Report: Siri for Mac will be one of OS X 10.12’s major new features

(credit: Apple) Apple’s Siri personal assistant will finally be coming to OS X 10.12 when the OS is released later this year, according to a report from 9to5Mac . According to the report, a Siri icon will live in the menu bar in the upper-right corner of the screen along with icons for Spotlight, the Notification Center, and other features. Users will also be able to use a keyboard shortcut to bring up Siri, which will be an optional feature that can be enabled during first-time setup or in System Preferences (much as it works in iOS today). Microsoft’s Cortana feature made a similar jump from Windows Phone 8.1 to Windows 10 last year, and Google supports its “OK Google” voice commands in Chrome OS as well. Since launching on the iPhone 4S in 2011, Siri has become a mainstay in most of Apple’s products; it spread to the iPad relatively quickly, it came to the Apple TV when it was refreshed last year, and it’s a primary input method for the Apple Watch. OS X already supports an optional Dictation feature for turning speech into text—in other words, the feature is a natural and long-awaited addition to the Mac platform. Read 1 remaining paragraphs | Comments

More:
Report: Siri for Mac will be one of OS X 10.12’s major new features

Microsoft kills off Qik, the video messaging service you didn’t know it had

Playing back a conversation, on the Windows Phone version. You’ll be forgiven for having forgotten about Skype Qik, the short video messaging service from Skype that Microsoft launched in October 2014. It offered low friction messaging—no need to create an account, merely having a phone number would do—similar to WhatsApp, SMS, or all sorts of other popular messaging services. Well, now it’s going away. The company says that the major features of Qik have been rolled into the regular Skype apps; video messaging already existed in Skype when Qik was released, and filters were added in October last year. As such, the app isn’t really needed any more, and Qik will stop working on March 24. Skype Qik was a successor to a short video messaging service called Qik that Skype bought in January 2011 for $150 million, just months before Microsoft bought Skype for $8.5 billion. The original Qik service was built around capturing video messages and sharing them with others. It was closed down in April 2014, as Skype introduced its own integrated video messaging capability. In that context, the new Skype Qik was a little strange, as it overlapped strongly with both the previously shuttered service, and the newly-added Skype capabilities. Read 1 remaining paragraphs | Comments

View original post here:
Microsoft kills off Qik, the video messaging service you didn’t know it had

Linux Mint hit by malware infection on its website, forum after hack attack

(credit: Wired UK/Shuttershock) Linux Mint forum users, and anyone who downloaded and installed a copy of the 17.3 Cinnamon edition on Saturday have probably been compromised by hackers and need to take action immediately, the distro’s creator has warned. Clem Lefebvre, confirmed in a  blog post that the “intrusion” had taken place over the weekend. He said: “Hackers made a modified Linux Mint ISO, with a backdoor in it, and managed to hack our website to point to it.” He added that the resultant malware infection had only affected ISOs downloaded from the Linux Mint site on Saturday, February 20. “As far as we know, the only compromised edition was Linux Mint 17.3 Cinnamon edition,” Lefebvre said. However, by Sunday it was a different story , with Linux Mint confirming that its forums database had also been targeted in the hack of its systems. Read 6 remaining paragraphs | Comments

Read More:
Linux Mint hit by malware infection on its website, forum after hack attack

Tiny micro-supercapacitors built directly on a chip

(credit: Drexel University ) Since the tech boom began decades ago, we’ve seen a dramatic transformation of electronics. Today, some technological dreamers are talking about “smart environments” where electronics are seamlessly integrated into our environment, providing comfort and convenience. For these dreams to be achieved, we need to get electronics—not just the chips—miniaturized to the point where sensors can be pervasive. This involves developing high-performance electrochemical storage devices to enable long-lived sensors and radio frequency identification (RFID) tags. But efficient miniaturized energy storage devices have proven to be challenging to create; it can be done, but it’s hard to integrate the results with other electronics. Supercapacitors According to an article in Science , an international team of scientists has now reported some progress in this area—specifically with the design of micro-supercapacitors. Supercapacitors are a class of materials that can store energy through accumulation of charge at the surface of a high-surface-area carbon sheet. They typically have a good cycle life, moderate energy density (6 Wh/kg), and high power densities (> 10 kW/kg). Supercapacitors are a great replacement for batteries in applications that require high power delivery and uptake with a very long charge-discharge cycle life; micro-supercapacitors are the same kind of material but much, much smaller. Read 13 remaining paragraphs | Comments

