An anonymous reader quotes a report from NPR: About four years ago, Kevin Sinclair inherited an army of clones. "Daisy, Debbie, Denise and Diana," says Sinclair, a developmental biologist at the University of Nottingham in England. "'Sister clones' probably best describes them," Sinclair says. "They actually come from the exactly the same batch of cells that Dolly came from." In an article out Tuesday in the journal Nature Communications, Sinclair and his colleagues write that the ewes' age, along with their strapping health, might be a reason for people to start feeling more optimistic about what cloning can do. Dolly's life did not turn out as scientists in the cloning field hoped it would. She died young -- 6 1/2 -- with a nasty lung virus. "That was really just bad luck," Sinclair says, and had "nothing to do" with the fact that Dolly was a clone. It was a daunting concept for those in the cloning field, because, says Sinclair, "If you're going to create these animals, they should be normal in every respect. They should be just as healthy as any other animal that's conceived naturally. If that is not the case, then it raises serious ethical and welfare concerns about creating these animals in the first place." But, the good health of the 13 clones in the Nottingham herd suggest better prospects for the procedure. Sinclair and his colleagues evaluated the animals' blood pressure, metabolism, heart function, muscles and joints, looking for signs of premature aging. They even fattened them up (since obesity is a risk factor for metabolic problems including diabetes) and gave them the standard tests to gauge how their bodies would handle glucose and insulin. The results? Normal, normal, normal. "There is nothing to suggest that these animals were anything other than perfectly normal," says Sinclair. They had slight signs of arthritis (Debbie in particular), but not enough to cause problems. "If I put them in with a bunch of other sheep, you would never be able to identify them," he says.
An anonymous reader quotes a report from Los Angeles Times: The Tesla car involved in a fatal crash in Florida this spring was in Autopilot mode and going about 10 miles faster than the speed limit, according to safety regulators, who also released a picture of the mangled vehicle. Earlier reports had stated the Tesla Model S struck a big rig while traveling on a divided highway in central Florida, and speculated that the Tesla Autopilot system had failed to intervene in time to prevent the collision. The National Transportation Safety Board released a preliminary report Tuesday that confirms some details of the May 7 collision, along with a photo that shows the car with its windshield flattened and most of its roof sheared off. The federal agency also included a photo of the big rig, circling an area on the right side of the tractor-trailer that showed the light damage the truck received from the collision. The 2015 Model S was moving at 74 mph, above the posted 65 mph speed limit, when it struck a 53-foot trailer being pulled by a Freightliner Cascadia truck. Tesla's semi-autonomous Autopilot driving feature was engaged, the report says.
An anonymous reader writes from a report via Softpedia: "The European Commission is proposing the creation of a database that will hold information on users of virtual currencies," reports Softpedia. "The database will record data on the user's real world identity, along with all associated wallet addresses." The database will be made available to financial investigation agencies in order to track down users behind suspicious operations. The creation of this database is part of a regulatory push that the EU got rolling after the Paris November 2015 terror attacks, and which it officially put forward in February 2016, and later approved at the start of July 2016. Legally, this is an attempt to reform the Anti-Money Laundering Directive (AMLD). The current draft is available here. The current AMLD draft reads: "The report shall be accompanied, if necessary, by appropriate proposals, including, where appropriate, with respect to virtual currencies, empowerments to set-up and maintain a central database registering users' identities and wallet addresses accessible to FIUs, as well as self-declaration forms for the use of virtual currency users."
An anonymous reader writes from a report via The Independent: According to a study carried out by corporate research firm MSCI, CEO's that get paid the most run some of the worst-performing companies. It found that every $100 invested in companies with the highest-paid CEOs would have grown to $265 over 10 years. However, the same amount invested in the companies with the lowest-paid CEOs would have grown to $367 over 10 years. The report, titled "Are CEOs paid for performance? Evaluating the Effectiveness of Equity Incentives," looked at the salaries of 800 CEOs at 429 large and medium-sized U.S. companies between 2005 and 2014 and compared it with the total shareholder return of the companies. Senior corporate governance research at MSCI, Ric Marshall, said in a statement: "The highest paid had the worse performance by a significant margin. It just argues for the equity portion of CEO pay to be more conservative."
