Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
Leaked Disney+ financials may shed light on recent price hike:
A leak of data from Disney points to the Disney+ streaming service making about $2.4 billion in revenue in its fiscal quarter ending on March 30. Disney doesn't normally share how much revenue its individual streaming services generate, making this figure particularly interesting.
In August, Disney confirmed that it was investigating the leak of "over a terabyte of data from one of the communication systems" it uses. In a report this week, The Wall Street Journal (WSJ) said it looked over files leaked by a hacking group called Nullbulge that include "a range of financial and strategy information," apparent login credentials for parts of Disney's cloud infrastructure, and more. The leak includes over "44 million messages from Disney's Slack workplace communications tool, upward of 18,800 spreadsheets, and at least 13,000 PDFs," WSJ said.
"We decline to comment on unverified information The Wall Street Journal has purportedly obtained as a result of a bad actor's illegal activity," a Disney spokesperson told WSJ.
According to WSJ, financial information came via "documents shared by staffers that detail company operations," adding, "It isn't official data of the sort Disney discloses to Wall Street and might not reflect final financial performance for a given period." That means we should take these figures with a grain of salt.
"Internal spreadsheets suggest that Disney+ generated more than $2.4 billion in revenue in the March quarter," WSJ reported, referencing Disney's fiscal Q2 2024. "It underscores how significant a revenue contributor Hulu is, particularly as Disney seeks to buy out Comcast's stake in that streaming service, and as the two sides spar over its value."
The publication noted that the $2.4 billion figure represents "about 43 percent"—42.5 percent to be more precise—of the direct-to-consumer (DTC) revenue that Disney reported that quarter, which totaled $5,642,000,000 [PDF]. In its Q2 report, Disney put Disney+, Hulu, and Disney+ Hotstar under its DTC umbrella. DTC revenue in Q2 represented a 13 percent increase compared to the same quarter in the prior fiscal year.
Further, subscriber counts for Disney+ and Hulu increased year over year in Q2. The leaks didn't specify how much revenue Disney's streaming businesses made in Q3, but Disney reported that DTC revenue increased to $5.8 billion [PDF].
Right before announcing its Q3 numbers, though, Disney announced price hikes across Disney+, Hulu, and ESPN+ by as much as 25 percent. As we wrote at the time, the price hike seemed like an attempt to push people toward bundle packages offering a combination of Disney+, Hulu, and/or ESPN+ (bundles are supposed to make subscriber churn less likely). Disney CFO Hugh Johnston tried convincing us that Disney's streaming catalog meant that it had "earned" the streaming price hikes.
But the recently leaked numbers shed a little more light on the situation.
https://blog.cloudflare.com/pingora-saving-compute-1-percent-at-a-time/
Cloudflare's global network handles a lot of HTTP requests – over 60 million per second on average. That in and of itself is not news, but it is the starting point to an adventure that started a few months ago and ends with the announcement of a new open-source Rust crate that we are using to reduce our CPU utilization, enabling our CDN to handle even more of the world's ever-increasing Web traffic.
Motivation
Let's start at the beginning. You may recall a few months ago we released Pingora (the heart of our Rust-based proxy services) as an open-source project on GitHub. I work on the team that maintains the Pingora framework, as well as Cloudflare's production services built upon it. One of those services is responsible for the final step in transmitting users' (non-cached) requests to their true destination. Internally, we call the request's destination server its "origin", so our service has the (unimaginative) name of "pingora-origin".
One of the many responsibilities of pingora-origin is to ensure that when a request leaves our infrastructure, it has been cleaned to remove the internal information we use to route, measure, and optimize traffic for our customers. This has to be done for every request that leaves Cloudflare, and as I mentioned above, it's a lot of requests. At the time of writing, the rate of requests leaving pingora-origin (globally) is 35 million requests per second.
It's not every day that a security researcher acquires the ability to generate counterfeit HTTPS certificates, track email activity, and execute code of his choice on thousands of servers—all in a single blow that cost only $20 and a few minutes to land. But that's exactly what happened recently to Benjamin Harris.
