Mount your hard drive… on your RAM?

A weird place for an SSD. Apacer PC makers do all kinds of things to save space inside their cases, but this is a new one to us: Apacer  is apparently sampling sticks of DDR3 desktop RAM that include slots for M.2 SSD add-in boards and CFast  CompactFlash cards, allowing you to mount storage devices directly to your RAM rather than using slots on the motherboard. The slots will still use the SATA III interface to transfer data—they’re just mounted to the RAM and they draw power through the RAM slot. These sticks will support all three lengths of M.2 SSD boards (2242, 2260, and 2280). That’s especially useful because, as AnandTech points out , only one mini-ITX desktop motherboard can directly support full-length M.2 boards. Full-length M.2 boards are necessary to accommodate higher storage capacities—currently available drives top out at 512GB, but 1TB drives are on the horizon . Connectors visible on top of the DIMMs would likely need to be connected to the SATA connectors on your motherboard; unfortunately it doesn’t look like these can take advantage of the faster PCI-Express flavor of M.2. Read 2 remaining paragraphs | Comments

Read More:
Mount your hard drive… on your RAM?

What we judge when we judge freemium, and the money we’ve spent on Hearthstone

BagoGames Few people know what to make of the Kim Kardashian: Hollywood mobile game. By reputation it’s boring, vapid, materialistic, and shallow—according to many serious gamers—and is deplorable not least because players can spend money to get ahead. The wails only grew louder when reports indicated that the game earned $1.6 million in its first five days and is on track to make $200 million in annual revenue , according to one analyst. While many gamers and gaming journalists struggled to figure out why anyone would spend money on a game made by and featuring a reality TV star, we aren’t totally in the dark. For one, casting shade on the subject matter is a value judgment of a certain set of interests and lifestyle. And on a meta level,  how people use their leisure time . Let he who has lived every moment deliberately immersed in deep consideration of the universe cast the first Angry Bird. Materialism in games probably does not cause materialism in the streets . For another, Kim K is actually pretty self-aware of its own materialism and glorification of social climbing and has a sense of irony about the world it gives players to try and thrive in. To wit, one of the things you can spend in-game money on is new body parts. Read 25 remaining paragraphs | Comments

See original article:
What we judge when we judge freemium, and the money we’ve spent on Hearthstone

Chip-based credit cards are a decade old; why doesn’t the US rely on them yet?

Ciaran McGuiggan Earlier this week, mobile payments company Square announced that it had developed a credit card reader that will verify purchases from an embedded chip on the card. Currently, US consumers primarily rely on swipe-and-sign credit cards, which give card details to a merchant through the magnetic stripe on the back. But because the swipe-and-sign system became overburdened with instances of fraud, MasterCard, Visa, and other financial groups decided in 2012 that they would transition their systems to a chip-based setup called EMV (eponymous for EuroPay, MasterCard, and Visa, the three primary developers of the standard) by October 2015. Square is hoping to capitalize on this transition by being one of the first companies out of the gate in the US to offer small and medium-sized business owners a smaller, less-expensive alternative to buying a whole new set of credit card terminals. The EMV standard works using a chip that’s embedded in a credit card, which effectively acts as a mini-computer. Instead of swiping quickly and having your card give its details to a merchant’s point of sale (POS) system, an EMV card creates a unique code for each transaction and (ideally) requires the consumer to enter a PIN associated with the card instead of relying on a signature. Because of this, EMV is often called chip-and-PIN. Making a purchase with an EMV card also requires the card to be present in the card reader throughout the transaction. Read 15 remaining paragraphs | Comments

Visit site:
Chip-based credit cards are a decade old; why doesn’t the US rely on them yet?

Updated Qi 1.2 standard makes wireless charging more wireless

The Qi-compatible Nexus 5 on the Nexus Wireless Charger. New chargers will be able to increase the space between the device and the pad. Andrew Cunningham The Wireless Power Consortium’s Qi wireless charging standard is wireless in that the phone is not physically plugged into anything, but it still requires your device and the wireless charging pad to be touching each other to work. Today, the WPC announced ( PDF ) that version 1.2 of the Qi standard will add support for resonant charging, making it possible for your phone to be charged when near a Qi pad rather than directly on top of it. A small image showing Qi 1.2 in action. WPC It’s a minor enough change that current Qi 1.1 receivers will be able to take advantage of it with no extra hardware, but it opens up a few different possibilities for companies that want to build Qi support into their products. The WPC says that Qi chargers can now be embedded within tables and desks rather than placed on the surface, making them less obtrusive. “New low power transmitter designs” will make it easier to build Qi chargers into cars, and a single Qi 1.2 transmitter will be able to charge multiple Qi devices simultaneously.  Qi can also now supply up to 2,000 watts of power to household appliances (the release specifically mentions “kitchen applications”). Current Qi devices will be able to draw power from these new transmitters at distances of up to 30 mm (around 1.2 inches), while devices with purpose-build Qi 1.2 receivers increase the distance to 45 mm (about 1.8 inches). Engadget reports that the resonant version of Qi is roughly 70 to 80 percent efficient, while the old inductive version is around 85 percent efficient, and Qi 1.1 and 1.2 transmitters and receivers will be able to interoperate, so inductive charging pads like the Nexus Wireless Charger will still be able to charge Qi 1.2 phones. Just know that resonant charging will require a Qi 1.2 transmitter. Read 1 remaining paragraphs | Comments

