- Indoor Carbon Dioxide Levels Could Be a Health Hazard, Scientists Warn
- Physicist Solves 2,000-Year-Old Optical Problem
- Sneaky Chrome Extension Disguises Netflix As a Google Hangout To Help You Slack Off At Work
- Instagram To Notify Users Comments Might Be Offensive Before They Are Posted
- Tesco, One of the World's Largest Supermarket Operators, Is Testing Cashierless Stores Solely Dependent On Cameras
- IDC: For 1 In 4 Companies, Half of All AI Projects Fail
- Amazon Staff Will Strike During Prime Day Over Working Conditions
- Brazil To Add Digital Data Protection To Fundamental Rights
- How Facebook Fought Fake News About Facebook
- Email App Superhuman's Superficial Privacy Fixes Do Not Prevent It From Spying on You
- Microsoft Releases Public Preview of Desktop Analytics To Help With Windows 10 Update Readiness Checks
- Microsoft Warns About Astaroth Malware Campaign
- Robocall Ban Should Target Texts and Foreign Calls, FCC Chief Says
- Pirate Our Games, Don't Buy Them From Key Resellers, Say Indies
- A Look at How Movies and Shows From Netflix and Amazon Prime Video Are Pirated
- Mozilla is Funding a Way To Support Julia in Firefox
- More Than 1,000 Android Apps Harvest Data Even After You Deny Permissions
- Is Ham Radio a Hobby, a Utility, or Both? A Battle Over Spectrum Heats Up
- British Airways Hit With Record Fine For Data Breach
- Unlivable Wages in Expensive Cities Are Plaguing the Video Game Industry
- Why We All Need To Agree That It Is Flat Out Unacceptable To Use RSA in 2019
- Ask Slashdot: Should the ISS Go Commercial?
- Meet The Community That Always Seem To Win Online Sweepstakes
Indoor Carbon Dioxide Levels Could Be a Health Hazard, Scientists Warn
An anonymous reader quotes a report from The Guardian:
Indoor levels of carbon dioxide could be clouding our thinking and may even pose a wider danger to human health, researchers say. The authors of the latest study -- which reviews current evidence on the issue -- say there is a growing body of research suggesting levels of CO2 that can be found in bedrooms, classrooms and offices might have harmful effects on the body, including affecting cognitive performance. "There is enough evidence to be concerned, not enough to be alarmed. But there is no time to waste," said Dr Michael Hernke, a co-author of the study from the University of Wisconsin-Madison, stressing further research was needed. Writing in the journal Nature Sustainability, Hernke and colleagues report that they considered 18 studies of the levels of CO2 humans are exposed to, as well as its health impacts on both humans and animals.
Traditionally, the team say, it had been thought that CO2 levels would need to reach a very high concentration of at least 5,000 parts per million (ppm) before they would affect human health. But a growing body of research suggests CO2 levels as low as 1,000ppm could cause health problems, even if exposure only lasts for a few hours. The team say crowded or poorly ventilated classrooms, office environments and bedrooms have all been found to have levels of CO2 that exceed 1,000ppm, and are spaces that people often remain in for many hours at a time. Air-conditioned trains and planes have also been found to exceed 1,000ppm.
Physicist Solves 2,000-Year-Old Optical Problem
Mexican physicist Rafael Gonzalez
has found the solution to spherical aberration in optical lenses, solving the 2,000-year-old Wasserman-Wolf problem that Isaac Newton himself could not solve. Newton invented a telescope that solved the chromatic aberration, but not the spherical aberration. PetaPixel reports:
Fast forward to 2018 when Hector A. Chaparro-Romo, a doctoral student at the National Autonomous University of Mexico (UNAM), who had been trying to solve this problem for 3 years, invited Rafael G. Gonzalez-Acuna, a doctoral student from Tec de Monterrey, to help him solve the problem. At first, Gonzalez did not want to devote resources to what he knew to be a millenary, impossible to solve problem. But upon the insistence of Hector Chaparro, he decided to accept the challenge. After months of working on solving the problem, Rafael Gonzalez recalls, "I remember one morning I was making myself a slice of bread with Nutella, when suddenly, I said out loud: Mothers! It is there!" He then ran to his computer and started programming the idea. When he executed the solution and saw that it worked, he says he jumped all over the place. It is unclear whether he finished eating the Nutella bread. Afterwards, the duo ran a simulation and calculated the efficacy with 500 rays, and the resulting average satisfaction for all examples was 99.9999999999%. Which, of course, is great news for gear reviewers on YouTube, as they will still be able to argue about the 0.0000000001% of sharpness difference among lens brands. Their findings were
published in the journal Applied Optics. They also published
an article in Applied Optics that gives an analytical solution to the
Levi-Civita problem formulated in 1900. "The Levi-Civita problem, which has existed without a solution for over a century, was also considered a mythical problem by the specialized community," reports PetaPixel.
