Every Super Bowl loser wants a do-over, but no team has had as disastrous an ending as Atlanta had in the final nine minutes of Super Bowl LI. If the Falcons were given 1,000 do-overs, they would have been expected, according to ESPN’s win probability model, to win the game 996 times.All the Falcons needed was one more point, one defensive stop or perhaps even just one more minute of burnt clock to zero out the New England Patriots’ 0.4 percent chance to surmount a nigh-insurmountable lead.Why didn’t they?“I think we ran out of gas,” Falcons head coach Dan Quinn said at his post-game press conference. Even so, Quinn’s offensive machine should have been able to coast to the finish line after being up 28-12 with possession of the ball and less than 10 minutes to play. Instead, bad decision-making turned domination into capitulation.The Falcons, as I wrote one FiveThirtyEight’s Super Bowl live blog, had been stunningly effective on the ground all game. The Patriots’ rush defense ranked fourth in Football Outsiders’ Defense-adjusted Value Over Average (DVOA) this season, yet the Falcons had piled up 94 yards and a touchdown on just 14 carries.Starting at the 9:40 mark, Falcons running back Tevin Coleman ran on first and second down, getting injured on the latter play but setting up 3rd-and-1 from the team’s own 36-yard line. Rather than dial up another clock-eating run, offensive coordinator Kyle Shanahan called a pass play. Coleman’s backfield partner, Devonta Freeman, whiffed on his blocking assignment, and Falcons quarterback Matt Ryan was strip-sacked.After the Patriots capitalized on the turnover with a touchdown, the Falcons ran 11 offensive plays — and only two of them were runs. Despite needing more than anything to wind the clock down to zero, Shanahan gave only two more carries to Freeman, who’d been averaging 8.2 yards per carry until that point.This is where football coaches, who spend numerous hours micro-analyzing schemes and matchups as they build out their game plans, can lose the forest for the trees. It may well be that Shanahan had a perfect play called up for that situation, or a matchup he knew Ryan could exploit. Ryan, after all, had completed 13 of 16 passes to that point; another short completion seemed like an easy ask. But the Falcons needed to maximize their chance of finishing the game with more points, not their offensive efficiency. Should Terrell Owens Be In The Hall of Fame? Related: Hot Takedown Even if the Patriots had stopped Freeman short of the sticks on 3rd-and-1, it would have run 30 more seconds off the clock, and an average Matt Bosher punt would have placed the Patriots inside their own 20-yard line with less than eight minutes to play. Instead, the Falcons’ only turnover of the game gave the Patriots the ball 5 yards from the red zone with 8:24 left on the clock. Even an unsuccessful run and decent punt at this juncture might have been enough to win the game, considering that the Patriots would go on to score the game-tying touchdown with just 57 seconds left. (Then again, having one fewer minute may have just meant that the Patriots would have scored even faster.)Incredibly, Shanahan and the Falcons later doubled down on their mistake.On the ensuing Falcons possession, Ryan gripped it and ripped it. The Falcons moved from their own 10-yard line to the Patriots’ 22 with a 2-yard run sandwiched between two deep passes. They then ran once, for a loss of a yard, shaving 44 seconds off the clock. Then, Shanahan dialed up another pass — and Ryan took his fifth sack.“You don’t think, just run the ball and make your guy kick a 50-yard field goal,” Shanahan told reporters after the game. But wait — why wouldn’t you think that?Running two more times, even for no gain, would have forced the Patriots to burn two timeouts. The Falcons were on the Patriots’ 23-yard line; a field-goal attempt from there would have been 40 yards, not 50. Falcons kicker Matt Bryant has made 78.2 percent of his career kicks from between 40 and 49 yards. With the score 28-20, going up by 11 with less than four minutes to play would likely have been as effective a dagger as going up by 15.In the end, Shanahan, Ryan and the Falcons offense can point to just about any metric and say they put together a masterful offensive game. They averaged a whopping 7.5 yards per play over the course of the game, far more than the Patriots’ 5.9, or even the Falcons’ league-leading regular-season average of 6.7.But sometimes the best performance in a vacuum isn’t the optimal performance in a game situation. That’s something Shanahan, reportedly set to become the head coach of the San Francisco 49ers, is going to have to learn.
