Comcast to pay you $20 each time a technician is late for an appointment [Updated]

UPDATE : After publication, we learned Comcast has been making the $20 guarantee for more than two years  before this week’s announcement. The other parts of the announcement, including the hiring boost, store renovations, and changes to technology and training, appear to be new. Comcast is once again pledging to overhaul its legendarily bad customer service, hiring more than 5,500 new customer service employees and making “major investments in technology and training,” the company announced yesterday . Part of the hiring boost will add “hundreds of additional technicians across the country,” with a goal to always be on time for customer appointments by Q3 2015, sometime between July and August. To prove how serious it is, Comcast is making a new promise: “If a technician doesn’t arrive on time for an appointment, Comcast will automatically credit the customer $20,” the cable company said. Read 4 remaining paragraphs | Comments

Visit link:
Comcast to pay you $20 each time a technician is late for an appointment [Updated]

Blackboard Chalk Isn’t Really Chalk at All

Ubiquitous in many classrooms since the 19th century, chalk and chalkboards are familiar to most of us. White, powdery and prone to sticking to those surfaces where it is put (and just as easy to wipe away), chalk and its accompanying board are excellent instructional aids. Notably, however, most chalk today isn’t technically chalk at all, but gypsum. Read more…

More here:
Blackboard Chalk Isn’t Really Chalk at All

How Selerity reported Twitter’s earnings—before Twitter did

Selerity reported Twitter’s Q1 2015 quarterly earnings results On April 28, 2015. #BREAKING : Twitter $TWTR Q1 Revenue misses estimates, $436M vs. $456.52M expected — Selerity (@Selerity) April 28, 2015 Besides the news itself (Twitter’s revenues were disappointing to some investors) the event was noteworthy because it occurred at 3:07 pm New York time—almost an hour before the close of trading . While it’s rare for companies to release during market-hours there is no official policy prohibiting it and early announcements do happen occasionally. In the case of Twitter’s earnings, it was apparently the result of an accident by NASDAQ’s investor relations subsidiary , Shareholder.com. Most of the media coverage to date has focused on the process by which Selerity obtained the earnings press release so quickly. Some of that coverage has been speculative or inaccurate. In particular it’s important to understand that this was not a “hack.” That term implies a circumvention of laws or privacy, something Selerity would never do. Nor was it a “leak” by Selerity—it had already been published in the expected manner in the expected location. It was just early. We did not “guess” the URL that contained Twitter’s quarterly earnings results. Anyone with a web-browser and an Internet connection could have followed the links from the main investor relations page to the same PDF file that Selerity found. Read 27 remaining paragraphs | Comments

See more here:
How Selerity reported Twitter’s earnings—before Twitter did

Boeing 787 Dreamliners contain a potentially catastrophic software bug

A software vulnerability in Boeing’s new 787 Dreamliner jet has the potential to cause pilots to lose control of the aircraft, possibly in mid-flight, Federal Aviation Administration officials warned airlines recently. The bug—which is either a classic integer overflow or one very much resembling it—resides in one of the electrical systems responsible for generating power, according to memo the FAA issued last week . The vulnerability, which Boeing reported to the FAA, is triggered when a generator has been running continuously for a little more than eight months. As a result, FAA officials have adopted a new airworthiness directive (AD) that airlines will be required to follow, at least until the underlying flaw is fixed. “This AD was prompted by the determination that a Model 787 airplane that has been powered continuously for 248 days can lose all alternating current (AC) electrical power due to the generator control units (GCUs) simultaneously going into failsafe mode,” the memo stated. “This condition is caused by a software counter internal to the GCUs that will overflow after 248 days of continuous power. We are issuing this AD to prevent loss of all AC electrical power, which could result in loss of control of the airplane.” Read 2 remaining paragraphs | Comments