Harris, the CEO and founder of security firm watchTowr, did all of this by registering the domain dotmobilregistry.net. The domain was once the official home of the authoritative WHOIS server for .mobi
[...]
Harris noticed that the previous dotmobiregistry.net owners had allowed the domain to expire. He then scooped it up and set up his own .mobi WHOIS server there.To Harris's surprise, his server received queries from slightly more than 76,000 unique IP addresses within a few hours of setting it up. Over five days, it received roughly 2.5 million queries from about 135,000 unique systems. The entities behind the systems querying his deprecated domain included a who's who of Internet heavyweights comprising domain registrars, providers of online security tools, governments from the US and around the world, universities, and certificate authorities, the entities that issue browser-trusted TLS certificates that make HTTPS work.
"watchTowr's research has demonstrated that trust placed in this process by governments and authorities worldwide should be considered misplaced at this stage, in [our] opinion," Harris wrote in a post documenting his research.
[...]
WHOIS has played a key role in Internet governance since its earliest days, back when it was still called the ARPANET. Elizabeth Feinler, an information scientist working for the Augmentation Research Center, became the principal investigator for NIC, short for the Network Information Center project, in 1974. Under Feinler's watch, NIC developed the top-level domain naming system and the official host table and published the ARPANET Directory, which acted as a directory of phone numbers and email addresses of all network users. Eventually, the directory evolved into the WHOIS system, a query-based server that provided a comprehensive list of all Internet host names and the entities that had registered them.Despite its antiquated look and feel, WHOIS today remains an essential resource with tremendous consequences.
[...]
Harris populated his WHOIS database with junk data that corresponded to all real .mobi addresses. Administrative email addresses, and most other fields led to the watchtowr.com domain. For humor, he also added ASCII art.
[...]
The humor aside, the rogue WHOIS server gave him powers he never should have had. One of the greatest was the ability to dictate the email address certificate authority GlobalSign used to determine if a party applying for a TLS certificate was the rightful owner of the domain name the certificate would apply to. Like the vast majority of its competitors, GlobalSign uses an automated process. An application for example.com, for instance, will prompt the certificate authority to send an email to the administrative email address listed in the authoritative WHOIS for that domain. If the party on the other end clicks a link, the certificate is automatically approved.When Harris generated a certificate signing request for microsoft.mobi, he promptly received an email from GlobalSign. The email gave him the option of receiving a verification link at whois@watchtowr.com. For ethical reasons, he stopped the experiment at this point.
[...]
"The purchase of a $20 domain that allowed the passive inference of .gov/.mil communications and the subversion of the Certificate Authority verification system should be a clear demonstration that the integrity of the trust and security processes we as Internet users rely on is, and continues to be, extremely fragile," Harris wrote in an online interview. "The systems and security we all take for granted is, in many places, truly held together in ways that would not pass approval in 2024."
A wider global trend that will see V2X technology become the standard in most vehicles:
The future connected vehicle does not just use a standard smartphone cellular connection but also takes advantage of dedicated V2X safety communication channels. V2X, which stands for Vehicle-to-Everything, uses either Wi-Fi or cellular-based technology to facilitate communication with other vehicles and traffic infrastructure. If regulation or safety standards mandate this technology, then V2X is set to become the "digital seatbelt" of the future, promising to reduce accidents, improve congestion, and reduce emissions globally by allowing vehicle safety systems to talk to each other and to city traffic infrastructure, even in the pouring rain, dense fog, or busy carparks.
The two most popular technologies for V2X, DSRC [Dedicated short-range communications], and C-V2X [Cellular-Vehicle-to-Everything], both require different hardware. DSRC is based on Wi-Fi protocols, and C-V2X is based on 4G or 5G protocols. Currently, there are approximately 1 million V2X-connected vehicles on the road globally, with those mainly concentrated in Europe and China. About half the market is using DSRC-based technology, and the other half of the market is using C-V2X technology, with most of these vehicles being available in China.
IDTechEx is forecasting a significant market shift towards C-V2X technology, with over 90% of the market forecasted to be using 5G-based C-V2X technology by 2034. The biggest contribution to this shift is regulation — the two largest vehicle markets in the world, the US and China, both have governmental organizations actively pushing for C-V2X adoption and have formally abandoned DSRC technology.