An anonymous reader quotes a report from BGR: Apple on Tuesday announced fiscal third-quarter earnings of $1.42 per share, or $7.8 billion in net income, on sales totaling $42.4 billion. That compares to a net profit of $1.85 per share in the same quarter last year, while revenue slid from the Q3 record of $49.6 billion that Apple set in fiscal 2015. Ahead of Apple's report, analysts were expecting EPS to come in at $1.39 while revenue was seen dropping to $42.1 billion, right in the middle of Apple's guidance of between $41 billion and $43 billion. iPhone sales in fiscal Q3 2016 totaled 40.4 million units, down from the 47.5 million iPhones the company sold during the June quarter last year, which was also a third-quarter record. Wall Street's consensus for this past quarter was 40 million units. The company said it expects between $45.5 billion and $47.5 billion in sales for the fiscal fourth quarter. The only part of Apple's business that's really growing is its mobile apps and online services. The company reported a 19 percent sales jump for the segment that includes iTunes, Apple Music, the App Store and services like Apple Pay and iCloud storage. "That segment produced nearly $6 billion in sales -- more than Apple pulled in from quarterly sales of either iPad or Macs," reports ABC News.
An anonymous reader writes from a report via TechCrunch: Sources inside the AR helmet company Skully say the startup is no more. TechCrunch reports: "Operations have ceased within the company, and we're told the website will be turned off at some point today. [Skully's CEO and co-founder Marcus Weller] has also been asked to sign a confidentiality deal with investors. Weller told TechCrunch today he will not sign and that he's completely walked away from all dealings with the company as of 10 days ago. The site is still up for now but it says Skully's AR-1 helmet is sold out in every size and no one is able to order. A source tells us sales were cut off on Monday. The shutdown leaves several vendors and Skully's manufacturer Flextronics with unpaid bills and at least 50 full-time employees out of a job. It's unclear if any of the vendors will be paid. That also means the more than 3,000 people who pre-ordered a helmet may never get one -- and one source tells us it's doubtful any of them will be receiving a refund." One source claims Weller botched a possible acquisition deal with Chinese company LeSports before leaving the company last week, while another says the deal might still happen now that the former CEO is gone. Weller is saying that he and his brother were forced out of the company after investors disagreed with the LeSports deal. Investors from Intel Capital ultimately determined it was best to simply shut down the entire company instead of trying to salvage the company Weller started. "We're disappointed Skully has closed its doors. We've been focused on the company's success for nearly two years and have recently been trying to negotiate a funding round to keep it going," Intel Capital said in a statement. "We're certainly sorry for the employees who are losing their jobs, the crowdfunding backers whose investments didn't work out and the customers who'd pre-purchased product. We continue to be excited by the promise of this kind of wearable technology."
An anonymous reader writes from a report via The Next Web: Norway plans to build "submerged floating bridges" to allow drivers to cross its bodies of water. The Next Web reports: "The 'submerged floating bridges' would consist of large tubes suspended by pontoon-like support structures 100 feet below water. Each will be wide enough for two lanes of traffic, and the floating structures should ease the congestion on numerous ferries currently required to get commuters from Point A to Point B. Each support pontoon would then be secured to a truss or bolted to the bedrock below to keep things stable." A trip from Kristiansand to Trondheim is roughly 680 miles and could take as long as 21 hours due to the seven ferry trips required along the way. While building normal bridges would cost significantly less than the $25 billion in funds required for the tunnel project, the fjords and difficult terrain make them unsuitable candidates. The pricey tunnel project could cut the trip time to just 10 hours when it's expected to be finished in 2035.
Reader joshtops writes: Facebook needs you to fill its News Feed, Oculus Rift, and Gear VR with 360 content. So today it put all the hardware and software designs of its Surround 360 camera on Github after announcing the plan in April. Thanks to cheeky instruction manual inspired by Ikea's manuals, you can learn how to buy the parts, assemble the camera, load the image-stitching software, and start shooting 360 content. Essentially 17 cameras on a UFO-looking stick, the 360 Surround camera can be built for about $30,000 in parts. The 4-megapixel lenses can shoot 4K, 6K, or 8K 360 video, and fisheye lenses on the top and bottom remove the blindspots. Facebook forced a random engineer to try to build the 360 Surround from the open source instructions, and found it took about four hours.FastCompany has more details.
