NASA releases first images of Cassini’s dive through the geyser of Enceladus

The reason scientists are excited about the data being returned from the geyser is that it may include elements of life beneath the surface of Enceladus. Cassini is not designed to detect life directly. However, it could pick up its building blocks.

Source: NASA releases first images of Cassini’s dive through the geyser of Enceladus | Examiner.com

Midwest Start-Up Achieves Rare $1 Billion Valuation

Uptake’s model is to partner with well-known companies in various industries — from construction to mining to aviation — and create software and special algorithms that help these customers collect and understand huge amounts of data. The company is already producing positive cash flow, according to a person with knowledge of the financials who spoke on the condition of anonymity.

Source: Midwest Start-Up Achieves Rare $1 Billion Valuation – The New York Times

A Tower of Molten Salt Will Deliver Solar Power After Sunset

Solar power projects intended to turn solar heat into steam to generate electricity have struggled to compete amid tumbling prices for solar energy from solid-state photovoltaic (PV) panels. But the first commercial-scale implementation of an innovative solar thermal design could turn the tide. Engineered from the ground up to store some of its solar energy, the 110-megawatt plant is nearing completion in the Crescent Dunes near Tonopah, Nev. It aims to simultaneously produce the cheapest solar thermal power and to dispatch that power for up to 10 hours after the setting sun has idled photovoltaics.

Source: A Tower of Molten Salt Will Deliver Solar Power After Sunset – IEEE Spectrum

Quantum Study Suggests ‘Spooky Action’ Is Real.

The scientists placed two diamonds on opposite sides of the Delft University campus, 1.3 kilometers apart.

Each diamond contained a tiny trap for single electrons, which have a magnetic property called a “spin.” Pulses of microwave and laser energy are then used to entangle and measure the “spin” of the electrons.

Source: Sorry, Einstein. Quantum Study Suggests ‘Spooky Action’ Is Real. – The New York Times

A potential weakness of the experiment, he suggested, is that an electronic system the researchers used to add randomness to their measurement may in fact be predetermined in some subtle way that is not easily detectable, meaning that the outcome might still be predetermined as Einstein believed.

Point-and-shoot weapon stops drones without destroying them

The tool is a point-and-shoot system, and has a range of some 400 meters. It gains control of the drone, immobilizing it so no remote action can occur. It does so by either disrupting remote control or GPS navigation.

The drone then either lands in the vicinity or flies back to its starting point, and effectively suffers no damage.

Source: Point-and-shoot weapon stops drones without destroying them

NSA in P/poly: The Power of Precomputation

Diffie-Hellman is the thing where Alice and Bob first agree on a huge prime number p and a number g, then Alice picks a secret a and sends Bob ga (mod p), and Bob picks a secret b and sends Alice gb (mod p), and then Alice and Bob can both compute (ga)b=(gb)a=gab (mod p), but an eavesdropper who’s listening in only knows p, g, ga (mod p), and gb (mod p), and one can plausibly conjecture that it’s hard from those things alone to get gab (mod p). So then Alice and Bob share a secret unknown to the eavesdropper, which they didn’t before, and they can use that secret to start doing cryptography.

Source: Shtetl-Optimized » Blog Archive » NSA in P/poly: The Power of Precomputation

Kilogram conflict resolved at last

For decades, metrologists have strived to retire ‘Le Grand K’ — the platinum and iridium cylinder that for 126 years has defined the kilogram from a high-security vault outside Paris. Now it looks as if they at last have the data needed to replace the cylinder with a definition based on mathematical constants.

Source: Kilogram conflict resolved at last : Nature News & Comment

If they are proved right, in 2018, Le Grand K will join the metre as a museum piece. “We’ll keep it,” says Davis, “but it won’t be defining anything anymore.”

secmodel_securelevel

The securelevel mechanism is intended to allow protecting the persistence of code and data on the system, or a subset thereof, from modification, even by the super-user by providing convenient means of “locking down” a system to a degree suited to its environment.

Source: NetBSD 6.1.5 – man page for secmodel_securelevel (netbsd section 9) – Unix & Linux Commands

Highly secure mode may seem Draconian, but is intended as a last line of defence should the super-user account be compromised. Its effects preclude circumvention of file flags by direct modification of a raw disk device, or erasure of a file system by means of newfs(8). Further, it can limit the potential damage of a compromised “firewall” by prohibiting the modification of packet filter rules. Preventing the system clock from being set backwards aids in post-mortem analysis and helps ensure the integrity of logs. Precision timekeeping is not affected because the clock may still be slowed.

On-chip liquid cooling promises revolutionary change

The technique involves cutting microfluidic channels into the die of FPGA devices, which were chosen for the research and trials because of their flexible configuration and extensive use in the military. Effectively this locates the cooling just microns from the problem, and even allows for the possibility of chip-stacking, which very few devices currently have the room or efficiency to achieve, given the necessity to dissipate heat from a central locus of adjacent chips.

Source: On-chip liquid cooling promises revolutionary change