this [algebraic] equation we describe how the shape of the second aspherical surface of the given lens should be given a first surface, which is provided by the user, as well as the object-image distance," explains Gonzalez. "The second surface is such that it corrects all the aberration generated by the first surface, and the spherical aberration is eliminated."
Sneaky Chrome Extension Disguises Netflix As a Google Hangout To Help You Slack Off At Work
Netflix Hangouts is a new Chrome extension that
tries to make it easier to get away with watching Netflix while you're supposed to be working. Just go to the show you want to catch up on during work hours, and press the extension's icon in your Chrome menu to bring up a fake four-person conference call. Then you can sit back and watch the show in the window's bottom right feed while three fake colleagues get down to business. The Verge reports:
The extension was developed by Mschf Internet Studios, which has produced a few internet curiosities like this over the years. There was the Slack channel that offered $1,000 in prize money for the first person to correctly guess each word of the day (it was shut down by Slack after just a week), a man who ate various foods as disgusting ice cream toppings, and who could forget Tabagotchi, the lovable virtual avatar that slowly died as you opened more and more tabs? Netflix Hangouts is the latest in a long line of services designed to let you slack off at work.
Instagram To Notify Users Comments Might Be Offensive Before They Are Posted
In an effort to curb cyber bullying, Instagram is rolling out a new AI feature that
will automatically detect whether comments are offensive and notify users before they are posted. The Hill reports:
In an example included in the company release, Instagram shows a user trying to comment "You are so ugly and stupid." Instagram follows up with a message asking the user "Are you sure you want to post this?" with an "undo" button. "From early tests of this feature, we have found that it encourages some people to undo their comment and share something less hurtful once they have had a chance to reflect," Instagram said.
To further help protect users from unwanted interactions, Instagram said it will start testing a new "restrict" feature. Restricting a user will make it so the user's comments are only visible to that person; a user will be able to choose whether or not to make that the restricted person's comments available to others by approving them. Restricted users also will not be able to see when an account is active or when a person has read their direct messages.
Tesco, One of the World's Largest Supermarket Operators, Is Testing Cashierless Stores Solely Dependent On Cameras
An anonymous reader quotes a report from The Wall Street Journal:
Tesco, one of the world's largest supermarket operators, is one of several grocers testing cashierless stores with cameras that track what shoppers pick (Warning: source paywalled; alternative source), so they pay by simply walking out the door. The retailers hope the technology -- similar to that pioneered by Amazon.com Inc. in its Amazon Go stores in the U.S. -- will allow them to cut costs and alleviate lines as they face an evolving threat from the e-commerce giant.
Tesco plans to open its self-styled "pick and go" or "frictionless shopping" store to the public next year after testing with employees. Eventually it wants to use the technology, developed by Israeli startup Trigo Vision, in more of its smaller grocery stores. Tesco's 4,000-square-foot test store uses 150 ceiling-mounted cameras to generate a three-dimensional view of products as they are taken off shelves. In its recent demo, Tesco's system detected shoppers as they walked around the store. It also identified a group of products when a person holding them stood in front of a screen, tallying up their total price. Tesco is considering identifying shoppers through an app or loyalty card when they enter the store and then charging their app when they leave. Tesco told investors its method costs one-tenth of systems used by its competitors, partly because it only uses cameras. Amazon Go uses cameras and sensors to track what shoppers pick. Amazon customers scan a QR code at a gate when they enter a store, then walk out when finished. While Tesco will track the movements of their customers, the company says the system used in its trial doesn't recognize faces.