An anonymous reader writes: While filming Star Wars: The Force Awakens, Harrison Ford almost died when he was crushed by a hydraulic door on the set of the Millennium Falcon. He was reportedly knocked to the ground and crushed beneath the heavy door when he walked on to the set not believing it to be live. The 71-year-old actor suffered a broken left leg. Prosecutor Andrew Marshall said the door "could have killed somebody. The fact that it didn't was because an emergency stop was activated," he said. The company responsible, Foodles Production, pleaded guilty to two breaches under health and safety legislation, one count under section two of the Health and Safety at Work Act 1974, which related to a breach of duty in relation to employees, and a second under section three, a breach over people not employed by the company. The lawyer for Foodles Production, which is owned by Disney, said the company would contest the level of risk involved on August 22nd at Aylesbury crown court.
Reader msm1267 writes: Wireless keyboards made by eight different companies suffer from a vulnerability that can allow attackers to eavesdrop on keystrokes from up to 250 feet away, researchers warned Tuesday. If exploited, the vulnerability, dubbed KeySniffer, could let an attacker glean passwords, credit card numbers, security questions and answers -- essentially anything typed on a keyboard, in clear text. Keyboards manufactured by Hewlett-Packard, Toshiba, Kensington, Insignia, Radio Shack, Anker, General Electric, and EagleTec are affected, according to Marc Newlin, a researcher with Bastille Networks who discovered the vulnerability. Bastille gave the manufacturers of the keyboards 90 days to address the vulnerability, but most vendors failed to respond to their findings. Newlin said only Jasco Products, a company that manufactures the affected keyboard (GE 98614) for General Electric, responded and claimed it no longer manufactures wireless devices, like keyboards. As there doesn't appear to be a way to actually fix the vulnerability, it's likely the companies will eventually consider the devices end of life.
Chinese electronics conglomerate LeEco is purchasing American TV manufacturer Vizio for $2 billion, the company announced at a press conference in China on Tuesday. The announcement effectively gives LeEco, formerly known as LeTV, an instant foothold in the U.S. television market. For a refresh, for those who haven't heard much about LeEco, it's one of China's biggest electronics companies. Founded in 2004, it offers a range of services including live-streaming, e-commerce, cloud, smartphones, TV set-top boxes, and smart TVs among many other products and services. One of the recent areas where it has invested its time on is an electric car, which we talked about here a few weeks ago. From a report: Vizio is primarily known for its televisions, like the P-Series sets that we recently unboxed, but they've also dipped their toes into Android. For example, Vizio released a 10-inch tablet a few years ago, and the aforementioned P-Series TV set ships with a 6-inch Android tablet that you use as a remote. Once Vizio is acquired by LeEco, it'll be operated as an independent subsidiary and the current management will remain in California. LeEco CEO Jia Yueting commented on the deal, saying, "We hope that we can use the ecosystem model and create a great integration between Vizio and LeEco and create new values for U.S. users."Having talked to the executives of LeEco in the past few months, I understand that the company intends to bring its products to the American market before its rival Xiaomi does. Xiaomi also intends to bring its smartphones and TVs to the U.S. and European market, but is currently dealing with different regulations.
If you are planning to purchase the Moto Z or a Moto G4 smartphone, be prepared to not see security updates rolling out to your phone every month -- and in a timely fashion. After Ars Technica called out Motorola's security policy as "unacceptable" and "insecure," in a recent review, the company tried to handle the PR disaster, but later folded. In a statement to the publication, the company said: Motorola understands that keeping phones up to date with Android security patches is important to our customers. We strive to push security patches as quickly as possible. However, because of the amount of testing and approvals that are necessary to deploy them, it's difficult to do this on a monthly basis for all our devices. It is often most efficient for us to bundle security updates in a scheduled Maintenance Release (MR) or OS upgrade. As we previously stated, Moto Z Droid Edition will receive Android Security Bulletins. Moto G4 will also receive them.Monthy security updates -- or the lack thereof -- remains one of the concerning issues that plagues the vast majority of Android devices. Unless it's a high-end smartphone, it is often rare to see the smartphone OEM keep the device's software updated for more than a year. Even with a flagship phone, the software update -- and corresponding security patches -- are typically guaranteed for only 18 to 24 months. Reports suggest that Google has been taking this issue seriously, and at some point, it was considering publicly shaming its partners that didn't roll out security updates to their respective devices fast enough.
