Nvidia turns on 1080p 60 FPS streaming for its Grid cloud gaming service

Starting today, Nvidia has enabled 1080p 60 FPS streaming from its Grid cloud gaming service . To use the new mode, you need to be part of the public Shield Hub beta group , have a Shield device, and at least a 30Mbps connection to the Internet. For the moment, around 35 Grid games support 1080p60 streaming, with Nvidia promising that rest (another 14 at the moment) will get a resolution bump after a server-side hardware refresh. Nvidia won’t say what that hardware refresh entails, but did confirm that its servers would be using the same Kepler-based Grid GPUs. Grid streaming remains free until June 30, after which Nvidia will offer a paid-for premium tier in addition to the free service. While Nvidia still won’t spill the beans on exactly what the premium tier gets you, or how much it’ll cost, we can confirm that 1080p streaming will not require a premium subscription. Read 4 remaining paragraphs | Comments

Excerpt from:
Nvidia turns on 1080p 60 FPS streaming for its Grid cloud gaming service

AT&T to fix Internet congestion before it can be hit with complaint

With a month left before net neutrality complaints can be filed to the Federal Communications Commission, Internet service providers are continuing to sign agreements to prevent network congestion and a potential scolding from regulators. The latest agreement was announced today between AT&T and Level 3 , an Internet backbone operator that has accused broadband providers like AT&T of not upgrading interconnection points, allowing Internet performance for consumers to be degraded. A month ago, Level 3 told National Journal  that it was “evaluating our options” and “still experiencing interconnection point congestion as some large consumer ISPs continue to attempt to leverage control over access to their users to extract arbitrary tolls.” While the FCC’s net neutrality order  bans paid prioritization of traffic after it enters providers’ networks, it doesn’t ban payments for interconnection, which happens at the edges of the network. However, the FCC set up a complaint process so it can decide whether particular demands are unreasonable and prod companies into providing enough capacity to prevent Internet slowdowns. Complaints can be filed beginning June 12. Read 3 remaining paragraphs | Comments

Original post:
AT&T to fix Internet congestion before it can be hit with complaint

In rare move, Silicon Valley county gov’t kills stingray acquisition

The Santa Clara County Board of Supervisors has halted a plan to approve the purchase of a cell-site simulator , better known as a stingray. The secretive surveillance devices can be used to determine a phone’s location, but they can also intercept calls and text messages. During the act of locating a phone, stingrays also sweep up information about nearby phones—not just the target phone. Earlier this year, Ars reported on how the FBI is actively trying to “prevent disclosure” of how these devices are used in local jurisdictions across America. The move, happening in one of the primary counties in Silicon Valley, marks an unusual occasion that a local government has turned away from federal funds that would be used to acquire such a device. The device was approved initially during a February 24, 2015 meeting, despite a testy exchange between the Santa Clara Sheriff’s Office and Supervisor Joe Simitian, a former state senator with a penchant for an interest in privacy issues. Simitian’s office didn’t immediately respond to Ars’ request for comment. Read 19 remaining paragraphs | Comments

Follow this link:
In rare move, Silicon Valley county gov’t kills stingray acquisition

How Selerity reported Twitter’s earnings—before Twitter did

Selerity reported Twitter’s Q1 2015 quarterly earnings results On April 28, 2015. #BREAKING : Twitter $TWTR Q1 Revenue misses estimates, $436M vs. $456.52M expected — Selerity (@Selerity) April 28, 2015 Besides the news itself (Twitter’s revenues were disappointing to some investors) the event was noteworthy because it occurred at 3:07 pm New York time—almost an hour before the close of trading . While it’s rare for companies to release during market-hours there is no official policy prohibiting it and early announcements do happen occasionally. In the case of Twitter’s earnings, it was apparently the result of an accident by NASDAQ’s investor relations subsidiary , Shareholder.com. Most of the media coverage to date has focused on the process by which Selerity obtained the earnings press release so quickly. Some of that coverage has been speculative or inaccurate. In particular it’s important to understand that this was not a “hack.” That term implies a circumvention of laws or privacy, something Selerity would never do. Nor was it a “leak” by Selerity—it had already been published in the expected manner in the expected location. It was just early. We did not “guess” the URL that contained Twitter’s quarterly earnings results. Anyone with a web-browser and an Internet connection could have followed the links from the main investor relations page to the same PDF file that Selerity found. Read 27 remaining paragraphs | Comments

See more here:
How Selerity reported Twitter’s earnings—before Twitter did

Boeing 787 Dreamliners contain a potentially catastrophic software bug

A software vulnerability in Boeing’s new 787 Dreamliner jet has the potential to cause pilots to lose control of the aircraft, possibly in mid-flight, Federal Aviation Administration officials warned airlines recently. The bug—which is either a classic integer overflow or one very much resembling it—resides in one of the electrical systems responsible for generating power, according to memo the FAA issued last week . The vulnerability, which Boeing reported to the FAA, is triggered when a generator has been running continuously for a little more than eight months. As a result, FAA officials have adopted a new airworthiness directive (AD) that airlines will be required to follow, at least until the underlying flaw is fixed. “This AD was prompted by the determination that a Model 787 airplane that has been powered continuously for 248 days can lose all alternating current (AC) electrical power due to the generator control units (GCUs) simultaneously going into failsafe mode,” the memo stated. “This condition is caused by a software counter internal to the GCUs that will overflow after 248 days of continuous power. We are issuing this AD to prevent loss of all AC electrical power, which could result in loss of control of the airplane.” Read 2 remaining paragraphs | Comments