IDC: For 1 In 4 Companies, Half of All AI Projects Fail
new study from International Data Corporation (IDC) found that of the organizations already using AI,
only 25% have developed an "enterprise-wide" AI strategy, and it found that among those in the process of deploying AI, a substantial number of projects are doomed to fail. VentureBeat reports:
IDC's Artificial Intelligence Global Adoption Trends & Strategies report, which was published today, summarizes the results of a May 2019 survey of 2,473 organizations using AI solutions in their operations. It chiefly focused on respondents' AI strategy, culture, and implementation challenges, as well as their AI data readiness initiatives and the production deployment trends expected to experience growth in the next two years. Firms blamed the cost of AI solutions, a lack of qualified workers, and biased data as the principal blockers impeding AI adoption internally. Respondents identified skills shortages and unrealistic expectations as the top two reasons for failure, in fact, with a full quarter reporting up to 50% failure rate.
However, that's not to suggest success stories are few in far between. More than 60% of companies reported changes in their business model in association with their AI adoption, and nearly 50% said they'd established a formal framework to encourage the ethical use, potential bias risks, and trust implications of AI, according to IDC. Moreover, 25% report having established a senior management position to ensure adherence.
Amazon Staff Will Strike During Prime Day Over Working Conditions
Staff at a warehouse in Shakopee, Minnesota
will hold six hours of strikes on July 15th (the start of Prime Day) to demand less stringent quotas and the conversion of more temporary workers into permanent employees. Engadget reports:
The quotas make the work dangerous and unreliable, according to the workers, and permanent work will help create a "livable future." Workers in the U.S. have protested before (including a December protest in Minnesota over support for East African workers), but not during crucial sales days -- you've only really seen that practice in Europe until now. The company has declined to comment on the strike.
Brazil To Add Digital Data Protection To Fundamental Rights
An anonymous reader quotes a report from ZDNet:
The Brazilian Senate has approved a proposal to add protection of data in digital platforms to the list of fundamental rights and individual citizen guarantees set out in the country's constitution. Brazil's general data protection law was due to go live in February 2020 but a stopgap measure signed by former president Michel Temer just before leaving office in January 2019 has extended the deadline to August next year. Earlier this year, the National Authority for Personal Data Protection has also been created , with attributions including the creation of frameworks on how to handle information and guide organizations on how to adhere to the rules. The authority will also be responsible for monitoring and applying fines to non-compliant organizations. "State and society should be entitled, as a general rule, to knowledge about each other, as long as there is a real need," said senator Simone Tebet, rapporteur of the proposal. "Other than that, data privacy should be preserved as much as possible."
How Facebook Fought Fake News About Facebook
Facebook has built tools to track posts on Facebook and WhatsApp that talk about its executives, products, or moves
Bloomberg reported on Monday. The company has been, for years, routinely
using these tools to "snuff out" posts that it deems to offer untrue characterization of its services or people. From the report:
Many companies monitor social media to learn what customers are saying about them. But Facebook's position is unique. It owns the platform it's watching, an advantage that may help Facebook track and reach users more effectively than other firms. And Facebook has been saddled with so many real problems recently that sometimes misinformation can stick. Stormchaser is just one of multiple tools Facebook has deployed to manage its reputation, which has taken a dramatic hit thanks to its role in spreading Russian misinformation during the U.S. election and numerous privacy scandals. The company employs hundreds of public relations officials and spent $13 million on government lobbying in 2018. Zuckerberg and Facebook Chief Operating Officer Sheryl Sandberg have become so intertwined with the company's image that Facebook routinely collects public survey data to understand how the general public views them -- data that shapes what the executives say and do publicly. Facebook's response:
"We didn't use this internal tool to fight false news because that wasn't what it was built for, and it wouldn't have worked," the spokeswoman wrote in an email. "The tool was built with simple technology that helped us detect posts about Facebook based on keywords, so we could consider whether to respond to product confusion on our own platform. Comparing the two is a false equivalence." The New York Times' tech columnist Kevin Roose,
You could write a dissertation about this quote, and the difference between what Facebook considers "product confusion" (wrong stuff about us, which must be removed immediately) and "false news" (wrong stuff about other people, which is protected free speech).
Email App Superhuman's Superficial Privacy Fixes Do Not Prevent It From Spying on You
It took an article I almost didn't publish and tens of thousands of people saying they were creeped out, but Superhuman admitted they were wrong and reduced the danger that their surveillance pixels introduce. Good on Rahul Vohra and team for that. I will say, however, that I'm a little surprised how quickly some people are rolling over and giving Superhuman credit for fixing a problem that they didn't actually fix. [...] Let's take a look at how Superhuman [an email app that charges users $30 a month] explains their changes.
