“Download this gun”: 3D-printed semi-automatic fires over 600 rounds

The white portion of this AR-15, known as the “lower,” was manufactured using 3D printing. Defense Distributed Cody Wilson, like many of his Texan forebears, is fast-talkin’ and fast-shootin’—but unlike his predecessors in the Lone Star State, he’s got 3D printing technology to further his agenda. Wilson’s non-profit organization, Defense Distributed , released a video this week showing a gun firing off over 600 rounds—illustrating what is likely to be the first wave of semi-automatic and automatic weapons produced by the additive manufacturing process. Last year, his group famously demonstrated that they could use a 3D-printed “lower” for an AR-15 semi-automatic rifle—but the gun failed after six rounds. Now, after some re-tooling, Defense Distributed has shown that it has fixed the design flaws and can seemingly fire for quite awhile. (The AR-15 is the civilian version of the military M16 rifle.) Read 34 remaining paragraphs | Comments

See more here:
“Download this gun”: 3D-printed semi-automatic fires over 600 rounds

Human hearing beats sound’s uncertainty limit, makes MP3s sound worse

New Jersey Modern audio compression algorithms rely on observations about auditory perceptions. For instance, we know that a low-frequency tone can render a higher tone inaudible. This perception is used to save space by removing the tones we expect will be inaudible. But our expectations are complicated by the physics of waves and our models of how human audio perception works. This problem has been highlighted in a recent Physical Review Letter , in which researchers demonstrated the vast majority of humans can perceive certain aspects of sound far more accurately than allowed by a simple reading of the laws of physics. Given that many encoding algorithms start their compression with operations based on that simple physical understanding, the researchers believe it may be time to revisit audio compression. Time and frequency: Two sides of the same coin You’ll notice I didn’t say, “human hearing violates the laws of physics,” even though it was very tempting. The truth is that nothing violates the laws of physics, though many things violate the simplified models we use to approximate them. Read 10 remaining paragraphs | Comments

More:
Human hearing beats sound’s uncertainty limit, makes MP3s sound worse

The Pirate Bay leaves Sweden for friendlier waters

The Swedish Pirate Party has stopped hosting the notorious website The Pirate Bay, according to TorrentFreak. While no one knows where the site is actually run from, Web-hosting services have been provided through the Swedish Pirate Party for a few years now. Now, the site’s hosting will be taken care of by the Pirate Parties in Norway and Sweden. TPB is being forced to move because the Swedish Pirate Party is under pressure from Rights Alliance, a Swedish anti-piracy group representing large music and movie interests. Rights Alliance threatened legal action against the Pirate Party if the group didn’t stop hosting the site by tomorrow. Spain in particular could turn out to be a safe haven for the piracy-driven website, since judges in that country have found simply linking to other infringing sites is not a basis for copyright liability. The sports-streaming site Rojadirecta, for example, was exonerated after legal action against it was initiated in Spain. (That didn’t stop it from having its domain name grabbed by a US agency, before being given back last summer.) Read 1 remaining paragraphs | Comments

See more here:
The Pirate Bay leaves Sweden for friendlier waters

Cellular data traffic keeps doubling every year

Florence Ion Worldwide mobile data traffic doubled over the past year and is expected to continue growing at a similar rate due to expanding smartphone sales and video traffic, telecom equipment maker Ericsson said in research released today. By the end of 2012, global data traffic on mobile networks (not including Wi-Fi) hit around 1,300 petabytes per month, twice as much as in the previous year, Ericsson said. Ericsson The chart shows an approximate doubling each year for the past few years. We’ve asked Ericsson for the raw data behind the report and will provide that if we get it. Ericsson’s measurements come from “a large base of commercial networks that together cover all regions of the world,” the report states. “They form a representative base for calculating world total traffic in mobile networks.” Read 10 remaining paragraphs | Comments

More here:
Cellular data traffic keeps doubling every year

Skype calls now equivalent to one-third of global phone traffic

TeleGeography New research (PDF) from TeleGeography, a telecom market analysis firm, shows that worldwide Skype usage is now equivalent to over one-third of all international phone traffic—a record level. The firm’s new data, released Wednesday , shows that “international telephone traffic grew 5 percent in 2012, to 490 billion minutes.” At the same time, “cross-border Skype-to-Skype voice and video traffic grew 44 percent in 2012, to 167 billion minutes. This increase of nearly 51 billion minutes is more than twice that achieved by all international carriers in the world, combined.” While that doesn’t mean that telcos are going to go out of business anytime soon, it does mean that they are certainly continuing to feel the heat. Read 3 remaining paragraphs | Comments

Read the original:
Skype calls now equivalent to one-third of global phone traffic