More:
Updated Qi 1.2 standard makes wireless charging more wireless

Apple’s multi-terabit, $100M CDN is live—with paid connection to Comcast

dariorug Apple’s long-rumored content delivery network (CDN) has gone live in the US and Europe, delivering traffic directly to Comcast and other Internet service providers thanks to paid interconnection deals, Frost & Sullivan analyst Dan Rayburn reported today . The CDN can deliver multiple terabits of data per second and will help Apple more efficiently distribute new releases of iOS and OS X. Apple is still using Akamai and Level 3 CDN services for iTunes and app downloads, “but over time, much of that traffic will be brought over to Apple’s CDN,” Rayburn wrote. “It’s too early to know how much traffic will come over and when, but Apple’s already started using their own CDN much faster than I expected. The pace of their build out and amount of money they are spending on infrastructure is incredible. Based on my calculations, Apple has already put in place multiple terabits per second of capacity and by the end of this year, will have invested well more than $100M in their CDN build out.” Apple has been working on its CDN for about a year. Read 10 remaining paragraphs | Comments

More:
Apple’s multi-terabit, $100M CDN is live—with paid connection to Comcast

This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

Saurabh R. Patil When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran’s heavily fortified Natanz nuclear facility , trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can’t be detected by today’s defenses. Dubbed BadUSB, the hack reprograms embedded firmware to give USB devices new, covert capabilities. In a demonstration scheduled at next week’s Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers. A different drive will similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The presenters will demonstrate similar hacks that work against Android phones when attached to targeted computers. They say their technique will work on Web cams, keyboards, and most other types of USB-enabled devices. “Please don’t do anything evil” “If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin, told Ars. “Whatever it is, there could always be some code running in that device that runs maliciously. Every time anybody connects a USB device to your computer, you fully trust them with your computer. It’s the equivalent of [saying] ‘here’s my computer; I’m going to walk away for 10 minutes. Please don’t do anything evil.” Read 10 remaining paragraphs | Comments

Read More:
This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

Modbook’s next project is the convertible MacBook Apple won’t make

The Modbook Pro X would be an expensive entry in a crowded niche. Modbook Inc. Before the iPad, people who wanted an Apple tablet could buy something called the ” Modbook ” from a company named Axiotron. For $2,279, the company would take a regular white plastic MacBook, take it apart, and reassemble it inside a purpose-built tablet case with a Wacom digitizer and stylus installed. After some financial trouble and the launch of an actual Apple tablet , Axiotron became Modbook Inc. , and the company launched the Modbook Pro , which did for the 13-inch MacBook Pro what the Modbook did for the standard Macbook. Today the company is ready to announce the third iteration of the Modbook, kind of. The Modbook Pro X takes the 15-inch Retina MacBook Pro (including the refreshed models introduced yesterday ), makes some modifications to its specs, and puts it into a tablet case. Like past Modbooks, the Modbook Pro X is designed to appeal to artists and other creative professionals who would like to draw directly on their tablet screens without having to use a separate drawing tablet. The catch? This project currently exists  only as a Kickstarter project , with no guarantee the product will see the light of day if it doesn’t hit its $150,000 funding goal. The Modbook as a tablet. Modbook Inc. The Modbook Pro X will preserve all of the original ports and the CPU, GPU, and screen specs of the 2013 Retina MacBook Pro, crammed into a black tablet of indeterminate thickness and weight. The screen will be covered by a digitizer that supports 2,048 different pressure levels, and the Modbook will come with software installed to take advantage of the digitizer hardware. Optional “keybars,” small rows of keys mounted to the back of the tablet, will provide keyboard hotkey shortcuts that users can press without interrupting whatever they’re sketching onscreen. Read 6 remaining paragraphs | Comments

More:
Modbook’s next project is the convertible MacBook Apple won’t make

It’s not just Verizon: All major US carriers throttle “unlimited” data

Verizon Wireless One of the most common reactions to Verizon’s announcement that it will throttle the heaviest users of its “unlimited” 4G plans went something like this: “That’s the last straw, I’m switching to T-Mobile!” Unfortunately, switching to T-Mobile, AT&T, or Sprint won’t protect you from getting throttled, even if the carrier is claiming to sell you “unlimited” data. Let’s take a look at the relevant passages in each carrier’s terms and conditions. We’ll start with the Verizon Wireless announcement last week: Read 15 remaining paragraphs | Comments

Originally posted here:
It’s not just Verizon: All major US carriers throttle “unlimited” data

Bose accuses Beats of using patented noise-cancelling tech

Bose Corp. filed a lawsuit on Friday that accuses popular headphone maker Beats Electronics of infringing upon several of its patents. The suit claims that Bose lost sales because Beats—which Apple announced it would acquire for $3 billion in May—used patented noise-cancelling technology in its Studio and Studio Wireless headphone lines. Beats’ products that allegedly use the technology “can also be used for noise cancellation when no music is played, a feature that Beats also advertises,” the suit states. “Thus, Beats specifically encourages users to use the infringing functionality. Beats advertises no method to turn off features that cause end users to directly infringe.” Read 5 remaining paragraphs | Comments

Read this article:
Bose accuses Beats of using patented noise-cancelling tech

Model drone finds elderly man, missing for three days, alive

It took just 20 minutes for a model drone to locate a missing elderly Wisconsin man, a feat that helicopters, search dogs, and volunteers couldn’t accomplish in three days. Just don’t tell that to the Federal Aviation Administration, whose regulatory wings are already flapping about model drones. This weekend’s discovery of the 82-year-old man in an area of crops and woods comes amid a legal tussle between flight regulators and model drone operators—the latest of which coincidentally involves search-and-rescue missions. Read 10 remaining paragraphs | Comments

Read More:
Model drone finds elderly man, missing for three days, alive