Microsoft CEO Steve Ballmer to retire within 12 months

Substantial news out of Redmond this morning: Microsoft CEO Steve Ballmer is retiring within the next 12 months. Ballmer has been a prominent fixture at Microsoft since joining the company in 1980. Prior to becoming the CEO, Ballmer was active in a number of Microsoft divisions, with a particular focus on the sales side of the house. He took over chief executive duties when Bill Gates stepped down in January 2000. Though much pilloried in the tech press for Microsoft’s more recent missteps, including Windows RT and, most famously, Windows Vista, Ballmer’s tenure as CEO has been a positive one for Microsoft—at least from a revenue perspective. Under his leadership, Microsoft’s net income has increased to $23 billion, with annual revenue climbing from $25 billion to $70 billion, with an average annual profit growth of over 16 percent. Read 3 remaining paragraphs | Comments        

Read More:
Microsoft CEO Steve Ballmer to retire within 12 months

Someone beat the Vikings into the North Atlantic by 500 years

The rugged coast of the Faroe islands don’t lend themselves to easy colonization. Flickr user Stig Nygaard The Faroe Islands, a remote archipelago between Scotland and Iceland, could have been inhabited 500 years earlier than was previously thought, according to a startling archaeological discovery. The islands were thought to have been colonized by the Vikings in the 9th century AD. However, dating of peat ash and barley grains has revealed that humans had actually settled there somewhere between the 4th and 6th centuries AD. The Faroes were the first stepping stone beyond the Shetland Islands for the dispersal of European people across the North Atlantic. The findings therefore allow speculation as to whether Iceland, Greenland, and even North America were reached earlier than previously thought. The Faroes are in the North Atlantic, roughly equidistant between Iceland, Norway, and the UK. Mike Church from the University of Durham said he and his research partner, Símun V. Arge from the National Museum of the Faroe Islands, had not expected to find such evidence. “Símun and myself sampled the site in 2006 to take scientific samples for environmental archaeological analysis from the medieval Viking settlement, “ he said. Read 12 remaining paragraphs | Comments        

Visit site:
Someone beat the Vikings into the North Atlantic by 500 years

Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist

William Ward Google developers have confirmed a cryptographic vulnerability in the Android operating system that researchers say could generate serious security glitches on hundreds of thousands of end user apps, many of them used to make Bitcoin transactions. This weakness in Android’s Java Cryptography Architecture is the root cause of a Bitcoin transaction that reportedly was exploited to pilfer about $5, 720 worth of bitcoins out of a digital wallet  last week. The disclosure, included in a blog post published Wednesday by Google security engineer Alex Klyubin, was the first official confirmation of the Android vulnerability since Ars and others  reported the incident  last weekend. Klyubin warned that other apps might also be compromised unless developers change the way they access so-called PRNGs, short for pseudo random number generators. “We have now determined that applications which use the Java Cryptography Architecture (JCA) for key generation, signing, or random number generation may not receive cryptographically strong values on Android devices due to improper initialization of the underlying PRNG, ” he wrote. “Applications that directly invoke the system-provided OpenSSL PRNG without explicit initialization on Android are also affected.” Apps that establish encrypted connections using the HttpClient and java.net classes aren’t vulnerable. Read 5 remaining paragraphs | Comments        

Read this article:
Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist

Mobile startup offers unprecedented plan: 500MB of data, free incoming calls

On Tuesday, the American mobile phone market took one step closer to looking a bit more like the European or Asian markets: free incoming calls, inexpensive outgoing calls, and a focus on data. A Canadian startup, TextNow , just launched a new mobile service in the United States. For $18.99 per month, you get 500MB of data, 750 rollover minutes, and unlimited texting and incoming calls. In the US, it’s the norm for both the sending and receiving parties to be charged for a call. But nearly everywhere else in the world, only the person who originated the call actually pays. “Incoming calls don’t really cost us that much, ” Derek Ting, the company’s CEO, told Ars. “Carriers charge you anyway because they can get away with it.” Read 5 remaining paragraphs | Comments        

Read this article:
Mobile startup offers unprecedented plan: 500MB of data, free incoming calls

Simple technique puts graphene capacitors on par with lead-acid battery

If the bottom is a layer of graphene in a super capacitor, then storage can be increased by making the solution above it as low-volume as possible. Lawrence Livermore National Lab Individual pieces of graphene have some pretty amazing properties, but finding a way to produce bulk materials that make good use of those properties has been rather challenging. Now, researchers have figured out a way to make graphene-based electrodes in bulk through a process so simple that it can be adapted to the manufacturing techniques that we currently use to make paper. And the resulting capacitors, at least in these test cases, had storage capacities that approached those of lead-acid batteries. Those of us who have taken basic physics tend to think of capacitors as two parallel, charge-holding plates, since that’s how they’re taught. But electrochemical capacitors perform a similar trick on a much smaller scale, by having the charges held by individual ions that absorb to an electrode. To boost capacity, the simplest thing to do is to increase the surface area for the ions to interact with. That’s why graphene seems so appealing; since it’s only a single atom thick, it should be possible to stick a tremendous amount of surface into a relatively small volume. The problem, however, has been getting the ions into the graphene itself in order for them to interact. Once the graphene is prepared, lots of factors like pore size and inter-sheet spacing come into play, since these control how quickly ions can get into the graphene. A team at Australia’s Monash University came up with an easy solution to this: put the ions in place during the manufacturing process. Read 4 remaining paragraphs | Comments        

Continued here:
Simple technique puts graphene capacitors on par with lead-acid battery

