Everything posted by Titan ;x
-
After a public showing on Friday of the film - based on a slave uprising led by preacher Nat Turner in 1831 - Parker described it as "a labour of love". There were gasps in the audience at some of the harrowing scenes. After the screening, Parker, who has faced media scrutiny over a historic rape trial, got a standing ovation. Parker acted in, wrote and directed the film. It gained a huge amount of awards buzz when it first screened at the Sundance film festival in January. However, recent media attention has been focused on Parker's acquittal for rape in 1999 and his accuser's subsequent suicide. Parker's 'sorrow' over rape accuser's suicide Birth of a Nation to show at London festival 'No brainer' Parker said: "I didn't have the benefit of learning about Nat Turner when I was at school, yet I grew up 42 miles (68km) east of where the rebellion happened. "So you can imagine learning about this person, in the absence of heroes, meant a lot to me." He said it was a "no brainer" that he would choose to tell the story on film. "We should all look at this film in the sense that this was a person that stood against a system that was oppressing people," he told the audience. "If we can relate to that in 2016, we must ask our selves what we would be willing to sacrifice for what we want our children, and our children's children, to enjoy." Cameron Bailey, the Toronto festival's artistic director, described the film as a "painful story from American history and a story that needed to be told". The Toronto International Film Festival runs until 18 September.
-
After a public showing on Friday of the film - based on a slave uprising led by preacher Nat Turner in 1831 - Parker described it as "a labour of love". There were gasps in the audience at some of the harrowing scenes. After the screening, Parker, who has faced media scrutiny over a historic rape trial, got a standing ovation. Parker acted in, wrote and directed the film. It gained a huge amount of awards buzz when it first screened at the Sundance film festival in January. However, recent media attention has been focused on Parker's acquittal for rape in 1999 and his accuser's subsequent suicide. Parker's 'sorrow' over rape accuser's suicide Birth of a Nation to show at London festival 'No brainer' Parker said: "I didn't have the benefit of learning about Nat Turner when I was at school, yet I grew up 42 miles (68km) east of where the rebellion happened. "So you can imagine learning about this person, in the absence of heroes, meant a lot to me." He said it was a "no brainer" that he would choose to tell the story on film. "We should all look at this film in the sense that this was a person that stood against a system that was oppressing people," he told the audience. "If we can relate to that in 2016, we must ask our selves what we would be willing to sacrifice for what we want our children, and our children's children, to enjoy." Cameron Bailey, the Toronto festival's artistic director, described the film as a "painful story from American history and a story that needed to be told". The Toronto International Film Festival runs until 18 September.
-
Welcome to CSBD Have fun
-
Only 60 examples of limted run model to be built priced from £27,995 Caterham has released an exclusive version of its iconic sportscar, called the Seven Sprint. It marks 60 years of Seven production – which the brand celebrates next year – and is inspired by a model that was planned to debut in the ‘60s but never launched. Only 60 examples of the Sprint will be made available in the UK and European markets, each priced from £27, 995. The car will be showcased at the Goodwood revival this weekend. The limited-edition model comes powered by the same 80bhp 660cc three-cylinder Suzuki engine also found in Caterham’s entry-level Seven 160. Despite the modest power output the Seven Sprint should be capable of 0-62mph in 6.9 seconds. It’s available in a choice of six exterior paints finishes to reflect the original colours that were available in 1966. The Sprint’s powder-coated grey chassis is a nod to the Series 2 Lotus 7, while the suspension and rollover bar are a tribute to the Colin Chapman’s original. Its flared front wings, polished exhaust silencer and individual rear lights echo the early years of the Seven. Rounding off the unique exterior of the Sprint are the cream painted wheels and polished hubcaps. Inside, the wooden-rimmed sports steering wheel, wood effect dashboard and classic instrument layout add to the classic ‘60s feel. The panels and Muirhead Scottish seat upholstery are hand-stitched, finished in scarlet red, while a fully carpeted interior and luggage space completing the Sprint’s design.
-
Marilyn Monroe will always remain an inspiration to many. The lady who has given us many iconic moments continues to inspire fashionistas and stars alike. So strong is her allure that in 2011, the ivory rayon-acetate dress worn by Monroe in ‘The Seven Year Itch’ – where the dress famously billows up as she steps over a gusty subway grate – raised $4.6 million at an auction held at The Paley Center for Media in Los Angeles. This time it’s the famous flesh-coloured, skin-tight beaded gown that Monroe wore during her breathless rendition of Happy Birthday to President John F Kennedy that’s going on the auction block. The auction house, Julien’s Auctions is offering the sequined stunner at a sale in Los Angeles on November 17 and it’s expected to fetch around $2 million to $3 million. The sultry actress wore the barely-there dress at Kennedy’s 45th birthday celebration at Madison Square Garden on May 19, 1962. According to Reuters, a representative from Julien said, “Monroe had asked for the dress to be especially historic, a request dutifully carried out by Hollywood favourite, designer Jean Louis. It’s like the equivalent of a Monet, just because of its historic significance and its connection to one of the most important actresses of our time.” Made of silk gauze and covered in thousands of rhinestone beads and sequins, the iconic dress was so form-fitting that Monroe had to be sewn into it. It was first purchased 17 years ago at Christie’s auction by the late financier Martin Zweig for $1.26 million. He kept it in a climate-controlled display case at his Pierre Hotel penthouse in New York and had it professionally mounted on a mannequin. The dress is among some 1,300 Monroe artifacts being offered by Julien’s over three days. According to AP, Julien said, “This is the last auction of its kind. When she died Marilyn Monroe left everything to Lee Strasberg. We have the final of his estate items as they relate to Marilyn Monroe. It’s literally going to be the last opportunity to ever experience a Marilyn Monroe auction like this again.”
-
An operation to rescue people trapped overnight in a series of cable cars in the French Alps has resumed. Forty-five tourists spent a cold Thursday night suspended above the glaciers of Mont Blanc at an altitude of about 3,800m (12,468ft). They were among 110 people initially trapped when the cable cars ground to a halt on Thursday afternoon. It is believed that the cars stopped after cables became tangled in high winds. Technicians on Friday morning are trying to untangle the cable cars by loosening the tension of cables holding them. Sixty-five people were evacuated by helicopter late on Thursday but the rescue operation had to be suspended on Thursday night when night fell and clouds hampered visibility. "We were forced to suspend operations for safety reasons," said Georges Francois Leclerc, prefect of the Haute-Savoie department. "We hope to get everyone on Friday morning," he said, adding that it was "a very complex operation". The stranded tourists have been given survival blankets, energy bars and bottles of water. Interior Minister Bernard Cazeneuve said first aid workers had spent the night in the cable cars with those trapped. Local officials said the operation would resume at 06:30 local time (04:30 GMT). Mathieu Dechavanne, the head of the cable car company, said it appeared that cables had crossed over "for unexplained reasons" but probably due to strong gusts of wind. French, Italian and Swiss teams are taking part in rescue efforts and they have three helicopters at their disposal. The cable cars connect the Aiguille de Midi peak in France, at 3,842m (12,605ft), to Pointe Helbronner in Italy, at 3,462m (11,358ft) and offer a panoramic view of Mont Blanc.