The White House on Tuesday issued new instructions on how government agencies should respond to major cyber security attacks, in an attempt to combat perceptions that the Obama administration has been sluggish in addressing threats from sophisticated hacking adversaries, Reuters reports. The announcement comes amid reports that hackers working for Russia may have engineered the leak of emails stolen from the Democratic National Committee in an attempt to influence the outcome of the upcoming presidential election. Motherboard adds: George W. Bush's Homeland Security Advisory System -- the color-coded terrorism "threat level" indicator that became a symbol of post-9/11 fear mongering -- is getting its spiritual successor for hacking: the "Cyber Incident Severity Schema." President Obama announced a new policy directive Tuesday that will codify how the federal government will respond to hacking incidents against both the government and private American companies. [...] The Cyber Incident Severity Schema ranges from white (an "unsubstantiated or inconsequential event") to black (a hack that "poses an imminent threat to the provision of wide-scale critical infrastructure services, national government stability, or to the lives of U.S. persons") , with green, yellow, orange, and red falling in between. Any hack or threat of a hack rated at orange or above is a "significant cyber incident" that will trigger what the Obama administration is calling a "coordinated" response from government agencies. As you might expect, there are many unanswered questions here, and the federal government has announced so many cyber programs in the last few years that it's hard to know which, if any of them, will actually make the US government or its companies any safer from hackers.
The hacker who claimed to compromise the DNC swore he was Romanian, but new investigation shows he worked directly for Russia President Vladimir Putin's government in Moscow. The Daily Beast reports: The hacker who claims to have stolen emails from the Democratic National Committee and provided them to WikiLeaks is actually an agent of the Russian government and part of an orchestrated attempt to influence U.S. media coverage surrounding the presidential election, a security research group concluded on Tuesday. The researchers, at Arlington, Va.-based ThreatConnect, traced the self-described Romanian hacker Guccifer 2.0 back to an Internet server in Russia and to a digital address that has been linked in the past to Russian online scams. Far from being a single, sophisticated hacker, Guccifer 2.0 is more likely a collection of people from the propaganda arm of the Russian government meant to deflect attention away from Moscow as the force behind the DNC hacks and leaks of emails, the researchers found. ThreatConnect is the first known group of experts to link the self-proclaimed hacker to a Russian operation, amidst an ongoing FBI investigation and a presidential campaign rocked by the release of DNC emails that have embarrassed senior party leaders and inflamed intraparty tensions turning the Democratic National Convention. The emails revealed that party insiders plotted ways to undermine Sen. Bernie Sanders' presidential bid. The researchers at the aforementioned security firm are basing their conclusion on three signals: the hacker used Russian computers to edit PDF files, he also used Russian VPN -- and other internet infrastructure from the country, and that he was unable to speak Romanian.
BlackBerry, which once assumed the tentpole position in the mobile market, announced on Tuesday the BlackBerry DTEK 50, its second smartphone powered by Google's Android operating system. The Canadean company is marketing the DTEK as the 'world's most secure' phone. It is priced at $300, and will go on sale in select markets on August 8. The Verge adds:The DTEK50 has a 5.2-inch, 1080p display, Qualcomm Snapdragon 617 processor, 3GB RAM, 13-megapixel camera, and 2,610mAh battery. The 8-megapixel front camera also includes a flash for taking selfies. It runs Android 6.0 Marshmallow with BlackBerry's software features, such as the Hub. The software is similar to the software on the Priv released last year. The security features are highlighted right in the device's name, as it has BlackBerry's DTEK software that protects users from malware and other security problems often seen on Android smartphones. The DTEK app lets users quickly get an overview of their device's security and take action on any potential issues. BlackBerry says that it has modified Android with its own technology originally developed for the BB10 platform to make it more secure. The company is also committing to rapid updates to deliver security patches shortly after they are released.