US edges closer to energy independence

EIA The net energy consumption of the US has held fairly steady for nearly 20 years. Over the past decade, however, there’s been a large increase in production of energy within the US. As a result, the US government’s energy figures for the first half of this year show that the differences between production and consumption have dropped to the lowest level in 29 years. This represents a net drop in energy imports by 17 percent compared to the same period a year earlier. According to the Energy Information Agency, the boost in energy production came from a variety of sources. Natural gas was the largest, accounting for just over half of the annual increase. Coal accounted for another quarter, renewable energy for 12 percent, and petroleum for eight. The EIA also notes that energy use this year was unusually high due to the intense cold that hit most of the nation in the first few months of 2014. The vast majority of the country’s imports come in the form of petroleum products and crude oil. These imports have been decreasing as new sources of oil are tapped and automotive efficiency standards are tightening. Refined petroleum products remain the largest US energy export; smaller quantities of coal and natural gas are also shipped overseas. Read 1 remaining paragraphs | Comments

Visit site:
US edges closer to energy independence

Google has removed 170,000-plus URLs under “right to be forgotten” edict

Google Google says it has removed 170,706 URLs in the wake of a European high court ruling in May requiring search engines to take down “inadequate, irrelevant, or no longer relevant” materials from search results upon request by EU citizens. In all, the search giant said it has already been asked to remove about half a million URLs from its search results, and it has removed about 42 percent of them, according to its latest Transparency Report  published Thursday. “In evaluating a request, we will look at whether the results include outdated or inaccurate information about the person,” the report said. “We’ll also weigh whether or not there’s a public interest in the information remaining in our search results—for example, if it relates to financial scams, professional malpractice, criminal convictions or your public conduct as a government official (elected or unelected). Our removals team has to look at each page individually and base decisions on the limited context provided by the requestor and the information on the webpage. Is it a news story? Does it relate to a criminal charge that resulted in a later conviction or was dismissed?” Read 6 remaining paragraphs | Comments

See the original article here:
Google has removed 170,000-plus URLs under “right to be forgotten” edict

Windows 10’s very different way of updating

We’ve been expecting the next version of Windows to work differently when it comes to updates and upgrades , and with the release of the Windows 10 Technical Preview , Microsoft’s intentions are a little clearer. The current Windows update model is superficially simple, but it has a few complexities. Every so often, the company releases a major update to Windows. In theory, that version of the operating system remains essentially unaltered for its lifetime. It receives critical (security) updates on a monthly basis (Patch Tuesday), and periodic non-security bug fixes (both monthly and as larger Service Packs), but significant functional changes are reserved for the next operating system version. This policy, with rules such as “Service Packs don’t add features,” was publicly propagated. But it was never really true. Service Packs didn’t add new features, except when they did. Windows XP Service Pack 2 was, in modern parlance, “Windows XP R2,” or perhaps “Windows XP point 1.” It was recognizable as Windows XP, but it included a bunch of new, security-oriented features in the core operating system and Internet Explorer 6. It also made some breaking changes to enhance security at the possible expense of application compatibility. Read 20 remaining paragraphs | Comments

View post:
Windows 10’s very different way of updating

What we know (and suspect) is coming in iOS 8.1

Apple Pay is one of the biggest features expected to launch with iOS 8.1 later this month. Apple Last week, numerous publications ( including Ars ) reported seeing references to iOS 8.1, 8.2, and 8.3 in their site analytics pages. iOS versions 5, 6, and 7 only saw one major point update apiece during their respective lifespans, so evidence of three different updates being tested simultaneously just weeks after the release of iOS 8.0  came as a surprise. It looks like we’ll be seeing the first of those updates sooner rather than later. Today Apple pushed out the second beta build of iOS 8.1 in as many weeks to its registered developers, and the final version of the software is rumored to be released at or near Apple’s event later this month . Obviously such a quick turnaround time will make iOS 8.1 a smaller update than iOS 7.1 , which gestated for around six months and fixed a host of problems when finally released. But the update is still rumored to include a handful of significant features—here’s a list of the most important additions. Read 11 remaining paragraphs | Comments

Excerpt from:
What we know (and suspect) is coming in iOS 8.1

How to win friends, influence people, and have businesses magically text you

Cyrus Farivar This week, I downloaded a new iPhone app, Path Talk , and I texted actual questions to local businesses near where I live in Oakland, California. In some cases I got answers back within minutes, but most took longer, even over an hour. Nevertheless, it was almost like magic. Without interrupting my work day, I learned some crucial information about my favorite East Oakland taco truck ( Tacos Sinaloa ): “Can I place an order by phone?” “Hi! Unfortunately, you would have to come to our restaurant in person since we do not take orders over the phone. Sorry about that. Have a nice day!” Read 25 remaining paragraphs | Comments

Read the article:
How to win friends, influence people, and have businesses magically text you