-
In addition to keeping your computer healthy, it's important to think about your own health. Using a computer involves a lot of repetitive motions such as typing and using the mouse. Over time, these motions can begin to negatively impact your body, especially your wrists, neck, and back. Staring at a monitor for long periods of time can also cause eye strain. To minimize these risks, you should take a few moments to make sure your workspace is arranged in a comfortable and healthy way. Watch the video below to learn more about arranging your workspace to avoid strain and injury. Avoiding strain and injury Computer ergonomics is the science of equipment design and how specific equipment usage and placement can reduce a user's discomfort and increase productivity. Some equipment is designed with special attention to ergonomics, like ergonomic keyboards and ergonomic chairs. Here are a few tips to help you avoid injury in your workspace. Adjust your chair: Make sure your chair is adjusted to allow you to sit in a natural, comfortable position. Many office chairs are specially designed to support the lower back and promote good posture. Keep the keyboard at a comfortable height: Try to place the keyboard in a position that allows you to keep your wrists straight and relaxed to avoid wrist strain. Many desks have a keyboard tray that can keep the keyboard at a better height. You can also buy an ergonomic keyboard that is designed to minimize wrist strain. Keep the mouse close to the keyboard: If possible, place the mouse right next to the keyboard. If the mouse is too far away, it may be uncomfortable or awkward to reach for it. Place the monitor at a comfortable distance: The ideal position for a monitor is 20 to 40 inches away from your eyes. It should also be at eye level or slightly lower. Avoid clutter: The computer area can quickly become cluttered with paper, computer accessories, and other items. By keeping this area as uncluttered as possible, you can improve your productivity and prevent strain and injury. Take frequent breaks: It's important to take breaks while you're working at your computer. To avoid eye strain, you should look away from the monitor every once in a while. You can also stand up and walk around to avoid sitting in the same position for long periods of time. Programs such as Workrave can automatically remind you to take breaks.
-
Spotting a glitch on the factory floor in real time—and reconfiguring around it—are the goals of a new $4 million project led by University of Michigan engineering researchers. The project, which also involves researchers from the University of Illinois and Cornell University, aims to increase factory productivity and American competitiveness. Modern advanced manufacturing plants hold hundreds of software and hardware components. Their robots, conveyer belts, sensors, control systems and communication networks have intricately choreographed roles in a sector that yields 12 percent of the nation's GDP. But machine failures, operators' mistakes and, increasingly, cyberattacks can halt production—leading to expensive unscheduled downtime or potentially dangerous situations. In 2015, for example, hackers breached the control system in a steel mill in Germany and made it impossible for operators to properly shut down a blast furnace. News accounts described the damage as "massive." The new project—made possible by a grant from the National Science Foundation—will yield "a revolutionary methodology for controlling manufacturing systems," the researchers say. They call the methodology "software-defined control." Central to the new approach is a continuous, full simulation of the manufacturing plant. The team will produce this simulation and develop software that compares a plant's actual operation to what they'd expect based on the simulation. "The idea is you have the physical manufacturing plant and the simulated model of the plant so if there's a difference between the two, you can detect a fault or a cyber-intrusion," said project principal investigator Dawn Tilbury, associate dean for research and professor of mechanical engineering at the U-M College of Engineering. "The goal is to develop control systems for manufacturing systems that are secure and reconfigurable automatically." Such systems could reprogram how parts flow through the plant to avoid a faulty piece of equipment. "Our work aims to develop the science and enabling technologies to transform manufacturing systems from the current paradigm of low efficiency and high susceptibility to system disruptions to a new era of system-level anomaly detection, classification and action," said Kira Barton, U-M assistant professor of mechanical engineering. "This will lead to less downtime, faster responses to disruptions and a more efficient manufacturing system." Indeed, the rise of automation calls for a better way to keep tabs on plant operation, Tilbury said. "Automation may increase efficiency and raise quality, but it brings with it vulnerabilities," she said. Robots are networked, and the companies that produced them can often log in remotely to make repairs. These are legitimate endeavors, but they can also be weak links in the cybersecurity of the system. As manufacturing systems become more complex and digitally connected, they become increasingly susceptible to disruptions that can cause significant financial losses. The U.S. Department of Homeland Security investigated 97 cyberattacks at critical manufacturers during the fiscal year ending in June 2015, according to a report by its Industrial Control Systems Cybersecurity Emergency Response Team. Cyberattacks to manufacturing plants are a relatively new phenomenon. The FY 2015 number that federal officials examined was double the previous year. A more clear and present risk—and this one to the nation's economy—is that of unscheduled factory downtime. It's one of the most prevalent causes of inefficiency in manufacturing, the researchers say. When a cyberattack or a broken machine stops a factory in its tracks, the cost can run tens of thousands of dollars a minute. "Manufacturing systems produce the vast majority of products in the modern world—automobiles, computers, textiles and toys, to name just a few," said Sibin Mohan, U of I research assistant professor of computer science. 'Improvements in the design and operation of manufacturing systems will have a huge financial and social impact on companies and consumers, and that's crucial to economic competitiveness." While the project focuses on discrete part manufacturing, the researchers say it translates well to semiconductor manufacturing and batch processes. "The work will combine techniques from multiple disciplines, spanning control theory, modeling of physical properties, machine learning, and cybersecurity, to detect and deter such attacks. The collaboration will be exciting as well as challenging," said Elaine Shi, associate professor of computer science at Cornell. This grant is one of three announced today through NSF's Frontier program, which aims to advance the state of the art in cyber-physical systems. "NSF has been a leader in supporting research in cyber-physical systems, which has enabled and accelerated multidisciplinary research in a number of application domains," said Jim Kurose, NSF's head of computer and information science and engineering directorate. "We look forward to the results of this new award, which expands our Frontier projects portfolio into the area of cyber-manufacturing."
-
Photo editing pushes laptop capabilities right to the very edge. Top-quality work demands a high-resolution, color-accurate display, and a fast processor. But the rigors of traveling with photo gear plus a computer make small, lightweight machines with long battery lives a real plus. Similarly, storing thousands of high-resolutions calls for a large hard drive, while peak performance is only possible with an SSD. When we last looked at the best options in the market last year, there were some clear leaders. We’ve updated our list, with new and improved models have have come on the market over the last year. This isn’t an exhaustive list of the best laptops for photo editing, but if you are in the market, one of these is likely to suit your needs. Dell XPS 15 My favorite laptop for image editing continues to be the Dell XPS 15. Each year, Dell makes it lighter, smaller, and more powerful. Currently, you can get a base model with an i3 and 8GB of memory for $1000, but most will want something beefier. A top-of-the-line i7 unit with 16GB of memory, a 512GB PCIe SSD, Nvidia GTX 960M GPU, and upgraded with a UHD touchscreen is a fairly reasonable $2,100 -- about 20% less than similar functionality in the previous generation. The unit has a good selection of ports, including HDMI, USB 3.0, and Thunderbolt. At 4.4 pounds the latest XPS 15 is about the lightest laptop you can find that can pack this much punch, and with a nearly Adobe RGB color gamut. Don’t fret if we missed your photo editing favorite It was hard to pick out just a few machines from the dozens of excellent laptop models out there. For many, apparently small features like backlit keyboards, multiple USB 3.0 ports, choice of DisplayPort, HDMI, or VGA output, or battery life can easily change which model is right for your particular needs. This is especially true with Windows ultrabooks — with literally dozens of very similar models crowding the sub-four-pound SSD-powered Windows laptop space. Unfortunately, laptop makers seem to be making it increasingly difficult to compare the actual specifications for their units. Manufacturers often completely neglect to state maximum RAM capacity, base CPU speed (they seem to like bragging about the higher Turbo Boost speed instead), or drive RPMs. Hopefully, though, the models we’ve described can serve as a baseline for your shopping so you’ll know what’s available and what some of your alternatives are. If you have a very-high-end photography workflow, that involves a lot of multi-layer Photoshop images, and are okay with lugging around something larger, also take a look at our best laptops for engineers guide for ideas. If you have a different laptop you love for your photo editing work, let us know about it in the comments.