Rahul correctly lays out four of the criticisms leveled at Superhuman's read receipts: Location data could be used in nefarious ways. Read statuses are on by default. Recipients of emails cannot opt out. Superhuman users cannot disable remote image loading. However, he also omits the core criticism: Recipients of Superhuman emails do not know their actions are being tracked or sent back to senders. Superhuman said it was keeping the read status feature, but turning it off by default. Users who want it will have to explicitly turn it on. Mike adds:
This addresses the concern about teaching customers to surveil by default but also establishes that Superhuman is keeping the feature working almost exactly as-is, with the exception of not collecting or displaying actual locations. I've spoken with several people about how they interpreted Rahul's post on this particular detail. Some believed the whole log of timestamped read events was going away and were happy about that. Others read it as: you can still see exactly when and how many times someone has opened your email, complete with multiple timestamps -- you just can't see the location anymore. That, to me, is not sufficient. "A little less creepy" is still creepy. Also worth noting, "turning receipts off by default" does nothing to educate customers about the undisclosed surveillance they are enabling if they flip that switch.
Microsoft Releases Public Preview of Desktop Analytics To Help With Windows 10 Update Readiness Checks
Microsoft has released a public preview of a new service aimed at helping businesses assess their
app-compatibility levels ahead of deploying new Windows 10 feature updates. From a report:
It allows for the quick and easy creation of app inventories to make compatibility checks simpler. Brad Anderson, corporate vice president for Microsoft 365, says that the tool makes use of machine learning and the cloud to make it easier to deploy and update Windows 10. The aim with Desktop Analytics is to avoid the compatibility problems that stand in the way of keeping machines up to date.
Microsoft Warns About Astaroth Malware Campaign
The Microsoft security team has issued a warning today about ongoing malware campaigns that are
distributing the Astaroth malware using fileless and living-off-the-land techniques that make it harder for traditional antivirus solutions to spot the ongoing attacks. From a report:
The attacks were detected by the team behind Windows Defender ATP, the commercial version of the company's Windows Defender free antivirus. Andrea Lelli, a member of the Windows Defender ATP team said alarms bells sounded at Microsoft's offices when they detected a huge and sudden spike in usage of the Windows Management Instrumentation Command-line (WMIC) tool. This is a legitimate tool that ships with all modern versions of Windows, but the sudden spike in usage suggested a pattern specific to malware campaigns. When Microsoft looked closer, it discovered a malware campaign that consisted of a massive spam operation that was sending out emails with a link to a website hosting a .LNK shortcut file.
Robocall Ban Should Target Texts and Foreign Calls, FCC Chief Says
Federal Communications Commission Chairman Ajit Pai has proposed another set of robocall rules, this time to
ban malicious calls that spoof caller IDs in text messages and international calls. From a report:
The anti-spoofing rules will be voted on by the FCC Aug. 1, and they already have the support of more than 40 state attorneys general, Pai said Monday. These new rules would close the loopholes in targeting international callers, including one-way interconnected VoIP calls, and scammers using text messaging. They are part of the FCC's "multi-pronged approach to battle the noxious intrusion of illegal robocalls, as well as malicious caller ID spoofing," Pai said. Last month, the FCC voted unanimously on a proposal to give mobile phone companies greater power to "aggressively block" unwanted robocalls.
Pirate Our Games, Don't Buy Them From Key Resellers, Say Indies
Small video games studios are asking the public to stop buying their titles from "unauthorised" markets,
saying the sales cost them more than they earn. From a report:
Several have said it would even be better if consumers pirated their games rather than purchased discounted unlock codes from the "key resellers." One label is running a petition calling on the biggest such market -- G2A -- to halt sales of indie games outright. But G2A has defended its business model. It said the indies benefited from its policy of sharing a cut of sales made by third parties. "Hundreds of developers earn money from selling their keys through marketplaces such as G2A," head of communications Maciej Kuc told BBC News.
"We don't plan on taking away that possibility anytime soon, as it would be hurtful not only to our customers but also to the many developers who use our platform to their benefit." He added that G2A already took measures to tackle illegal sales. And he said developers were partly responsible for some of the scams on its site because of the "thousands of free keys" they had created for giveaways. The campaign's organiser, however, has dismissed this defence. "They are harming our industry and the value of our games," Mike Rose, from the Manchester-based publisher No More Robots, told BBC News.
