France removes Internet cut-off threat from its anti-piracy law

This street art in eastern France reads: “Hadopi: The French Internet is under control!” mathias France finally put an end to the most extreme measure of its famous “three strikes” anti-piracy regime: no one will face being cut off from the Internet. The law is better known by its French acronym, Hadopi. In the last few years under the law, the Hadopi agency famously set up a system with graduating levels of warnings and fines . The threat of being cut off entirely from the Internet was the highest degree, but that penalty was never actually put into place. “Getting rid of the cut-offs and those damned winged elephants is a good thing. They’re very costly,” Joe McNamee, of European Digital Rights, quipped to Ars. Read 11 remaining paragraphs | Comments

Read More:
France removes Internet cut-off threat from its anti-piracy law

Windows 8.1 gains boot-to-desktop to attract business users

At TechEd North America today, Microsoft unveiled a host of features coming in Windows 8.1 that should make the operating system more appealing to business users. Windows 8.1 is a free update to Windows 8 that will ship  later this year . On top of bringing back a Taskbar-visible Start button , Windows 8.1 will give enterprises a lot more control over the operating system’s appearance. Chief among these controls is the ability to boot straight to the desktop, a feature found in prerelease versions of Windows 8 but not officially supported in the final version. Additionally, IT departments can now exact more control over the Start screen, fixing its layout and prepopulating it with tiles for corporate apps. At its most extreme, this will allow IT departments to turn Windows 8 machines into kiosks, booting into specific Metro apps. If the built-in capabilities aren’t sufficient, Microsoft will be releasing an embeddable version. The catchily-named Windows Embedded 8.1 Industry will be for use in things like point-of-sale systems and ATMs. Read 6 remaining paragraphs | Comments

View article:
Windows 8.1 gains boot-to-desktop to attract business users

Sony, Lego team up to create programmable, interactive Lego bricks

A newly revealed partnership seeks to bring the interactivity of Sony’s video games to the world of Lego’s physical bricks and characters. At a 25th anniversary open house for Sony’s Computer Science Laboratories in Japan , the companies showed off Toy Alive, a prototype project that uses simple Lego bricks with embedded microchips that can be controlled with a PC or a DualShock gamepad. The Toy Alive team is currently showing off a tiny, remote-controlled platform that can be controlled with a DualShock gamepad to play a chase game monitored by a webcam and computer software. Other bricks use translucent red plastic and built-in, computer-controlled LEDs to make a Lego house look like it’s on fire or to activate an actuator that causes Lego models to explode into pieces. The team is even experimenting with tiny wireless cameras that can give a minifig-eye view of a scene for a bit of augmented reality. Lego has long supported interactivity in its toys through its Mindstorms line of robotics aimed at programmers and students. But with Toy Alive, the team is trying to “keep the pieces small and simple so that children can use them with other toys,” according to associate researcher Alexis Andre, who has been working on the project for about a year. “It’s a mixture of video games and toys, and how do you make toys more interactive? How do you provide a platform for the children to do whatever they want to do?” Read 1 remaining paragraphs | Comments

See the original article here:
Sony, Lego team up to create programmable, interactive Lego bricks

Two CPUs, two batteries, two OSes: Asus announces Transformer Book Trio

The Asus Transformer Book Trio takes the dockable tablet concept to the next level. Asus Asus has long offered a line of Android tablets that slot into keyboard docks, but at its Computex press conference it announced it would be taking this concept one step further. Its new Transformer Book Trio is a tablet running Android (an unspecified version of Jelly Bean, to be a bit more precise); when docked, it becomes a Haswell-equipped Windows 8 Ultrabook. The laptop contains all the ingredients for a standard Ultrabook in its base: a 4th-generation Haswell CPU, 1TB of storage, an unspecified amount of RAM, and a 33WHr battery. Behind the 11.6-inch 1080p display is an entirely separate computer based on Intel’s Clover Trail+ Atom platform: the 2GHz Atom Z2580, 2GB of RAM, 64GB of solid-state storage, and a 19WHr battery. When the laptop is docked, Engadget reports that a button press will switch between the Windows 8 installation in the base and the Android installation in the lid. Undocking the lid switches the tablet to a full-time Android tablet, though since the hardware is x86-based, one wonders if Windows 8 couldn’t be installed on it with some effort. The device combines a couple of concepts that Asus is already using elsewhere. Its Transformer Pad tablets have long been keyboard-dockable, and the Transformer AiO also uses a detachable screen to double as a tablet (though in that case the tablet’s hardware is ARM-based). Read 1 remaining paragraphs | Comments