-
We round up all you need to know about Apple's in-car connectivity service - compatible with the iPhone 5 right up to the iPhone 7 Apple's CarPlay service addresses some of the biggest problems with in-car infotainment - namely, the difficulty in keeping maps, apps and data as up-to-date as possible. It offers carmakers the ability to swap standard infotainment systems for one that interlinks seamlessly with the iPhone - allowing you to control selected apps right from the car, using a familiar interface. Despite the recent launch of the new iPhone 7 coming with great news like improved storage, a better camera and faster performance, there was no mention of CarPlay being updated. However, Apple did mention improvements to the Maps app, allowing third-party apps to integrate to locations on the map. You can now order a taxi or read reviews right within the Apple Maps app. A while ago, Apple updated CarPlay for iOS 10, bringing greater functionality for the Apple Maps app. For the first time, Apple Maps is able to show turn-by-turn navigation instructions in a car's instrument cluster - much like many built-in sat-nav systems already can do. It's a big step towards making CarPlay feel more seamlessly integrated into a vehicle and less of an afterthought - as well as bringing it into line with competitor Android Auto, which has been doing it for a while. • Best sat-nav apps: 2016 group test As well as this, Maps for CarPlay will be able to suggest landmarks along a route, and show predicted traffic along the route. If traffic backs up, Maps will suggest a new route, and for the first time users are also able to swipe around the map while navigating. Apple is also opening up its voice-controlled digital assistant, Siri, to be used by outside developers. The company says developers could 'use Siri to control CarPlay apps' - potentially using the excellent voice recognition software to control more functions in car, such as changing a music playlist. • Android Auto: user guide and review About Apple CarPlay Key smartphone functions like voice calls, contact info and music streaming have been widely available via manufacturers’ own in-car interfaces for years, of course. But if you want to enjoy ‘maximum connectivity’ with your smartphone then systems like Apple CarPlay are the way to go. Simply put, Apple CarPlay is software built into a new car’s infotainment system that allows you to operate many of your iPhone’s features and apps via the car’s touchscreen display. It’s much safer than operating your phone when it’s mounted in a cradle, especially if you use the Siri voice recognition feature, and unlike using a hand-held phone while driving, it’s perfectly legal! You can also use steering wheel controls, or other relevant dashboard switches depending on how your car’s controls are configured. • Best in-car entertainment systems - group test The phone-to-car connection is hard-wired using the cable you’d be plugging-in anyway if you were using your car as a glorified phone charger. Future versions of Apple CarPlay will use WiFi or Bluetooth connectivity, we’re told. Which iPhone models are compatible with Apple CarPlay? CarPlay is compatible with all iPhones equipped with a lightning connector – which basically means anything from an iPhone 5 up, but specifically includes iPhone 5, iPhone 5c, iPhone 5s, iPhone 6, iPhone 6 Plus, iPhone 6s and iPhone 6s Plus. When is your upgrade due? What apps and features does Apple CarPlay run? Siri is the voice assistance feature offered by the iPhone, and when connected to CarPlay it allows you to find contact numbers, listen to voicemails and will read out messages. You can also dictate responses and send them without taking your hands off the wheel. Siri also gives you access to iTunes for music, podcasts and radio, as well as various third-party apps like Spotify. Navigation is catered for with Apple mapping, giving you turn-by-turn directions, traffic conditions and an ETA. Again, you can use Siri to help plan journeys. Which carmakers offer Apple CarPlay compatible models? It’s an evolving situation, and not all the carmakers who’ve signed up for CarPlay make it available on all models yet. But the list of manufacturers who install the technology includes Audi, Citroen, Ferrari, Ford, Honda, Hyundai, Mercedes-Benz, Mitsubishi, Peugeot, Porsche, SEAT, Skoda, Volkswagen and Volvo. If you are not in the market for a new car, you can also buy aftermarket navigation/audio head units that are pre-loaded with CarPlay – they’re currently available from Alpine and Pioneer. • Best app-friendly head unit upgrades Volkswagen reckons it’s the first manufacturer to offer a choice of three switchable smartphone interfaces. Its latest Discover Navigation system – a high-end option being introduced widely across its line-up as models are refreshed – boldly offers Android Auto, Apple CarPlay and MirrorLink connectivity. Many other manufacturers seem to be adopting the ‘either or’ approach with Apple CarPlay and Android Auto and anyway the roll-out process is slow, so for now you’ll need to shop around to find your perfect smartphone match. But as the technology develops, more carmakers will be following VW’s lead and catering for everyone. Apple CarPlay versus Android Auto review – which is better? The basic features of the two rival systems are broadly similar, but dedicated iPhone users will prefer the simple and refined CarPlay interface, which mimics the look and feel they’re accustomed to. Android Auto uses the live update card information system used by Google Now. Music features naturally reflect the systems’ origins too – so CarPlay uses iTunes but also connects to Dash Radio, Stitcher and Audible, while Android Auto leads with Google Play Music, but also enables Spotify and Radioplayer. Both rival systems handle navigation and mapping effectively, but many users will be instantly more comfortable with the Android Auto’s Google Maps system, as it’s so familiar from their desktops. • Best sat-navs for 2016 While CarPlay supports Apple’s own messaging system, Android Auto can handle messages from Google Hangouts, KiK, WhatsApp and Skype to name a few. Apple CarPlay versus Android Auto review – verdict You’ll probably already own a smartphone when you buy your next car, and that will define your choice of in-car operating system. In terms of functionality the two systems are very similar, but CarPlay focuses on simple, clean, intuitive user journeys while the Android Auto strength is a more open platform for third party apps and content. It’s a highly subjective area, but if forced to choose we’d go for Android Auto with Google Maps and access to multiple messaging apps.
-
A new study brings out that the more advertising kids see for particular brands of alcohol, the more they consume those brands. The research shows substantial evidence linking alcohol advertising to underage drinking and suggests that TV ads really do influence the amount of alcohol kids drink. Past studies have found that underage drinkers often have a preference for the brands of alcohol they see advertised. Lead researcher Timothy Naimi, said “But critics could say, sure, ads influence the brands underage drinkers choose, but not whether they drink, or how much they drink in total.” However, he said his team’s findings counter that argument: The more exposure kids had to brand-specific alcohol ads on TV, the greater the total amount they consumed of those brands, even after adjusting for consumption of all non-advertised brands. Naimi said the adjustment is important, because it takes into account the fact that those who watch more television may tend to drink more. The findings are based on a national sample of 1,031 13- to 20-year-olds who said they’d had alcohol in the past month. They were asked whether, in the past month, they’d watched any of 20 po[CENSORED]r TV shows that featured alcohol commercials. They also reported on their consumption of the 61 brands in those commercials. The researchers measured youths’ add exposure in what they term “adstock units.” On average, underage drinkers who’d seen zero units had about 14 drinks per month; that rose to about 33 per month by the time they’d seen 300 adstock units. Drinking levels shot up among kids exposed to more than 300 units, reaching 200-plus drinks in the past month. Naimi pointed out, alcohol advertising is self-regulated by the industry. Manufacturers have guidelines saying that adds should be limited to media that have a mostly adult audience, for instance. But alcohol companies don’t always follow their own guidelines, and there is no penalty for violations. For parents, Naimi said, the findings may offer extra motivation to curb kids’ time in front of the TV, particularly for programming with alcohol advertising. In general, experts recommend that children and teenagers spend a limited amount of time each day in front of a “screen” — whether a TV, computer, or phone. The point, in part, is to free more time for healthier activities, such as exercising and reading. “This could be yet another reason to limit screen time,” Naimi said. The research was published in the Journal of Studies on Alcohol and Drugs.
