Zothecula writes: The danger posed by rising levels of atmospheric carbon dioxide has seen many schemes proposed to remove a proportion it from the air. Rather than simply capture this greenhouse gas and bury it in the ground, though, many experiments have managed to transform CO2 into useful things like carbon nanofibers or even fuels, such as diesel. Unfortunately, the over-arching problem with many of these conversions is the particularly high operating temperatures that require counterproductive amounts of energy to produce relatively low yields of fuel. Now researchers at the University of Southern California (USC) claim to have devised a way to take CO2 directly from the air and convert it into methanol using much lower temperatures and in a correspondingly simpler way.
Today, Instagram announced that users will be able to switch between up to five different accounts when using the app on iOS and Android. This new feature will be available later this week, when users download version 7.15 of the app. According to a blog post from the company, "Go to your profile settings to add an additional account. From there, tap your username at the top of your profile to switch between accounts. Once you have multiple accounts added, you'll see your profile photo appear in places throughout the app so you can always tell which one you're using at the moment."
dcblogs writes: U.S. Sen. Richard Blumenthal (D-Conn.) is asking the U.S. Department of Justice to investigate the layoff and replacement of IT workers by foreign workers at a state energy utility. But he is also demanding that the utility, Eversource Energy, drop a particularly restrictive non-disparagement clause that laid off employees had to sign to receive their severance. This clause bars discussion "that would tend to disparage or discredit" the utility. [emphasis added] He wants the employees, who had to train foreign replacements, to be able to state "honestly what happened to them."
An anonymous reader writes: Not even a week has gone by since Torrents Time appeared on the scene, and the site has already been served with a cease-and-desist letter. Anti-piracy group BREIN, based in the Netherlands, has deemed the streaming tool an "illegal application" and demands the administrators "cease and desist the distribution of Torrents Time immediately."
destinyland writes: Last week GitHub released a new open source tool called Scientist, a Ruby-based library they've been using in-house for several years. "It's the most terrifying moment when you flip the switch,"GitHub engineer Jesse Toth told one technology reporter, who notes that the tool is targeted at developers transitioning from a legacy system. "Scientist was born when GitHub engineers needed to rewrite the permissions code — one of the most critical systems in the GitHub application." The tool measures execution duration and other metrics for both test and production code during runtime, and Toth reports that they're now also developing new versions in Node.js, C#, and .Net..
Jason Koebler writes: Two and a half years after Elon Musk pitched the technology, actually traveling on a hyperloop is still theoretical, but its effect on business is not. There is a very real, bonafide industry of people whose job description is, broadly speaking "make the hyperloop into a tangible thing." The SpaceX Hyperloop Pod Design Weekend at Texas A&M University earlier this weekend was the coming out party for people in that industry.
An anonymous reader writes: The BBC has now put the second of Stephen Hawking's Reith Lectures up on their web site, with accompanying illustrations. It's not 'All you ever wanted to know about Black Holes', but it's an easy introduction to some of the latest thinking on them.
An anonymous reader writes: There's a German security researcher that is arduously testing the installers of tens of software products to see which of them are vulnerable to basic DLL hijacking. Surprisingly, many companies are ignoring his reports. Until now, only Oracle seems to have addressed this problem in Java and VirtualBox. Here's a short (probably incomplete) list of applications that he found vulnerable to this attack: Firefox, Google Chrome, Adobe Reader, 7Zip, WinRAR, OpenOffice, VLC Media Player, Nmap, Python, TrueCrypt, and Apple iTunes. Mr. Kanthak also seems to have paid special attention to antivirus software installers. Here are some of the security products he discovered vulnerable to DLL hijacking: ZoneAlarm, Emsisoft Anti-Malware, Trend Micro, ESET NOD32, Avira, Panda Security, McAfee Security, Microsoft Security Essentials, Bitdefender, Rapid7's ScanNowUPnP, Kaspersky, and F-Secure.