More:
Two CPUs, two batteries, two OSes: Asus announces Transformer Book Trio

Seat of Power: the computer workstation for the person with everything

MWE Lab’s Emperor 1510 LX—don’t call it a chair. MWE Labs Science fiction is filled with cherished seats of power, workstations that put the universe a finger-touch or a mere thought away. Darth Vader had his meditation pod, the Engineers of Prometheus had their womb-like control stations, and Captain Kirk has the Captain’s Chair. But no real-life workstation has quite measured up to these fictional seats of power in the way that Martin Carpentier’s Emperor workstations have. The latest “modern working environment” from Carpentier’s Quebec City-based MWE Lab is the Emperor 1510 LX. With a retractable monitor stand that can support up to five monitors (three 27-inch and two 19-inch), a reclining seat with thigh rest, a Bose sound system, and Italian leather upholstery, the Emperor 1510 LX looks more like a futuristic vehicle than a workstation.  And it’s priced like a vehicle, too—it  can soon be yours for the low, low price of $21,500. Tale of the Scorpion In 2006, Carpentier was slaving away as a web designer when he reached a breaking point. He was tired of his tangle of cables, the struggle to manage multiple monitors, and the horrible ergonomics that came with a standard computer desk. Inspired by the emperor scorpion, Carpentier modeled his workstation after its tail, with the monitors suspended at the stinger. Read 12 remaining paragraphs | Comments

View post:
Seat of Power: the computer workstation for the person with everything

Haswell is here: we detail Intel’s first 4th-generation Core CPUs

Intel is announcing the first of its fourth-generation Core processors based on the “Haswell” architecture. Intel Intel has been releasing information about Haswell, its next-generation CPU architecture, for months now. Our coverage has already been fairly extensive—we’ve already got a nice overview of Haswell’s CPU architecture itself, along with a primer on its brand-new integrated GPUs . All we need to know now is specific product information, and Intel is finally giving us our first official taste of that today. This morning’s announcements revolve around high-end quad-core chips in the Core i7 and Core i5 families, 12 for desktops and ten for laptops. If you’re looking for specific information about U- and Y- series low-voltage chips for Ultrabooks or anything belonging to the Core i3, Pentium, or Celeron families, you’ll have to wait a little while longer. We’ll be sure to pass that information along as we have it. What we’ll do here is present a high-level recap of the CPU, GPU, and chipset enhancements Intel is introducing in Haswell. After that, we’ll break down the specific CPUs that Intel is announcing today, and the kinds of systems you’re likely to find them in. Note that all of this information is coming directly from Intel—they’re not going to out-and-out make things up, but they’re definitely going to present their CPUs in the best possible light. We’ll be putting all of the below performance claims to the test as we begin to review Haswell-based systems later this summer. Read 30 remaining paragraphs | Comments

More:
Haswell is here: we detail Intel’s first 4th-generation Core CPUs

Mac malware signed with Apple ID infects activist’s laptop

F-Secure Stealthy Mac OS X spyware that was digitally signed with a valid Apple Developer ID has been detected on the laptop of an Angolan activist attending a human rights conference, researchers said. The backdoor, which is programmed to take screenshots and send them to remote servers under the control of the attackers, was spread using a spear phishing e-mail , according to privacy activist Jacob Appelbaum. Spear phishing is a term for highly targeted e-mails that address the receiver by name and usually appear to come from someone the receiver knows. The e-mails typically discuss topics the two people have talked about before. According to AV provider F-Secure, the malware was discovered during a workshop showing freedom of speech activists how to secure their devices against government monitoring. The malware was signed with a valid Apple Developer ID  allowing it to more easily bypass the Gatekeeper feature Apple introduced in the Mountain Lion version of OS X. If it’s not the first time Mac malware has carried such a digital assurance, it’s certainly among the first. Both F-Secure and Appelbaum said the backdoor, identified as OSX/KitM.A, is new and previously unknown. For its part, AV provider Intego said the malware is a variant of a previously seen trojan known as OSX/FileSteal. Intego continued: Read 3 remaining paragraphs | Comments