-
The Pentagon says a Russian fighter plane flew within about 10ft (3m) of one of its reconnaissance aircraft operating over the Black Sea. US officials described the intercept by the SU-27 jet on Wednesday as "dangerous and unprofessional". Russia's defence ministry said the US plane had been approaching Russian territory and the SU-27 pilots had adhered to international rules. Russia is currently carrying out military exercises in the Black Sea. Pentagon spokesman Capt Jeff Davis said the US Navy P-8A Poseidon aircraft had been conducting routine operations in international airspace when the Russian fighter made the unsafe manoeuvre. "These actions have the potential to unnecessarily escalate tensions, and could result in a miscalculation or accident," he said. A US defence official quoted by AFP news agency said the Russian plane had flown within 30ft of the P-8A before closing to just 10ft. However, the Russian defence ministry said fighters intercepted the US plane because it was heading towards Russian territory with its transponder signal - which helps others identify it - switched off. "After the Russian fighters got close to the spy planes for visual confirmation and to determine their wing numbers, the American aircraft changed course sharply and flew away," a statement said. "The Russia pilots acted in strict accordance with international rules for flights." Relations between Russia and the West have been strained since the Russian annexation of Crimea from Ukraine in March 2014. In April, the US complained that Russian jets had confronted one of its reconnaissance planes over the Baltic Sea in an "unsafe and unprofessional manner". In that incident, Russia also said that the US plane had turned off its transponder signal.
-
Introduction Take a look at the front and back of your computer case and count the number of buttons, ports, and slots you see. Now look at your monitor and count any you find there. You probably counted at least 10, and maybe a lot more. Each computer is different, so the buttons, ports, and sockets will vary from computer to computer. However, there are certain ones you can expect to find on most desktop computers. Learning how these ports are used will help whenever you need to connect something to your computer, like a new printer, keyboard, or mouse. Watch the video below to learn about the buttons, ports, and slots on a desktop computer. Front of a computer case Click the buttons in the interactive below to become familiar with the front of a computer. Back of a computer case The back of a computer case has connection ports that are made to fit specific devices. The placement will vary from computer to computer, and many companies have their own special connectors for specific devices. Some of the ports may be color coded to help you determine which port is used with a particular device. Click the buttons in the interactive below to become familiar with the back of a computer. Other types of ports There are many other types of ports, such as FireWire, Thunderbolt, and HDMI. If your computer has ports you don't recognize, you should consult your manual for more information. Peripherals you can use with your computer The most basic computer setup usually includes the computer case, monitor, keyboard, and mouse, but you can plug many different types of devices into the extra ports on your computer. These devices are called peripherals. Let's take a look at some of the most common ones. Printers: A printer is used to print documents, photos, and anything else that appears on your screen. There are many types of printers, including inkjet, laser, and photo printers. There are even all-in-one printers, which can also scan and copy documents. Scanners: A scanner allows you to copy a physical image or document and save it to your computer as a digital (computer-readable) image. Many scanners are included as part of an all-in-one printer, although you can also buy a separate flatbed or handheld scanner. Speakers/headphones: Speakers and headphones are output devices, which means they send information from the computer to the user—in this case, they allow you to hear sound and music. Depending on the model, they may connect to the audio port or the USB port. Some monitors also have built-in speakers. Microphones: A microphone is a type of input device, or a device that receives information from a user. You can connect a microphone to record sound or talk with someone else over the Internet. Many laptop computers come with built-in microphones. Web cameras: A web camera—or webcam—is a type of input device that can record videos and take pictures. It can also transmit video over the Internet in real time, which allows for video chat or video conferencing with someone else. Many webcams also include a microphone for this reason. Game controllers and joysticks: A game controller is used to control computer games. There are many other types of controllers you can use, including joysticks, although you can also use your mouse and keyboard to control most games. Digital cameras: A digital camera lets you capture pictures and videos in a digital format. By connecting the camera to your computer's USB port, you can transfer the images from the camera to the computer. Mobile phones, MP3 players, tablet computers, and other devices: Whenever you buy an electronic device, such as a mobile phone or MP3 player, check to see if it comes with a USB cable. If it does, this means you can most likely connect it to your computer.
-
In the chaos that followed the terrorist attack at the 2013 Boston Marathon, bomb squads scanned packages at the scene for explosive devices. Two homemade pressure cooker bombs had killed three people and injured more than 250, and techs quickly had to determine if more were waiting to blow up. They got help from X-Ray Toolkit (XTK), an image-processing and analysis software developed at Sandia National Laboratories that has swept the ranks of the country's bomb squads. In fact, XTK has spread through the military and emergency response communities so rapidly that it's now in the hands of more than 20,000 users across the globe. It also was adopted by the FBI's Hazardous Devices School, which certifies the 467 recognized state and local bomb squads in the U.S., as its benchmark for all courses. "XTK is the standard in the field not only nationally, but internationally. It made the average bomb tech a better bomb tech," said Craig Greene, a special agent and bomb technician at the Albuquerque FBI. "In the past 20 years, the bomb technician community has progressed from the Stone Age to the 21st century in terms of equipment and procedures, and XTK is a major part of that progression." The toolkit got to the people who needed it so quickly due to a thoroughly unconventional approach to technology transfer. "The objective was to get the technology out so it could be used to save lives." said Justin Garretson, lead developer of the XTK software. Sandia recently won the 2016 national Federal Laboratory Consortium Award for Excellence in Technology Transfer for its XTK effort. Licensing specialist Bob Westervelt said Sandia did three things: offered it to military and law enforcement bomb squads to download free from the XTK website; offered no-cost test and evaluation licenses to X-ray scanner manufacturers so they could make sure XTK worked with their hardware; and offered low-cost licenses to companies willing to give high-quality training to end users. "Those were foundational elements of the XTK licensing. It was a unique approach," Westervelt said. "We hadn't done anything like it on that scale before." A specialized visualization tool Explosive Ordnance Disposal (EOD) technicians use portable X-ray scanners with image-processing software to look inside and analyze suspicious objects ranging from backpacks to battlefield improvised explosive devices (IEDs) to shipping containers. It's a high-pressure, time-sensitive job. "Every mission is different," Garretson said. "Maybe it's just someone's lunch or a hoax, but maybe it's a pipe bomb. It's all about speed, precision and accuracy. It's about having all the tools you need, none that you don't need and supporting the bomb tech's natural work flow." Before XTK, bomb techs had to learn to use multiple software packages, most developed for medical X-ray or photography applications rather than emergency response. The federal government wanted a specialized X-ray visualization tool, and Sandia was tapped in 2009 to develop XTK with funding from the National Nuclear Security Administration (NNSA) and the Department of Defense Combating Terrorism Technical Support Office. "We wanted something new and specific to the needs of national EOD personnel responsible for responding to nuclear terrorism events," said Marc Phipps, a former Army non-commissioned officer and bomb technician who headed up the XTK project for NNSA. "I was an Army guy and knew we could do better." The XTK team spent hundreds of hours with EOD technicians learning how they work and custom built the software to meet their needs. "There was a lot of collaboration. As a response organization, we were able to guide the software where it needed to be," Phipps said. "We went out with local bomb squads and brought Sandia coders with us to the field. Justin would be in the classroom writing code while the techs were testing the software. We would de-bug it right there. He wrote the code during lunch and when the techs came back it was ready. We gave everybody everything they ever wanted. It was awesome." Garretson said Phipps had "a vision of what this software could be." "We'd get something done and he'd give us more," Garretson said. "Make it do this, make it do that. Have it talk to the scanners, stitch images together, enhance so we can see things better, now add measurement tools. We did all that. Now make it compress the images so I can upload them over a satellite data-link. Piece by piece, Marc had us put into one user-friendly package all the tools that could make the bomb tech more effective." Customize features, manage incidents Phipps said there were dozens of versions of the toolkit before XTK 1.0 was ready. "We made it simple to use," he said. "EOD personnel can customize the features and set it up the way they want to use it. They can manage an incident as needed." A bomb tech scans an object and acquires an image, then applies "all our XTK magic to it," Garretson said. "But it doesn't begin or even end with looking at the images. XTK assists the bomb tech in every step of the operation from planning X-ray exposures to transmitting images out of the field." The software tools can help optimize X-rays, identify critical device components, create 3-D visualizations, stitch multiple images together to cover large objects and compress large images for transmission. XTK also offers file management, measurement, markup, image-sharing tools and the ability to create training scenarios and after-action reports. "We wanted to equip responders to be better able to respond," Phipps said. Greene said bomb techs must mani[CENSORED]te a radiographic image to learn what it is. "XTK is very versatile and lets us mani[CENSORED]te the X-ray to identify certain components. There are no alternatives to identifying what's in the X-ray," he said. "That's the key to rendering safe any IED or explosive. If you don't know what's inside the packet, the render safe tool might be wrong." In tandem, Sandia designed the patented Grid-Aim system, an optional hardware accessory kit for XTK that lets users quickly and precisely disable the internal components of an IED with minimal damage to surrounding property and infrastructure, preserving the rest of the device for evidence. 