Twitter 2018 One Musicfest Bringing Cardi B, Miguel & Nas To Atlanta Extended to two days this year, the festival will also feature GRAMMY winners Brandy, Common, Robert Glasper, and T.I.Philip MerrillGRAMMYs Jun 5, 2018 – 1:01 pm One Musicfest 2018 comes to Atlanta from Sept. 8–9, with Cardi B, Miguel and Nas headlining along with Big Sean, Jeezy and T.I. Attendance at last year’s OMF was more than 20,000 and the roster is richer now that the event has been extended to two days.The supergroup August Greene is slated to perform. The trio unites Common, Robert Glasper and Karriem Riggins following the release of their self-titled album in March after forming during this year’s GRAMMY Week festivities. The album’s single “Optimistic” features GRAMMY winner Brandy, who is also on the OMF2018 bill. The expanded OMF2018 roster continues with many of this summer’s hottest talents. DVSN, Kelis, Rapsody, and Jessie Reyez will remind all in attendance and online why people love to watch them, and there will be George Clinton & Parliament to depend upon for funk. Other performers include Big Krit, Davido, Goldlink, St Beauty, and Teedra Moses as well as a special Atlanta crunk set.Tickets are now on sale via the OMF website.Catching Up On Music News Powered By The Recording Academy Just Got Easier. Have A Google Home Device? “Talk To GRAMMYs”Read more Facebook News Cardi B, Miguel & Nas Onboard For One Musicfest 2018-one-musicfest-bringing-cardi-b-miguel-nas-atlanta Email https://www.instagram.com/p/BjpUgEpAwYy/?hl=en&taken-by=onemusicfest
Aug 9 • What a security researcher learned from monitoring traffic at Defcon Black Hat Defcon All the different Android versions through the years Aug 10 • That 4G hotspot could be a hotbed for hackers Stone, who discussed her research at the Black Hat cybersecurity conference in Las Vegas on Thursday, sees preinstalled malware as a threat that security researchers aren’t often focused on, since attention is usually directed toward malware that victims download on their own. But unlike downloaded malware, preinstalled malware is harder to find and even more difficult to get rid of. “If malware or security issues can make its way as a preinstalled app, then the damage it can do is greater, and that’s why we need so much reviewing, auditing and analysis,” she said. Because Apple has full control over its iPhone, preinstalled malware isn’t much of a concern for iOS, or the App Store. Many of the preinstalled harmful apps pop up after a malicious actor tricks phone makers into including their software on their devices. Android’s security team discovered two major malware campaigns hidden in preinstalled apps over the last three years, one called Chamois and the other called Triada. Together, they infected tens of millions of low-budget Android devices from the moment they were shipped out. Google did not specify which phones were affected.At Black Hat, Stone detailed three new case studies on preinstalled apps that posed threats to Android devices, though it’s unclear whether the apps’ creators had malicious intent. They affected millions of devices and turned off Google Play Protect, spied on people’s web activity and allowed potential hackers to run code remotely, Stone said. Case studies Stone discussed two cases where the preinstalled “malware” were accidents, but still presented a security threat for millions of people. Up to 225 device makers had apps with code that allowed for remote code execution. These apps opened a window that would allow anyone online to connect to it, and once it did, the person would have complete control. This affected 6 million devices, but was fixed within a month, Stone said. In the second case, consumer and commercial conglomerate Honeywell had vulnerabilities preinstalled on Android devices controlling its industrial control systems. Any apps on the Android devices that Honeywell was using had extended privileges, so a potential attacker could have abused that security flaw and stolen passwords and documents. The company disclosed that vulnerability last September. In another case study, the Android security team found a preinstalled app that turned off Google Play Protect, which it fixed last November. Stone also described a preinstalled app that took detailed logs of people’s web activities, which Google considers spyware. Black Hat Defcon reading • Android malware that comes preinstalled is a massive threat Aug 11 • DARPA’s $10 million voting machine couldn’t be hacked at Defcon (for the wrong reasons) Mobile Security 2 Share your voice When malware comes preinstalled on Android devices, it’s much harder to remove, Google’s researchers said. Omar Marques/SOPA Images/LightRocket via Getty Images Keeping your Android device safe from malware is difficult enough as it is — but it’s an entirely different threat when the harmful apps come with your device. Android’s open-source operating system allows for more affordable alternatives for millions of people, but it also opens the door for hackers to sneak in prepackaged malware.Preinstalled malware had been discovered on more than 7.4 million Android devices, which had the ability to take over devices and download apps in the background while committing ad fraud, researchers working for Google found. While major Android partners like Samsung or LG, as well as Google’s own Pixel devices, are likely safe from these kinds of threats, budget phone makers who rely on third-party software to save a few bucks could be vulnerable. Attackers offer genuine services, and hide the malware in the apps they provide, according to Maddie Stone, a security researcher on Google’s Project Zero and previously a tech lead on the Android Security team. “If malware or security issues can make its way as a preinstalled app, then the damage it can do is greater, and that’s why we need so much reviewing, auditing and analysis/” Maddie Stone, a security researcher on Google’s Project Zero Comments Tags