A Look at How Movies and Shows From Netflix and Amazon Prime Video Are Pirated
TorrentFreak spoke with a member of piracy group "The Scene" to understand how
they obtain -- or rip -- movies and shows from sources such as Netflix and Amazon Prime Video. The technique these people use is different from hardware capture cards or software-based 'capping' tools. From the report:
"Content for WEB releases are obtained by downloading the source content. Whenever you stream a video online, you are downloading chunks of a video file to your computer. Sceners simply save that content and attempt to decrypt it for non-DRM playback later," the source said. When accessing the content, legitimate premium accounts are used, often paid for using prepaid credit cards supported by bogus identities. It takes just a few minutes to download a video file since they're served by CDNs with gigabits of bandwidth.
"Once files are downloaded from the streaming platform, however, they are encrypted in the .mp4 container. Attempting to view such video will usually result in a blank screen and nothing else -- streams from these sites are protected by DRM. The most common, and hard to crack DRM is called Widevine. The way the Scene handles WEB-releases is by using specialized tools coded by The Scene, for The Scene. These tools are extremely private, and only a handful of people in the world have access to the latest version(s)," source noted. "Without these tools, releasing Widevine content is extremely difficult, if not impossible for most. The tools work by downloading the encrypted video stream from the streaming site, and reverse engineering the encryption." Our contact says that decryption is a surprisingly quick process, taking just a few minutes. After starting with a large raw file, the finalized version ready for release is around 30% smaller, around 7GB for a 1080p file.
Mozilla is Funding a Way To Support Julia in Firefox
funding a project for bringing the Julia programming language to Firefox and the general browser environment. From a report:
The project received funding part of the Mozilla Research Grants for the first half of 2019, which the browser maker announced on Friday. In April, when Mozilla opened this year's submissions period for research grants, the organization said it was looking for a way to bring data science and scientific computing tools to the web. It said it was specifically interested in receiving submissions about supporting R or Julia at the browser level. Both R and Julia are programming languages designed for high-performance numerical, statistical, and computational science.
Mozilla engineers have worked in previous years to port data science tools at the browser level, as part of Project Iodide. Previously, as part of this project, Mozilla engineers ported the Python interpreter to run in the browser using WebAssembly. "This project, Pyodide, has demonstrated the practicality of running language interpreters in WebAssembly," Mozilla engineers said.
More Than 1,000 Android Apps Harvest Data Even After You Deny Permissions
An anonymous reader shares a report:
Permissions on Android apps are intended to be gatekeepers for how much data your device gives up. If you don't want a flashlight app to be able to read through your call logs, you should be able to deny that access. But even when you say no, many apps find a way around: Researchers discovered more than 1,000 apps that skirted restrictions, allowing them to gather precise geolocation data and phone identifiers behind your back. The discovery highlights how difficult it is to stay private online, particularly if you're attached to your phones and mobile apps. Tech companies have mountains of personal data on millions of people, including where they've been, who they're friends with and what they're interested in.
Lawmakers are attempting to reel that in with privacy regulation, and app permissions are supposed to control what data you give up. Apple and Google have released new features to improve people's privacy, but apps continue to find hidden ways to get around these protections. Researchers from the International Computer Science Institute found up to 1,325 Android apps that were gathering data from devices even after people explicitly denied them permission. Serge Egelman, director of usable security and privacy research at the ICSI, presented the study in late June at the Federal Trade Commission's PrivacyCon.
Is Ham Radio a Hobby, a Utility, or Both? A Battle Over Spectrum Heats Up
Some think automated radio emails are mucking up the spectrum reserved for amateur radio,
while others say these new offerings provide a useful service.
Like many amateur radio fans his age, Ron Kolarik, 71, still recalls the "pure magic" of his first ham experience nearly 60 years ago. Lately, though, encrypted messages have begun to infiltrate the amateur bands in ways that he says are antithetical to the spirit of this beloved hobby. So Kolarik filed a petition, RM-11831 [PDF], to the U.S. Federal Communications Commission (FCC) proposing a rule change to "Reduce Interference and Add Transparency to Digital Data Communications." And as the proposal makes its way through the FCC's process, it has stirred up heated debate that goes straight to the heart of what ham radio is, and ought to be. The core questions: Should amateur radio -- and its precious spectrum -- be protected purely as a hobby, or is it a utility that delivers data traffic? Or is it both? And who gets to decide?