'How do we get that?' As XTK and Grid-Aim were being developed for government use, Phipps saw that the system could help military and civilian bomb techs do their jobs better. "We were working with FBI and state and local EOD people," he said. "All the local guys said, 'How do we get that?' Well, the government paid for it, why not give it to them? So we gave it away." The technology transfer began in 2012 when the government began outside distribution of XTK software. "It was huge. People everywhere wanted it," Phipps said. "We were teaching classes all the time and set up a website and 24-hour phone number. It was almost a full-time job answering emails and phone calls. It took off because it was what people needed." Sandia wasn't able to train the tens of thousands of people who wanted XTK so the technology was licensed to multiple companies that provided training and helped get XTK widely distributed in a short time. Westervelt said instructors are tested and certified every year to maintain high-quality training. Grid-Aim was licensed separately to four companies that produce and sell the hardware. A success story XTK is used by the Department of Justice, Department of Energy and Department of Defense. U.S. allies including the United Kington, Australia and Canada use the software, with more requests coming in from international training partners. Sandia updates XTK regularly with new features and versions designed for mobile computer platforms, such as touch-screen tablets. "It keeps getting bigger," Phipps said. "XTK is a success story, taxpayer money put to good use," Garretson said. "Even after all these years I get feedback all the time about how much of a difference it has made for people. One guy calls it the single most impactful, game-changing thing he's seen in his years as a bomb tech. It bridged the gap between our world at Sandia and the rest of the world." Greene said bomb techs know and appreciate that NNSA, which funded the initial work, made the software available as a free app and continues to update it. "That's important to them," he said. "It's their lives and the lives of others on the line."
-
An exciting new study from the University of Sheffield and published in the journal Swarm Intelligence has demonstrated (free pre-print version) a method of allowing computers to make sense of complex patterns all on their own, an ability that could open the door to some of the most advanced and speculative applications of artificial intelligence. Using an all-new technique called Turing Learning, the team managed to get an artificial intelligence to watch movements within a swarm of simple robots and figure out the rules that govern their behavior. It was not told to look for any particular signifier of swarm behavior, but simply to try to emulate the source more and more accurately and to learn from the results of that process. It’s a simple system that the researchers think could be applied everywhere from human and animal behavior to biochemical analysis to personal security. First, the history. Alan Turing was a multi-talented British mathematician who helped to both win the Second World War and invent the earliest computers, both while leading the Allied code-breaking efforts at Blechley Park. However, this impact on history may have been even greater through his academic work; his seminal paper On Computable Numbers laid down the foundations for modern computer theory, and his thinking on artificial intelligence is still some of the most influential today. He devised the famous Turing Test for true AI: if an AI can endure a detailed, text-based interrogation by a human tester or testers, and those testers cannot accurately determine whether they are speaking to a human or a robot, then true artificial intelligence has been achieved. With all we now know about the ability of neural networks to find patterns in behavior, this does seem like a somewhat low bar to consciousness — but it’s easy to remember, historically important, and it has alliteration, which means it’s famous. This new learning process is called Turing Learning because it basically puts a very simple version of this pass-fail differentiation test into practice, over and over again. It can be applied in many contexts, but for their study the team used robot swarms. In all contexts though, you have an original, a copy, and a comparison algorithm. In this study one swarm of robots, the “agent” swarm, moves according to simple but unknown rules, while a second “model” swarm starts out with largely meaningless, random behaviors. (As an aside, yes, the “model” swarm should really be the one that is used as the model, but whatever.) These two swarms are then compared by a “classifier” algorithm but, crucially, this classifier is not told which rubrics it is supposed to be comparing. It simply looks at a swarm, notices all the attributes it can, and tries to determine whether it is looking at the agent or model swarm — does this swarm conform to the patterns associated with the agent swarm, yes or no? At first this will of course be a total guess, but when the classifier algorithm does correctly identify the swarm, it is given a metaphorical “reward” that slightly increases the probability that aspects of the path it took to that answer will be repeated in the future. In principle, even starting from totally random modes of comparison between the two swarms, the classifier should be able to quickly deemphasize irrelevant aspects of the agent swarm while focusing in on those that actually impact the accuracy of its guesses. For its part, the model swarm adjusts its own movement after each guess, receiving its own probabilistic reward for “tricking” the classifier into incorrectly identifying it as the agent swarm. What this means is that of the three aspects of this learning system, only the agent swarm remains static, because that’s the thing we’re trying to study. The other two elements, the model swarm and the classifier, evolve in a complementary fashion to one another. The accuracy of one directly offsets the accuracy of the other and drives a need for both to keep getting more accurate over time. In the University of Sheffield study, this evolutionary approach, in which the model provides both the machine learning predator and the prey, produced more accurate guesses at the agent swarm’s programming than traditional pattern-finding algorithms. In the above Turing Learning test, the classifier is eventually seeing through to the simple rules that govern the movement of the agent swarm, even though the actual behavior of the swarm is much more complex than that due to interactions between robots and with the environment. To continue to distinguish between the two increasingly similar swarms, the algorithm is forced to infer the deep, underlying laws that give rise to the more nuanced distinctions. This insight then drives the model swarm to correct such errors, inexorably nudging its programming to be just a little more similar to the unknown programming of the agent swarm. So, what’s the utility of this? Well, much the same as existing neural networks, but with less need for human direction and thus less possibility of human bias. More traditional neural network models are already capable of providing real insight into long-standing problems by applying the cold, inhuman mind of a computer. Computers aren’t biased toward any particular outcome (unless we tell them to be), which for instance allows them to find a much wider and more powerfully predictive suite of visual characteristics for lung cancer in tissue micrographs despite such identification having been studied and refined for decades by medical doctors. That sort of ability can be applied widely. What if we wanted to learn about the defining aspects of the work of a great painter? We might ask historians of this artist, but that would produce largely canonical explanations and perhaps overlook the same things that have been overlooked since the very beginning. But a learning model could find aspects nobody — including the artist themselves — had ever considered. It could find the small but important stimuli that cause schools of fish to move this way rather than that. It could slowly refine AI pathfinding and general behavior in video-games to create more lifelike allies and opponents. Perhaps most intriguingly, though, Turing Learning could assist in analyzing human behavior. Give a model like this a never-ending feed of human movements through a subway station and a simulated station full of simple moving actors, and those actors might very soon move according to rules that provide real insight into human psychology. By the same token, a dystopian surveillance agency might one-day run a simulation in which a human model behaves in certain simulated ways, those behaviors simultaneously evolving ever-closer to your own and to the model of a closeted dissident. The idea of some all-seeing AI that can sniff out malcontents is a lot easier to imagine when that AI doesn’t have to have been specifically programed to know what every potentially shady behavior looks like, but can figure that out as it goes. These are the sorts of abilities in machine learning that forecast the most incredible and worrying predictions of science fiction. Neural networks have had the ability to watch us and find patterns for many years now, but this breakthrough shows just how quickly those abilities are moving forward.