View article:
Tiny micro-supercapacitors built directly on a chip

McAfee will break iPhone crypto for FBI in 3 weeks or eat shoe on live TV

Enlarge / John McAfee and Ars Technica deep cover operative Sean Gallagher at an unnamed location that looks suspiciously like Las Vegas. (credit: Sean Gallagher) In an op-ed for Business Insider titled ” I’ll decrypt the San Bernardino phone free of charge so Apple doesn’t need to place a back door on its product ,” libertarian presidential candidate and former antivirus developer John McAfee waded into the ongoing battle of words between Apple and the FBI with some choice words of his own. Never one to bring a knife to a verbal gunfight, McAfee unleashes a howitzer of invective, blasting the United States government for undermining the country’s “already ancient cybersecurity and cyberdefense systems.” It takes only four short paragraphs for McAfee to start talking about Nazis and Hitler. Two paragraphs later—not counting blockquotes—McAfee proclaims that by pressing Apple to “back door” (his words) the iPhone and bypass or defeat the mechanisms keeping its data secure, the government is seeking to bring about the end of the world (as we know it). This is heavy stuff. Read 8 remaining paragraphs | Comments

Read More:
McAfee will break iPhone crypto for FBI in 3 weeks or eat shoe on live TV

Remains at a Swedish fort tell a story of bloody Iron Age warfare

A Roman coin found at the site of Sandby Borg, whose inhabitants probably included a number of unemployed Roman soldiers. (credit: Max Jahrehorn Oxides) On Öland, an icy island off the coast of Sweden, archaeologists have unearthed the remains of a 1,500-year-old fort whose inhabitants were brutalized in such an extreme way that legends about it persist to this day. As researchers piece together the fort’s final days, it sounds like they’re telling a horror story. Possibly hundreds of people sheltering behind the fort’s defenses were executed and abandoned, their bodies left to rot in place without burial. Their wounds were indicative of execution. And some of their mouths were stuffed with goat and sheep teeth, possibly a dark reference to the Roman tradition of burying warriors with coins in their mouths. None of their considerable wealth was looted, which is highly unusual. Researchers have found barely hidden valuables in every house they’ve excavated. Even the livestock was left behind after the slaughter, locked up to die of starvation. This is even more bizarre than the lack of looting. On an island with scarce resources, it would have been considered a waste for victors (or neighbors) to leave healthy horses and sheep behind after battle. Read 10 remaining paragraphs | Comments

Read the original:
Remains at a Swedish fort tell a story of bloody Iron Age warfare

Chrome OS distro for regular PCs can now dual-boot with Windows

Enlarge / Dell’s old Latitude E6410 becomes a modern Chromebook. (credit: Andrew Cunningham) A few months ago, we wrote about CloudReady , a version of the open source Chromium OS from Neverware that can transform older Windows PCs into what are essentially Chromebooks (give or take a couple of media codecs and other features). Neverware takes the Chromium OS code provided by Google and does all the hard work of testing and maintaining driver compatibility and providing updates, the same things that Google handles for actual Chromebooks. The OS is aimed at schools that either want to move to Chromebooks but can’t afford the cost of all-new hardware or schools that have already begun a transition to Chromebooks but want to repurpose old hardware they already have. Today, Neverware announced a new version of CloudReady aimed at schools and individuals who want to try the software on their PCs without losing the capability to run Windows. CloudReady version 45.3 can be installed on any system with an existing UEFI-mode installation of Windows 7, 8, or 10 and 32GB of free disk space. You can find detailed installation directions on Neverware’s site. The UEFI requirement means that the list of PCs that support dual-booting is much shorter than the normal CloudReady support list, so this won’t be of much use to people with older BIOS-based PCs and Windows installations. But if you happen to have a device on the list, and you want to give the software a spin, you can download the free version from Neverware’s site. The fully featured version that supports Google’s Chrome OS management console costs $59 per machine for an unlimited license or $25 for a one-year license. Read on Ars Technica | Comments