Link:
Boeing 787 Dreamliners contain a potentially catastrophic software bug

Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Less than 24 hours after Google unveiled a Chrome extension that warns when user account passwords get phished , a security researcher has devised a drop-dead simple exploit that bypasses it. This benign proof-of-concept exploit looks almost identical to a Google login page, and is typical of a malicious phishing page that attempts to trick people into entering their user name and password. If Google’s freely available Password Alert extension was better designed, it would provide a warning as soon as someone tried to log into the page with their Google password. Instead, the warning is completely suppressed. (Note: although Ars fully trusts the researcher, readers are strongly advised not to enter passwords for Google accounts they use for anything other than testing purposes.) A video of the bypass exploit is here Bypassing Google’s Password Alert “Protection” “It beggars belief,” Paul Moore, an information security consultant at UK-based Urity Group who wrote the exploit, told Ars. “The suggestion that it offers any real level of protection is laughable.” He went on to say Google would do better devoting its resources to supporting the use of password managers, since most of them provide much more effective protections against phishing attacks. Read 3 remaining paragraphs | Comments

More:
Behold: the drop-dead simple exploit that nukes Google’s Password Alert

AT&T/DirecTV merger likely to be approved

Despite Comcast abandoning  its Time Warner Cable (TWC) purchase in the face of government opposition, mergers of Internet and TV providers are still on the table. AT&T’s proposed $48.5 billion acquisition of DirecTV is likely to win approval from the Federal Communications Commission,  The Wall Street Journal reported . And TWC could still be acquired, but by Charter Communications instead of Comcast. The FCC hasn’t publicly revealed its position on AT&T’s attempt to buy the satellite TV provider. But despite opposing Comcast/TWC, the commission “sees the AT&T deal as helping competition and aiding the spread of broadband into rural areas that lack service, people familiar with the matter said,” according to the Journal report. FCC officials haven’t yet finalized concessions that AT&T would make in exchange for approval, “but the commission’s staff is inclined to recommend the approval of the deal.” Read 6 remaining paragraphs | Comments

Excerpt from:
AT&T/DirecTV merger likely to be approved

Intel’s Compute Stick: A full PC that’s tiny in size (and performance)

Specs at a glance: Intel Compute Stick STCK1A32WFC OS Windows 8.1 with Bing 32-bit CPU 1.33GHz quad-core Intel Atom Z3735F (Turbo Boost up to 1.83GHz) RAM 2GB 1333MHz DDR3 (non upgradeable) GPU Intel HD Graphics (integrated) HDD 32GB eMMC SSD Networking 2.4GHz 802.11n Wi-Fi, Bluetooth 4.0 Ports 1x USB 2.0, microSD, micro USB (for power) Size 4.06” x 1.46” x 0.47” (103 x 37 x 12mm) Other perks Lock slot Warranty 1 year Price ~$150, ~$110 for Ubuntu Linux version with 1GB of RAM and 8GB of storage Our appreciation of mini desktop PCs is well-documented at this point . In the age of the smartphone and the two-pound laptop, the desktop PC is perhaps the least exciting of computing devices, but there are still plenty of hulking desktop towers out there, and many of them can be replaced by something you can hold in the palm of your hand. Intel’s new Compute Stick, available for about $150 with Windows 8.1 and $110 with Ubuntu 14.04 LTS, takes the mini desktop concept about as far as it can go. The Stick isn’t even really a “desktop” in the traditional sense, since it’s an HDMI dongle that hangs off the back of your monitor instead of sitting on your desk. It’s not very powerful, but the Compute Stick is one of the smallest Windows desktops you can buy right now. Let’s take a quick look at what it’s capable of. Read 19 remaining paragraphs | Comments

Link:
Intel’s Compute Stick: A full PC that’s tiny in size (and performance)