-
Happy brithday Best wishes
-
MG insiders confirm next year’s Nissan Juke rival will be called MG ZS, and we've spotted it testing on the road This is our best look yet at MG's new baby SUV. The follow-up act to the Qashqai-sized MG GS, the smaller SUV will be called the ZS and go head-to-head with the Nissan Juke when it arrives. Spied wearing a production body for the first time, the new MG SUV will be based on a shortened version of the platform from the GS. Over the MG3 hatchback the ride height has clearly been raised, while the headlamps appear to be more raked back than they are on the larger GS. A number plate check on previous test mules also uncovered that MG was trailing a 1.0-litre petrol motor - an engine MG does currently not have in its range. If MG is developing a small three-cylinder turbo unit itself it could appear in other models within MG's lineup. • Best crossovers to buy now According to a high-ranking MG insider, the new car will be badged MG ZS. The model will mark the revival of the nameplate last used to denote MG’s version of the Rover 45, a saloon and hatchback axed in 2005. Plus, MG's head of marketing Matthew Cheyne said that the explosion in po[CENSORED]rity of SUVs and crossovers has meant it’s a market the brand cannot ignore. Based on the GS platform also means the smaller ZS may also get the same 1.5-litre petrol engine and 6-speed manual gearbox from the larger crossover, as well as the 1.0-litre mentioned above. There's also a 7-speed DCT automatic in the GS, which could also appear on the smaller car. The platform also supports larger cars, which means we could see a seven-seater rival for the Nissan X-Trail in the MG line-up in the future - but hardcore fans of MG won't be pleased to learn that MG’s new focus on SUVs has come at the cost of a new MG two-seater roadster. Although the ZS’ styling will borrow heavily from the British-designed MG GS, the final look will be influenced by the MG Icon concept, first shown at Beijing Motor Show in 2012. That car featured clear styling links to the MGB GT of the 1960s but in a pumped-up crossover package, and was penned by Brit Anthony Williams-Kenny and his team at parent company's SAIC's HQ in Shanghai. Fuel economy of over 50mpg is likely in the lighter Juke rival, but the headline figure will be the price. With the GS starting at more than £3,500 less than the Qashqai, we expect MG's Juke to cost from around £12,000 - significantly less than the Nissan.
-
BUTTER chicken and naan. For many people outside India, that’s where their discovery of Indian food usually begins and ends. But British-Indian television chef and cookbook author Anjum Anand adds more destinations on the Indian food tour. Anand brings a 12-part series that showcases Indian cuisine in all its varied splendour to the world. Shot in Melbourne, Australia, TLC’s Anjum’s Spice Stories adds an Indian twist to Australian classics. So, you have a ginger tiramisu chai and Punjabi samosas, tandoori grilled salmon parcels, baked spinach ricotta, and contemporary takes on Murgh chaat and Delhi papri chaat. In the show, which began on August 15, Anand showcases the spices, fresh produce and richness of Indian food as she goes exploring the picturesque Australian countryside and the street bazaars of Melbourne. “Australians are big foodies. However, I’ve always felt there is no proper understanding of Indian food,” she says, over the phone from London where she lives. She also hopes to dispel the notion that Indian food is unhealthy. “It’s the healthiest in fact. Look at our spices and ingredients — turmeric, ginger, garam masalas, cardamom, cinnamon, cumin, cloves, garlic, chillies…the spices give our food a distinct quality and richness,” she says. “I’ve tried to show new and innovative cooking methods for healthy and easy cooking that tricky Indian dishes demand. There is a smorgasbord of food to choose from — vegetarian, non vegetarian, and sea food,” says Anand, who travels frequently to Australia. A po[CENSORED]r face on food shows in the UK, Anand has seen the way food has come to dominate po[CENSORED]r space. “When I started, it was very much about the food and the recipe. But the way the scene has changed, especially with food shows on TV, is quite phenomenal. It’s more about competition, connection, journey, characters and judges, and less about food,” she says. Anand, who has authored several books, is now ready with another. “This book will capture the best food of India, from biryanis, chaats, samosas, tandoori food, all focusing on health, flavours and no shortcuts,” she says.
-
A Canadian judge is facing a disciplinary hearing over controversial comments he made while presiding over a sexual assault case in 2014. Justice Robin Camp, a provincial judge in Calgary, asked an alleged sexual assault victim why she could not "just keep her knees together". Mr Camp acquitted the accused man, but the verdict was overturned on appeal. The Canadian Judicial Council will decide whether Mr Camp should be removed over his remarks. Disciplinary hearings for judges are not common in Canada, where there have only been 11 such inquiries since the national council of senior judges was created in 1971. Mr Camp sparked outrage during the 2014 case, when he asked a 19-year-old woman, "Why couldn't you just keep your knees together?" He also said, "pain and sex sometimes go together" and had referred to the complainant as "the accused," court records show. The woman told the court she was raped by Alexander Scott Wagar over a bathroom sink at a house party in Calgary. The Alberta Appeal Court overturned Mr Camp's decision and a new trial was ordered for Mr Wagar. Mr Camp had since been elevated to the Federal Court. Will Stanford sexual assault case silence future victims? The allegations against Mr Camp include: that his comments "reflected an antipathy" toward laws aimed at protecting vulnerable witnesses used "stereotypical or biased thinking" asked the alleged victim questions based on "discredited, stereotypical assumptions" of how one should behave after a sexual assault Mr Camp plans to appear before the panel, which comprises three judges, who are council members, and two senior lawyers. He is expected to apologise for his comments and say he has participated in training and counselling with a superior court judge, a psychologist and a sexual assault legal expert. "He believes he can make a positive contribution as a member of the Canadian judiciary," a notice of response on Mr Camp's position said on the council's website. "He will strive to keep improving and to keep learning." The inquiry is expected to last several days and the panel will then make a recommendation to the full Canadian Judicial Council. Mr Camp is not allowed to hear cases until further notice, according to a Federal Court order.
