news aggregator

Steamship Ahoy - Life Is Strange: Episode 4

Blue's News - 6 hours 26 min ago
Steam News announces the release of episode 4 of Life Is Strange, the five-part adventure series. Word is: "Life Is Strange Episode 4 is now available on Steam! Life Is Strange is a beautifully...

Sports Demos & More on Steam

Blue's News - 6 hours 26 min ago
A couple of new sports game are now available on Steam, where they have a demo for Rugby Challenge 3 FanHub which allows you to create custom players and teams for the sports sim, but not actually...

Lord of the Rings Online Servers Closing

Blue's News - 6 hours 26 min ago
WBIE announces plans to sunset some servers for The Lord of the Rings Online, their Tolkien-inspired MMORPG. They offer a timeline for the closures, which begin on August 3rd and will conclude at the...

Morning Patches

Blue's News - 6 hours 26 min ago
World of Warcraft Patch 6.2 Hotfixes- July 27.

Gatherings & Competitions

Blue's News - 6 hours 26 min ago
ASSEMBLY Summer 2015 Game Development entries. Thanks Morris. StarCraft II: 5th Anniversary Giveaway.

Morning Previews

Blue's News - 6 hours 26 min ago
Jotun on PC Invasion.

Morning Consolidation

Blue's News - 6 hours 26 min ago
This Week?s Xbox Deals with Gold and Spotlight Sale. Xbox Summer Spotlight Kickoff ? New Digital Games.

Morning Mobilization

Blue's News - 6 hours 26 min ago
OnePlus Announces the OnePlus 2- 389 USD High-End Flagship.

Morning Metaverse

Blue's News - 6 hours 26 min ago
eBay is shutting down its on-demand delivery service. Thanks HARDOCP.

Morning Tech Bits

Blue's News - 6 hours 26 min ago
I am Stephen Hawking, theoretical physicist. Join me to talk about making the future of technology more human, reddit. AMA! Thanks InBlack. Google?s Calico Partners With Ancestry.com to Share DNA,...

Morning Safety Dance

Blue's News - 6 hours 26 min ago
Even former heads of NSA, DHS think crypto backdoors are stupid. What we can learn from JPMorgan?s insider breaches. Thanks Ant.

How ants use combs and brushes to keep their antennae clean.

Ant's VideoSift Submissions - 6 hours 30 min ago

"For an insect, grooming is a serious business. If the incredibly sensitive hairs on their antennae get too dirty, they are unable to smell food, follow pheromone trails or communicate. So insects spend a significant proportion of their time just keeping themselves clean.

Camponotus rufifemur ants possess a specialised cleaning structure on their front legs that is actively used to groom their antennae. A notch and spur covered in different types of hairs form a cleaning device similar in shape to a tiny lobster claw. During a cleaning movement, the antenna is pulled through the device which clears away dirt particles using ‘bristles’, a ‘comb’ and a ‘brush’.

Alexander Hackmann, from the University of Cambridge's Department of Zoology, explains how this works and the potential applications for nanotechnology."

From http://motherboard.vice.com/read/ants-grooming-combs-could-hold-the-key-to-cleaning-nanogadgets ...


How ants use combs and brushes to keep their antennae clean.

Ant's VideoSift Submissions - 6 hours 30 min ago

"For an insect, grooming is a serious business. If the incredibly sensitive hairs on their antennae get too dirty, they are unable to smell food, follow pheromone trails or communicate. So insects spend a significant proportion of their time just keeping themselves clean.

Camponotus rufifemur ants possess a specialised cleaning structure on their front legs that is actively used to groom their antennae. A notch and spur covered in different types of hairs form a cleaning device similar in shape to a tiny lobster claw. During a cleaning movement, the antenna is pulled through the device which clears away dirt particles using ‘bristles’, a ‘comb’ and a ‘brush’.

Alexander Hackmann, from the University of Cambridge's Department of Zoology, explains how this works and the potential applications for nanotechnology."

From http://motherboard.vice.com/read/ants-grooming-combs-could-hold-the-key-to-cleaning-nanogadgets ...


