Apple’s multi-terabit, $100M CDN is live—with paid connection to Comcast

dariorug Apple’s long-rumored content delivery network (CDN) has gone live in the US and Europe, delivering traffic directly to Comcast and other Internet service providers thanks to paid interconnection deals, Frost & Sullivan analyst Dan Rayburn reported today . The CDN can deliver multiple terabits of data per second and will help Apple more efficiently distribute new releases of iOS and OS X. Apple is still using Akamai and Level 3 CDN services for iTunes and app downloads, “but over time, much of that traffic will be brought over to Apple’s CDN,” Rayburn wrote. “It’s too early to know how much traffic will come over and when, but Apple’s already started using their own CDN much faster than I expected. The pace of their build out and amount of money they are spending on infrastructure is incredible. Based on my calculations, Apple has already put in place multiple terabits per second of capacity and by the end of this year, will have invested well more than $100M in their CDN build out.” Apple has been working on its CDN for about a year. Read 10 remaining paragraphs | Comments

More:
Apple’s multi-terabit, $100M CDN is live—with paid connection to Comcast

This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

Saurabh R. Patil When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran’s heavily fortified Natanz nuclear facility , trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can’t be detected by today’s defenses. Dubbed BadUSB, the hack reprograms embedded firmware to give USB devices new, covert capabilities. In a demonstration scheduled at next week’s Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers. A different drive will similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The presenters will demonstrate similar hacks that work against Android phones when attached to targeted computers. They say their technique will work on Web cams, keyboards, and most other types of USB-enabled devices. “Please don’t do anything evil” “If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin, told Ars. “Whatever it is, there could always be some code running in that device that runs maliciously. Every time anybody connects a USB device to your computer, you fully trust them with your computer. It’s the equivalent of [saying] ‘here’s my computer; I’m going to walk away for 10 minutes. Please don’t do anything evil.” Read 10 remaining paragraphs | Comments

Read More:
This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

Bose accuses Beats of using patented noise-cancelling tech

Bose Corp. filed a lawsuit on Friday that accuses popular headphone maker Beats Electronics of infringing upon several of its patents. The suit claims that Bose lost sales because Beats—which Apple announced it would acquire for $3 billion in May—used patented noise-cancelling technology in its Studio and Studio Wireless headphone lines. Beats’ products that allegedly use the technology “can also be used for noise cancellation when no music is played, a feature that Beats also advertises,” the suit states. “Thus, Beats specifically encourages users to use the infringing functionality. Beats advertises no method to turn off features that cause end users to directly infringe.” Read 5 remaining paragraphs | Comments

Read this article:
Bose accuses Beats of using patented noise-cancelling tech

Quasiparticles carry entanglement to near infinite speeds

crocus08 In a recent experiment, scientists were able to observe quasiparticles propagating across a string of ions, creating waves of quantum entanglement in their wake. Experiments like this one, which study systems with multiple quantum bodies, are crucial to learning about the behavior of quasiparticles and their interactions with more traditional particles. It’s tempting to think that quasiparticles are not particles at all. Quasiparticles are “objects” that emerge within a complex system, such as a solid object. The collective behavior of the particles in the solid can create the impression of a new particle. The impression—or quasiparticle—moves through the solid as if it were a real particle moving through empty space, and it behaves according to the same rules. Nevertheless, within their system, quasiparticles can have real effects on their environment. Most recently, scientists were able to track the propagation of quasiparticles called magnons through a collection of atoms. Now, scientists have been able to watch as that propagation changed the behavior of these atoms. And in the process, the quasiparticles reached speeds where a conventional model, which we use to understand time, breaks down. Read 13 remaining paragraphs | Comments

See more here:
Quasiparticles carry entanglement to near infinite speeds

Id shows off double-jumping, skull-crushing new Doom at QuakeCon

If you weren’t at QuakeCon, this content-free teaser is all you get to see of the new Doom for the time being. The bad news is that only people who were actually at Dallas’ QuakeCon last night were able to see the world-premiere gameplay footage from the next Doom game, which somehow hasn’t been leaked online yet. The good news is that plenty of people that were there are reporting on the unveiling, which seemed to include a number of extremely un- Doom -like additions. One of the bigger changes brought by the new Doom (which is notably not being called Doom 4 anymore ) is a jet-pack powered double-jump, à la Crysis 3 , Titanfall , Destiny and, now, presumably, every first-person shooter to come out in the next year or two. Players can also climb up the sides of “large crates and gaps” according to PC Gamer’s report , adding even more ability to go vertical. But it’s the Mortal Kombat -style melee finishing moves that seem to have gotten the crowd the most riled up. PC Gamer describes how, once an enemy is low on health, the player can get close and activate moves that see “lower jaws pulled off, skulls stomped on, and hearts torn out with the level of detail usually reserved for those slow-mo bullet cams in the Sniper Elite series.” Rock Paper Shotgun noted  that “enemies break apart like moldy bread… literally tearing them in half sometimes.” The outlet also reported scenes with “crushing heads, chunks flying everywhere.” Read 3 remaining paragraphs | Comments