-
Once you've set up your computer, you may want to purchase home Internet access so you can send and receive email, browse the Web, stream videos, and more. You may even want to set up a home wireless network, commonly known as Wi-Fi, so you can connect multiple devices to the Internet at the same time. Watch the video below to learn about connecting to the Internet. Types of Internet service The type of Internet service you choose will largely depend on which Internet service providers (ISPs) serve your area, along with the types of service they offer. Here are some common types of Internet service. Dial-up: This is generally the slowest type of Internet connection, and you should probably avoid it unless it is the only service available in your area. Dial-up Internet uses your phone line, so unless you have multiple phone lines you will not be able to use your landline and the Internet at the same time. DSL: DSL service uses a broadband connection, which makes it much faster than dial-up. DSL connects to the Internet via a phone line but does not require you to have a landline at home. And unlike dial-up, you'll be able to use the Internet and your phone line at the same time. Cable: Cable service connects to the Internet via cable TV, although you do not necessarily need to have cable TV in order to get it. It uses a broadband connection and can be faster than both dial-up and DSL service; however, it is only available where cable TV is available. Satellite: A satellite connection uses broadband but does not require cable or phone lines; it connects to the Internet through satellites orbiting the Earth. As a result, it can be used almost anywhere in the world, but the connection may be affected by weather patterns. Satellite connections are also usually slower than DSL or cable. 3G and 4G: 3G and 4G service is most commonly used with mobile phones, and it connects wirelessly through your ISP's network. However, these types of connections aren't always as fast as DSL or cable. They will also limit the amount of data you can use each month, which isn't the case with most broadband plans. Choosing an Internet service provider Now that you know about the different types of Internet service, you can do some research to find out what ISPs are available in your area. If you're having trouble getting started, we recommend talking to friends, family members, and neighbors about the ISPs they use. This will usually give you a good idea of the types of Internet service available in your area. Most ISPs offer several tiers of service with different Internet speeds, usually measured in Mbps (short for megabits per second). If you mainly want to use the Internet for email and social networking, a slower connection (around 2 to 5 Mbps) might be all you need. However, if you want to download music or stream videos, you'll want a faster connection (at least 5 Mbps or higher). You'll also want to consider the cost of the service, including installation charges and monthly fees. Generally speaking, the faster the connection, the more expensive it will be per month. Although dial-up has traditionally been the least expensive option, many ISPs have raised dial-up prices to be the same as broadband. This is intended to encourage people to switch to broadband. We do not recommend dial-up Internet unless it's your only option. Hardware needed Modem Once you have your computer, you really don't need much additional hardware to connect to the Internet. The primary piece of hardware you need is a modem. The type of Internet access you choose will determine the type of modem you need. Dial-up access uses a telephone modem, DSL service uses a DSL modem, cable access uses a cable modem, and satellite service uses a satellite adapter. Your ISP may give you a modem—often for a fee—when you sign a contract, which helps ensure that you have the right type of modem. However, if you would prefer to shop for a better or less expensive modem, you can choose to buy one separately. Router A router is a hardware device that allows you to connect several computers and other devices to a single Internet connection, which is known as a home network. Many routers are wireless, which allows you to create a home wireless network, commonly known as a Wi-Fi network. You don't necessarily need to buy a router to connect to the Internet. It's possible to connect your computer directly to your modem using an Ethernet cable. Also, many modems include a built-in router, so you have the option of creating a Wi-Fi network without buying extra hardware. Setting up your Internet connection Once you've chosen an ISP, most providers will send a technician to your house to turn on the connection. If not, you should be able to use the instructions provided by your ISP—or included with the modem—to set up your Internet connection. After you have everything set up, you can open your web browser and begin using the Internet. If you have any problems with your Internet connection, you can call your ISP's technical support number. Home networking If you have multiple computers at home and want to use all of them to access the Internet, you may want to create a home network, also known as a Wi-Fi network. In a home network, all of your devices connect to your router, which is connected to the modem. This means everyone in your family can use the Internet at the same time. Your ISP technician may be able to set up a home Wi-Fi network when installing your Internet service. If not, you can review our lesson on How to Set Up a Wi-Fi Network to learn more. If you want to connect a computer that does not have built-in Wi-Fi connectivity, you can purchase a Wi-Fi adapter that plugs into your computer's USB port.
-
An international team of computer science researchers has identified serious security vulnerabilities in the iOS - the operating system used in Apple's iPhone and iPad devices. The vulnerabilities make a variety of attacks possible. "There's been a lot of research done on Android's operating systems, so we wanted to take a closer look at Apple's iOS," says William Enck, an associate professor of computer science at North Carolina State University and co-author of a paper describing the work. "Our goal was to identify any potential problems before they became real-world problems." The researchers focused on the iOS's "sandbox," which serves as the interface between applications and the iOS. The iOS sandbox uses a set "profile" for every third-party app. This profile controls the information that the app has access to and governs which actions the app can execute. To see whether the sandbox profile contained any vulnerabilities that could be exploited by third-party apps, the researchers first extracted the compiled binary code of the sandbox profile. They then decompiled the code, so that it could be read by humans. Next, they used the decompiled code to make a model of the profile, and ran series of automated tests in that model to identify potential vulnerabilities. Ultimately, the researchers identified vulnerabilities that would allow them to launch different types of attacks via third-party apps. Those attacks include: Methods of bypassing the iOS's privacy settings for contacts; Methods of learning a user's location search history; Methods of inferring sensitive information (such as when photos were taken) by accessing metadata of system files; Methods of obtaining the user's name and media library; Methods of consuming disk storage space that cannot be recovered by uninstalling the malicious app; Methods of preventing access to system resources, such as the address book; and Methods that allow apps to share information with each other without permission. "We are already discussing these vulnerabilities with Apple," Enck says. "They're working on fixing the security flaws, and on policing any apps that might try to take advantage of them." The international collaboration led to the paper "SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles" which will be presented end of October at the renowned ACM Conference on Computer and Communications Security (CCS) in Vienna. Explore further: Georgia Tech uncovers iOS security weaknesses More information: "SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles" Authors: Luke Deshotels and William Enck, North Carolina State University; Mihai Chiroiu and Răzvan Deaconescu, University Politehnica of Bucharest; Lucas Davi and Ahmad-Reza Sadeghi, Technische Universität Darmstadt. Presented: Oct. 24-28, ACM Conference on Computer and Communications Security, Vienna Austria Abstract Recent literature on iOS security has focused on the malicious potential of third-party applications, demonstrating how developers can bypass application vetting and code-level protections. In addition to these protections, iOS uses a generic sandbox profile, called "container," to confine malicious or exploited third-party applications. In this paper, we present the first systematic analysis of the iOS container sandbox profile. We propose the SandScout framework to extract, decompile, formally model, and analyze iOS sandbox profiles as logic-based programs. We use our Prolog-based queries to evaluate file-based security properties of the container sandbox profile for iOS 9.0.2 and discover seven classes of exploitable vulnerabilities. These attacks affect nonjailbroken devices running later versions of iOS. We are working with Apple to resolve these attacks, and we hope SandScout will play a significant role in the development of sandbox profiles for future versions of iOS.