Aug 10 • Those robocall blocker apps are hanging up on your privacy See All Preinstalled vs. downloaded malwareAll malware might seem the same to you, but when it’s preinstalled, there are a few key differences that make it a more dangerous threat. Since they’re approved and installed by the phone makers, antivirus programs don’t flag them as harmful, even if an app is behaving exactly like malware would. These apps also have escalated permissions compared to downloaded malware, and can’t be removed unless the phone makers send a security update, Stone said. Google Play Protect can disable the malicious app, but it can’t remove it completely. In 2018, the Android Security team reviewed builds from about 1,000 different phone makers to make sure there weren’t any preinstalled malware packaged in with the devices.”I put a lot of my own time and resources into finding it then versus after the fact to identify all of these issues before they ever go out to users,” Stone said. “We want to make sure no one is infected because we talk about how hard it is to remove after the fact.”In March 2018, the Chamois botnet had infected 7.4 million devices. By July, there were about 700,000 devices still infected, Stone said. Sometimes, those security updates never arrive, or people don’t download them.Because these apps are preinstalled, they can often remain hidden without an icon, leaving people unaware that they’re even affected. While hackers try to get victims to download malware, with preinstalled apps, attackers just have to trick the phone makers. “If you are able to infiltrate the supply chain out of the box, then you already have as many infected users as how many devices they sell,” Stone said. “That’s why it’s a scarier prospect and I really hope more researchers join us in vetting these processes.” • 17 Photos
Lead in ‘tap-water’ in ancient Rome up to 100 times more than local spring waters © 2016 Phys.org Painting by Joseph Mallord William Turner (between 1817 and 1820) Vesuvius in Eruption, watercolor. Credit: Yale Center for British Art. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. To bring water to cities, the early Romans built vast waterworks systems using aqueducts and lead pipes—the water that was delivered, unbeknownst to the Romans, contained some amount of lead which in addition to making its way into the bodies of those who drank it, also made it into the ground or other water systems via sewage. In the case of the cities and towns around Naples, sewage was piped to certain locations where it was dumped directly into the harbor which resulted in sediment build up, some of which contained lead particles. Modern researches studying sediment cores can analyze the different layers of sediment and note the different amounts of lead in it and the differences in the types of lead, which can offer information about the amount of water brought into the system, and in this case, the changes to the system that came about.In studying their sediment core samples taken from the harbor, the researchers found marked changes in lead particles immediately after Mount Vesuvius erupted, likely, they suggest, because the eruption either clogged pipes, or destroyed some of the water delivery system. Differences in isotopic composition, they noted suggested lead pipes had been brought in from different locations to replace those that had been damaged. They noted also that the original water system had remained in place for approximately 15 years after the eruption before it was finally replaced. The team also found evidence of a continually expanding water system until approximately the fifth century, when natural disasters and invasions led to a sharp decline in upgrades.The researchers suggest their techniques could be used in other parts of the world, not just the area once covered by the Roman Empire—to better understand population changes, or other events that had an impact on the people that lived there. More information: Hugo Delile et al. A lead isotope perspective on urban development in ancient Naples, Proceedings of the National Academy of Sciences (2016). DOI: 10.1073/pnas.1600893113AbstractThe influence of a sophisticated water distribution system on urban development in Roman times is tested against the impact of Vesuvius volcanic activity, in particular the great eruption of AD 79, on all of the ancient cities of the Bay of Naples (Neapolis). Written accounts on urbanization outside of Rome are scarce and the archaeological record sketchy, especially during the tumultuous fifth and sixth centuries AD when Neapolis became the dominant city in the region. Here we show that isotopic ratios of lead measured on a well-dated sedimentary sequence from Neapolis’ harbor covering the first six centuries CE have recorded how the AD 79 eruption was followed by a complete overhaul of Neapolis’ water supply network. The Pb isotopic signatures of the sediments further reveal that the previously steady growth of Neapolis’ water distribution system ceased during the collapse of the fifth century AD, although vital repairs to this critical infrastructure were still carried out in the aftermath of invasions and volcanic eruptions. Journal information: Proceedings of the National Academy of Sciences Citation: Sediments in Gulf of Naples reveal impact on Roman water distribution after Vesuvius eruption (2016, May 17) retrieved 18 August 2019 from https://phys.org/news/2016-05-sediments-gulf-naples-reveal-impact.html Explore further (Phys.org)—A team of researchers with members from France, the U.S., the U.K. and Italy has found evidence of disruptions to the water delivery system in the area around Naples after the eruption of Mount Vesuvius in AD 79. In their paper published in Proceedings of the National Academy of Sciences, the team describes their testing of sediment cores taken from the harbor at Naples, what they found and what their study has revealed about the history of the area.