Bitcoin reaches an all-time trading high of over $33

After rising steadily over the last several months, Bitcoin has reached an all-time high according to data on Bitcoin Charts . As of this writing, Mt. Gox , the most popular Bitcoin trading site (which announced on Wednesday that  its operations  would move to Silicon Valley), recorded a high price of $33.22 per Bitcoin. There’s no single explanation as to why Bitcoin has continued to rise, accelerating particularly over the last month. That said, it’s been clear that interest in the digital currency has been rapidly rising, as any regular reader of Ars knows. It’s likely that online gambling has played a part. As we’ve reported earlier this year, one Bitcoin-based site took in $500,000 in profit in just six months in 2012—and Bitcoin gambling is set to get even bigger . For now, gambling with the cryptocurrency, like using Bitcoins in general, remains in a legal grey area  (which may be part of the appeal as well). Read 3 remaining paragraphs | Comments

View article:
Bitcoin reaches an all-time trading high of over $33

Human hearing beats sound’s uncertainty limit, makes MP3s sound worse

New Jersey Modern audio compression algorithms rely on observations about auditory perceptions. For instance, we know that a low-frequency tone can render a higher tone inaudible. This perception is used to save space by removing the tones we expect will be inaudible. But our expectations are complicated by the physics of waves and our models of how human audio perception works. This problem has been highlighted in a recent Physical Review Letter , in which researchers demonstrated the vast majority of humans can perceive certain aspects of sound far more accurately than allowed by a simple reading of the laws of physics. Given that many encoding algorithms start their compression with operations based on that simple physical understanding, the researchers believe it may be time to revisit audio compression. Time and frequency: Two sides of the same coin You’ll notice I didn’t say, “human hearing violates the laws of physics,” even though it was very tempting. The truth is that nothing violates the laws of physics, though many things violate the simplified models we use to approximate them. Read 10 remaining paragraphs | Comments

More:
Human hearing beats sound’s uncertainty limit, makes MP3s sound worse

Why a one-room West Virginia library runs a $20,000 Cisco router

Yes, this library has a Cisco 3945 router. Marmet, West Virginia is a town of 1,500 people living in a thin ribbon along the banks of the Kanawha River just below Charleston. The town’s public library is only open Thursdays, Fridays, and Saturdays. It’s housed in a small building the size of a trailer, which the state of West Virginia describes as an “extremely small facility with only one Internet connection.” Which is why it’s such a surprise to learn the Marmet Public Library runs this connection through a $15,000 to $20,000 Cisco 3945 router intended for “mid-size to large deployments,” according to Cisco. In an absolutely scathing report  (PDF) just released by the state’s Legislative Auditor, West Virginia officials are accused of overspending at least $5 million of federal money on such routers, installed indiscriminately in both large institutions and one-room libraries across the state. The routers were purchased without ever asking the state’s libraries, cops, and schools what they needed. And when distributed, the expensive routers were passed out without much apparent care. The small town of Clay received seven of them to serve a total population of 491 people… and all seven routers were installed within only .44 miles of each other at a total cost of more than $100,000. In total, $24 million was spent on the routers through a not-very-open bidding process under which non-Cisco router manufacturers such as Juniper and Alcatel-Lucent were not “given notice or any opportunity to bid.” As for Cisco, which helped put the massive package together, the Legislative Auditor concluded that the company “had a moral responsibility to propose a plan which reasonably complied with Cisco’s own engineering standards” but that instead “Cisco representatives showed a wanton indifference to the interests of the public in recommending using $24 million of public funds to purchase 1,164 Cisco model 3945 branch routers.” Read 20 remaining paragraphs | Comments

Original post:
Why a one-room West Virginia library runs a $20,000 Cisco router

Sony patent application measures load times to detect pirated games

Sony seems prepared to unleash a new tool in its never-ending battle against game pirates, using measured load times, of all things, to detect certain illegitimate copies of its games. Sony’s patent for “Benchmark measurement for legitimate duplication validation” was filed way back in August 2011, but it was only published by the US patent office late last week. The patent describes a method for a system that would measure load times for games loaded into a system against a previously measured threshold for what those load times ought to be on a standard, unmodified game and system: For example, if an authentic game title is distributed exclusively on [Blu-ray discs] having a total benchmark load time of 45 seconds on a game console BD drive, the acceptable range of load times could be from 40 to 50 seconds. Thus, a total measured title load time of four seconds would be outside of the acceptable range of total load times for a legitimate media type. Even if the pirated media results in similar overall load times to the original media (if a hacker added an intentional delay, for instance, or if a pirated game on a hard drive loaded similarly to an authentic game on a flash drive), the method described in the patent also measures load times for individual segments of the game code to detect fraudulent copies. Read 4 remaining paragraphs | Comments

Continued here:
Sony patent application measures load times to detect pirated games

