By timothy from Slashdot's it-more-than-begins department
LichtSpektren writes: Several tech sites have now broke the news that Canonical has revealed their BQ Aquaris M10 Ubuntu Tablet. Joey-Elijah Sneddon builds the hype: "A stunning 10.1-inch IPS touch display powered a full HD 1920×1200 pixel resolution at 240 ppi. Inside is a 64-bit MediaTek MT8163A 1.5GHz quad-core processor, 2GB of RAM, and 16GB of internal memory. A micro SD memory card is included, adding storage expansion of up to 64GB. Furthermore, the converged slate includes an 8-megapixel rear camera with autofocus and dual LED flash (and capable of recording in full 1080p), plus a front facing 3-megapixel camera for video chats, vlogs and selfies. Front facing Dolby Atmos speakers will provide a superior sound experience during movie playback. The M10 measure 246mm x 171mm x 8.2mm, weighs just 470 grams — lighter than the Apple iPad Air — and has a 7280 mAh battery to give up to 10 hours of use. ... Tablet mode offers a side stage for running two apps side-by-side, plus a full range of legacy desktop applications, mobile apps and scopes. LibreOffice, Mozilla Firefox, The GIMP and Gedit are among a 'curated collection of legacy apps' to ship pre-installed on the tablet. It will also be possible for developers and enthusiasts to install virtually any ARM compatible app available on Ubuntu using the familiar 'apt-get' command." A photo gallery can also be seen on his website here. The price is not yet announced, but the Android version of the same tablet is currently on sale for €229.Read Replies (0)
By timothy from Slashdot's short-attention-span department
itwbennett writes: According to a Ponemon Institute survey, hackers make less than $15,000 per successful attack and net, on average, less than $29,000 a year. The average attacker conducts eight attacks per year, of which less than half are successful. Among the findings that will be of particular interest to defenders: Hackers prefer easy targets and will call off an attack if it is taking too long. According to the survey, 13 percent quit after a delay of five hours. A delay of 10 hours causes 24 percent to quit, a delay of 20 hours causes 36 to quit, and a majority of 60 percent will give up if an attack takes 40 additional hours. 'If you can delay them by two days, you can deter 60 percent of attacks,' said Scott Simkin, senior threat intelligence manager at Palo Alto Networks, which sponsored the study.Read Replies (0)
By timothy from Slashdot's beats-the-alternative department
Fast Company highlights the cheap-for-the-price Phoenix exoskeleton, created by University of California Berkeley professor (and Berkeley Robotics and Human Engineering Laboratory director) Homayoon Kazerooni and a team of his former grad students at SuitX, a company Kazerooni founded in 2013. Set to sell for $40,000 when it goes on sale next month, the Phoenix sounds expensive -- except compared to the alternatives. For paraplegic patients, there are a handful of other powered exoskeletons, but they cost much more, and are engineered for more than the modest goals of the Phoenix, which allows only one thing: slow walking on level ground. That limited objective means that the rig is light (27 pounds), and relatively unobtrusive. Kazerooni says that he'd like the price to go down much further, too, noting that all the technology in a modern motorcyle can be had for the quarter of the price.
A slice: [The] only driving motors in Phoenix are at the hip joints. When the user hits a forward button on their crutches, their left hip swings forward. At this moment, the onboard computer signals the knee to become loose, flex, and clear the ground. As the foot hits, the knee joint stiffens again to support the leg. This computer-choreographed process repeats for the right leg.
As it happens, this hinged knee joint has another benefit. If the wearer hits something midstep, like a rock or a curb, a powered knee would blindly drive the leg forward anyway, likely leading to a fall. The hinge naturally absorbs such resistance and allows the wearer a chance to compensate.Read Replies (0)
By timothy from Slashdot's let's-put-these-fish-in-that-barrel department
mdsolar writes: A former Energy Department employee accused of attempting to infiltrate the agency's computer system to steal nuclear secrets and sell them to a foreign government pleaded guilty Tuesday to a reduced charge of attempting to damage protected government computers in an email "spear-phishing attack." Charles Harvey Eccleston, a former employee at the department and at the independent Nuclear Regulatory Commission (NRC), was arrested March 27 by Philippine authorities after an undercover FBI sting operation. Eccleston, 62, a U.S. citizen who had been living in the Philippines since 2011, was "terminated" from his job at the NRC in 2010, according to the Justice Department. In January 2015, the department said, he targeted more than 80 Energy Department employees in Washington at four national nuclear labs with emails containing what he thought were links to malicious websites that, if activated, could infect and damage computers.Read Replies (0)