Your Stolen Identity Goes For $20 On the Internet Black Market

/. - 7 hours 59 min ago
HughPickens.com writes: Keith Collins writes at Quartz that the going rate for a stolen identity is about twenty bucks on the internet black market. Collins analyzed hundreds of listings for a full set of someone's personal information—identification number, address, birthdate, etc., known as "fullz" that were put up for sale over the past year, using data collected by Grams, a search engine for the dark web. The listings ranged in price from less than $1 to about $450, converted from bitcoin. The median price for someone's identity was $21.35. The most expensive fullz came from a vendor called "OsamaBinFraudin," and listed a premium identity with a high credit score for $454.05. Listings on the lower end were typically less glamorous and included only the basics, like the victim's name, address, social security number, perhaps a mother's maiden name. Marketplaces on the dark web, not unlike eBay, have feedback systems for vendors ("cheap and good A+"), refund policies (usually stating that refunds are not allowed), and even well-labeled sections. "There is no shortage of hackers willing to do about anything, computer related, for money," writes Elizabeth Clarke. "and they are continually finding ways to monetize personal and business data."

Read more of this story at Slashdot.

OnePlus Announces OnePlus 2 'Flagship Killer' Android Phone With OxygenOS

/. - 8 hours 46 min ago
MojoKid writes: The OnePlus 2 was officially unveiled [Monday] evening and it has been announced that the smartphone will start at an competitively low $329, unlocked and contract free. The entry level price nets you a 5.5" 1080p display, a cooler-running 1.8GHz Qualcomm Snapdragon 810 v2.1 SoC paired with 3GB of RAM, 16GB of internal storage, a 13MP rear camera (with OIS, laser focusing and two-tone flash), 5MP selfie camera, and dual nano SIM slots. If you don't mind handing over an extra $60, you'll receive 4GB of RAM to back the processor and 64GB of internal storage. Besides beefing up the internal specs, OnePlus has also paid some attention to the exterior of the device, giving it a nice aluminum frame and a textured backplate. There are a number of optional materials that you can choose from including wood and Kevlar. Reader dkatana links to InformationWeek's coverage, which puts a bit more emphasis on what the phone doesn't come with: NFC. Apparently, people just don't use it as much as anticipated.

Read more of this story at Slashdot.

Currently Quantum Computers Might Be Where Rockets Were At the Time of Goddard

/. - 9 hours 31 min ago
schwit1 writes: If quantum computing is at the Goddard level that would be a good thing for quantum computing. This means that the major fundamental breakthrough that would put them over the top was in hand and merely a lot of investment, engineering and scaling was needed. The goal of being able to solve NP-hard or NP-Complete problems with quantum computers is similar to being able to travel to the moon, mars or deeper into space with rockets. Conventional flight could not achieve those goals because of the lack of atmosphere in space. Current computing seems like they are very limited in being able to tackle NP-hard and NP Complete problems. Although clever work in advanced mathematics and approximations can give answers that are close on a case by case basis.

Read more of this story at Slashdot.

Air-Gapped Computer Hacked (Again)

/. - 10 hours 17 min ago
An anonymous reader writes: Researchers from Ben Gurion University managed to extract GSM signals from air gapped computers using only a simple cellphone. According to Yuval Elovici, head of the University’s Cyber Security Research Center, the air gap exploit works because of the fundamental way that computers put out low levels of electromagnetic radiation. The attack requires both the targeted computer and the mobile phone to have malware installed on them. Once the malware has been installed on the targeted computer, the attack exploits the natural capabilities of each device to exfiltrate data using electromagnetic radiation.

Read more of this story at Slashdot.

Hacker Set To Demonstrate 60 Second Brinks Safe Hack At DEFCON

/. - 12 hours 10 min ago
darthcamaro writes: Ok so we know that Chrysler cars will be hacked at Black Hat, Android will be hacked at DEFCON with Stagefright, and now word has come out that a pair of security researchers plan on bringing a Brinks safe onstage at DEFCON to demonstrate how it can be digitally hacked. No this isn't some kind of lockpick, but rather a digital hack, abusing the safe's exposed USB port. And oh yeah, it doesn't hurt that the new safe is running Windows XP either.

Read more of this story at Slashdot.

First Person Super Smash Bros.

Ant's VideoSift Submissions - Mon, 07/27/2015 - 10:46pm

"Real Smash Bros like you've never seen it before! ..."

Before & After VFX: https://www.youtube.com/watch?v=4vNrlLCL04Y


Project IceStorm Passes Another Milestone: Building a CPU

/. - Mon, 07/27/2015 - 10:07pm
beckman101 writes: FPGAs — specialized, high speed chips with large arrays of configurable logic — are usually highly proprietary. Anyone who has used one is familiar with the buggy and node-locked accompanying tools that FPGA manufacturers provide. Project IceStorm aims to change that by reverse-engineering some Lattice FPGAs to produce an open-source toolchain, and today it passed a milestone. The J1 open-source CPU is building under IceStorm, and running on real hardware. The result is a fairly puny microcontroller, but possibly the world's most open one.

Read more of this story at Slashdot.

Syndicate content