Virtualization startup puts desktop apps seamlessly in the cloud

For software developers, cloud services solve all sorts of problems. They make it easy to ensure license compliance, they keep customers running up-to-date software, and they skip the need for downloads and installations. But cloud services also have their issues. It’s hard for cloud services to take advantage of local compute resources such as fast CPUs and powerful GPUs. A compute-intensive cloud service will need to buy a lot of computation. They also lack the vast array of rich, complex desktop applications that already exist. Starting today, a startup is aiming to create the best of both worlds with a cloud offering it’s describing as “Native as a service.” Numecent claims that it can take almost any desktop application and convert it into a cloud offering within a few hours. The software is delivered to end-user PCs using Numecent’s “cloudpaging” technology , which downloads applications on a piecemeal, as-needed basis. The downloaded portions of the application are retained client-side in an encrypted store. This enables Numecent to also enforce license conditions and prevent piracy. Read 4 remaining paragraphs | Comments        

Read the original:
Virtualization startup puts desktop apps seamlessly in the cloud

$99 ARM-based PC runs either Ubuntu or Android

A new ARM-based Linux PC with a host of capabilities—including Wi-Fi, Bluetooth, two Gigabit Ethernet jacks, and five USB ports—goes on sale next month starting at $99. ” Utilite , ” offered by Israeli company CompuLab, won’t be as cheap as a Raspberry Pi , but the specs justify the cost. With dimensions of 5.3” × 3.9” × 0.8”, Utilite comes with a Freescale i.MX6 system-on-chip with a single-, dual-, or quad-core ARM Cortex-A9 processor (which uses 3-8 watts of power). It will have up to 4GB of DDR3 1066MHz memory, up to 512GB of SSD storage, and a microSD slot allowing another 128GB. The PC can be purchased with either Ubuntu Linux or Android. Read 4 remaining paragraphs | Comments        

Read More:
$99 ARM-based PC runs either Ubuntu or Android

USB 3.0 continues to steal Thunderbolt’s thunder

PCs that use Thunderbolt are rare, and they’re getting rarer. Chris Foresman For Thunderbolt fans hoping that the high-speed interface will catch on, we’ve got more bad news: an Acer representative talking to CNET  has said that the company has no plans to support Thunderbolt in its PCs this year. Acer’s Aspire S5 Ultrabook was one of the few Windows laptops to include Thunderbolt support when it was introduced in early 2012. “We’re really focusing on USB 3.0—it’s an excellent alternative to Thunderbolt, ” said the Acer spokesperson. “It’s less expensive, offers comparable bandwidth, charging for devices such as mobile phones, and has a large installed base of accessories and peripherals.” By itself, the news of one company distancing itself from Thunderbolt might not be a big deal, but this is just another example of the trouble that Thunderbolt faces two-and-a-half years after its public introduction in the 2011 MacBook Pro. A Newegg search reveals a handful of high-end desktop motherboards that support it (five boards, all above $150), but the complete list of non-Apple prebuilt systems that have ever supported the interface is pretty short . Read 2 remaining paragraphs | Comments        

See the article here:
USB 3.0 continues to steal Thunderbolt’s thunder

Female scammer who taunted US authorities online finally caught in Mexico

A Southern California woman who mocked American authorities via Twitter—after having fled the country—was finally arraigned on Monday in a San Diego courtroom. Wanda Lee Ann Podgurski, 60, was arrested in Rosarito, Mexico on July 4, 2013. This was a month after she tweeted “ Catch me if you can , ” seemingly directed at San Diego District Attorney Bonnie Dumanis , apparently the only person Podgurski followed on Twitter at the time. A superior court judge sentenced Podgurski in absentia on June 21, 2013 to 20 years and four months in state prison. She was  convicted (PDF) of 29 felony counts stemming from an insurance fraud scam. Podgurski worked as a clerk for Amtrak and held health insurance policies with six different companies, then she filed claims with all of them after she declared that she was disabled from supposed fall in her home in August 2006. Read 5 remaining paragraphs | Comments

See the article here:
Female scammer who taunted US authorities online finally caught in Mexico

Verizon would end “century of regulation” by killing wireline phone, says NY AG

Hurricane Sandy caused widespread damage in Fire Island, New York. Fireisland.com New York Attorney General Eric Schneiderman this week accused Verizon of trying to “depart from a century of telephone service regulation” by ending wireline telephone service in a part of Fire Island devastated by Hurricane Sandy in October, 2012. In addition, Schneiderman has accused Verizon of violating a state order by telling customers outside of Fire Island that they should accept wireless phone service instead of repairs to their landline service. He says Verizon should be fined $100, 000 per customer, per day. Verizon says it has not violated the state order, and that its offer of wireless service outside Fire Island is strictly optional. Verizon is, however, trying to gain state approval to end wireline service entirely in western Fire Island. Read 19 remaining paragraphs | Comments

More:
Verizon would end “century of regulation” by killing wireline phone, says NY AG

Windows 8.1 to go RTM in “late August”

During its Worldwide Partner Conference in a rainy and humid Houston today, Windows CFO Tami Reller announced that Windows 8.1, the free update to Windows 8, will be made available to OEMs by “late August, ” with devices reaching the market by the holiday season. Windows 8 was released to manufacturing on August 1, 2012. Microsoft is promoting a faster release cadence across its entire range of products, and Windows 8.1 is arguably the first mass-market consumer product from the company that will benefit from this new release schedule. Read on Ars Technica | Comments

Read More:
Windows 8.1 to go RTM in “late August”

Mass-login attack on Nintendo fan site hijacks 24,000 accounts

Almost 24, 000 user accounts on Nintendo’s main fan site have been hijacked in a sustained mass-login attack that began early last month, the company said. The wave of attacks on Club Nintendo exposed personal information associated with 23, 926 compromised accounts, including users’ real names, addresses, phone numbers and e-mail addresses, according to a press release Nintendo issued over the weekend. The campaign began on June 9 and attempted more than 15.5 million logins over the following month. Attackers likely relied on a list of login credentials taken from a site unrelated to Nintendo. Club Nintendo offers rewards to Nintendo customers in exchange for having them register their products, answer surveys, and provide personal data. The site operates internationally and has about four million users in Japan, the primary region of most affected users. Things came to a head on July 2, when the wave of logins crested. By Friday, July 5, Nintendo had reset passwords on the site. Read 2 remaining paragraphs | Comments

View the original here:
Mass-login attack on Nintendo fan site hijacks 24,000 accounts

Attackers sign malware using crypto certificate stolen from Opera Software

Alan Cleaver Hackers penetrated network servers belonging to Opera Software, stole at least one digital certificate, and then used it to distribute malware that incorrectly appeared to be published by the browser maker. The attack was uncovered, halted, and contained on June 19, according to a short advisory  that Opera published Wednesday morning. While administrators have cleaned the system and have yet to find any evidence of any user data being compromised, the breach still had some troubling consequences. “The attackers were able to obtain at least one old and expired Opera code signing certificate, which they have used to sign some malware,” Wednesday’s advisory stated. “This has allowed them to distribute malicious software which incorrectly appears to have been published by Opera Software or appears to be the Opera browser. It is possible that a few thousand Windows users, who were using Opera between June 19 from 1.00 and 1.36 UTC , may automatically have received and installed the malicious software.” Read 3 remaining paragraphs | Comments

Original post:
Attackers sign malware using crypto certificate stolen from Opera Software