[...] If a technology is included in a New Car Assessment Program (NCAP), OEMs aiming to achieve a high safety rating must include it in order to pass certain tests. China has announced V2X inclusion in the CNCAP from 2024 onwards, which is set to result in significant growth for the technology in China. Many manufacturers target a 5-star score in NCAPs, as NCAP scores can significantly impact sales.
[...] One area where V2X could make the largest impact is for autonomous vehicles (AVs). The number and sophistication of sensors in an autonomous vehicle are vast and increase with the level of autonomy. AVs like those in Phoenix or San Francisco currently depend on LiDAR [light detection and ranging], radar, and cameras for the majority of their perception. Each sensor fulfills important functions and ensures robust and safe operation, but these vehicle sensor systems are limited by line-of-sight. Using either DSRC or C-V2X, autonomous vehicles can transmit information at a dedicated frequency (~5.9GHz), with V2X acting as an extra sensor that works in all weather conditions and can go through walls and obstacles, effectively solving the line-of-sight problem. The main feasible method for achieving this is to use V2X to broadcast the location-related information of each car. A connected vehicle receiving the information can calculate the possibility of collision with the other vehicle using onboard compute. If the risk is high, the driver (or passenger of an autonomous vehicle) will be immediately warned, and the system will adjust accordingly to avoid a collision safely and effectively.
https://therecord.media/ford-patent-application-in-vehicle-listening-advertising
Ford Motor Company is seeking a patent for technology that would allow it to tailor in-car advertising by listening to conversations among vehicle occupants, as well as by analyzing a car's historical location and other data, according to a patent application published late last month.
"In one example, the controller may monitor user dialogue to detect when individuals are in a conversation," the patent application says. "The conversations can be parsed for keywords or phrases that may indicate where the occupants are traveling to."
The tech — labeled as "in-vehicle advertisement presentation" — will determine where a car is located, how fast it is traveling, what type of road it is driving on and whether it is in traffic. It also will predict routes, speeds and destinations to customize ads to drivers, the application said.
The system could pull data from "audio signals within the vehicle and/or historical user data, selecting a number of the advertisements to present to the user during the trip," the patent application said.
Is accidentally stumbling across the unknown a key part of science?:
The three princes of Sarandib—an ancient Persian name for Sri Lanka—get exiled by their father the king. They are good boys, but he wants them to experience the wider world and its peoples and be tested by them before they take over the kingdom. They meet a cameleer who has lost his camel and tell him they've seen it—though they have not—and prove it by describing three noteworthy characteristics of the animal: it is blind in one eye, it has a tooth missing, and it has a lame leg.
After some hijinks the camel is found, and the princes are correct. How could they have known? They used their keen observational skills to notice unusual things, and their wit to interpret those observations to reveal a truth that was not immediately apparent.
It is a very old tale, sometimes involving an elephant or a horse instead of a camel. But this is the version written by Amir Khusrau in Delhi in 1301 in his poem The Eight Tales of Paradise, and this is the version that one Christopher the Armenian clumsily translated into the Venetian novel The Three Princes of Serendip, published in 1557; a publication that, in a roundabout way, brought the word "serendipity" into the English language.
In no version of the story do the princes accidentally stumble across something important they were not looking for, or find something they were looking for but in a roundabout, unanticipated manner, or make a valuable discovery based on a false belief or misapprehension. Chance, luck, and accidents, happy or otherwise, play no role in their tale. Rather, the trio use their astute observations as fodder for their abductive reasoning. Their main talent is their ability to spot surprising, unexpected things and use their observations to formulate hypotheses and conjectures that then allow them to deduce the existence of something they've never before seen.
This is how Telmo Pievani, the first Italian chair of Philosophy of Biological Sciences at the University of Padua, eventually comes to define serendipity in his new book, Serendipity: the Unexpected in Science. It's hardly a mind-bending or world-altering read, but it is a cute and engaging one, especially when his many stories of discovery veer into ruminations on the nature of inquiry and of science itself.
