Siemens Gamesa Unveils World First Electrothermal Energy Storage System, stores electricity in volcanic rock

Spanish renewable energy giant and offshore wind energy leader Siemens Gamesa Renewable Energy last week inaugurated operations of its electrothermal energy storage system which can store up to 130 megawatt-hours of electricity for a week in volcanic rock. […] The heat storage facility consists of around 1,000 tonnes of volcanic rock which is used as Read more about Siemens Gamesa Unveils World First Electrothermal Energy Storage System, stores electricity in volcanic rock[…]

Google Calendar was down for hours after major outage

Google Calendar was down for users around the world for nearly three hours earlier today. Calendar users trying to access the service were met with a 404 error message through a browser from around 10AM ET until around 12:40PM ET. Google’s Calendar service dashboard now reveals that issues should be resolved for everyone within the Read more about Google Calendar was down for hours after major outage[…]

Software below the poverty line – Open Source Developers being exploited

However, I recently met other open source developers that make a living from donations, and they helped widen my perspective. At Amsterdam.js, I heard Henry Zhu speak about sustainability in the Babel project and beyond, and it was a pretty dire picture. Later, over breakfast, Henry and I had a deeper conversation on this topic. Read more about Software below the poverty line – Open Source Developers being exploited[…]

Anyone else find it weird that the bloke tasked with probing tech giants for antitrust abuses used to, um, work for the same tech giants?

The man heading up any potentially US government antitrust probes into tech giants like Apple and Google used to work for… Apple and Google. In the revolving-door world that is Washington DC, that conflict may not seem like much but one person isn’t having it: Senator Elizabeth Warren (D-MA) this week sent Makan Delrahim a Read more about Anyone else find it weird that the bloke tasked with probing tech giants for antitrust abuses used to, um, work for the same tech giants?[…]

Facing Antitrust Pressure, Google Starts Spinning Its Own Too Big to Fail Argument

In an interview this week with CNN, Google CEO Sundar Pichai attempted to turn antitrust questions around by pointing to what they say is the silver lining of size: Big beats China. In the face of an intensifying push for antitrust action, the argument has been called tech’s version of “too big to fail.” “Scale Read more about Facing Antitrust Pressure, Google Starts Spinning Its Own Too Big to Fail Argument[…]

Phantom Brigade – turn based mech game where you can see into the future

Phantom Brigade is a hybrid turn-based & real-time tactical RPG, focusing on in-depth customization and player driven stories. As the last surviving squad of mech pilots, you must capture enemy equipment and facilities to level the playing field. Outnumbered and out-gunned, lead The Brigade through a desperate campaign to retake their war-torn homeland.   Source: Read more about Phantom Brigade – turn based mech game where you can see into the future[…]

We Have Detected Signs of Our Milky Way Colliding With Another Galaxy

According to new research, Antlia 2’s current position is consistent with a collision with the Milky Way hundreds of millions of years ago that could have produced the perturbations we see today. The paper has been submitted for publication and is undergoing peer review. Antlia 2 was a bit of a surprise when it showed up Read more about We Have Detected Signs of Our Milky Way Colliding With Another Galaxy[…]

Storm in a teacup: Linux Command-Line Editors Do What they’re supposed to do, are called Vulnerable to High-Severity Bugs by ‘researcher’

A bug impacting editors Vim and Neovim could allow a trojan code to escape sandbox mitigations. A high-severity bug impacting two popular command-line text editing applications, Vim and Neovim, allow remote attackers to execute arbitrary OS commands. Security researcher Armin Razmjou warned that exploiting the bug is as easy as tricking a target into clicking Read more about Storm in a teacup: Linux Command-Line Editors Do What they’re supposed to do, are called Vulnerable to High-Severity Bugs by ‘researcher’[…]

Readability of privacy policies for big tech companies visualised

For The New York Times, Kevin Litman-Navarro plotted the length and readability of privacy policies for large companies: To see exactly how inscrutable they have become, I analyzed the length and readability of privacy policies from nearly 150 popular websites and apps. Facebook’s privacy policy, for example, takes around 18 minutes to read in its Read more about Readability of privacy policies for big tech companies visualised[…]

National MagLab creates world-record magnetic field with small, compact coil

A novel magnet half the size of a cardboard toilet tissue roll usurped the title of “world’s strongest magnetic field” from the metal titan that had held it for two decades at the Florida State University-headquartered National High Magnetic Field Laboratory. And its makers say we ain’t seen nothing yet: By packing an exceptionally high-field Read more about National MagLab creates world-record magnetic field with small, compact coil[…]

British Official Signs U.S. Extradition Order For Julian Assange Despite Hostility Between UK Home Secretary and Trump Regime

Britain’s Home Secretary Sajid Javid told BBC Radio today that he has signed the extradition order for Julian Assange, paving the way for the WikiLeaks founder to be sent to the U.S. to face charges of computer hacking and espionage. “There’s an extradition request from the U.S. that is before the courts tomorrow, but yesterday Read more about British Official Signs U.S. Extradition Order For Julian Assange Despite Hostility Between UK Home Secretary and Trump Regime[…]

HackerOne Reveals Which Security Bugs Are Making Its Army of Hackers the Most Bank

As far back as 2015, major companies like Sony and Intel have sought to crowdsource efforts to secure their systems and applications through the San Francisco startup HackerOne. Through the “bug bounty” program offered by the company, hackers once viewed as a nuisance—or worse, as criminals—can identify security vulnerabilities and get paid for their work. Read more about HackerOne Reveals Which Security Bugs Are Making Its Army of Hackers the Most Bank[…]

