Sep 122012
 

Google won’t be able to compete with the attention lavished on Apple for the launch of the sixth-generation iPhone, but it did announce the notable milestone late tonight of half a billion device activations.

“Today is a big day for Android… 500 million devices activated globally, and over 1.3 million added every single day,” said Hugo Bara, Android’s director of product management, in a Google+ post. It’s not clear how many devices are replacing older ones, though.

Barra said in June at the Google I/O show that 400 million Android devices had been activated and that the rate was 1 million per day.

MORE:  Google: 500 million Android devices activated | Mobile – CNET News.

 


Sep 122012
 

Cutting the cord is still an outlier activity. You have to do too much searching, use too many specialized devices, and configure too many settings to get what you want. But as devices from Google, Apple, Roku and others make internet delivery indistinguishable from cable and satellite delivery, we’re going to wake up one morning and find cord-cutting has gone completely mainstream. And those devices are pretty much already here.

All the advantages enjoyed by subscription TV today are melting away. In five years, those advantages will have been eliminated entirely. In a decade, many of today’s constraints will seem laughable. The idea that you had to pay for 400 other channels just because you wanted to watch a single show will be akin to paying for internet access by the hour.

Xfinity, Time Warner and their cohorts aren’t going anywhere anytime soon. But while the cable company of tomorrow may provide the pipes, it’s certain that it won’t provide the plan. In short, subscription TV is already dead. The body just hasn’t quit twitching yet.

MORE:  Cable’s Walls Are Coming Down.

 


Sep 122012
 

Most consumer technologies, when wielded correctly, are magnificent. But so are bagpipes. In the hands of someone who doesn’t know what they’re doing, technology can be an annoyance enabler. These 12 technologies are not the future we were hoping for.

Camera Flash

Here’s the deal with the flash on your camera: Most of the time it doesn’t help. You’re either too far away from the action or you’re too close. That photo you shot at the concert? Still dark. The flash didn’t help, and everyone within a four-foot radius is nightblind now. That photo from the girls’ night out where your friends were two feet away? The flash made them look like ghouls. Go to your smartphone or camera’s settings and turn off the flash. Do it now.

MORE:  12 of the World’s Most Annoying Technologies | Gadget Lab | Wired.com.

 


Sep 112012
 

In his statement, Wagner said that at “no time was any customer data at risk or were any of our systems compromised.” He also apologized to customers for the mishap and thanked them for their patience

What exactly caused the outage, however, is still unclear, and Wagner didn’t offer much in the way of specifics:

We have determined the service outage was due to a series of internal network events that corrupted router data tables. Once the issues were identified, we took corrective actions to restore services for our customers and GoDaddy.com. We have implemented measures to prevent this from occurring again.

MORE:  Go Daddy: Sorry about the outage. And no, it wasn’t a hack | Security & Privacy – CNET News.

 


Sep 102012
 

Browser maker Mozilla has patched a bug in the latest major version of Firefox that could have exposed the websites of those using the “Private Browsing” mode.

“Private Browsing,” a feature implemented in most modern browsers, allows users to browse the Web without leaving any trace of the websites visited on the user’s computer.

But shortly after the latest Firefox release was dished out to end-users, a bug report was filed to claim that any site visited while in the privacy-conscious mode “could be found through manual browser cache inspection,” according to Mozilla’s bug-reporting site Bugzilla.

Website addresses, page images, search queries, passwords and cookies — known as cached content — were stored by Firefox 15 when the browser privacy mode was enabled.

MORE:  Private browsing bug fixed in Firefox 15.0.1 | Internet & Media – CNET News.

 


Sep 102012
 

We’ve written before about the value of writing your README before your code, but what about when it comes to the actual code? Terse one-liners? Paragraph-long descriptions? How much is enough and when is it too much?

How to comment code is a perennial subject of debate for programmers, one that developer Zachary Voase recently jumped into, arguing that one of the potential flaws with extensive comments (or any comments really) is that they never seem to get updated when the code changes. “We forget,” writes Voase, “overlooking a comment when changing the fundamental behavior of semantics of the code to which it relates.”

Voase thinks the solution is in our text editors, which typically “gray out” comments, fading then into the background so we can focus on the actual code. We ought to do the opposite, he believes: Make the comments jump out. Looking at the visual examples on Voase’s post makes the argument a bit more compelling. Good text editors have configurable color schemes so it shouldn’t be too hard to give this a try and see if it improves your comments and your code.