jones_supa writes: These days, the motivation to use open source software for many people is to avoid backdoors placed by intelligence organizations and to avoid software that has hidden privacy-intruding characteristics. For the operating system and userspace software, open choices are already available. The last remaining island has been the firmware included in various ROM chips in a computer. Libreboot has introduced an open BIOS, but it is not available for newer systems featuring the Intel ME or AMD PSP management features. Talos' Secure Workstation fills this need, providing a modern system with 8-core POWER8 CPU, 132 GB RAM, and open firmware. The product is currently in a pre-release phase where Raptor Engineering is trying to understand if it's possible to do a production run of the machine. If you are interested, it's worth visiting the official website. Adds an anonymous reader about the new system, which rings in at a steep $3100: "While the engineers found solace in the POWER8 architecture with being more open than AMD/Intel CPUs, they still are searching for a graphics card that is open enough to receive the FSF Respect Your Freedom certification." Update: 02/08 18:44 GMT by T : See also Linux hacker and IBM employee Stewart Smith's talk from the just-completed linux.conf.au on, in which he walks through "all of the firmware components and what they do, including the boot sequence from power being applied up to booting an operating system."
msm1267 writes: Researchers from Kaspersky Lab's Global Research & Analysis Team today unveiled details on two new criminal operations that have borrowed heavily from targeted nation-state attacks, and also shared an update on a resurgent Carbanak gang, which last year, it was reported, had allegedly stolen upwards of $1 billion from more than 100 financial companies. The heaviest hitter among the newly discovered gangs is an ongoing campaign, mostly confined to Russia, known as Metel. This gang targets machines that have access to money transactions, such as call center and support machines, and once they are compromised, the attackers use that access to automate the rollback of ATM transactions. As the attackers empty ATM after ATM—Metel was found inside 30 organizations—the balances on the stolen accounts remained untouched.
Lucas123 writes: With the introduction of 3D or stacked NAND flash memory, non-volatile memory has for the first time surpassed that of hard disk drives in density. This year, Micron revealed it had demonstrated areal densities in its laboratories of up to 2.77 terabits per square inch (Tbpsi) for its 3D NAND. That compares with the densest HDDs of about 1.3Tbpsi. While NAND flash may have surpassed hard drives in density, it doesn't mean the medium has reached price parity with HDDs — nor will it anytime soon. One roadblock to price parity is the cost of revamping existing or building new 3D NAND fabrication plant, which far exceeds that of hard drive manufacturing facilities, according to market research firm Coughlin Associates. HDD makers are also preparing to launch even denser products using technologies such as heat assisted magnetic recording.
knwny writes: In what is believed to be the first such incident in modern times, a meteorite strike in India killed a man and injured three others. According to police sources, a loud blast was heard at the site of the strike which also left a four-feet deep crater. Preliminary investigation by forensic and bomb experts showed no sign of any explosive substance at the scene. The second link has a picture of the supposed crater which I believe will interest Slashdotters with experience in this area.
mikejuk writes: The Pi Zero was supposed to be available from November 26, 2015. It is now the start of February and all of the stockists, including the Pi Swag Shop, are still showing out of stock. That's two whole months, and counting, of restricted supply which is more than an initial hiccup. Of course you would expect enough to be made available initially to meet the expected demand. The Pi sells something in the region of 200,000 per month so what do you think the initial run of the Pi Zero actually was? The answer is 20,000 units. Of which 10,000 were stuck to the cover of MagPi and "given away" leaving just 10,000 in the usual distribution channels. And yet Eben Upton, founder of the Raspberry Pi Foundation, commented: "You'd think we'd be used to it by now, but we're always amazed by the level of interest in new Raspberry Pi products," Well yes, you really would think that they might be used to it by now and perhaps even prepared for it. At the time of writing the Pi Zero is still out of stock and when it is briefly in stock customers are limited to one unit.
A victim of its own success, yes, but the real victims are the Raspberry Pi's competitors.
A victim of its own success, yes, but the real victims are the Raspberry Pi's competitors.
New submitter isisilik writes: For those working in the 'aaS' business the Parse shutdown was the main topic of conversation this weekend. So why did Facebook decide to shut down their developer platform? The author claims that Facebook never wanted to host apps to begin with, they just wanted developers to use Facebook login. And he builds up a good case.
itwbennett writes: On Sunday, the name, title, email address, and phone number of more than 9,000 DHS employees, with titles ranging from engineers, to security specialists, program analysts, InfoSec and IT, all the way up to director level was posted on Twitter. 'The account went on to claim that an additional data dump focused on 20,000 FBI employees was next,' writes CSO's Steve Ragan. The hacker told Motherboard that the data was obtained by "compromising the email account of a DoJ employee, although he would not elaborate on how that account was accessed in the first place."