Soldier receives UK’s first mind-controlled robot arm
EPSON Moverio – google glass you can buy now
SkyJack – autonomous drone hacking
SkyJack (available from github) is primarily a perl application which runs off of a Linux machine, runs aircrack-ng in order to get its wifi card into monitor mode, detects all wireless networks and clients around, deactivates any clients connected to Parrot AR.drones, connects to the now free Parrot AR.Drone as its owner, then uses node.js with node-ar-drone to control zombie drones
collectiveaccess collection software
CollectiveAccess is free open-source software for managing and publishing museum and archival collections.
Runs on any modern web browser
Pre-configured with several library standards including Dublin Core, PBCore, VRA Core and more
Customizable through simple user interfaces — no complex programming required
Reporting tools easily generate finding aids and exports to PDF or spreadsheet-readable formats
Supports multilingual cataloging
Mapping tools allow you to georeference any asset
Integrated with Library of Congress subject headings, Getty vocabularies, GeoNames, and more
Plugins extend the software’s core functionality to support timelines, visualizations, image licensing and more
Import frameworks allow for the batch migration and transformation of media and data
Free online documentation and support
via Welcome to collectiveaccess.org | collectiveaccess.org.
Easy way to eat mandarin oranges (without peeling!)
We Are More Likely to Lie in the Afternoon
If you want to catch someone in a lie, you’ll raise your odds in the afternoon because most people are more likely to cheat or lie then, as opposed to in the morning
The researchers also found that people who tend to cheat regularly were just as likely to do so in the morning as in the afternoon. It was the more ethical folks who suffered lapses as the day wore on
via We Are More Likely to Lie in the Afternoon: Scientific American Podcast.
ProJet 4500 – full colour 3d printing
The industry’s only continuous tone full-color plastic 3D printer
Combine the Power of Vibrant Full Color With Durable Plastic Materials
The ProJet® 4500 gives you the power to make ready-to-use, flexible, strong parts, colored pixel by pixel, with superior surface quality. This office-friendly 3D printer is quick and efficient, and features intuitive operation controls, so you can ensure high productivity and cut operating costs.
via ProJet® 4500 | www.3dsystems.com.
evidence of transgenerational epigenetic inheritance: ‘Memories’ pass between generations
Experiments showed that a traumatic event could affect the DNA in sperm and alter the brains and behaviour of subsequent generations. A Nature Neuroscience study shows mice trained to avoid a smell passed their aversion on to their “grandchildren”. The animals were trained to fear a smell similar to cherry blossom. The team at the Emory University School of Medicine, in the US, then looked at what was happening inside the sperm. They showed a section of DNA responsible for sensitivity to the cherry blossom scent was made more active in the mice’s sperm. Both the mice’s offspring, and their offspring, were “extremely sensitive” to cherry blossom and would avoid the scent, despite never having experiencing it in their lives. hanges in brain structure were also found. “The experiences of a parent, even before conceiving, markedly influence both structure and function in the nervous system of subsequent generations,” the report concluded.
The findings provide evidence of “transgenerational epigenetic inheritance” – that the environment can affect an individual’s genetics, which can in turn be passed on.
via BBC News – ‘Memories’ pass between generations.
E.C.Snaith and Son Ltd – Supplier Of Military Medals, Ribbons, Badges, Buttons & Insignia
Google to CyanogenMod: Git yer warranty-voiding ass outta our store
Google has taken a dim view of the CyanogenMod Installer, an app that makes it easier to install alternative firmwares on Android phones, leading its developers to pull it from the Google Play Store.The installer was the first major undertaking by Cyanogen Inc., the Seattle company recently formed to promote CyanogenMod, its open-source alternative Android build for smartphones and tablets; it’s intended to replace official distributions of the mobile operating system.
http://www.theregister.co.uk/2013/11/28/cyanogenmod_installer_pulled_from_google_play/
I thought Android was supposed to be the open, user configurable, friendly, alternative OS. Guess Google wants it to be as closed as Apple IOS
Build a Cheap Home Automation System in 10 Minutes with Ninja Blocks
Home security and automation are rarely mentioned in the same sentence as the word cheap, but it’s totally possible if you’re willing to do a few things yourself. We checked out a $200 DIY kit called Ninja Blocks, and were able to get a home automation and security system up and running in about 10 minutes.
Electrode recreates all four tastes on your tongue
Signals that reproduce the four well-known major taste components – salt, sweet, sour, bitter – are transmitted through a silver electrode touching the tip of the tongue. The taste receptors are fooled by a varying alternating current and slight changes in temperature controlled by semiconductor elements that heat and cool very rapidly.