He starts with the above-mentioned romp through global literature, culminating in the joint coining and misunderstanding of the term as we know it today: in 1754, after reading the popular English translation entitled The Travels and Adventures of Three Princes of Serendip, the intellectual Horace Walpole described "Serendipity, a very expressive word," as "discoveries, by accidents and sagacity, of things which they were not in quest of."
Pievani knows a lot, but like a lot, about the history of science, and he puts it on display here. He quickly debunks all of the instances of alleged serendipity that are always trotted out: Fleming the microbiologist had been studying antibiotics and searching for a commercially viable one for years before his moldy plate led him to penicillin. Yes, Röntgen discovered X-rays by a fluke, but it was only because of the training he received in his studies of cathode rays that he recognized he was observing a new form of radiation. Plenty of people over the course of history splashed some volume of water out of the baths they were climbing into and watched apples fall, but only Archimedes—who had recently been tasked by his king to figure out if his crown was made entirely of gold—and Newton—polymathic inventor of calculus—leapt from these (probably apocryphal) mundane occurrences to their famous discoveries of density and gravity, respectively.
After dispensing with these tired old saws, Pievani then suggests some cases of potentially real—or strong, as he deems it—serendipity. George de Mestral's inventing velcro after noticing burrs stuck to his pants while hiking in the Alps; he certainly wasn't searching for anything, and he parlayed his observation into a useful technology. DuPont chemists' developing nylon, Teflon, and Post-it notes while playing with polymers for assorted other purposes. Columbus "discovering" the Americas (for the fourth time) since he thought the Earth was about a third smaller than Eratosthenes of Cyrene had correctly calculated it to be almost two thousand years earlier, forgotten "due to memory loss and Eurocentric prejudices."
The European Court of Justice has ruled that Apple has gotten an unfair tax advantage by the Irish tax authorities over the period 1991 to 2014.
During this period, Apple only paid taxes in the European Union through 2 subsidiaries in Ireland, Apple Sales International and Apple Operations Europe. Both companies were granted exemption tax rules by the Irish government in 1991 and 2007. As a result of the allocation method endorsed in these tax rulings, Apple only paid an effective corporate tax rate that declined from 1% in 2003 to 0.005% in 2014 on the profits of Apple Sales International.
This selective tax treatment of Apple in Ireland is illegal under EU state aid rules, because it gives Apple a significant advantage over other businesses that are subject to the normal national taxation rules, according to the European Commission.
After a long legal battle, the European Court of Justice has now ruled that this viewpoint of the Commission is correct, and Apple needs to pay illegal tax benefits worth €13 billion, plus rent, to the Irish authorities.
There is no appeal possible to this decision.
Wars of necessity spawn weapons innovation as each side tries to counter the other's tactics and punch through defenses. For instance—as the Russian invasion of Ukraine has made drone warfare real, both sides have developed ways to bring down drones more easily. One recent Ukrainian innovation has been building counter-drone ramming drones that literally knock Russian drones from the sky.
In the case of the trench warfare that currently dominates the Russian invasion of eastern Ukraine, the Ukrainians have another new tactic: dragon's fire. Delivered by drone.
[...]
This drone type is allegedly called "Dragon" and is said to feature thermite, a mixture of metal powder (usually aluminum) and metal oxide (in this case, said to be iron). When a thermite mixture is ignited, it undergoes a redox reaction that releases an enormous amount of heat energy and can burn anywhere.
[...]
Update, Sept. 5: WarTranslated, an X account that posts translations into English from Russian-speaking Telegram channels, has just posted a Russian writer's thoughts about the new drones. The Dragon drones' "effectiveness now looks much higher than in the initial videos," the writer says, adding that they are "capable of burning out vegetation (grass, bushes, trees with foliage) in a short period of time. This will open up the enemy's view of camouflaged positions, which will deprive the defending units of property and ammunition, and the assault groups concentrated for the attack of the element of surprise."
Optical Character Recognition converts passwords shown in images to machine-readable text:
Researchers have discovered more than 280 malicious apps for Android that use optical character recognition to steal cryptocurrency wallet credentials from infected devices.
