For months, 911 callers got automated message that said “hang up and dial 911”

No one suffering from an emergency expects to be greeted by a recording when they dial 911. Yet 911 callers in Caddo County, Oklahoma were unable to reach a human operator for months in 2013. Instead, they were routed to an automated message that “instructed callers to ‘hang up and dial 911’ if their call is an emergency,” the Federal Communications Commission said yesterday . The FCC issued a proposed fine of $100,000 to the Hinton Telephone Company, saying the telco “betrayed its customers.” Read 11 remaining paragraphs | Comments

See the original article here:
For months, 911 callers got automated message that said “hang up and dial 911”

Bio-high-tech treatment for Ebola may have saved two US citizens

The Ebola virus consists of small but lethal filament of RNA containing only seven genes. CDC Today, CNN is reporting that the two US citizens who were flown back to the states after contracting Ebola virus were given an extremely experimental treatment, one that’s still undergoing animal testing. While the treatment involves antibodies, it’s not a vaccine and can work effectively even after an infection has started. The process that produced it is a testament to the impressive capabilities developed in the field of biotechnology. The Ebola virus, known for its horrific symptoms and high fatality rate, currently has no established treatment. Which means that health care workers who are fighting the disease, and thus at high risk for becoming infected themselves, can do little more than put themselves in isolation and try to compensate for the damage the virus causes. That was apparently the case for two Americans who contracted the virus while working in Liberia. In this case, however, both were apparently given an experimental treatment developed in part by a company called Mapp Biopharmaceutical. Complicating matters, Mapp licenses its developments to a company called LeafBio for production and distribution. But LeafBio has also licensed an Ebola treatment from a second company, called Defyrus, and plans on combining the two. It’s unclear whether the Americans received the original or combined therapy. In either case, both therapies were based on the same developmental process outlined below. Read 9 remaining paragraphs | Comments

View original post here:
Bio-high-tech treatment for Ebola may have saved two US citizens

Chip-based credit cards are a decade old; why doesn’t the US rely on them yet?

Ciaran McGuiggan Earlier this week, mobile payments company Square announced that it had developed a credit card reader that will verify purchases from an embedded chip on the card. Currently, US consumers primarily rely on swipe-and-sign credit cards, which give card details to a merchant through the magnetic stripe on the back. But because the swipe-and-sign system became overburdened with instances of fraud, MasterCard, Visa, and other financial groups decided in 2012 that they would transition their systems to a chip-based setup called EMV (eponymous for EuroPay, MasterCard, and Visa, the three primary developers of the standard) by October 2015. Square is hoping to capitalize on this transition by being one of the first companies out of the gate in the US to offer small and medium-sized business owners a smaller, less-expensive alternative to buying a whole new set of credit card terminals. The EMV standard works using a chip that’s embedded in a credit card, which effectively acts as a mini-computer. Instead of swiping quickly and having your card give its details to a merchant’s point of sale (POS) system, an EMV card creates a unique code for each transaction and (ideally) requires the consumer to enter a PIN associated with the card instead of relying on a signature. Because of this, EMV is often called chip-and-PIN. Making a purchase with an EMV card also requires the card to be present in the card reader throughout the transaction. Read 15 remaining paragraphs | Comments

Visit site:
Chip-based credit cards are a decade old; why doesn’t the US rely on them yet?

Updated Qi 1.2 standard makes wireless charging more wireless

The Qi-compatible Nexus 5 on the Nexus Wireless Charger. New chargers will be able to increase the space between the device and the pad. Andrew Cunningham The Wireless Power Consortium’s Qi wireless charging standard is wireless in that the phone is not physically plugged into anything, but it still requires your device and the wireless charging pad to be touching each other to work. Today, the WPC announced ( PDF ) that version 1.2 of the Qi standard will add support for resonant charging, making it possible for your phone to be charged when near a Qi pad rather than directly on top of it. A small image showing Qi 1.2 in action. WPC It’s a minor enough change that current Qi 1.1 receivers will be able to take advantage of it with no extra hardware, but it opens up a few different possibilities for companies that want to build Qi support into their products. The WPC says that Qi chargers can now be embedded within tables and desks rather than placed on the surface, making them less obtrusive. “New low power transmitter designs” will make it easier to build Qi chargers into cars, and a single Qi 1.2 transmitter will be able to charge multiple Qi devices simultaneously.  Qi can also now supply up to 2,000 watts of power to household appliances (the release specifically mentions “kitchen applications”). Current Qi devices will be able to draw power from these new transmitters at distances of up to 30 mm (around 1.2 inches), while devices with purpose-build Qi 1.2 receivers increase the distance to 45 mm (about 1.8 inches). Engadget reports that the resonant version of Qi is roughly 70 to 80 percent efficient, while the old inductive version is around 85 percent efficient, and Qi 1.1 and 1.2 transmitters and receivers will be able to interoperate, so inductive charging pads like the Nexus Wireless Charger will still be able to charge Qi 1.2 phones. Just know that resonant charging will require a Qi 1.2 transmitter. Read 1 remaining paragraphs | Comments