Since Kolarik filed his petition in late 2018, this debate has engulfed the ham world. Fierce defenders of both sides have filed passionate letters and comments to the FCC arguing their cases. On one side is Kolarik in Nebraska. In his view, it's all rather simple: "Transparency is a core part of ham radio," he says. "And yet, you can find tons of traffic from automatic[ally controlled digital] stations that are extremely difficult to identify, if you can identify them at all, and they cause interference." The automatically controlled digital stations (ACDS) Kolarik refers to can serve to power services like Winlink, a "global radio email" system. Overseen and operated by licensed volunteers around the globe, Winlink is funded and guided by the Amateur Radio Safety Foundation, Inc. (ARSFI). The service uses amateur and government radio frequencies around the globe to send email messages by radio. Users initiate the transmission through an Internet connection, or go Internet-free and use smart-network radio relays.
On Winlink's website, the service says it provides its licensed users the ability to send email with attachments, plus messages about their positions, and weather and information bulletins. Representatives of the service say it also allows users to participate in emergency and disaster relief communications. But Kolarik's petition argues two points: First, because such messages "are not readily and freely able to be decoded," the FCC should require all digital codes to use protocols that "can be monitored in entirety by third parties with freely available, open-source software." Secondly, he wants the rule change to reduce the interference that he says services like Winlink can create between amateur-to-amateur stations -- by relegating the often-unattended automatic stations to operate solely on narrower sub-bands. Loring Kutchins, the president of ARSFI, says he believes Kolarik's petition is "well intentioned in its basis. But the fundamental conflict is between people who believe amateur radio is about hobby, not about utility. But nowhere do the FCC rules use the word 'hobby.'"
British Airways Hit With Record Fine For Data Breach
British Airways is facing a record fine of 183m Pound ($230m) for last year's breach of its security systems. The Information Commissioner's Office said the incident took place after users of British Airways' website were diverted to a fraudulent site. Through this false site, details of around 500,000 customers were harvested by the attackers. The BA penalty amounts to 1.5% of its worldwide turnover in 2017, less than the possible maximum of 4%. The fine amounts to around 10% of BA's profits for that year.
Unlivable Wages in Expensive Cities Are Plaguing the Video Game Industry
An anonymous reader shares a report:
Crunch has been one of the biggest topics in video game industry news over the last year with reports of massive studio layoffs at established studios following closely behind. Another topic relating to these issues that hasn't received as much attention, however, are the low and unfair wages developers are being paid in exchange for their increasingly demanding work. Just like issues with crunch and layoffs, it's a problem developers are afraid to speak openly about because of the fear of retaliation from current and future job opportunities. In light of all the news surrounding crunch and layoffs at studios, Beck Hallstedt sparked the conversation about developers being paid unlivable wages on Twitter, using the Quality Assurance (QA) jobs at Gearbox Software as a prime example.
They go on to say, "I know crunch is the big thing to criticize in games but please, please, please talk about how bad wages are too. People are living in their cars and pulling out loans to pay rent because of this stuff." They point out information from PayScale, which shows the average Gearbox Software salary at $54,000, but that number isn't the full picture. That average is taken from a small group of people -- in Gearbox Software's case, 10 -- who reported their earnings. Some of these individuals are senior level designers that are making as much as 105k, bumping up the average salary higher than it is. [...] Many game studios are located in major cities like San Francisco, Los Angeles, Seattle, and New York. This makes the cost of living far higher than it is in other places in the country. Since many studios do not allow their staff to work remotely, developers have to live in the city or relocate to find consistent work. Rent, food, transportation, and sometimes even student loans and medical care can factor into the cost of living.
Hallstedt has been working as a freelance concept artist for over three years, with their first in-house job being a 2D Art internship at High Voltage Software in Chicago. "I was hired at $12 an hour, which I'm honestly happy with for an intern position in the Midwest. I was learning as much as I was contributing, and the artists there spent time guiding me through adapting to a studio pipeline," they said. "It was great, and the generosity of those artists has guided my entire career." A few weeks after the internship ended, Netherrealm Studios reached out and asked Hallstedt to submit their resume as an associate concept artist. During the interview, they were offered to work on Injustice 2 for their standard 9-month temporary contract. The offer they received wasn't anywhere near what they imagined it would be. The salary was $11 an hour, which was $1 less than their prior internship had offered, except that this would a full-time commitment.
