Even mild COVID in young people often leads to long-term symptoms, study finds

Common symptoms among young adults included fatigue and and cognitive problems.

A UNLV Medicine medical assistant administers a Pfizer-BioNTech COVID-19 vaccination to a UNLV School of Nursing student.

Enlarge / A UNLV Medicine medical assistant administers a Pfizer-BioNTech COVID-19 vaccination to a UNLV School of Nursing student. (credit: Getty | Ethan Miller)

Even mild cases of COVID-19 in young people often lead to lingering symptoms and health complications that drag on for six months or longer, according to a small Norwegian study published this week in Nature Medicine.

Researchers at the University of Bergen carefully followed 312 people with confirmed cases of COVID-19 for at least six months. Of those, 247 had mild to moderate illnesses and isolated at home, never becoming sick enough to be admitted to a hospital. Six months after testing positive, 136 of the 247 (55 percent) still had lingering symptoms. And those 136 weren’t only in the older age groups. In fact, in all the age groups between 16 and over 60 years old, between 50 percent and 60 percent of COVID patients reported persistent symptoms.

For instance, of those between 16 and 30 years old, 52 percent (32 of 61) still suffered COVID-19 symptoms after six months. The most common symptoms were disturbed taste and/or smell, fatigue, difficulty breathing, difficulty concentrating, and memory problems.

Read 4 remaining paragraphs | Comments

Verletzte in Mali – wofür?

Erstmals werden Bundeswehr-Soldaten im Blauhelm-Einsatz bei einem Anschlag im Norden des Landes verwundet

Erstmals werden Bundeswehr-Soldaten im Blauhelm-Einsatz bei einem Anschlag im Norden des Landes verwundet

We have our best look yet at supervillain Mandarin in new Shang-Chi trailer

“Throughout my life, the Ten Rings gave my family power.”

Marvel's official trailer for Shang-Chi and the Legend of the Ten Rings is here to give us a bit more of the title character's backstory. The trailer also serves up glimpses of classic villains the Mandarin and Abomination and a supporting (yet crucial) character from 2016's Doctor Strange.

Directed by Destin Daniel Cretton, Shang-Chi and the Legend of the Ten Rings is the first Marvel film to feature an Asian lead—Simu Liu, best known for his role as Jung Kim on the sitcom Kim's Convenience—as well as a predominantly Asian/Asian diaspora cast and crew. Marvel continues to keep plot details tightly under wraps, except to say that the main character gets drawn into the clandestine Ten Rings organization and must confront his past. "Shang-Chi’s main problem in his life is rooted in not knowing who he really is," Cretton has said. "He has to learn how to own every part of himself. If he doesn’t allow himself to look at all of it—the good, the bad, the light, and the dark—and to own it all, he won’t be able to reach his full potential."

The "ten rings" of the title refers to the Marvel Comics supervillain Mandarin's Ten Rings of Power (worn on the fingers in the comics and shown as arm bracelets in footage from the Marvel film), each with a different powers: ice blasts, flames, or mind-control, for instance. As we've reported previously, Marvel created an entirely new character, Wenwu, who has gone by many names over the years, including the Mandarin, who made an appearance in Iron Man 3—or rather, Ben Kingsley played Trevor Slattery, an imposter posing as the Mandarin.

Read 5 remaining paragraphs | Comments

Here’s how Android apps on Windows 11 are going to work

Microsoft is building an Android framework on top of the Windows Subsystem for Linux.

Microsoft's Windows 11 announcement surprised us with the news that the upcoming OS will run Android apps alongside Windows apps. Unfortunately, the keynote was light on details. Will these apps use emulation? Will Windows' existing Linux support be involved? We got our answers shortly after the keynote, thanks to a follow-up developer talk that went into some details.

The feature is officially called the "Windows Subsystem for Android," which should tell you a lot about how it works. Windows currently has a "Windows Subsystem for Linux" (WSL), which uses a subset of the Hyper-V functionality to run Linux apps on a real Linux kernel alongside your Windows apps. (Hyper-V lets a second guest OS access the bare metal hardware instead of running on top of the host OS with less access to resources.) Real Android phones use the Linux kernel, and Microsoft is building an Android framework on top of WSL for the Windows Subsystem for Android. It sounds like we're essentially getting x86 Android running on Hyper-V.

Android apps under Windows should feel just like native Windows apps, with a top-level window, taskbar entry, and the ability to be pinned to the start menu. During its presentation, Microsoft said, "Behind the scenes, we actually create a proxy native app that handles the bridge between the Android app model and the Windows app model." Presumably, that means the system will provide things like a start menu shortcut, icons, entries in the app uninstall lists, and other minor Windows wrappings that will make the app feel native.

Read 10 remaining paragraphs | Comments

Biden silent on municipal broadband as he makes $65B deal with Republicans

No word yet, but GOP likely wouldn’t agree to deal if it favored public networks.

President Joe Biden standing at a dais and pointing as he speaks at a press conference.