Read More:
Id shows off double-jumping, skull-crushing new Doom at QuakeCon

Fossils of strange Cambrian predator preserved with brains preserved

The new species, showing the eyes (upper and lower center) and a single clawed appendage (top left). Peiyun Cong The animals of the Cambrian are noted for being a collection of oddballs that are sometimes difficult to match up with anything currently living on Earth. But even among these oddities, Anomalocarids stand out (as their name implies). The creatures propelled themselves with a series of oar-like paddles arranged on their flanks, spotted prey with enormous compound eyes , and shoveled them into a disk-like mouth with large arms that resided at the very front of their bodies—although some of them ended up as filter feeders . We’ve identified a large number of anomalocarid species, many of which appear to have been the apex predators of their ecosystems. Yet for all our knowledge of them, there’s a key issue we haven’t clarified: how do they relate to any species that might exist today? New fossils from a Cambrian era deposit in China have revealed three samples of a new species that are so exquisitely preserved that their discoverers can trace the animals’ nerves. And the structure of the brain reveals affinities for two completely different types of organisms. The new species, Lyrarapax unguispinus , is a relatively small anomalocarid  at only about eight centimeters long. Like others of this group, it’s got a set of distinctive features, such as a neck, large compound eyes, and large frontal appendages, in this case shaped a bit like claws. Just past the neck, it’s got two large segments that look a bit like the fins on the sides of animals like dolphins. Read 6 remaining paragraphs | Comments

See the original post:
Fossils of strange Cambrian predator preserved with brains preserved

Bitcoin pool GHash.io commits to 40% hashrate limit after its 51% breach

Antana GHash.io announced that “it is not aiming to overcome 39.99 [percent] of the overall Bitcoin hashrate,” in a new statement published Wednesday . This marks a clear departure from the large Bitcoin pool’s recent flirtations with 51 percent . If that threshold is crossed for sustained periods of time, it concentrates power in ways that Bitcoin’s decentralized design normally does not allow. “If GHash.io approaches the respective border, it will be actively asking miners to take their hardware away from GHash.io and mine on other pools,” the statement continues. “GHash.io will encourage other mining pools to write similar voluntary statements from their sides.” Read 6 remaining paragraphs | Comments

Taken from:
Bitcoin pool GHash.io commits to 40% hashrate limit after its 51% breach

GHCQ’s “Chinese menu” of tools spreads disinformation across Internet

Just a few of the “weaponized” capabilities from GCHQ’s catalog of information warfare tools. What appears to be an internal Wiki page detailing the cyber-weaponry used by the British spy agency GCHQ was published today by Glenn Greenwald of The Intercept . The page, taken from the documents obtained by former NSA contractor Edward Snowden, lists dozens of tools used by GCHQ to target individuals and their computing devices, spread disinformation posing as others, and “shape” opinion and information available online. The page had been maintained by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) Covert Internet Technical Development team, but it fell out of use by the time Snowden copied it.  Greenwald and NBC previously reported on JTRIG’s “dirty tricks” tactics for psychological operations and information warfare, and the new documents provide a hint at how those tactics were executed. GCHQ’s capabilities included tools for manipulating social media, spoofing communications from individuals and groups, and warping the perception of content online through manipulation of polls and web pages’ traffic and search rankings. Originally intended to inform other organizations within GCHQ (and possibly NSA) of new capabilities being developed by the group, the JTRIG CITD team noted on the page, “We don’t update this page anymore, it became somewhat of a Chinese menu for effects operations.” The page lists 33 “effects capability” tools, as well as a host of other capabilities for collecting information, tracking individuals, attacking computers, and extracting information from seized devices. Read 8 remaining paragraphs | Comments

Read More:
GHCQ’s “Chinese menu” of tools spreads disinformation across Internet

Human memory-saving devices get $37.5m research boost from DARPA

Flickr user: Dierk Schaefer Two teams creating devices that stimulate the brain to restore memory function have been  granted $37.5 million  by DARPA to develop the technology. Both will initially work with people with epilepsy who have been given implants to locate where their seizures originate. The researchers will reuse the data gathered during this process to monitor other brain activity, such as the patterns that occur when the brain stores and retrieves memories. One team will then attempt to map these patterns by recording the brain activity of epilepsy sufferers with mild memory problems while they play a computer game about remembering things. The pattern differences between the best and worst scores among these patents will be used to develop an algorithm for a personalized stimulation pattern to keep the brain performing at an optimal level. Read 6 remaining paragraphs | Comments

See the article here:
Human memory-saving devices get $37.5m research boost from DARPA

Seattle utility wants $17,500 refund after failure to scrub negative search results

John Tregoning Seattle’s publicly-owned electrical utility, City Light, is now demanding  a refund for the $17,500 that it paid to Brand.com  in a botched effort to boost the online reputation of its highly-paid chief executive, Jorge Carrasco. The project was concocted by the CEO’s chief of staff, Sephir Hamilton . In an interview with Ars, Hamilton said that the agency may even file a lawsuit to enforce this refund. “We’re leaving our options open,” he said. “I hope that they’ll see that what we signed up for was not the service that they delivered. We were sold one bill of goods and we were given another.” Read 26 remaining paragraphs | Comments

Link:
Seattle utility wants $17,500 refund after failure to scrub negative search results