The apps masquerade as official ones from banks, government services, TV streaming services, and utilities. In fact, they scour infected phones for text messages, contacts, and all stored images and surreptitiously send them to remote servers controlled by the app developers. The apps are available from malicious sites and are distributed in phishing messages sent to targets. There's no indication that any of the apps were available through Google Play.
The most notable thing about the newly discovered malware campaign is that the threat actors behind it are employing optical character recognition software in an attempt to extract cryptocurrency wallet credentials that are shown in images stored on infected devices. Many wallets allow users to protect their wallets with a series of random words. The mnemonic credentials are easier for most people to remember than the jumble of characters that appear in the private key. Words are also easier for humans to recognize in images.
[...] Optical character recognition is the process of converting images of typed, handwritten, or printed text into machine-encoded text. OCR has existed for years and has grown increasingly common to transform characters captured in images into characters that can be read and manipulated by software.
[...] People who are concerned they may have installed one of the malicious apps should check the McAfee post for a list of associated websites and cryptographic hashes.
The malware has received multiple updates over time. Whereas it once used HTTP to communicate with control servers, it now connects through WebSockets, a mechanism that's harder for security software to parse. WebSockets have the added benefit of being a more versatile channel.
Developers have also updated the apps to better obfuscate their malicious functionality. Obfuscation methods include encoding the strings inside the code so they're not easily read by humans, the addition of irrelevant code, and the renaming of functions and variables, all of which confuse analysts and make detection harder. While the malware is mostly restricted to South Korea, it has recently begun to spread within the UK.
"This development is significant as it shows that the threat actors are expanding their focus both demographically and geographically," Ryu wrote. "The move into the UK points to a deliberate attempt by the attackers to broaden their operations, likely aiming at new user groups with localized versions of the malware."
A multinational automaker prepared to lay off more than 2,000 American workers in August after benefiting handsomely from the Biden administration's subsidies for electric-vehicle production:
Stellantis, the parent company to famous brands like Ram and Jeep, has been awarded hundreds of millions in grants from the federal government to promote its EV manufacturing. But the Biden administration's largesse has not prevented the company from laying off American workers.
In July, the Department of Energy awarded Stellantis subsidiary Chrysler a $334.8 million grant to convert a shuttered Illinois plant into a facility for building EVs and another $250 million grant to make a ...(aaaand, paywall)
The AP ran a story a few weeks ago foreshadowing this action:
The statement comes as the company faces increased capital spending to make the transition from gasoline vehicles to electric autos. It also has reported declining U.S. sales in the first quarter, and it has higher costs due to a new contract agreement reached last year with the United Auto Workers union. Stellantis has about 43,000 factory workers.
[...] Stellantis CEO Carlos Tavares has said his company has to work on cutting costs globally in order to keep electric vehicles affordable for the middle class. Electric vehicles, he has said, cost about 40% more than those powered by gasoline. Without cost reductions, EVs will be too expensive for the middle class, shrinking the market and driving costs up more, Tavares has said.
I've been working on cars for most of my life and my observation is Chrysler/Ram are the worst vehicles on the road. I also own two Jeeps that are 50+ years old, however Chrysler has ruined the Jeep name by what I assume is cutting corners to save money because they're poorly designed and flimsy. Interesting the powers that be at Stellantis don't seem to be concerned about these issues.
Previously: Chrysler to Go All-Electric by 2028, Starting with the Airflow in 2025
Related:
• General Motors Lays Off Hundreds Of US Workers
• Tesla Lays Off 'More Than 10%' of its Global Workforce
Core drilling is tricky. Getting a 6 GHz signal through concrete is now easier.
One issue in getting office buildings networked that you don't typically face at home is concrete—and lots of it. Concrete walls are an average of 8 inches thick inside most commercial real estate.
Keeping a network running through them is not merely a matter of running cord. Not everybody has the knowledge or tools to punch through that kind of wall. Even if they do, you can't just put a hole in something that might be load-bearing or part of a fire control system without imaging, permits, and contractors. The bandwidths that can work through these walls, like 3G, are being phased out, and the bandwidths that provide enough throughput for modern systems, like 5G, can't make it through.