-
A clean air filter keeps your engine breathing clearly, so take the time to check it for damage and replace if necessary The air filter is one of those important items that’s easy to forget, but it’s incredibly important to your car’s health, performance and fuel economy. It traps the debris and dirt in the air that would otherwise be sucked into the engine so it needs to be checked and looked after. Here’s how to change it. How to change your car air filter You should change your air filter approximately every year. The best rule of thumb is to replace it when you have an oil change. Check your handbook for the correct air filter and visit your Nissan dealer to purchase the replacement. Next, open the bonnet and locate the filter – but only do this when the car is engine is cold. The air filter is normally in a large, black ‘air box’ near the left or right hand side of the bonnet. If you’re not sure, check your car’s handbook. Unclip the lid, make a note of which way round the filter is, take out the old one and take a look. The filter should be clean and clear of debris. If it retains its original colour – the filter part is usually light beige – it should be OK for a bit longer. If it’s covered in dirt, then you should change it. All you need to do here is drop in the new filter, making sure it’s the right way round. Replace the air box lid, fasten the clips and you’re done. It’s that simple. As always, if you’re unsure speak to the experts. Nissan’s Vehicle Health Check will analyse your car to alert you to any potential faults and can access how healthy your car is. For more information, the very best service and peace of mind, visit your local Nissan dealer.
-
Muslim women who are young and educated choose to wear the veil as it is their means to integrate into modern society, according to a latest study conducted in 25 Islamic nations. The study, done by researchers from Oxford University and European University Institute published in the journal ‘European Sociological Review’ last week, tested earlier mathematical models to see how the intensity of wearing the veil varied according to the women’s education, employment, urbanisation and contact with non-Muslims. The study, ‘Behind the Veil: The Strategic Use of Religious Garb’, includes the wearing of headscarves, the turban or hijab, the chador, the burqa (which covers the face too), and no head covering at all. “A veil is seen as a genuine expression of a woman’s religiosity. Paradoxically, it is the women who are engaging with the modern world who appear to rely on the veil to signal to others that they will not succumb to the temptations of modern urban life,” explained Dr Ozan Aksoy, the study’s author from the Department of Sociology at the University of Oxford. The study drew on data of thousands of women living in Belgium, Turkey and 25 Muslim countries. Study co-author Professor Diego Gambetta, Official Fellow of Nuffield College, Oxford, and Professor of Social Theory at the European University Institute, noted: “Contrary to the populist cant that seems now dominant in Europe, veiling could be a sign of more rather than less integration. Highly religious women who have more native friends and live in areas dominated by natives use the veil to keep their pious reputation while being integrated. “Banning or shunning veiling would deprive them of a means that allow them more opportunity for integration rather than marking their differences.”
-
Tiny particles of pollution have been discovered inside samples of brain tissue, according to new research. Suspected of toxicity, the particles of iron oxide could conceivably contribute to diseases like Alzheimer's - though evidence for this is lacking. The finding - described as "dreadfully shocking" by the researchers - raises a host of new questions about the health risks of air pollution. Many studies have focused on the impact of dirty air on the lungs and heart. Now this new research provides the first evidence that minute particles of what is called magnetite, which can be derived from pollution, can find their way into the brain. Earlier this year the World Health Organisation warned that air pollution was leading to as many as three million premature deaths every year. Tracing origins The estimate for the UK is that 50,000 people die every year with conditions linked to polluted air. The research was led by scientists at Lancaster University and is published in the Proceedings of the National Academy of Sciences (PNAS). The team analysed samples of brain tissue from 37 people - 29 who had lived and died in Mexico City, a notorious pollution hotspot, and who were aged from 3 to 85. The other 8 came from Manchester, were aged 62-92 and some had died with varying severities of neurodegenerative disease. The lead author of the research paper, Prof Barbara Maher, has previously identified magnetite particles in samples of air gathered beside a busy road in Lancaster and outside a power station. She suspected that similar particles may be found in the brain samples, and that is what happened. "It's dreadfully shocking. When you study the tissue you see the particles distributed between the cells and when you do a magnetic extraction there are millions of particles, millions in a single gram of brain tissue - that's a million opportunities to do damage." Further study revealed that the particles have a distinctive shape which provides a crucial clue to their origin. Magnetite can occur naturally in the brain in tiny quantities but the particles formed that way are distinctively jagged. By contrast, the particles found in the study were not only far more numerous but also smooth and rounded - characteristics that can only be created in the high temperatures of a vehicle engine or braking systems. Prof Maher said: "They are spherical shapes and they have little crystallites around their surfaces, and they occur with other metals like platinum which comes from catalytic converters. "So for the first time we saw these pollution particles inside the human brain. "It's a discovery finding. It's a whole new area to investigate to understand if these magnetite particles are causing or accelerating neurodegenerative disease." For every one natural magnetite particle identified, the researchers found about 100 of the pollution-derived ones. The results did not show a straightforward pattern. While the Manchester donors, especially those with neurodegenerative conditions, had elevated levels of magnetite, the same or higher levels were found in the Mexico City victims. The highest level was found in a 32-year-old Mexican man who had been killed in a traffic accident. Disease risk? Dubbed "nanospheres", the particles are less than 200 nanometres in diameter - by comparison, a human hair is at least 50,000 nanometres thick. While large particles of pollution such as soot can be trapped inside the nose, smaller types can enter the lungs and even smaller ones can cross into the bloodstream. But nanoscale particles of magnetite are believed to be small enough to pass from the nose into the olfactory bulb and then via the nervous system into the frontal cortex of the brain. Prof David Allsop, a specialist in Alzheimer's and other neurodegenerative diseases, is a co-author of the study and also at Lancaster University. He said that pollution particles "could be an important risk factor" for these conditions. "There is no absolutely proven link at the moment but there are lots of suggestive observations - other people have found these pollution particles in the middle of the plaques that accumulate in the brain in Alzheimer's disease so they could well be a contributor to plaque formation. "These particles are made out of iron and iron is very reactive so it's almost certainly going to do some damage to the brain. It's involved in producing very reactive molecules called reaction oxygen species which produce oxidative damage and that's very well defined. "We already know oxidative damage contributes to brain damage in Alzheimer's patients so if you've got iron in the brain it's very likely to do some damage. It can't be benign." Other experts in the field are more cautious about a possible link. Dr Clare Walton, research manager at the Alzheimer's Society, said there was no strong evidence that magnetite causes Alzheimer's disease or makes it worse. "This study offers convincing evidence that magnetite from air pollution can get into the brain, but it doesn't tell us what effect this has on brain health or conditions such as Alzheimer's disease," she said. "The causes of dementia are complex and so far there hasn't been enough research to say whether living in cities and polluted areas raises the risk of dementia. Further work in this area is important, but until we have more information people should not be unduly worried." She said that in the meantime more practical ways of lowering the chances of developing dementia include regular exercise, eating a healthy diet and avoiding smoking.