Enlarge / President Joe Biden delivers remarks on the Senate's bipartisan infrastructure deal at the White House on June 24, 2021. (credit: Getty Images | Kevin Dietsch )

President Joe Biden announced a $65 billion broadband-deployment deal Thursday with Senate Republicans and Democrats, but he provided no details on whether the plan will prioritize municipal broadband networks as the president originally proposed.

Congressional Republicans have tried to ban municipal broadband nationwide, so it's highly unlikely that they would have agreed to Biden's stated goal of giving public networks priority over private ISPs in the next big round of government subsidies. Biden in March proposed $100 billion for broadband over eight years and a provision to prioritize "support for broadband networks owned, operated by, or affiliated with local governments, non-profits, and co-operatives—providers with less pressure to turn profits and with a commitment to serving entire communities."

Eleven Senate Republicans, nine Democrats, and an independent who caucuses with Democrats agreed on the $65 billion broadband plan as part of a larger $1.2 trillion infrastructure framework. The fact sheet released by Biden provides no detail on how the funding will be distributed, but it says the $65 billion will pay for "universal broadband infrastructure."

Read 13 remaining paragraphs | Comments

Here’s what you’ll need to upgrade to Windows 11

The TPM requirement has many Windows 10 users worried—often unnecessarily.

Since Microsoft's announcement of Windows 11 yesterday, one concern has reverberated around the Web more loudly than any other—what's this about a Trusted Platform Module requirement?

Windows 11 is the first Windows version to require a TPM, and most self-built PCs (and cheaper, home-targeted OEM PCs) don't have a TPM module on board. Although this requirement is a bit of a mess, it's not as onerous as millions of people have assumed. We'll walk you through all of Windows 11's announced requirements, including TPM—and make sure to note when all this is likely to be a problem.

General hardware requirements

Although Windows 11 does bump general hardware requirements up some from Windows 10's extremely lenient minimums, it will still be challenging to find a PC that doesn't meet most of these specifications. Here's the list:

Read 29 remaining paragraphs | Comments

NFC flaws let researchers hack an ATM by waving a phone

Flaws in card-reader technology can wreak havoc with point-of-sale systems and more.

NFC flaws let researchers hack an ATM by waving a phone

Enlarge (credit: Chalongrat Chuvaree | Getty Images)

For years, security researchers and cybercriminals have hacked ATMs by using all possible avenues to their innards, from opening a front panel and sticking a thumb drive into a USB port to drilling a hole that exposes internal wiring. Now, one researcher has found a collection of bugs that allow him to hack ATMs—along with a wide variety of point-of-sale terminals—in a new way: with a wave of his phone over a contactless credit card reader.

Josep Rodriguez, a researcher and consultant at security firm IOActive, has spent the last year digging up and reporting vulnerabilities in the so-called near-field communications reader chips used in millions of ATMs and point-of-sale systems worldwide. NFC systems are what let you wave a credit card over a reader—rather than swipe or insert it—to make a payment or extract money from a cash machine. You can find them on countless retail store and restaurant counters, vending machines, taxis, and parking meters around the globe.

Read 12 remaining paragraphs | Comments

Cold-case files: Archaeologists discover 3,000-year-old victim of shark attack

Young adult male lost an arm and a leg before dying of shock and blood loss.

Original excavation photograph of Tsukumo No. 24, a young adult male with evidence of severe trauma consistent with an attack by a white or tiger shark.

Enlarge / Original excavation photograph of Tsukumo No. 24, a young adult male with evidence of severe trauma consistent with an attack by a white or tiger shark. (credit: Kyoto University)

Marine biologists have spent decades counteracting the popular misconception of sharks as aggressive predators that target humans, particularly in the wake of the blockbuster Jaws franchise. But fatal attacks nonetheless do happen—and they happened even in prehistoric times. While examining the skeletal remains of a prehistoric hunter-gatherer cemetery in Japan dating back some 3,000 years, University of Oxford archaeologists found distinctive evidence that one such skeleton had been the victim of a fatal shark attack. They described their findings in a new paper published in the Journal of Archaeological Science: Reports. It's the oldest known victim of a shark attack yet—like a prehistoric cold-case film.

The Tsukumo burial site in Japan's Okayama Prefecture was discovered by construction workers in the 1860s and first excavated in 1915. More than 170 human skeletons were unearthed and housed at Kyoto University. The site dates to the Late-Final Jōmon period of the Japanese archipelago. Co-authors J. Alyssa White and Rick Schulting, both from Oxford, made their discovery while examining the remains for evidence of violent trauma, part of a larger study on violence in prehistoric Japan. Remains categorized as Tsukumo No. 24 showed marks of severe trauma that proved especially puzzling.

"We were initially flummoxed by what could have caused at least 790 deep, serrated injuries to this man," said White and Schulting. "There were so many injuries and yet he was buried in the community burial ground, the Tsukumo Shell-mound cemetery site. The injuries were mainly confined to the arms, legs, and front of the chest and abdomen. Through a process of elimination, we ruled out human conflict and more commonly-reported animal predators or scavengers."