That's what WaveCore, from Airvine Scientific, aims to fix, and I can't help but find it fascinating after originally seeing it on The Register. The company had previously taken on lesser solid obstructions, like plaster and thick glass, with its WaveTunnel. Two WaveCore units on either side of a wall (or on different floors) can push through a stated 12 inches of concrete. In their in-house testing, Airvine reports pushing just under 4Gbps through 12 inches of garage concrete, and it can bend around corners, even 90 degrees. Your particular cement and aggregate combinations may vary, of course.
The spec sheet shows that a 6 GHz radio is the part that, through "beam steering," blasts through concrete, with a 2.4 GHz radio for control functions. There's PoE or barrel connector power, and RJ45 ethernet in the 1, 2.5, 5, and 10Gbps sizes.
6 GHz concrete fidelity (Con-Fi? Crete-Fi?) is just one of the slightly uncommon connections that may or may not be making their way into office spaces soon. LiFi, standardized as 802.11bb, is seeking to provide an intentionally limited scope to connectivity, whether for security restrictions or radio frequency safety. And Wi-Fi 7, certified earlier this year, aims to multiply data rates by bonding connections over the various bands already in place.
http://www.theradiohistorian.org/fm/fm.html
Before FM, There was APEX
In the early and mid-1930s, radio communication was confined to the Low [or Long] Waves (100-500 kHz), Medium Waves (500-1500 kHz), and the Short Waves (1,500 to 30,000 kHz). The frequencies above that, referred to as the "ultra-high frequencies", were truly the "Wild West" of radio. It was a place for experimentation and a possible home to future radio services. Commercial broadcasting to the public took place entirely on the standard broadcast band (540-1600 kHz), but it was affected by a number of defects that annoyed the public – natural and man-made static, local and skip interference, atmospheric fading, and limited fidelity. Starting about 1932, a number of brave and daring broadcasters sought permission from the FCC to conduct experiments in the Ultra-Short Waves in an attempt to find solutions to these problems. In particular, these experimental stations wanted to transmit wideband, high fidelity audio. Amplitude modulation, the only known method of transmitting audio at the time, was the method utilized on these so-called "Apex" stations. Experimental licenses were being issued for up to 1,000 watts on frequencies at 25-26 MHz and 42 MHz. By 1939, these Apex stations were operating in 34 U.S. cities in 22 states They suffered less skip interference than standard AM stations, but static was still a problem.
At the same time that these Apex broadcasters were gaining a foothold in the upper frontiers of the radio spectrum, an entirely new type of radio service was also being demonstrated - one that was destined to cause Apex AM to become obsolete. That service was called Frequency Modulation, or FM.
Boeing's Starliner spacecraft sailed to a smooth landing in the New Mexico desert Friday night, an auspicious end to an otherwise disappointing three-month test flight that left the capsule's two-person crew stuck in orbit until next year.
Cushioned by airbags, the Boeing crew capsule descended under three parachutes toward an on-target landing at 10:01 pm local time Friday (12:01 am EDT Saturday) at White Sands Space Harbor, New Mexico. From the outside, the landing appeared just as it would have if the spacecraft brought home NASA astronauts Butch Wilmore and Suni Williams, who became the first people to launch on a Starliner capsule on June 5.
But Starliner's cockpit was empty as it flew back to Earth Friday night. Last month, NASA managers decided to keep Wilmore and Williams on the International Space Station (ISS) until next year after agency officials determined it was too risky for the astronauts to return to the ground on Boeing's spaceship. Instead of coming home on Starliner, Wilmore and Williams will fly back to Earth on a SpaceX Dragon spacecraft in February. NASA has incorporated the Starliner duo into the space station's long-term crew.
[...] After streaking through the atmosphere over the Pacific Ocean and Mexico, Starliner deployed three main parachutes to slow its descent, then a ring of six airbags inflated around the bottom of the spacecraft to dampen the jolt of touchdown. This was the third time a Starliner capsule has flown in space, and the second time the spacecraft fell short of achieving all of its objectives.