See more here:
Mac malware signed with Apple ID infects activist’s laptop

“SpecialisRevelio!” Macs use Harry Potter spell to unlock secret “backdoor”

Aurich Lawson / Warner Bros. Entertainment The Mac on your desk or on the cafe table next to you has a chip with secret functions that can be unlocked only by inputting a spell from the Harry Potter series. The SMC, or system management controller, is a chip used to regulate a Mac’s current and voltage, manage its light sensor, and temporarily store FileVault keys. Turns out that the SMC contains undocumented code that is invoked by entering the word “SpecialisRevelio,” the same magic words used to reveal hidden charms, hexes, or properties used by wizards in the Harry Potter  series written by author J. K. Rowling. That fun fact was presented Wednesday at the NoSuchCon security conference by veteran reverse engineer Alex Ionescu. While most details are far too technical for this article, the gist of the research is that the SMC is a chip that very few people can read but just about anyone with rudimentary technical skills can “flash” update. Besides displaying the Apple engineers’ affinity for Harry Potter, Ionescu’s tinkerings also open the door to new types of hacks. But don’t worry because they’re mostly the fodder for a hacking scene in a James Bond or Mission Impossible screenplay. “The attacks discussed in my presentation are attacks that likely only a nation-state adversary would have the sufficient technical knowledge to implement, and they require precise knowledge of the machine that is being targeted,” Ionescu, who is chief architect at security firm CrowdStrike, wrote in an e-mail to Ars. “They are perfect, for example, at a border crossing where a rogue country may need to ‘take a quick look at your laptop’ to ‘help prevent terrorism.’ I don’t suspect most Mac users (and certainly not those that read Ars or other similar publications) would be at a high-profile enough level to warrant such level of interest from another state.” Read 7 remaining paragraphs | Comments

View post:
“SpecialisRevelio!” Macs use Harry Potter spell to unlock secret “backdoor”

Steam players can now earn coupons for new games by playing old ones

A profile decked out with the spoils of a trading card collection. Cool, but go back to the part about coupons? Steam Steam will release a new beta feature within its service called Steam Trading Cards according to  an announcement from the company. The trading cards integrate with a handful of Valve titles at launch, and players that collect the cards will be able to use them to earn coupons as well as profile backgrounds and other items to augment their Steam experience. The launch titles that will generate trading cards to collect include Don’t Starve, Dota 2, Counter-Strike: Global Offensive, Team Fortress 2, Portal 2 and Half-Life 2 . When players get a particular set of cards they can craft them into a game badge to get “marketable items” like emoticons, profile backgrounds, and coupons for things like game discounts or DLC. The badges can then be upgraded, or “leveled up,” by collecting the same set again. The info page states that half of any card set is dropped during game play while the other half is “earned through collecting prowess.” Badges contribute to a player’s “Steam Level,” and as that number rises players get account-bound items including extra friend list slots. Read 1 remaining paragraphs | Comments

See more here:
Steam players can now earn coupons for new games by playing old ones

VMware’s dual-persona smartphones phones finally available to purchase

The first two phones to run VMware’s dual-persona software. VMware At long last, VMware’s dual-persona software for smartphones is available on actual devices. Today, VMware and Verizon Wireless announced that the Android-based LG Intuition and Motorola Razr M can now be purchased with VMware’s Horizon Mobile software, which separates the device into isolated partitions that keep a user’s work applications and data separate from personal stuff. VMware began promising virtualized smartphones in 2010 , claiming they would be available for sale in 2011. Samsung promised to support VMware’s virtualized phone vision in September 2011, and VMware started promising virtualization for iPhones and iPads in August 2012. We called it ” vaporware .” Samsung and Apple devices still aren’t running the dual-persona software, but it’s nice to see VMware phones finally materialize. VMware and Verizon said the Intuition and Razr M are immediately available for sale with Horizon Mobile software. Perpetual licenses to Horizon Mobile start at $125 per user and “can be purchased through local resellers of VMware and Verizon Wireless,” the companies said. Read 5 remaining paragraphs | Comments

See more here:
VMware’s dual-persona smartphones phones finally available to purchase