3d sculpting: MIT ‘smart tools’ meld personal technique with computerized controls
You create a 3d model and then use the tool to whittle away the block of material
http://m.youtube.com/watch?hd=1&v=krRTZqFFn6c&desktop_uri=%2Fwatch%3Fv%3DkrRTZqFFn6c%26hd%3D1
Winamp to die!
Winamp.com and associated web services will no longer be available past December 20, 2013. Additionally, Winamp Media players will no longer be available for download. Please download the latest version before that date
via Download Winamp Media Player – Free MP3, Video, and Music Player – Winamp.
That is hugely depressing!
mrQuery Searches Your Phone, Calls Friends, and Opens Apps in Two Taps
You tap home and it starts a box in which you type….
Michael Robertson: Introducing The World’s First Radio Search Engine
I just launched a beta version of RadioSearchEngine.com – the world’s first radio search engine. There are other directories of A-Z lists of radio stations, but this is the first search engine where any song or artist can be located on stations playing from anywhere in the world. A universal web player for the first time connects to and plays nearly every station offering immediate audio satisfaction and unprecedented user control – See more at: http://www.michaelrobertson.com/archive.php?minute_id=378#sthash.RqNJMCHx.dpuf
http://www.michaelrobertson.com/archive.php?minute_id=378
There went Spotify…
TSA screening works only ‘a little better than chance,’ according to government report
Summarizing 400 studies over the past 60 years, the report concludes that humans perform only “the same as or slightly better than chance.” Given that the TSA has spent almost a billion dollars on the program, that’s a pretty poor record.
This includes extensive studies of the TSA SPOT programme over 2011 & 2012
Hackers steal ‘FULL credit card details’ of 376,000 people from Irish loyalty programme firm
A hack attack against an Irish loyalty programme firm, Loyaltybuild, has led to the theft of the full credit card details of at least 376,000 consumers, says the country’s data protection watchdog.According to the results of a preliminary investigation by the Office of the Data Protection Commissioner (ODPC), credit card and – contrary to all payment storage rules – CVV details were held unencrypted on Loyaltybuild’s systems in the run-up to attacks in the middle of October.
http://www.theregister.co.uk/2013/11/14/irish_loyalty_card_breach/
Microsoft’s Office 365 email, Lync cloud down
Due to a DNS problem with onmicrosoft.com, the glue tying domain names to Microsoft cloud services logins, these services were down. Long live the cloud!
http://www.theregister.co.uk/2013/11/14/office_365_cloudy_oopsie/
Bewustwording pakt de belangrijkste schakel in online veiligheid aan: de mens
Bewustwording pakt de belangrijkste schakel in online veiligheid aan: de mens
Online gebeurt er veel. Bedrijven stellen steeds vaker web-based systemen ter beschikking aan medewerkers. Zo kunnen ze altijd en overal bij de gegevens en functionaliteiten die ze nodig hebben en vaak zelfs nog méér. Alles SaaS, Cloud en 2.0. Met goede reden; er hoeft minder specialistische infrastructuur onderhouden te worden. Verantwoordelijkheid wordt overgenomen door derde partijen. Maar is dat wel zo?
Personeels- en snel afschrijvende hardwarekosten worden vermeden. Particulieren maken veelvuldig gebruik van de internet giganten: Zoekmachines, social media en winkelen. De opkomst van betaalbaar mobiel internet, smartphones en tablets zorgen ervoor dat mensen steeds vaker online zijn. Ook dat er meer vervlochtenheid is tussen privé en werk: mensen willen graag bedrijfsemail op hun persoonlijke tablet lezen, of hun eigen PC of laptop gebruiken om met bedrijfsgegevens te werken. (BYOD)
Bewustwording noodzakelijk
Bedrijven kunnen zich niet alleen meer bezig houden met de beveiliging van hun eigen netwerk. Ook de beveiliging van apparatuur van de werknemer is belangrijk. Het surfgedrag van werknemers is – niet alleen thuis – veranderd. Overal wordt o.a. getweet en geFacebookt. Hierdoor wordt het potentieel voor onveilige situaties veel hoger. Er is veel minder controle over wat er gebeurt op een netwerk. Je firewall, virus- en malwarescanners kunnen in orde zijn, maar wat een werknemer mee van huis neemt is vaak onbeschermd. Het is duidelijk dat de mensen zelf bewust moeten zijn wat de risico’s op het internet zijn.