More:
Updated Qi 1.2 standard makes wireless charging more wireless

Apple’s multi-terabit, $100M CDN is live—with paid connection to Comcast

dariorug Apple’s long-rumored content delivery network (CDN) has gone live in the US and Europe, delivering traffic directly to Comcast and other Internet service providers thanks to paid interconnection deals, Frost & Sullivan analyst Dan Rayburn reported today . The CDN can deliver multiple terabits of data per second and will help Apple more efficiently distribute new releases of iOS and OS X. Apple is still using Akamai and Level 3 CDN services for iTunes and app downloads, “but over time, much of that traffic will be brought over to Apple’s CDN,” Rayburn wrote. “It’s too early to know how much traffic will come over and when, but Apple’s already started using their own CDN much faster than I expected. The pace of their build out and amount of money they are spending on infrastructure is incredible. Based on my calculations, Apple has already put in place multiple terabits per second of capacity and by the end of this year, will have invested well more than $100M in their CDN build out.” Apple has been working on its CDN for about a year. Read 10 remaining paragraphs | Comments

More:
Apple’s multi-terabit, $100M CDN is live—with paid connection to Comcast

This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

Saurabh R. Patil When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran’s heavily fortified Natanz nuclear facility , trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can’t be detected by today’s defenses. Dubbed BadUSB, the hack reprograms embedded firmware to give USB devices new, covert capabilities. In a demonstration scheduled at next week’s Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers. A different drive will similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The presenters will demonstrate similar hacks that work against Android phones when attached to targeted computers. They say their technique will work on Web cams, keyboards, and most other types of USB-enabled devices. “Please don’t do anything evil” “If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin, told Ars. “Whatever it is, there could always be some code running in that device that runs maliciously. Every time anybody connects a USB device to your computer, you fully trust them with your computer. It’s the equivalent of [saying] ‘here’s my computer; I’m going to walk away for 10 minutes. Please don’t do anything evil.” Read 10 remaining paragraphs | Comments

Read More:
This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

LibreOffice 4.3 upgrades spreadsheets, brings 3D models to presentations

A 3D duck in the latest version of LibreOffice Impress. Document Foundation LibreOffice’s latest release provides easier ways of working with spreadsheets and the ability to insert 3D models into presentations, along with dozens of other changes. LibreOffice was created as a fork from OpenOffice in September 2010 because of concerns over Oracle’s management of the open source project. LibreOffice has now had eight major releases and is powered by “thousands of volunteers and hundreds of developers,” the Document Foundation, which was formed to oversee its development, said in an announcement today . ( OpenOffice  survived the Oracle turmoil by being transferred to the Apache Software Foundation and continues to be updated.) In LibreOffice 4.3, spreadsheet program Calc “now allows the performing of several tasks more intuitively, thanks to the smarter highlighting of formulas in cells, the display of the number of selected rows and columns in the status bar, the ability to start editing a cell with the content of the cell above it, and being able to fully select text conversion models by the user,” the Document Foundation said. Read 3 remaining paragraphs | Comments

See the article here:
LibreOffice 4.3 upgrades spreadsheets, brings 3D models to presentations

Podcasting patent troll: We tried to drop lawsuit against Adam Carolla

wasim muklashy Personal Audio LLC is an East Texas shell company that gleaned national attention when it claimed it had the right to demand cash from every podcaster. The company was wielding a patent on “episodic content,” which it said included anyone doing a podcast, as well as many types of online video. Now the company is trying to walk away from its highest-profile lawsuit against comedian Adam Carolla—but Carolla won’t let the case drop. In a statement  released today, Personal Audio says that Carolla, who has raised more than $450,000 from fans to fight the case, is wasting their money on an unnecessary lawsuit. The company, which is a “patent troll” with no business other than lawsuits, has said Carolla just doesn’t care since his fans are paying his lawyers’ bills. Read 12 remaining paragraphs | Comments

See more here:
Podcasting patent troll: We tried to drop lawsuit against Adam Carolla

Chinese military “hacked” Israel’s Iron Dome

Iron Dome The technology behind Iron Dome, the missile defense system Israel has been using since 2011, was allegedly stolen by Chinese military hackers. That claim was made by Cyber Engineering Services   to  Brian Krebs of security news site Krebs On Security , and it identifies Elisra Group, Israel Aerospace Industries (IAI), and Rafael Advanced Defense Systems as the three defense companies that were compromised during the cyber assault. The perpetrators, Cyber Engineering Services says, are the same ones behind a spate of attacks that have come to light in the past few years, all attributed to Unit 61398, a Shanghai-based arm of the Chinese army. The five Chinese military officers indicted by the US earlier this year  for allegedly hacking energy firms in the country also belong to the same unit. The hacks took place from October 2011, some six months after Iron Dome became operational, and continued up until August 2012. Israel Defense Forces (IDF) has said that many hundreds of rockets fired from Gaza, particularly during the current military operation and a series of clashes in 2012, have been scuppered by the system, which is thought to be one of the most effective missile-defense technologies in the world. Read 7 remaining paragraphs | Comments

Read More:
Chinese military “hacked” Israel’s Iron Dome

Bose accuses Beats of using patented noise-cancelling tech

Bose Corp. filed a lawsuit on Friday that accuses popular headphone maker Beats Electronics of infringing upon several of its patents. The suit claims that Bose lost sales because Beats—which Apple announced it would acquire for $3 billion in May—used patented noise-cancelling technology in its Studio and Studio Wireless headphone lines. Beats’ products that allegedly use the technology “can also be used for noise cancellation when no music is played, a feature that Beats also advertises,” the suit states. “Thus, Beats specifically encourages users to use the infringing functionality. Beats advertises no method to turn off features that cause end users to directly infringe.” Read 5 remaining paragraphs | Comments

Read this article:
Bose accuses Beats of using patented noise-cancelling tech