Comcast acquires full ownership of NBCUniversal ahead of schedule

Comcast, the nation’s largest cable provider, will consolidate its control over NBCUniversal by buying out the 49 percent of the media company that it doesn’t already own. Comcast will pay General Electric $16.7 billion for the shares and shell out $1.4 billion for related real estate, including the iconic 30 Rockefeller Plaza. Under a deal announced in 2009, General Electric spun NBC, Universal Studios, and various other media properties off into a new joint venture and sold 51 percent of the shares, and effective control, to Comcast. The merger was intensely controversial. Critics charged that the acquisition would further cement Comcast’s already dominant position in the cable market, making it impossible for competitors such as Netflix to compete on a level playing field. But regulators decided not to challenge the merger, settling for a long list of regulatory concessions. Read 4 remaining paragraphs | Comments

View original post here:
Comcast acquires full ownership of NBCUniversal ahead of schedule

Apple releases iOS 6.1.1 for iPhone 4S users with 3G issues (Updated)

Update : Apple has now released the iOS 6.1.1 update mentioned in our original writeup. The update is specifically for the iPhone 4S and “fixes an issue that could impact cellular performance and reliability for iPhone 4S.” This is most likely to address the 3G issues experienced by some users, though it doesn’t sound like iOS 6.1.1 does anything to improve battery life as of yet. Original story : iOS 6.1.1 may be making its way into consumers’ hands sooner than we expected. The first beta of iOS 6.1.1 was only released to Apple’s developer network last week, but the update is reportedly being “rushed” out to customers in order to address 3G performance bugs, according to German iPhone site iFun . It is also said to address other problems like reduced battery life. The software is said to have undergone some carrier testing, though it’s still unclear exactly when Apple plans to publish the update. Read 4 remaining paragraphs | Comments

Original post:
Apple releases iOS 6.1.1 for iPhone 4S users with 3G issues (Updated)

At long last, TI releases graphing calculator for the iPad

A TI-Nspire’s functionality, replicated on an iPad. TI/TechPoweredMath Texas Instruments has brought its graphing calculator functionality to a more modern platform, according to TechPoweredMath . TI-Nspire for iPad mimics the functionality of the color TI-Nspire calculator and has cloud integration for teachers to share files with students. TI’s graphing calculators have been stuck staunchly in the past as much as possible.  Color screens were  a recent development for its most popular line of devices, and developers have had to build games with only a handful of kilobytes of code . As smartphones and tablets rise in popularity, it makes increasing sense to fold the graphing calculator functionality into devices that students are likely carrying around with them anyway. This is not to say graphing calculator apps haven’t existed for some time—they have, for both smartphones and tablets, and many are free. But until now, TI has refused to cross over. Read 3 remaining paragraphs | Comments

Read this article:
At long last, TI releases graphing calculator for the iPad

Adobe issues emergency Flash update for attacks on Windows, Mac users

Adobe Systems has released a patch for two Flash player vulnerabilities that are being actively exploited online to surreptitiously install malware, one in attacks that target users of Apple’s Macintosh platform. While Flash versions for OS X and Windows are the only ones reported to be under attack, Thursday’s unscheduled release is available for Linux and Android devices as well. Users of all affected operating systems should install the update as soon as possible. The Mac exploits target users of the Safari browser included in Apple’s OS X, as well as those using Mozilla’s Firefox. That vulnerability, cataloged as CVE-2013-0634, is also being used in exploits that trick Windows users into opening booby-trapped Microsoft Word documents that contain malicious Flash content, Adobe said in an advisory . Adobe credited members of the Shadowserver Foundation , Lockheed Martin’s Computer Incident Response Team, and MITRE with discovery of the critical bug. Read 4 remaining paragraphs | Comments

Continue Reading:
Adobe issues emergency Flash update for attacks on Windows, Mac users

Securing your website: A tough job, but someone’s got to do it

In 2006, members of a notorious crime gang cased the online storefronts belonging to 7-Eleven, Hannaford Brothers, and other retailers. Their objective: to find an opening that would allow their payment card fraud ring to gather enough data to pull off a major haul. In the waning days of that year they hit the mother lode, thanks to Russian hackers identified by federal investigators as Hacker 1 and Hacker 2. Located in the Netherlands and California, the hackers identified a garden-variety flaw on the website of Heartland Payment Systems, a payment card processor that handled some 100 million transactions per month for about 250,000 merchants. By exploiting the so-called SQL injection vulnerability, they were able to gain a toe-hold in the processor’s network , paving the way for a breach that cost Heartland more than $12.6 million. The hack was masterminded by the now-convicted Albert Gonzalez and it’s among the most graphic examples of the damage that can result from vulnerabilities that riddle just about any computer that serves up a webpage . Web application security experts have long cautioned such bugs can cost businesses dearly, yet those warnings largely fall on deaf ears. But in the wake of the Heartland breach there was no denying the damage they can cause. In addition to the millions of dollars the SQL injection flaw cost Heartland, the company also paid with its loss of reputation among customers and investors. Read 23 remaining paragraphs | Comments

See the original article here:
Securing your website: A tough job, but someone’s got to do it