"I'm happy to report Starliner did really well today in the undock, deorbit, and landing sequence," said Steve Stich, manager of NASA's commercial crew program, which manages a contract worth up to $4.6 billion for Boeing to develop, test, and fly a series of Starliner crew missions to the ISS.
While officials were pleased with Starliner's landing, the celebration was tinged with disappointment.
[...] Boeing's Starliner managers insisted the ship was safe to bring the astronauts home. It might be tempting to conclude the successful landing Friday night vindicated Boeing's views on the thruster problems. However, the spacecraft's propulsion system, provided by Aerojet Rocketdyne, clearly did not work as intended during the flight. NASA had the option of bringing Wilmore and Williams back to Earth on a different, flight-proven spacecraft, so they took it.
[...] As Starliner approached the space station in June, five of 28 control thrusters on Starliner's service module failed, forcing Wilmore to take manual control as ground teams sorted out the problem. Eventually, engineers recovered four of the five thrusters, but NASA's decision makers were unable to convince themselves the same problem wouldn't reappear, or get worse, when the spacecraft departed the space station and headed for reentry and landing.
Engineers later determined the control jets lost thrust due to overheating, which can cause Teflon seals in valves to swell and deform, starving the thrusters of propellant. Telemetry data beamed back to the mission controllers from Starliner showed higher-than-expected temperatures on two of the service module thrusters during the flight back to Earth Friday night, but they continued working.
[...] The overheating thrusters are located inside four doghouse-shaped propulsion pods around the perimeter of Starliner's service module. It turns out the doghouses retain heat like a thermos—something NASA and Boeing didn't fully appreciate before this mission—and the thrusters don't have time to cool down when the spacecraft fires its control jets in rapid pulses. It might help if Boeing removes some of the insulating thermal blankets from the doghouses, Stich said.
The easiest method of resolving the problem of Starliner's overheating thrusters would be to change the rate and duration of thruster firings.
"What we would like to do is try not to change the thruster. I think that is the best path," Stich said. "There thrusters have shown resilience and have shown that they perform well, as long as we keep their temperatures down and don't fire them in a manner that causes the temperatures to go up."
There's one thing from this summer's test flight that might, counterintuitively, help NASA certify the Starliner spacecraft to begin operational flights with its next mission. Rather than staying at the space station for eight days, Starliner remained docked at the research lab for three months, half of the duration of a full-up crew rotation flight. Despite the setbacks, Stich estimated the test flight achieved about 85 to 90 percent of its objectives.
"There's a lot of learning that happens in that three months that is invaluable for an increment mission," Stich said. "So, in some ways, the mission overachieved some objectives, in terms of being there for extra time. Not having the crew onboard, obviously, there are some things that we lack in terms of Butch and Suni's test pilot expertise, and how the vehicle performed, what they saw in the cockpit. We won't have that data, but we still have the wealth of data from the spacecraft itself, so that will go toward the mission objectives and the certification."
Arthur T Knackerbracket has processed the following story:
The multiple constellations of broadband-beaming satellites planned by Chinese companies could conceivably run the nation's "Great Firewall" content censorship system, according to think tank The Australian Strategic Policy Institute. And if they do, using the services outside China will be dangerous.
A Monday note by the Institute's senior fellow Mercedes Page notes that Chinese entities plan to launch and operate three low-Earth-orbit satellite constellations to provide terrestrial internet services. As The Register has reported, the first of 15,000-plus planned satellites launched earlier in August.
Page thinks the satellites show "China is not only securing its position in the satellite internet market but laying the groundwork for expanding its digital governance model far beyond its borders."
"Central to China's ambition is the concept of cyber sovereignty – the notion that each nation has the right to govern its digital domain," she wrote, adding that "China has used this principle to build a heavily censored surveillance system supporting the Chinese Communist Party's power, widely condemned for violating human rights."
Page also notes that satellite broadband services rely on a small number of ground stations, or gateways, and that those facilities are ideal locations to run systems that monitor, block and filter content.
