Nvidia turns on 1080p 60 FPS streaming for its Grid cloud gaming service

Starting today, Nvidia has enabled 1080p 60 FPS streaming from its Grid cloud gaming service . To use the new mode, you need to be part of the public Shield Hub beta group , have a Shield device, and at least a 30Mbps connection to the Internet. For the moment, around 35 Grid games support 1080p60 streaming, with Nvidia promising that rest (another 14 at the moment) will get a resolution bump after a server-side hardware refresh. Nvidia won’t say what that hardware refresh entails, but did confirm that its servers would be using the same Kepler-based Grid GPUs. Grid streaming remains free until June 30, after which Nvidia will offer a paid-for premium tier in addition to the free service. While Nvidia still won’t spill the beans on exactly what the premium tier gets you, or how much it’ll cost, we can confirm that 1080p streaming will not require a premium subscription. Read 4 remaining paragraphs | Comments

Excerpt from:
Nvidia turns on 1080p 60 FPS streaming for its Grid cloud gaming service

PSA: 3D Realms classics debut on Steam in 32-game bundle

The modern trend of out-of-print PC games coming back to life on digital-download shops got another big jolt on Tuesday with  The 3D Realms Anthology , a 32-game bundle available only on Steam. All of the games have been recoded to work on both Windows and OS X, and while many of the titles had already launched on Good Old Games (GOG.com), one particular Ars favorite made its Steam debut today: the original 1994 version of Rise of the Triad . That first-person shooter began life as the original sequel to Wolfenstein 3D , but when id Software went on to focus on  Doom instead, a different team—some of whose members went on to work on Duke Nukem 3D —put together a surprisingly robust shooter stuck in the relatively dated Wolfenstein 3D engine. For now, the only way to get that game on Steam, along with many other 3D Realms classics, is through today’s new 32-game bundle, which means you’ll have to shell out $30—but that price does come with other notable titles like 3D arcade-space shooter Terminal Velocity , pinball classic Balls of Steel , and mid-’90s FPS classic  Shadow Warrior . (Oh, and pretty much every Duke Nukem game, to boot.) GOG.com, meanwhile, was already selling  most of the bundle’s best games in a la carte form , in case the Steam bundle’s glut of edutainment nonsense does nothing for you. 3D Realms confirmed in a statement that before the Steam bundle launch, all of the games were either available as paid downloads directly from 3D Realms’ site or as freeware downloads. Read 1 remaining paragraphs | Comments

Read the original post:
PSA: 3D Realms classics debut on Steam in 32-game bundle

How Selerity reported Twitter’s earnings—before Twitter did

Selerity reported Twitter’s Q1 2015 quarterly earnings results On April 28, 2015. #BREAKING : Twitter $TWTR Q1 Revenue misses estimates, $436M vs. $456.52M expected — Selerity (@Selerity) April 28, 2015 Besides the news itself (Twitter’s revenues were disappointing to some investors) the event was noteworthy because it occurred at 3:07 pm New York time—almost an hour before the close of trading . While it’s rare for companies to release during market-hours there is no official policy prohibiting it and early announcements do happen occasionally. In the case of Twitter’s earnings, it was apparently the result of an accident by NASDAQ’s investor relations subsidiary , Shareholder.com. Most of the media coverage to date has focused on the process by which Selerity obtained the earnings press release so quickly. Some of that coverage has been speculative or inaccurate. In particular it’s important to understand that this was not a “hack.” That term implies a circumvention of laws or privacy, something Selerity would never do. Nor was it a “leak” by Selerity—it had already been published in the expected manner in the expected location. It was just early. We did not “guess” the URL that contained Twitter’s quarterly earnings results. Anyone with a web-browser and an Internet connection could have followed the links from the main investor relations page to the same PDF file that Selerity found. Read 27 remaining paragraphs | Comments

See more here:
How Selerity reported Twitter’s earnings—before Twitter did

Boeing 787 Dreamliners contain a potentially catastrophic software bug

A software vulnerability in Boeing’s new 787 Dreamliner jet has the potential to cause pilots to lose control of the aircraft, possibly in mid-flight, Federal Aviation Administration officials warned airlines recently. The bug—which is either a classic integer overflow or one very much resembling it—resides in one of the electrical systems responsible for generating power, according to memo the FAA issued last week . The vulnerability, which Boeing reported to the FAA, is triggered when a generator has been running continuously for a little more than eight months. As a result, FAA officials have adopted a new airworthiness directive (AD) that airlines will be required to follow, at least until the underlying flaw is fixed. “This AD was prompted by the determination that a Model 787 airplane that has been powered continuously for 248 days can lose all alternating current (AC) electrical power due to the generator control units (GCUs) simultaneously going into failsafe mode,” the memo stated. “This condition is caused by a software counter internal to the GCUs that will overflow after 248 days of continuous power. We are issuing this AD to prevent loss of all AC electrical power, which could result in loss of control of the airplane.” Read 2 remaining paragraphs | Comments

Link:
Boeing 787 Dreamliners contain a potentially catastrophic software bug

Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Less than 24 hours after Google unveiled a Chrome extension that warns when user account passwords get phished , a security researcher has devised a drop-dead simple exploit that bypasses it. This benign proof-of-concept exploit looks almost identical to a Google login page, and is typical of a malicious phishing page that attempts to trick people into entering their user name and password. If Google’s freely available Password Alert extension was better designed, it would provide a warning as soon as someone tried to log into the page with their Google password. Instead, the warning is completely suppressed. (Note: although Ars fully trusts the researcher, readers are strongly advised not to enter passwords for Google accounts they use for anything other than testing purposes.) A video of the bypass exploit is here Bypassing Google’s Password Alert “Protection” “It beggars belief,” Paul Moore, an information security consultant at UK-based Urity Group who wrote the exploit, told Ars. “The suggestion that it offers any real level of protection is laughable.” He went on to say Google would do better devoting its resources to supporting the use of password managers, since most of them provide much more effective protections against phishing attacks. Read 3 remaining paragraphs | Comments

