Aug 282012
 

Apple has now identified eight of Samsung’s devices that it wants to have banned from sale in the US following its patent victory last week. But while the jury in Apple’s court case against Samsung said Samsung had willfully infringed in most cases, Apple has apparently focused its attention on devices that are mostly unavailable in the US already.

Apple’s list of devices it wants to ban, published on Monday afternoon, is as follows:

Galaxy S 4G

Galaxy S2 AT&T

Galaxy S2 Skyrocket

Galaxy S2 T-Mobile

Galaxy S2 Epic 4G

Galaxy S Showcase

Droid Charge

Galaxy Prevail

MORE: Ban this: Apple lists 8 Samsung devices it wants kept out of the US | Ars Technica.

 


Aug 282012
 

The bulk of the companies here at the Republican National Convention are traditional media firms with dedicated spaces for their reporters to crank out stories about the big event. Then there are Twitter and Facebook. The two social media outfits are sharing a space upstairs and around the corner from a much larger area rented out by Bloomberg.

And why not? More and more, when people look for political information or post politics-related content, they do it on both platforms. The company names are synonymous with social media, and that’s partially why Twitter and Facebook decided to bunk together here at the RNC.

“We’re both here with the same mission. Our goals here are the same – to facilitate open engagement,” said Adam Sharp, who heads up Government, News, and Social Innovation at Twitter. “Obviously our companies have ways in which we compete, but it’s not a zero sum game,” continued Sharp.

Meanwhile Google – one of the only other “non-media” firms here (if it can still be called that) – has taken over a massive space on the main floor of the Tampa Convention Center, complete with primary colored walls, interactive experiences, and a coffee bar dishing out free cappuccinos for the caffeine-quaffing journalists embedded nearby.

MORE:  Twitter and Facebook Get Cozy at Republican Convention | ClickZ.

 


Aug 272012
 

Freelancing in web design and development is often a balancing act. You must carefully divide your time between doing work, getting more work, and ensuring you’re getting paid for said work. For each of these tasks, a huge range of tools exists – but it’s tough to know whether you’re using the best ones available.

We asked a number of leading designers to provide us with their favourites, so you can ensure your survival toolkit is the equivalent of a super-powered laser-armed jetpack, rather than a digital abacus.

In terms of approach, two distinct methodologies are clear. Some people, such as freelance web designer John Alex Jacob, favour a pared-down toolkit: “The way I do business has changed a lot this past year,” he tells .net. “I’ve been trying to keep things as simple as possible for my clients and me, improve efficiency and avoid unnecessary distractions while working.” He therefore advocates minimising what’s installed on your computer.

Others, however, advise exploring the diverse range of single-task indie apps and online services now available, in order to potentially boost productivity. Regardless of your own approach, we hope you find inspiration and exciting new tools in the selections provided by those we spoke to.

MORE:  The ultimate freelance web design tools | Feature | .net magazine.

 


Aug 272012
 

A vulnerability in the latest version of Oracle’s Java software framework is under active attack, and the damage is likely to get worse thanks to the availability of reliable exploit code that works on a variety of browsers and computer platforms, security experts warn.

The flaw in Java version 1.7 was reported on Sunday afternoon by FireEye security researcher Atif Mushtaq. A separate post published on Monday by researchers Andre M. DiMino and Mila Parkour said the number of attacks, which appear to install the Poison Ivy Remote Access Trojan, were low. But they went on to note that the typical delay in issuing Java patches, combined with the circulation of exploit code, meant it was only a matter of time until the vulnerability is exploited more widely by other attackers.

Members of Rapid7, the security company that helps maintain the open-source Metasploit exploit framework used by penetration testers and hackers, said they have already developed an exploit that works against Windows 7. They are in the process of testing it against the Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome browsers running on other operating systems, including Ubuntu Linux 10.04 and Windows XP. They went on to suggest that users should disable Java until a patch plugging the gaping hole is released.

“As a user, you should take this problem seriously, because there is currently no patch from Oracle,” a Rapid7 exploit developer wrote in a blog post. “For now, our recommendation is to completely disable Java until a fix is available.”

MORE:  Critical flaw under active attack prompts calls to disable Java | Ars Technica.

 


Aug 232012
 

Our recent feature on the growing vulnerability of passwords chronicled the myriad ways crackers extract clues used to guess other people’s login credentials. Add to that list a password reminder feature built in to recent versions of Microsoft’s Windows operating system.

It turns out the password clues for Windows 7 and 8 are stored in the OS registry in a scrambled format that can be easily converted into human-readable form. That information would undoubtedly be useful to hackers who intercept a cryptographic hash of a targeted computer, but are unable to crack it. Jonathan Claudius, the SpiderLabs vulnerability researcher who documented the new Windows behavior, has written a script that automates the attack and added it to Metasploit, an open-source toolkit popular among whitehat and blackhat hackers alike.