Link:
Boeing 787 Dreamliners contain a potentially catastrophic software bug

Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Less than 24 hours after Google unveiled a Chrome extension that warns when user account passwords get phished , a security researcher has devised a drop-dead simple exploit that bypasses it. This benign proof-of-concept exploit looks almost identical to a Google login page, and is typical of a malicious phishing page that attempts to trick people into entering their user name and password. If Google’s freely available Password Alert extension was better designed, it would provide a warning as soon as someone tried to log into the page with their Google password. Instead, the warning is completely suppressed. (Note: although Ars fully trusts the researcher, readers are strongly advised not to enter passwords for Google accounts they use for anything other than testing purposes.) A video of the bypass exploit is here Bypassing Google’s Password Alert “Protection” “It beggars belief,” Paul Moore, an information security consultant at UK-based Urity Group who wrote the exploit, told Ars. “The suggestion that it offers any real level of protection is laughable.” He went on to say Google would do better devoting its resources to supporting the use of password managers, since most of them provide much more effective protections against phishing attacks. Read 3 remaining paragraphs | Comments

More:
Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Spam-blasting malware infects thousands of Linux and FreeBSD servers

Several thousand computers running the Linux and FreeBSD operating systems have been infected over the past seven months with sophisticated malware that surreptitiously makes them part of a renegade network blasting the Internet with spam, researchers said Wednesday. The malware likely infected many more machines during the five years it’s known to have existed. Most of the machines infected by the so-called Mumblehard malware are believed to run websites, according to the 23-page report issued by researchers from antivirus provider Eset. During the seven months that they monitored one of its command and control channels, 8,867 unique IP addresses connected to it, with 3,000 of them joining in the past three weeks. The discovery is reminiscent of Windigo, a separate spam botnet made up of 10,000 Linux servers that Eset discovered 14 months ago. The Mumblehard malware is the brainchild of experienced and highly skilled programmers. It includes a backdoor and a spam daemon , which is a behind-the-scenes process that sends large batches of junk mail. These two main components are written in Perl and they’re obfuscated inside a custom “packer” that’s written in assembly , an extremely low-level programming language that closely corresponds to the native machine code of the computer hardware it runs on. Some of the Perl script contains a separate executable with the same assembly-based packer that’s arranged in the fashion of a Russian nesting doll. The result is a very stealthy infection that causes production servers to send spam and may serve other nefarious purposes. Read 7 remaining paragraphs | Comments

See original article:
Spam-blasting malware infects thousands of Linux and FreeBSD servers

170-year-old champagne provides clues to past winemaking

Divers discovered bottles in a shipwreck off the Finnish Aland archipelago in the Baltic Sea in 2010. After tasting the bottles on site, the divers realized they were likely drinking century-old champagne. Soon after, 168 unlabeled bottles were retrieved and were identified as champagnes from the Veuve Clicquot Ponsardin (VCP), Heidsieck, and Juglar (known as Jacquesson since 1832) champagne houses. A few of the recovered bottles had been lying horizontal in close-to-perfect slow aging conditions. Discovery of these wines, likely the oldest ever tasted, unleashed a flood of questions. When were these wines produced? What winemaking processes were in use at the time? Where was the wine going when the shipwreck occurred? An analytic approach A team of scientists gathered to search for the answers through the application of current analytical techniques, an approach called archaeochemistry. Using a combination of targeted and nontargeted modern chemical analytic approaches, the researchers aimed to uncover aspects of the winemaking practices. Read 14 remaining paragraphs | Comments

See more here:
170-year-old champagne provides clues to past winemaking

Solar powered Blue Cell provides cellular backhaul without wires

As we mentioned in our earlier coverage of LINK , Bell Labs is expecting that the near future will bring a lot of growth in cellular devices, like smart appliances and sensors. Part of its solution to this flood of new devices is to give them their own chunk of the spectrum to keep them from getting in the way of user-driven devices, like phones and tablets. But that’s only part of the solution; phone and tablet traffic is going to climb as well. The solution there is simply to create more cells so that there are fewer devices talking to a single base tower. But adding more access points isn’t a simple matter. Each requires power and a network connection, and constructing large towers can be a headache of siting permits and contracts. To address this, a research effort at Bell Labs called “Blue Cell” is attempting to simplify cellular access points by getting rid of the wires. As solar panel prices have plunged, getting rid of the power cord has gotten a lot easier. Of course, siting a large solar panel can be just as much trouble as siting a cell phone tower, so one of the major goals of the research was to reduce the energy requirements of a cellular access point. Examining the existing hardware, engineers found that the biggest energy draw was the digital signal processor, which converts the cellular signal into something that can be sent over network cables. Read 3 remaining paragraphs | Comments

Originally posted here:
Solar powered Blue Cell provides cellular backhaul without wires

Verizon’s new “Custom TV” is small step toward a la carte pricing

The dreaded pay-TV bundles that result in US homes watching only about 10 percent of the channels they pay for aren’t going away any time soon, but Verizon’s FiOS TV service is taking a small step in the right direction. Starting Sunday, new and existing FiOS customers will be able to choose from new “Custom TV” bundles that offer more flexibility and could (depending on one’s interests) save subscribers a bit of money. Verizon’s new Custom TV pricing, available beginning Sunday. 6 more images in gallery “It’s a simple way for customers to choose the types of channels they want without paying for those they don’t,” Verizon said in a description of the new pricing system that was e-mailed to reporters. Read 9 remaining paragraphs | Comments

Read this article:
Verizon’s new “Custom TV” is small step toward a la carte pricing