Earthquakes’ booms big enough to be detected from orbit

Artist’s impression of GOCE satellite. European Space Agency Last year, we reported on some mysterious booms in a small Wisconsin town that turned out to be small earthquakes. While it was an unusual story, it’s actually not that uncommon of an occurrence. Early in the summer of 2001, folks in Spokane, Washington started reporting similar booms. The sounds continued, off and on, for about five months. The mystery didn’t last long, as the earthquakes responsible were picked up by seismometers in the area. (A particularly loud one that took place exactly one month after the September 11, 2001 terrorist attacks in New York did rattle some nerves, however.) In total, 105 earthquakes were detected, with a couple as large as magnitude 4.0. For most of them, there wasn’t good enough seismometer coverage to really pinpoint locations, but some temporary units deployed around the city in July located a number of events pretty precisely: the earthquakes were centered directly beneath the city itself. While a dangerously large earthquake is pretty unlikely in Wisconsin, the possibility can’t be ignored in Washington. The 2011 earthquake in Christchurch, New Zealand was only a magnitude 6.3, but the damage was extensive because the epicenter was so close to the city. In L’Aquila, Italy, a swarm of small earthquakes in 2009 was followed by a deadly magnitude 6.3. (The poor public communication of risk during that swarm netted six seismologists manslaughter convictions .) Read 10 remaining paragraphs | Comments

View article:
Earthquakes’ booms big enough to be detected from orbit

Server hack prompts call for cPanel customers to take “immediate action”

The providers of the cPanel website management application are warning some users to immediately change their systems’ root or administrative passwords after discovering one of its servers has been hacked. In an e-mail sent to customers who have filed a cPanel support request in the past six months, members of the company’s security team said they recently discovered the compromise of a server used to process support requests. “While we do not know if your machine is affected, you should change your root level password if you are not already using SSH keys,” they wrote, according to a copy of the e-mail posted to a community forum . “If you are using an unprivileged account with ‘sudo’ or ‘su’ for root logins, we recommend you change the account password. Even if you are using SSH keys we still recommend rotating keys on a regular basis.” Read 3 remaining paragraphs | Comments

View post:
Server hack prompts call for cPanel customers to take “immediate action”

Qualcomm’s global LTE chip could help end iPhone fragmentation

Qualcomm yesterday unveiled a new series of chips designed to solve one of the nagging problems faced by smartphone manufacturers and smartphone users: a single phone isn’t capable of hopping on any cellular network. This difficulty caused Apple to release three versions of the iPhone 5, with support for different LTE networks. As a result, customers who frequently travel overseas had to think hard about which version of the iPhone they would buy, since different countries and carriers use different cellular bands. The iPhone uses Qualcomm chips . LTE has exacerbated this cellular fragmentation, Qualcomm said. “The wide range of radio frequencies used to implement 2G, 3G, and 4G LTE networks globally presents an ongoing challenge for mobile device designers,” Qualcomm Senior VP Alex Katouzian said in the company’s announcement . “Where 2G and 3G technologies each have been implemented on four to five different RF bands globally, the inclusion of LTE brings the total number of cellular bands to approximately 40.” Read 4 remaining paragraphs | Comments

Visit link:
Qualcomm’s global LTE chip could help end iPhone fragmentation

Cellular data traffic keeps doubling every year

Florence Ion Worldwide mobile data traffic doubled over the past year and is expected to continue growing at a similar rate due to expanding smartphone sales and video traffic, telecom equipment maker Ericsson said in research released today. By the end of 2012, global data traffic on mobile networks (not including Wi-Fi) hit around 1,300 petabytes per month, twice as much as in the previous year, Ericsson said. Ericsson The chart shows an approximate doubling each year for the past few years. We’ve asked Ericsson for the raw data behind the report and will provide that if we get it. Ericsson’s measurements come from “a large base of commercial networks that together cover all regions of the world,” the report states. “They form a representative base for calculating world total traffic in mobile networks.” Read 10 remaining paragraphs | Comments

More here:
Cellular data traffic keeps doubling every year

Sexy scammers entice men into stripping on webcam, then blackmail them

Police in Singapore have issued an alert citing a dramatic rise in the number of “cyber blackmail” cases being reported. But unlike many cases that target women or teenagers , this latest rash of crimes targets men through social media sites. The Singapore Police Force reports that there have been more than 50 reported cases in the last year where “foreign” women have lured men through invitations on social networks, such as Facebook and Tagged.com, into video sex sessions that are recorded for blackmail purposes. The women “initiate cybersex” with the men over video chat, stripping for them and then encouraging them to do the same. The men are told to perform sex acts on camera for the women, and the video feeds are recorded. The men are then contacted later and told that the videos will be posted in public if the victims don’t wire money to the scammers. Read 4 remaining paragraphs | Comments

More:
Sexy scammers entice men into stripping on webcam, then blackmail them

Laser intended for Mars used to detect “honey laundering”

Matthew T. Rader A laser tool funded by the European Space Agency to measure carbon on Mars has been reappropriated to detect fake honey. The counterfeit goods trade might more commonly be associated with handbags and watches, but it turns out that the world of honey trading is also a murky one, riddled with smuggling and fakery. According to a Food Safety News investigation , more than a third of honey consumed in the US has been smuggled from China and may be tainted with illegal antibiotics and heavy metals. To make matters worse, some honey brokers create counterfeit honey using a small amount of real honey, bulked up with sugar, malt sweeteners, corn or rice syrup, jaggery (a type of unrefined sugar) and other additives—known as honey laundering. This honey is often mislabeled and sold on as legitimate, unadulterated honey in places such as Europe and the US. Read 10 remaining paragraphs | Comments

Read the original post:
Laser intended for Mars used to detect “honey laundering”