View article:
Chrome OS distro for regular PCs can now dual-boot with Windows

Massive US-planned cyberattack against Iran went well beyond Stuxnet

(credit: Aurich Lawson) The Stuxnet computer worm that destroyed centrifuges inside Iran’s Natanz uranium enrichment site was only one element of a much larger US-prepared cyberattack plan that targeted Iran’s air defenses, communications systems, and key parts of its power grid, according to articles published Tuesday. The contingency plan, known internally as Nitro Zeus, was intended to be carried out in the event that diplomatic efforts to curb Iran’s nuclear development program failed and the US was pulled into a war between Iran and Israel, according to an article published by The New York Times . At its height, planning for the program involved thousands of US military and intelligence personnel, tens of millions of dollars in expenditures, and the placing of electronic implants in Iranian computer networks to ensure the operation targeting critical infrastructure would work at a moment’s notice. Another piece of the plan involved using a computer worm to destroy computer systems at the Fordo nuclear enrichment site, which was built deep inside a mountain near the Iranian city of Qom. It had long been considered one of the hardest Iranian targets to disable and was intended to be a follow-up to “Olympic Games,” the code name of the plan Stuxnet fell under. Read 5 remaining paragraphs | Comments

More here:
Massive US-planned cyberattack against Iran went well beyond Stuxnet

This flower, preserved in amber, may be 45 million years old

George Poinar The new fossil flower Strychnos electri in its original Dominican amber piece of mid-Tertiary age. The whole flower is less than 20 mm long and is the first finding of an asterid flower in amber from the New World. 4 more images in gallery This delicate flower has been preserved in amber, with each petal and tiny hair intact, for as many as 45 million years. Scientists discovered the flower in a cave in the Dominican Republic along with a treasure trove of insects preserved in amber. Now the flower has been identified by an expert as a member of the vast Asterid clade of flowers, whose members include the coffee plant as well as potatoes, peppers, and the poisonous Strychnine tree. Amber is fossilized tree sap, and pinning an exact date on it is extremely difficult. In paper published this morning in Nature Plants , biologists George Poinar and Lena Struwe  carefully used two methods of dating the material to suggest that this flower might have been fossilized as early as 45 million years ago or as late as 15 million. They came up with such a broad spread of dates largely because we still don’t have very many fossils from these kinds of plants, which makes precise dates difficult. The researchers had to date the flower by proxy, by examining other life forms found the amber cache, including the common single-celled organisms known as foraminifera and coccoliths. There are distinct evolutionary and population changes in foraminifera and coccoliths over time, and paleontologists often use these tiny animals to place fossils during specific geological periods. What’s certain is that this flower bloomed long before the age of apes during the mid-Tertiary period. Read 3 remaining paragraphs | Comments

Original post:
This flower, preserved in amber, may be 45 million years old

The fall… and rise and rise and rise of chat networks

At the end of October 2014, something very important came to an end. After 15 years of changing the way people communicated forever, Microsoft closed down its MSN Windows Live service. Originally named MSN Messenger, its demise was not an overnight failure. Microsoft’s acquisition of Skype for £5.1 billion in 2012 meant it was only a matter of time before it was finally closed. China was the last territory to migrate the service to Skype; other countries did so 12 months earlier. At its height, MSN Messenger had more than 330 million users after originally being launched to rival the emerging chat networks of AOL’s AIM service and ICQ, followed by the entry of Yahoo Messenger. It was the social network of its day and as influential and dominant as Facebook is today. Read 47 remaining paragraphs | Comments

See more here:
The fall… and rise and rise and rise of chat networks