The clue is added to the OS registry when users configure a Windows account to provide a hint about the password needed to access it. When he first saw the long string of letters and numbers that stored the hint, he thought it had been encrypted. Upon further examination, he learned that an eight-line Ruby script quickly decoded the text chunks.

MORE:  Password hints easily extracted from Windows 7, 8 | Ars Technica.

 


Aug 222012
 

We all know food, drink and technology don’t mix, yet dusty and crumb-filled keyboards are rampant in households and offices across the world. To help out on the housekeeping front, Logitech today unveiled a new PC keyboard — the Logitech Washable Keyboard K310 — that could spell the end of the dirty QWERTY.

The K310, which Logitech says can tolerate anything from “a light dusting to a rinse in the kitchen sink,” can be washed multiple times and can be submerged in up to 11 inches of water, and then left out to dry.

MORE:  Logitech comes clean with $40 washable keyboard | Tech Culture – CNET News.

 


Aug 212012
 

Traditional platter-based hard drives and solid state flash drives might dominate the storage landscape today, but in the future, you’ll be storing more data than you could possibly sift through within your very own DNA.

George Church and Sri Kosuri, two Harvard Wyss Institute scientists, have successfully demonstrated a process by which it’s possible to store 700TB of data in one gram of DNA.

At the moment, the stashing and unstashing process for DNA data isn’t exactly simple. Once you’ve translated your binary data into the right sequence of DNA base pairs (A and C for zeros, T and G for ones), you have to turn all of those sequences into DNA itself. Doing so involves standard laboratory techniques, but it takes a while: several days to convert 675 KB of text, pictures, and Javascript into 55,000 DNA strands. Reading it out again with a gene sequencer (another now-standard laboratory technique) takes even longer, and neither the read process nor the write process are particularly cheap, which is why you’d only really want to use DNA storage for archival purposes.

MORE:  Scientists figure how to store 700TB of data in one gram of DNA | DVICE.

 


Aug 152012
 

It’s not just customers who are drifting away from their laptops and desktops to do everything on mobile devices. More and more, entrepreneurs are cutting the bulky power cord and conducting business on the go. Thanks to tablets and the ever-growing selection of mobile apps that’s easy to do.

We asked 10 successful entrepreneurs to share the apps that boost their business productivity. Here are their top picks.

MORE:  10 Essential Tablet Apps for Business.

 


Aug 132012
 

C Spire Wireless, a small, southern wireless provider formerly known as Cellular South, has an ambitious plan to build a fast, 4G LTE network to reach its 900,000 customers. To do it, C Spire bought $192 million worth of 700 MHz wireless spectrum, which is considered some of the most valuable wireless spectrum that’s still available because it can travel long distances and penetrate obstacles.

But there’s a problem. C Spire claims it hasn’t been able to use this spectrum and hasn’t been able to deploy its 4G network. It says the bigger carriers, especially AT&T, have used their market power to ensure chip designers and device makers make equipment compatible with their flavor of the technology, leaving smaller carriers in the cold. And without devices and network gear, C Spire says it’s been sitting on a costly resource it can’t use — and thus can’t deliver to you, the consumer.

“We will deploy our 4G LTE network,” said Eric Graham, C Spire Wireless’ senior vice president for strategic relations. “But the fact that AT&T is using a different band plan [that is, a set of technical standards for equipment] in the 700 MHz spectrum has slowed things down. At least initially we’ll be using other spectrum other than the 700 MHz spectrum we bought for 4G. But eventually, we are going to need that spectrum to add more capacity to our network.”

In the wireless industry, it seems, you can never have too much spectrum. Even AT&T and Verizon Wireless, which together control about 70 percent of the wireless market, say they need more of it. But even if you have enough spectrum, as C Spire argues, the big guys can use their leverage with suppliers to make it darn difficult for you to use it.

Can you imagine what would happen if the industry giants further solidified their hold on the market by hoarding even more spectrum? Bad things, those underdogs would assure you, starting with higher costs for consumers and fewer innovations. And that, they say, is why regulators and judges need to intercede.

“We are at a critical time in the evolution of the wireless industry,” said Kathleen Ham, vice president of federal regulatory affairs for T-Mobile, in an interview with CNET. “And as we transition to 4G LTE, spectrum is a key part of the strategy and survival of every carrier. And it’s the duty of the regulators to ensure that we don’t end up with a market of spectrum haves and have-nots.”

MORE:  The coming wireless spectrum apocalypse and how it hits you | Mobile – CNET News.