Another approach is to treat comments as a narrative. Dave Winer recently mentioned comments in passing, writing about the benefits of using an outliner to handle comments since it makes it easy to show and hide them:

MORE:  The Best Way to Comment Your Code | Webmonkey | Wired.com.

 


Sep 062012
 

Adobe officially launched a new suite of marketing tools on Thursday called Adobe Social, which is intended to help users better measure and understand the return on investment they get from their social media campaigns.

With Adobe Social, marketers can monitor mentions for their brand on Facebook and Twitter, find out which customers are the key influencers on each of these networks and track how much revenue is being generated from specific social media campaigns and posts. The platform also makes it easier to target ads to certain audiences, personalize a website based on how the user interacts with it and even build apps for Facebook, effectively making it an all-in-one marketing tool for companies.

The company demoed some of these features at an event in Salt Lake City earlier this year, but Adobe Social has only been available in beta to a small group of customers since then. Starting today, the platform is available to the general public for purchase.

MORE:  Adobe Takes on Salesforce with Social ROI Tool.

 


Sep 042012
 

AntiSec hacker group claims it has in its possession over 12,000,000 Apple iOS Unique Device IDs, as well as other personal info from device owners. To prove it, it has released 1,000,001 UDIDs to the public.

The release, posted on Pastebin, also contains a detailed description of how the hackers allegedly obtained the IDs from FBI.

“During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of “NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc,” claims Antisec.

MORE:  Hackers Allegedly Leak 1 Million Apple Device IDs.

 


Sep 042012
 

With the exception of Google Fiber, the United States isn’t exactly breaking records when it comes to high-speed Internet policy. The National Broadband Plan, which was released two years ago, says that there should be a minimum level of service of at least 4Mbps for all Americans. Since then, not much has happened.

But across the pond in Ireland, Communications Minister Pat Rabbitte, has recently decided that that’s not nearly enough.

On Thursday, he outlined a new broadband plan for Ireland that puts the United States to shame. He says that half the population, largely in the urban and suburban cores, should have speeds of 70Mbps to 100Mbps, with service of at least 40Mbps to the next 20 percent of the country. Finally, hewrites, there should be a “minimum of 30Mbps for every remaining home and business in the country—no matter how rural or remote.”

The measure in Ireland is part of the European Union’s Digital Agenda for Europe, which, among other things, requires member states to publish national broadband plans by the end of the year to bring a minimum level of 30Mbps service to all citizens by 2020.

MORE:  Ireland calls for minimum Internet speeds of 30Mbps | Ars Technica.

 


Aug 292012
 

Last week’s feature explaining why passwords are under assault like never before touched a nerve with many Ars readers, and with good reason. After all, passwords are the keys that secure Web-based bank accounts, sensitive e-mail services, and virtually every other facet of our online life. Lose control of the wrong password and it may only be a matter of time until the rest of our digital assets fall, too.

Take, for example, the hundreds of millions of WiFi networks in use all over the world. If they’re like the ones within range of my office, most of them are protected by the WiFi Protected Access or WiFi Protected Access 2 security protocols. In theory, these protections prevent hackers and other unauthorized people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. I was curious how easy it would be to crack these passcodes using the advanced hardware menus and techniques that have become readily available over the past five years. What I found wasn’t encouraging.

First, the good news. WPA and WPA2 use an extremely robust password-storage regimen that significantly slows the speed of automated cracking programs. By using the PBKDF2 key derivation function along with 4,096 iterations of SHA1 cryptographic hashing algorithm, attacks that took minutes to run against the recent LinkedIn and eHarmony password dumps of June would require days or even weeks or months to complete against the WiFi encryption scheme.

What’s more, WPA and WPA2 passwords require a minimum of eight characters, eliminating the possibility that users will pick shorter passphrases that could be brute forced in more manageable timeframes. WPA and WPA2 also use a network’s SSID as salt, ensuring that hackers can’t effectively use precomputed tables to crack the code.

That’s not to say wireless password cracks can’t be accomplished with ease, as I learned firsthand.

MORE:  How I cracked my neighbor’s WiFi password without breaking a sweat | Ars Technica.