Read 8 remaining paragraphs | Comments

Steinberg Wins WIPO Domain Dispute Against ‘VST’ Plugin Pirate Sites

There are several ways copyright holders can deal with pirate sites. Music software company Steinberg, known as the inventor of the VST format for software plug-ins, recently took a relatively exotic route. It filed a WIPO domain dispute against various pirate sites, including vsttorrents.net. Steinberg won the arbitration case, but the pirates seem rather persistent.

From: TF, for the latest news on copyright battles, piracy and more.

justicePiracy is a complicated problem to tackle and some anti-piracy strategies are more effective than others.

Site blocking is fairly common, but determined pirates can usually find a way around it. Targeting the domain names directly can work as well but not all registrars and registries are receptive to complaints.

WIPO Domain Disputes

When it comes to domain names there is an indirect option too. The World International Property Organization (WIPO) has an arbitration panel that’s specifically set up to resolve domain name disputes.

The process, which doesn’t involve any courts, is quite simple. Rightsholders file a complaint against a domain owner who they believe is violating their rights. This only applies to domains that abuse registered trademarks in their name, which often makes it hard to use as an anti-piracy tool.

Steinberg Targets VST Pirate Sites

The trademark angle means that it can be used in a limited number of cases. German music hardware and software company Steinberg nonetheless decided to go down this road. Specifically, it goes after pirate sites that use its VST trademark, which stands for Virtual Studio Technology, a popular music creation plugin interface.

These VST plugins, which can be quite costly, are widely shared on pirate sites. In a recent WIPO complaint, Steinberg singled out crackedvst.net, vscrackofficial.com, vst-mafia.com, vst-torrents.com, vstcracks.net, vstplugs.com, vsttorrents.net, crackedvst.com, and vstland.com.

These are mostly smaller sites that have a targeted niche audience. According to Steinberg, their domains clearly violate its trademark while offering pirated content, also that of competitors.

Domain Owners Respond

In these cases, the WIPO panel always reaches out to the accused party to hear their side of the story. This outreach triggered a short response from one of the registrants, Ghulam Muhuddeen, who appeared to confuse the dispute with a takedown notice.

“I am not used your VST name, send me Software List I am removed your software [sic],” Muhuddeen told WIPO in a short response.

A more elaborate reply came in later from an Indian lawyer, representing one of the affected domain owners. That letter pointed out that VST is a widely used word and that the trademark in India is owned by a tractor company. Instead, the lawyer accused Steinberg of attempting to steal the domain.

vsttorrents

The lawyer added that the domain only offered a trial for Steinberg’s Cubase software. However, the response didn’t deny that all domains are related and under common control, which means that they will be treated as one by the WIPO panel.

WIPO Panel Sides With Steinberg

Domain name disputes are typically decided over three main questions. Are the domains using the contested trademark, does the owner lack a legitimate interest in the domain, and was it registered in bad faith? In this case, all of the questions above were answered affirmatively.

“All but one of the Domain Names entirely incorporate the VST mark, and add words like ‘cracks’, ‘cracked’, ‘torrents’, ‘land’, and ‘mafia’,” the panel writes, noting that several of these terms hint at infringing uses.

The vscrackofficial.com is an exception, as it only includes the first two letters of the trademark, but the arbitration panel concludes that the addition of the word “crack” helps to tip the scale in favor of Steinberg.

Not The First Arbitration Case

Also playing a role in that decision is the fact that two of the respondent were already accused in a similar domain dispute earlier, which they lost as well.

This pattern of abusive registrations confirms that the domains were registered in bad faith. The response from the lawyer is not convincing either, and the WIPO panel concludes that the current owners don’t have a legitimate interest in the names.

“It is apparent from the record here that Respondent is using the Domain Names improperly to increase Internet traffic to its commercial websites by appropriating Complainant’s VST trademark,” the panel concludes.

‘Pirates’ Persist

After winning the domain disputes the names were transferred to Steinberg but whether that has completely solved the issue is unclear.

Before losing the case, some of the operators already started advertising new domains. For example, Vsttorrents.net said it would move to Looptorrent.com, which remains online today. While that site still offers pirated plugins, it no longer uses the VST trademark in the domain name.

A quick Google search for terms such as “VST” and “crack” shows that Steinberg still has plenty of other problems as well.

vst crack google

From: TF, for the latest news on copyright battles, piracy and more.

FeedBurner goes into “maintenance mode” in July (Update your email or RSS subscriptions)

Google announced in April that it would turn off some key features for FeedBurner in July. And now that the dates is approaching, the company says the once-ubiquitous tool used by web publishers to dress up their RSS feeds is going into “mainten…

Google announced in April that it would turn off some key features for FeedBurner in July. And now that the dates is approaching, the company says the once-ubiquitous tool used by web publishers to dress up their RSS feeds is going into “maintenance mode.” For users, the biggest change is that if you subscribed to […]

The post FeedBurner goes into “maintenance mode” in July (Update your email or RSS subscriptions) appeared first on Liliputing.