Alleged Tor hidden service operator busted for child porn distribution

Catherine Scott On Friday, Eric Eoin Marques, a 28 year-old Dublin resident, was arrested on a warrant from the US on charges that he is, in the words of a FBI agent to an Irish court , “the largest facilitator of child porn on the planet.” The arrest coincides with the disappearance of a vast number of ” hidden services ” hosted on Tor, the anonymizing encrypted network. Marques is alleged to be the founder of Freedom Hosting, a major hidden services hosting provider. While Marques’ connection to Freedom Hosting was not brought up in court, he has been widely connected to the service—as well as the Tormail anonymized e-mail service and a Bitcoin exchange and escrow service called Onionbank—in discussions on Tor-based news and Wiki sites. All those services are now offline. And prior to disappearing, the sites hosted by Freedom Hosting were also distributing malware that may have been used to expose the users of those services. Tor hidden services are a lesser known part of the Tor “darknet.” They are anonymized Web sites, mail hosts, and other services which can only be reached by computers connected to Tor, or through a Tor hidden services proxy website, such as tor2web.org , and they have host names ending in .onion. Read 5 remaining paragraphs | Comments        

Originally posted here:
Alleged Tor hidden service operator busted for child porn distribution

Older iPhones won’t be banned as Obama Administration vetoes ITC decision

On Saturday, the Obama Administration vetoed the International Trade Commission’s potential ban on a few models of older Apple phones and tablets. Samsung opened the case against Apple with the ITC in 2011, and the commission decided in June that Apple had, in fact, infringed upon a Samsung patent, US Patent No 7, 706, 348 . The decision garnered attention because the patent is considered essential to industry standards, meaning Samsung is required to license the patent (rather than sit on it, or refuse license it to some competitors). The ITC ended up recommending a ban be placed on the infringing products brought forward in the case, which included AT&T models of the iPhone 4, the iPhone 3GS, iPhone 3, iPad 3G, and iPad 2 3G. In June of 2013, Ars wrote  of the ITC’s ban: ”The decision can only be appealed to the US Court of Appeals for the Federal Circuit, the nation’s top patent court. Theoretically, the President can also block an ITC-ordered import ban, but that hasn’t happened since the 1980s.” Read 4 remaining paragraphs | Comments        

See more here:
Older iPhones won’t be banned as Obama Administration vetoes ITC decision

Raspberry Pi and Arduino to get cellular access with SIM card add-on

SparqEE A new Kickstarter project aims to give Raspberry Pi and Arduino boards Internet access throughout the world with an add-on that allows integration with a SIM card. SparqEE Cellv1.0 would need to raise $70, 000 to get the technology to backers, with donors pledging at least $69 to get the device. SparqEE CEO Christopher Higgins, an engineer, said he plans to take the Kickstarter page live on August 20. For now, it’s viewable in a draft form so that people can provide feedback. Cellv1.0 consists of a board with a cellular chip, a power supply, and a SIM holder, as well as a “jumper board” that “includes level shifters for whatever voltage levels you’re using (ex. 3.3V, 5V, or other).” Read 5 remaining paragraphs | Comments        

Continue Reading:
Raspberry Pi and Arduino to get cellular access with SIM card add-on

SkyDrive follows Metro into oblivion as Microsoft abandons trademark case

“How’s SkyDrive?” “Oh, SkyDrive… won’t see him no more.” Microsoft One month after a British court ruled that Microsoft’s SkyDrive infringed on a British Sky Broadcasting (BSkyB) Group trademark, Microsoft has decided not to appeal and will find a new name for its cloud storage service. A press release Microsoft provided to Ars today states that BSkyB and Microsoft have agreed to a “settlement of trade mark infringement proceedings in the European Union brought by Sky against Microsoft in the English High Court… According to the settlement, Microsoft will not pursue its planned appeal of this decision and Sky will allow Microsoft to continue using the SkyDrive name for a reasonable period of time to allow for an orderly transition to a new brand. The agreement also contains financial and other terms, the details of which are confidential.” Microsoft said it would not provide any details beyond what’s in the press release, which also makes a vague reference to “joint projects” to benefit Microsoft and BSkyB customers. A new name for SkyDrive was not announced. The release does not specify whether the name change would occur in Europe only or worldwide, but it seems likely that Microsoft would want to have one name for the service in every region. Read 3 remaining paragraphs | Comments        

Originally posted here:
SkyDrive follows Metro into oblivion as Microsoft abandons trademark case

Trusting iPhones plugged into bogus chargers get a dose of malware

The Mactans charger uses a BeagleBoard for its computational power. Billy Lau, Yeongjin Jang, and Chengyu Song Plugging your phone into a charger should be pretty safe to do. It should fill your phone with electricity, not malware. But researchers from Georgia Institute of Technology have produced fake chargers they’ve named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones. Their bogus chargers—which do, incidentally, charge the phone—contain small computers instead of mere transformers. The iPhone treats these computers just as it does any other computer; instead of just charging, it responds to USB commands. It turns out that the iPhone is very trusting of USB-attached computers; as long as the iPhone is unlocked (if only for a split second) while attached to a USB host, then the host has considerable control over the iPhone. The researchers used their USB host to install an app package onto any iPhone that gets plugged in. iOS guards against installation of arbitrary applications with a strict sandboxing system, a feature that has led to the widespread practice of jailbreaking. This attack doesn’t need to jailbreak, however. Read 6 remaining paragraphs | Comments        

Link:
Trusting iPhones plugged into bogus chargers get a dose of malware