. Instead, other workplace factors play a more important role. Regardless of income level, we find three factors are the most important drivers of job satisfaction: culture and values, senior leadership, and career opportunities.

For job seekers, this suggests that finding satisfaction at work has less to do with pay, and more to do with broader workplace factors. Although pay is important, it is not among the main drivers of workplace happiness. Instead, the big drivers of job satisfaction are working in a company that shares your cultural values, that offers a meaningful career arc, and that has senior leaders you support and believe in.

When it comes to finding satisfaction at work, these are the key factors that matter most—regardless of income level.

Source: Does More Money Change What We Value at Work? – Glassdoor Economic Research

People who swear are deemed more honest

In three studies, we explored the relationship between profanity and honesty. We examined profanity and honesty first with profanity behavior and lying on a scale in the lab (Study 1; N = 276), then with a linguistic analysis of real-life social interactions on Facebook (Study 2; N = 73,789), and finally with profanity and integrity indexes for the aggregate level of U.S. states (Study 3; N = 50 states). We found a consistent positive relationship between profanity and honesty; profanity was associated with less lying and deception at the individual level and with higher integrity at the society level.

Source: Frankly, We Do Give a Damn – Jan 15, 2017