More:
Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Grooveshark, bowing to RIAA, shuts down and apologizes for “serious mistakes”

Grooveshark, the free online music streaming service that allowed users to upload their own songs, announced on Thursday that it was shutting down. Josh Greenberg and Sam Tarantino founded the streaming service in 2006, and the site attracted tens of millions of users. Grooveshark called itself “the world’s largest on-demand and music discovery service.” But the service not only allowed users to upload any song; the founders also apparently demanded that employees upload popular songs  in an effort to expand the site’s music library. The service came under fire in recent years for allowing copyrighted material on the site. Several record companies, including Warner Bros., Sony, and Universal Music Group, sued Grooveshark in 2011 . Now the record companies have come to an agreement with Grooveshark under which it shut down the site and remove all copyrighted songs. Read 6 remaining paragraphs | Comments

More:
Grooveshark, bowing to RIAA, shuts down and apologizes for “serious mistakes”

Raspberry Pi gets a remote Windows desktop client from Parallels

Parallels today is unveiling an RDP (remote desktop protocol) client for the Raspberry Pi, allowing the tiny computer to remotely access Windows desktops and applications. Although the Pi has appealed to hobbyists and developers, this product is for businesses, turning the Pi into a thin client for virtual desktop deployments. The pricing isn’t aimed at individuals. The Pi client works with the Parallels 2X Remote Application Server , which costs $75 per concurrent user, requiring a minimum of 15 users, making the minimum price $1,125. But there does seem to be an exception that allows free use for small groups and individuals. There’s a 30-day free trial that supports 50 concurrent users, and “After 30 days, you can continue using 2X Remote Application Server for three concurrent users with the FREE license key that you will receive via email after registration,” the 2X download page says . Read 6 remaining paragraphs | Comments

More:
Raspberry Pi gets a remote Windows desktop client from Parallels

Spam-blasting malware infects thousands of Linux and FreeBSD servers

Several thousand computers running the Linux and FreeBSD operating systems have been infected over the past seven months with sophisticated malware that surreptitiously makes them part of a renegade network blasting the Internet with spam, researchers said Wednesday. The malware likely infected many more machines during the five years it’s known to have existed. Most of the machines infected by the so-called Mumblehard malware are believed to run websites, according to the 23-page report issued by researchers from antivirus provider Eset. During the seven months that they monitored one of its command and control channels, 8,867 unique IP addresses connected to it, with 3,000 of them joining in the past three weeks. The discovery is reminiscent of Windigo, a separate spam botnet made up of 10,000 Linux servers that Eset discovered 14 months ago. The Mumblehard malware is the brainchild of experienced and highly skilled programmers. It includes a backdoor and a spam daemon , which is a behind-the-scenes process that sends large batches of junk mail. These two main components are written in Perl and they’re obfuscated inside a custom “packer” that’s written in assembly , an extremely low-level programming language that closely corresponds to the native machine code of the computer hardware it runs on. Some of the Perl script contains a separate executable with the same assembly-based packer that’s arranged in the fashion of a Russian nesting doll. The result is a very stealthy infection that causes production servers to send spam and may serve other nefarious purposes. Read 7 remaining paragraphs | Comments

See original article:
Spam-blasting malware infects thousands of Linux and FreeBSD servers

Rogue Silk Road DEA agent arrested with “go bag,” 9mm pistol

SAN FRANCISCO—Federal prosecutors successfully argued Wednesday that Carl Mark Force, the former Drug Enforcement Administration agent who allegedly went rogue during the investigation of Silk Road founder Ross Ulbricht, should not be granted bail. “I am not prepared to release him today,” United States Magistrate Judge Elizabeth Laporte said during the Wednesday hearing. She heard 90 minutes of argument from government lawyers and from one of Force’s defense attorneys. After the hearing, Force was transferred from Santa Rita Jail in nearby Alameda County to San Francisco County Jail. Read 36 remaining paragraphs | Comments

Visit link:
Rogue Silk Road DEA agent arrested with “go bag,” 9mm pistol

Microsoft brings Android, iOS apps to Windows 10

SAN FRANCISCO—Microsoft announced a four-pronged effort to bring developers and their apps to Windows at its build conference today. One of these prongs—a way for Web developers to present their sites as apps—was already announced at Mobile World Congress earlier in the year. The second prong is logical but not altogether surprising. In Windows 10, developers will be able to specially prepare existing Windows apps, whether Win32, .NET WinForms, .NET WPF, or any other Windows development technology, and sell them through the Windows Store. Unlike the “traditional” Windows application installation experience, these apps will be guaranteed to install, update, and uninstall cleanly—one of the important things that Store apps do to ensure that users feel confident trying apps out and removing them if they don’t like them. Behind the scenes, virtualization technology will be used to provide this isolation and robustness. Islandwood and Astoria The next two prongs are the more surprising: Microsoft is going after Android and iOS developers. With Project Islandwood, iOS developers will be able to take their iOS apps and build them for Windows. Microsoft has developed an Objective C toolchain and middleware layer that provide the operating system APIs that iOS apps expect. A select group of third parties have been using the Islandwood tools already, with King’s Candy Crush Saga for Windows Phone being one of the first apps built this way. King’s developers had to change only a “few percent” of the code in order to fully port it to Windows Phone. Read 6 remaining paragraphs | Comments

Original post:
Microsoft brings Android, iOS apps to Windows 10