[...] Page also warned "The centralized nature of satellite internet may also make countries more vulnerable to cyber espionage by the Chinese government or malicious actors." Another security risk comes from Chinese laws that require companies to store data within China and make it accessible to the Chinese government. "As China's satellite projects are intended to provide global coverage, the data of international users – spanning communication, location, and internet activity – would be subject to Chinese data laws." And that could mean "Chinese authorities could potentially access any data transmitted through Chinese satellite internet services."
If Chinese satellite broadband services are widely adopted, Page thinks "the world may witness the rise of a new digital Iron Curtain extending from space, dividing the free flow of information and imposing state control on a global scale."
Which sounds terrifying. However, many nations are already wary of satellite broadband, and are attempting to regulate it like any other telco. China's telcos and networking equipment providers have already been banned in many nations, while Beijing's various diplomatic efforts are increasingly regarded with scepticism after they left countries like Sri Lanka and Zambia in deep debt.
With US-based satellite broadband providers like Starlink and Amazon's Kuiper likely to offer service that matches the performance of Chinese providers, nations will have an easy way to route around Beijing's network controls. That is, if they are applied to satellite internet – a circumstance about which Page speculates, but which is not certain to eventuate.
Editor's note: This TechCrunch piece quotes extensively from the source. For brevity, the quoted pieces were removed, but can be seen if one clicks through to TFA.
Arthur T Knackerbracket has processed the following story:
Last month, we shared the details of a really good “Dear Colleague” letter that Senator Rand Paul sent around urging other Senators not to vote for KOSA [Kids Online Safety Act]. While the letter did not work and the Senate overwhelmingly approved KOSA (only to now have it stuck in the House), Paul has now expanded upon that letter in an article at Reason.
It’s well worth the read, though the title makes the point clear: Censoring the Internet Won’t Protect Kids.
It starts out by pointing out how much good the internet can be for families:
[...] He correctly admits that the internet can also be misused, and that not all of it is appropriate for kids, but that’s no reason to overreact:
[...] He points out that the law empowers the FTC to police content that could impact the mental health of children, but does not clearly define mental health disorders, and those could change drastically with no input from Congress.
What he doesn’t mention is that we’re living in a time when some are trying to classify normal behavior as a mental health disorder, and thus this law could be weaponized.
From there, he talks about the “duty of care.” That’s a key part of both KOSA and other similar bills and says that websites have a “duty of care” to make efforts to block their sites from causing various problems. As we’ve explained for the better part of a decade, a “duty of care” turns itself into a demand for censorship, as it’s the only way for companies to avoid costly litigation over whether or not they were careful enough.
Just last week, I got into a debate with a KOSA supporter on social media. They insisted that they’re not talking about content, but just about design features like “infinite scroll.” When asked about what kind of things they’re trying to solve for, I was told “eating disorders.” I pointed out that “infinite scroll” doesn’t lead to eating disorders. They’re clearly targeting the underlying content (and even that is way more complex than KOSA supporters realize).
Senator Paul makes a similar point in the other direction. Things like “infinite scroll” aren’t harmful if the underlying content isn’t harmful:
[...] As for stopping “anxiety,” Paul makes the very important point that there are legitimate and important reasons why kids may feel some anxiety today, and KOSA shouldn’t stop that information from being shared:
[...] He also points out — as he did in his original letter — that the KOSA requirements to block certain kinds of ads makes no sense in a world in which kids see those same ads elsewhere:
Even as I’ve quoted a bunch here, there’s way more in the article. It is, by far, one of the best explanations of the problems of KOSA and many other bills that use false claims of “regulating design” as an attempt to “protect the kids.” He also talks about the harms of age verification, how it will harm youth activism, and how the structure of the bill will create strong incentives for websites to pull down all sorts of controversial content.
There is evidence that kids face greater mental health challenges today than in the past. Some studies suggest this is more because of society’s openness to discussing and diagnosing mental health challenges. But there remains no compelling evidence that the internet and social media are causing it. Even worse, as Paul’s article makes abundantly clear, there is nothing out there suggesting that censoring the internet will magically fix those problems. Yet, that’s what KOSA and many other bills are designed to do.