Microsoft’s Office 365 “lockbox” gives customers last word on data access

One of the concerns that keeps many companies from adopting software-as-a-service for e-mail and other collaboration services has been the issue of who has control over the security of the content. Today at the RSA Conference, Microsoft is announcing changes to its Office 365 service that will allay some of those concerns, giving customers greater visibility into the security of their applications and control over what happens with them. At the same time, it will potentially be harder for government agencies and law enforcement to secretly subpoena the contents of an organization’s e-mail. In an interview with Ars, Microsoft’s general manager for Office 365 Julia White outlined the three new features, which are being announced in a blog post from Office 365 team Corporate Vice President Rajesh Jha today . Office 365 will now include a “Customer Lockbox” feature that puts customer organizations in control of when Microsoft employees can gain access to their data, requiring explicit permission from a customer before systems can be accessed to perform any sort of service on their Office 365 services. The capability will be turned on by the end of 2015 for e-mail and for SharePoint by the end of the first quarter of 2016. “We have automated everything we can to prevent the need for our people having to touch customer data,” White told Ars. “It’s almost zero—there are very rare instances when a Microsoft engineer has to log in to a customers’ services. Now we’re going to, in those rare instances, make customer approval mandatory to do so.” That would also apply to law enforcement requests for access, White acknowledged. “When the customer opts into the Lockbox, all requests would go into that process. So it’s a customer assurance of transparency. We want to systematically look at what kind of control and transparency customers want and provide it to them,” White said. Read 2 remaining paragraphs | Comments

Original post:
Microsoft’s Office 365 “lockbox” gives customers last word on data access

Tech vs. terror: Drones and data fight a new battle against poachers

When night falls, danger unfolds at the uMkhuze Game Reserve. And while some of the world’s most deadly predators—ranging in size from hyenas to lions—coexist next to African elephants, giraffes, and more within this massive, 140 square mile natural area, they aren’t the only creatures out hunting at night. This particular section of the iSimangaliso Wetland Park in KwaZulu-Natal, South Africa plays host to one of the country’s most profitable, albeit illegal, industries: poaching. In Africa, it’s a $70 billion business. Organized crime rings dabbling in poaching often carry ties to other smuggling industries like narcotics and weapons; some even connect with terrorist organizations. In this specific target area, rhinos most often land in the criminal crosshairs, with over 3,800 killed in South Africa alone over the past seven years. Their horns allegedly sell for $65,000 per kilogram as poachers look to profit from ivory and rhino horn powder. On the evening of November 4, 2014, two poaching suspects entered the reserve. One carried a .458 caliber rifle outfitted with a silencer. A cane knife—a long, machete-like tool used for harvesting—may have also been involved. Nearly 80 rhinos had been poached already that year; more seemed destined for the tally. But by chance, four park rangers noticed suspicious movement while on foot patrol that evening. A firefight ensued. Read 30 remaining paragraphs | Comments

More:
Tech vs. terror: Drones and data fight a new battle against poachers

Solar powered Blue Cell provides cellular backhaul without wires

As we mentioned in our earlier coverage of LINK , Bell Labs is expecting that the near future will bring a lot of growth in cellular devices, like smart appliances and sensors. Part of its solution to this flood of new devices is to give them their own chunk of the spectrum to keep them from getting in the way of user-driven devices, like phones and tablets. But that’s only part of the solution; phone and tablet traffic is going to climb as well. The solution there is simply to create more cells so that there are fewer devices talking to a single base tower. But adding more access points isn’t a simple matter. Each requires power and a network connection, and constructing large towers can be a headache of siting permits and contracts. To address this, a research effort at Bell Labs called “Blue Cell” is attempting to simplify cellular access points by getting rid of the wires. As solar panel prices have plunged, getting rid of the power cord has gotten a lot easier. Of course, siting a large solar panel can be just as much trouble as siting a cell phone tower, so one of the major goals of the research was to reduce the energy requirements of a cellular access point. Examining the existing hardware, engineers found that the biggest energy draw was the digital signal processor, which converts the cellular signal into something that can be sent over network cables. Read 3 remaining paragraphs | Comments

Originally posted here:
Solar powered Blue Cell provides cellular backhaul without wires