The Biggest Data Breach Archive on the Internet Is for Sale

The well-known and respected data breach notification website “Have I Been Pwned” is up for sale. Troy Hunt, its founder and sole operator, announced the sale on Tuesday in a blog post where he explained why the time has come for Have I Been Pwned to become part of something bigger and more organized. “To Read more about The Biggest Data Breach Archive on the Internet Is for Sale[…]

Popular Soccer App Spied on Fans Through Phone Microphone to Catch Bars Pirating Game Streams

Spain’s data protection agency has fined La Liga, the nation’s top professional soccer league, 250,000 euros ($283,000 USD) for using the league’s phone app to spy on its fans. With millions of downloads, the app was reportedly being used to surveil bars in an effort to catch establishments playing matches on television without a license. Read more about Popular Soccer App Spied on Fans Through Phone Microphone to Catch Bars Pirating Game Streams[…]

You won’t guess where European mobile data was rerouted for two hours. Oh. You can. Yes, it was China Telecom

On June 6, more than 70,000 BGP routes were leaked from Swiss colocation company Safe Host to China Telecom in Frankfurt, Germany, which then announced them on the global internet. This resulted in a massive rerouting of internet traffic via China Telecom systems in Europe, disrupting connectivity for netizens: a lot of data that should Read more about You won’t guess where European mobile data was rerouted for two hours. Oh. You can. Yes, it was China Telecom[…]

Who left a database of emails, credit cards, plain-text passwords, and more open to the web this week? Tech Data, come on down!

A team at network security outfit vpnMentor was scanning cyber-space as part of a web-mapping project when they happened upon a Graylog management server belonging to Tech Data that had been left freely accessible to the public. Within that database, we’re told, was a 264GB cache of information including emails, payment and credit card details, Read more about Who left a database of emails, credit cards, plain-text passwords, and more open to the web this week? Tech Data, come on down![…]

Infographic: How Different Generations Approach Work

How Different Generations Approach Work View the full-size version of the infographic by clicking here The first representatives of Generation Z have started to trickle into the workplace – and like generations before them, they are bringing a different perspective to things. Did you know that there are now up to five generations now working Read more about Infographic: How Different Generations Approach Work[…]

House Judiciary Committee aims guns at Big Tech and antitrust laws

The investigation will include a series of hearings held by the Subcommittee on Antitrust, Commercial and Administrative Law on the rise of market power online, as well as requests for information that are relevant to the investigation. A small number of dominant, unregulated platforms have extraordinary power over commerce, communication and information online. Based on Read more about House Judiciary Committee aims guns at Big Tech and antitrust laws[…]

Physicists can predict the jumps of Schrodinger’s cat (and finally save it)

Yale researchers have figured out how to catch and save Schrödinger’s famous cat, the symbol of quantum superposition and unpredictability, by anticipating its jumps and acting in real time to save it from proverbial doom. In the process, they overturn years of cornerstone dogma in quantum physics. The discovery enables researchers to set up an Read more about Physicists can predict the jumps of Schrodinger’s cat (and finally save it)[…]

The Russian Government Now Requires Tinder to Hand Over People’s Sexts

Tinder users in Russia may now have to decide whether the perks of dating apps outweigh a disconcerting invasion of privacy. Russian authorities are now requiring that the dating app hand over a wealth of intimate user data, including private messages, if and when it asks for them. Tinder is the fourth dating app in Read more about The Russian Government Now Requires Tinder to Hand Over People’s Sexts[…]

Lab Testing Giant Quest Diagnostics Says Data Breach May Have Hit Nearly 12 Million Patients

Clinical lab testing titan Quest Diagnostics acknowledged in a press release on Monday that an “unauthorized user” had gained access to personal information on around 11.9 million customers, including some financial and medical data. Per NBC News, news of the breach comes via way of a Securities and Exchange Commission filing in which Quest wrote Read more about Lab Testing Giant Quest Diagnostics Says Data Breach May Have Hit Nearly 12 Million Patients[…]

Supra smart TVs allow anyone on wifi network to switch video to whatever they want

Owners of Supra Smart Cloud TVs are in danger of getting some unwanted programming: it’s possible for miscreants or malware on your Wi-Fi network to switch whatever you’re watching for video of their or its choosing. Bug-hunter Dhiraj Mishra laid claim to CVE-2019-12477, a remote file inclusion zero-day vulnerability that allows anyone with local network Read more about Supra smart TVs allow anyone on wifi network to switch video to whatever they want[…]

Strewth: Hackers slurp 19 years of Oz student data in uni’s second breach within a year

The Australian National University (ANU) today copped to a fresh breach in which intruders gained access to “significant amounts” of data stretching back 19 years. The top-ranked Oz uni said it noticed about a fortnight ago that hackers had got their claws on staff, visitor and student data, including names, addresses, dates of birth, phone Read more about Strewth: Hackers slurp 19 years of Oz student data in uni’s second breach within a year[…]

EU countries and car manufacturers, navigation systems will share information between everyone

Advanced Driver Assistance Systems (ADAS) in cars such as automatic braking systems, systems that detect the state of the road, if there is anything in your blind spot and navigation systems will be sharing their data with European countries, car manufacturers and presumably insurers under the cloak of making driving safer. I’m sure it will, Read more about EU countries and car manufacturers, navigation systems will share information between everyone[…]