Why We All Need To Agree That It Is Flat Out Unacceptable To Use RSA in 2019
An excerpt from
a post on Trail of Bits:
From major open source projects to exciting new proprietary software, we've seen it all. But one common denominator in all of these systems is that for some inexplicable reason people still seem to think RSA is a good cryptosystem to use. Let me save you a bit of time and money and just say outright -- if you come to us with a codebase that uses RSA, you will be paying for the hour of time required for us to explain why you should stop using it. RSA is an intrinsically fragile cryptosystem containing countless foot-guns which the average software engineer cannot be expected to avoid. Weak parameters can be difficult, if not impossible, to check, and its poor performance compels developers to take risky shortcuts. Even worse, padding oracle attacks remain rampant 20 years after they were discovered. While it may be theoretically possible to implement RSA correctly, decades of devastating attacks have proven that such a feat may be unachievable in practice.
Ask Slashdot: Should the ISS Go Commercial?
The costs of running the International Space Station are a burden for NASA's budget. It has cost over $100 billion to construct and annual operating expenses run between $3 and $4 billion per year, representing a substantial percentage [about half] of NASA's manned space exploration budget. What to do, what to do?
A potential solution is to turn over operations (if not ownership) to private enterprise (Elon, are you listening?) Commercialization of space exploration may be anathema to some, but there is ample precedent for the government ceding control of publicly-funded endeavors to private enterprises. The Internet is the obvious example.
Why not give corporations control of the ISS? Are there drawbacks? Benefits? Which will prevail? Let's hear your opinions.
Sunday NPR noted that a few weeks ago NASA held a press event at Nasdaq's MarketSite to announce and promote "the commercialization of low Earth orbit," with astronaut Christina Koch beaming down a video from space to say that the crew was "so excited" to be a part of NASA "as our home and laboratory in space transitions into being accessible to expanded commercial and marketing opportunities" (as well as to "
But there are big logistical and financial hurdles. (Even NASA admits to NPR that revenue-generating opportunities first "need to be cultivated by the creative and entrepreneurial private sector.") So leave your own best thoughts in the comments -- the how, why, what if, or why not.
Should the International Space Station go commercial?
Meet The Community That Always Seem To Win Online Sweepstakes
The Hustle profiles a community for whom entering online sweepstakes are a way of life. And they "consistently land hundreds of prizes year after year -- vacation packages, cars, event tickets, electronics, and cash -- and their hauls sometimes amount to tens of thousands of dollars..."
"Winning online sweepstakes is supposedly an act of pure luck -- but some contestants claim to have it down to a science."
According to an informal poll of 585 respondents, roughly half of all regular sweepers report winnings equivalent to $1,250 or more per year; a quarter win $3k+ in prizes. What about that small 4% fraction that rakes in more than $12k per year in prizes? Are they just extraordinarily lucky or do they have some kind of system that increases their odds of locking down that dream vacation? To find out, we spoke with several women who have collectively made more than $500k winning contests online...
Carolyn Wilman (AKA, the "Contest Queen") has raked in $250k in her sweepstaking career using a quantitative strategy based on sheer volume:
- She creates a new email specifically for sweepstakes.
- She uses sweepstake aggregators (resources that list thousands of legitimate promotions in one location) to find form-based competitions.
- She uses software to auto-fill hundreds of entry forms with her information.
In a one hour-long sitting, with a few clicks, Wilman can enter more than 200 sweepstakes. The goal is two-fold: To enter as many contests as humanly possible, and to minimize the amount of time it takes to do it. "Luck has nothing to do with winning," she says. "It all comes down to effort and persistence."
Her persistence has paid off. In her best month, she won 83 prizes; in her best year, earnings topped $60k. Highlights include a $40k vacation package to the 2010 winter Olympics, a trip to London to visit the set of Harry Potter, and tickets to the British Open in Scotland.
One member of the "sweeper" community brags that they don't engage in highly risky behavior -- "But with sweepstakes, I can pretty much guarantee I'll win."