At 650% interest, that online payday loan is a steal

Fraud and Abuse Online: Harmful Practices of Inernet Payday Lending Online payday loan operators threaten their customers, promote loans designed for long-term indebtedness, and charge exorbitant interest rates, according to a study by the Pew Charitable Trusts. “Lump-sum loans online typically cost $25 per $100 borrowed per pay period—an approximately 650 percent annual percentage rate,” Pew said . The report, ” Fraud and Abuse Online: Harmful Practices in Internet Payday Lending ,” (PDF) comes a month after the Federal Trade Commission halted an only payday scheme that the government said “allegedly bilked consumers out of tens of millions of dollars by trapping them into loans they never authorized and then using the supposed ‘loans’ as a pretext to take money from their bank accounts .” Read 7 remaining paragraphs | Comments

Read the article:
At 650% interest, that online payday loan is a steal

FBI director says Chinese hackers are like a “drunk burglar”

Ivan David Gomez Arce James Comey, the Federal Bureau of Investigation director, says Chinese hackers are daily targeting US companies’ intellectual property. “I liken them a bit to a drunk burglar. They’re kickin’ in the front door, knocking over the vase, while they’re walking out with your television set,” Comey said Sunday on CBS’ 60 Minutes . “They’re just prolific. Their strategy seems to be: `We’ll just be everywhere all the time. And there’s no way they can stop us.”‘ 60 Minutes Comey’s remarks on the news magazine comes two weeks after a Senate Armed Services Committee report concluded that China’s military broke into Pentagon contractors’ computer networks at least 50 times—hacks that threaten ” to erode US military technical superiority .” Read 6 remaining paragraphs | Comments

Follow this link:
FBI director says Chinese hackers are like a “drunk burglar”

References to iOS 8.1, 8.2, and 8.3 showing up in site analytics

iOS 8 development continues apace. Andrew Cunningham iOS 8 has been in the hands of the public  for about a week and a half , and the OS has already received a pair of minor updates.  One fixed a handful of small issues in the initial release;  another fixed the major bugs introduced in the first update. But we’re already seeing evidence that Apple is working on some larger updates to the operating system, namely versions 8.1, 8.2, and 8.3. 9to5Mac first pointed out evidence of these new iOS versions this morning, found in its own analytics and data from some of its sources. So we quickly looked into our traffic data for September for similar data. We found requests listing iOS 8.1, 8.2, and 8.3 coming from Apple IP addresses—several thousand from 8.1 and just a few hundred from 8.2 and 8.3, which makes sense given that 8.1 is probably being worked on more aggressively at this point. The news here is not that Apple is continuing to develop new versions of iOS but that releasing an iOS 8.2 or 8.3 update would be a break from recent tradition. The last iOS version to progress beyond x.1 was iOS 4, which came during a much busier period for Apple in general and iOS specifically. Version 4.1 fixed many of the glaring bugs in version 4.0 and helped boost speed on the iPhone 3G, version 4.2 unified the iPhone and iPad versions of the OS and ushered in the first non-AT&T iPhones, and version 4.3 was introduced alongside the iPad 2. To some degree, software version numbers are arbitrary, but releasing three “major” updates for iOS 8 could indicate that iOS 8’s lifecycle will be similarly busy. Read 1 remaining paragraphs | Comments

Read More:
References to iOS 8.1, 8.2, and 8.3 showing up in site analytics

Using new Corvette’s valet-recording tech could be a felony in 12 states

© General Motors Over the past few months, General Motors and its Chevrolet dealerships have been selling the 2015 Corvette with an interesting feature called Valet Mode. Valet Mode records audio, video, and driving statistics of the person in the driver’s seat when the driver isn’t around, thus keeping low-life valets from being too loose with their filthy mitts while inside a Corvette owner’s fancy car. Trouble is that in at least 12 states, using Valet Mode might be considered a felony. Federal wiretapping laws generally require only one party to consent to a recording of an interaction. But in California, Connecticut, Delaware, Florida, Hawaii, Illinois, Louisiana, Maryland, Massachusetts, Montana, Nevada, New Hampshire, Oregon, Pennsylvania, and Washington, all parties are required to consent before a recording happens. So if a Corvette owner turns on Valet Mode in California and turns the car over to the unknowing attendant, that Corvette owner could be committing a felony. Read 6 remaining paragraphs | Comments

Originally posted here:
Using new Corvette’s valet-recording tech could be a felony in 12 states

Update: Bug in Bash shell creates big security hole on anything with *nix in it

Mac OS X Mavericks is also a *nix, and also vulnerable to the Bash bug. Sean Gallagher Update: The Bash vulnerability, now dubbed by some as “Shellshock”, has been reportedly found in use by an active exploit against web servers. See Ars’ latest report for further details. A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. “This issue is especially dangerous as there are many possible ways Bash can be called by an application,” a Red Hat security advisory warned. The bug , discovered by Stephane Schazelas , is related to how Bash processes environmental variables passed by the operating system or by a program calling a Bash-based script. If Bash has been configured as the default system shell, it can be used by network–based attackers against servers and other Unix and Linux devices via Web requests, secure shell, telnet sessions, or other programs that use Bash to execute scripts. Read 8 remaining paragraphs | Comments

Visit link:
Update: Bug in Bash shell creates big security hole on anything with *nix in it