Jij bent het product geworden
De risico’s zijn niet gelimiteerd tot virussen en malware. Ons dagprogramma “privacy & security in één dag”, geeft duidelijk aan dat het geven van informatie aan Cloud providers verregaande consequenties heeft: je geeft hen namelijk vaak de mogelijkheid om te doen waar ze zin in hebben met de data die je ze geeft. Hieronder valt letterlijk alles wat je intypt of opslaat in hun systemen. Jij bent het product geworden. De informatie die jij geeft valt niet meer te verwijderen of te corrigeren. De consequenties zijn dus levenslang. Het is zeer moeilijk om deze gegevens te beschermen tegen hackers. Uiteraard zijn er mogelijkheden om deze risico’s sterk te verminderen. AlertOnline biedt hiertoe een goed begin: bedrijven en particulieren informeren dat het niet allemaal zo onschuldig is als het lijkt op het internet.
Vanaf welke leeftijd begint u met digitale voorlichting?
Bewustwording begint echter met het onderwijs. Vaak hoor ik dat de huidige jeugd de computergeneratie is, die er alles van snapt. Als ik jongeren met een computer om zie gaan, dan merk ik dat ook zij niets snappen van computers. Ze begrijpen hoe ze Instagram, Twitter en Word moeten gebruiken maar hebben geen idee hoe het allemaal werkt. Op school is computerles eigenlijk les in het gebruiken van bepaalde programma’s. Veiligheid, privacy maar ook vooral basis hardware theorie, databases en programmeren zouden vanaf de middelbare school verplichte kost moeten zijn (en zo mogelijk eerder). Alleen dan kan de jeugd begrijpen hoe bepaalde onveiligheden werken en logischerwijs zelf bedenken wat wel en niet kan op internet. Daarbij zouden ze in staat zijn om een belangrijke bijdrage te kunnen bieden aan onze maatschappij, die inmiddels bijna overal op IT middelen draait.
Open Source software de toekomst
Ook moet er meer aandacht zijn voor Open Source en het MKB. Uit deze hoek komt de meeste innovatie. Veelal hebben zij moeite om voet aan de grond te krijgen omdat er nog steeds een idée fixe bestaat dat deze groepen weinig stabiliteit kunnen bieden. Niets is minder waar. Open Source is veilig omdat iedereen in de code kan kijken en fouten er uit kan halen. Het is betrouwbaar omdat de meeste aanbieders meedoen aan de ontwikkeling ervan. Het is fijn omdat het omgeschreven kan worden naar precies de functionaliteiten die jij nodig hebt. Vooral belangrijk is dat je gemakkelijk van leverancier kunt wisselen omdat meerdere leveranciers bekend zijn met het product dat jij gebruikt en er support op kunnen leveren.
Bewustwording méér dan een checklist
Bewustwording is dus niet alleen een checklist met puntjes die je aan iedereen kan geven en af kan lopen. Het is een manier van denken aanleren, die niet alleen beveiliging maar ook consequenties van gedrag in de hand loopt. Het zorgt er voor dat je meer kan met de middelen die je hebt. Computers kunnen veel, maar het blijft de mens die er voor zorgt welke mogelijkheden er worden benut en op welke manier dit allemaal gaat
Robin Edgar
ACTA 2: TPP
Wikileaks releases the text and positions of a trans Pacific version of ACTA, another way to erode internet rights through patents.
NL pushes for closer European defence
The only way for Europe to project the military might it needs to be able to protect its vast economic interests is by unifying the military and foreign policies of its member states. Only this will allow the economies of scale necessary to create an effective, non duplicated, expeditionary tool for politicians to use when diplomacy fails. The NL seems to have seen the light and is leading the way not only by example (integrating withe the DE navy, the BE air force, the UK marines, the common air transport fleet, the NATO AWACS fleet and the EU battlegroups), but also by leading the charge in this speech to the EU member states to get other nations on board as well. Only this way can the reliance on the US and NATO be removed and will the EU be able to stand on its own two feet in order to pursue its independent interests.
Study into consumer hard drive failures
Backblaze’s study finds that both AFR and MTBF are bunk. The document finds that disks follow the predicted “bathtub” curve of failure: lots of early failures due to manufacturing errors, a slow decline in failure rates to a shallow bottom and then a steep increase in failure rates as drives age.Backblaze’s disk longevity study shows something pretty close to the ‘bathtub’ curve one would expect
The study then looked at when drives fail and found a drive that survives the 5.1 per cent AFR of its first 18 months under load will then only fail 1.4 per cent of the time in the next year and half. After that, things get nasty: in year three a surviving disk has an 11.8 per cent AFR. That still leaves over 80 per cent of drives alive and whirring after four years, a decent outcome.
The study also predicts accelerated failure rates in years four and five, guesstimating things will get very, very bad in years four and five.
LightZone | Open-source digital darkroom software for Windows/Mac/Linux
Lightzone allows you to select areas of photographs and manipulate the light on each of these areas seperately.
LightZone | Open-source digital darkroom software for Windows/Mac/Linux.

