New wireless charging gear promises 3x faster charging

Faster charging, like Qualcomm’s “Quick Charge 2.0” (branded as “Turbo Charging” on the Nexus 6), is one of the nicest new smartphone features available. If we can’t make a battery last all day with heavy use, we can at least make it charge faster. The faster charging is possible because these devices charge at a higher voltage—instead of the normal 5 watts from a standard USB charger, these hit about 14 watts. These faster chargers have left wireless chargers in the dust, though. Today’s Qi charging pads still only put out 5W, the same as a slow wired charger. Freescale Semiconductor, a company that provides various chips to OEMs, is out to fix that. Today the company announced integrated circuits for 15 watt wireless chargers —a wireless solution that should be just as fast as a hardwired turbo charger. Of course, you will need new hardware to make this work. Freescale’s solution will require a new chip in your smartphone or tablet and a new charging pad. The good news is that this isn’t a new standard. Freescale’s chips can be tweaked to be compliant with Qi charging, which is found in many smartphone, or with lesser-used standards like the Power Matters Alliance. The Qi “medium power” standard is actually good up to 120W, provided the pad and device support it. Read 2 remaining paragraphs | Comments

Read the original post:
New wireless charging gear promises 3x faster charging

Linux Mint 17.1 review—less change is good change

The Linux Mint team recently released Linux Mint 17.1—a somewhat minor but still welcome upgrade to the Ubuntu-based ecosystem. And while Linux Mint 17.1 arrives as it usually does (a few weeks after the release of a new version of Ubuntu), version 17.1 is not based on Ubuntu’s latest effort, 14.10. Instead, this edition of Mint remains tied to the last Long Term Support (LTS) release, Ubuntu 14.04 . This marks the first time Linux Mint has not used the newest version of Ubuntu for a release. But if you paid attention to the curious approach of Linux Mint 17.0, you’ll know that was the plan all along. These days, Mint will not be changing its Ubuntu base again until the next LTS release—Ubuntu 16.04—arrives in 2016. And at first glance, it might seem like a bad thing. After all, Mint is missing out on whatever new stuff is in Ubuntu 14.10 (in this case it’s not much, but 15.04 will have plenty of changes). However, Mint 17.1 is in fact a very good sign for fans of the distro’s own tools, like its homegrown Cinnamon desktop. By relying on a consistent LTS release, Mint developers can more or less ignore the base system. Instead of spending all their time and effort making sure whatever Ubuntu has changed works with Mint, they can focus on what makes the ecosystem great—namely, its two primary desktops, MATE and Cinnamon. Read 32 remaining paragraphs | Comments

Read more here:
Linux Mint 17.1 review—less change is good change

AT&T still throttles “unlimited data”—even when network not congested

A while back, we reported that AT&T had stopped throttling unlimited data users except in cases when the network is congested. We were wrong. AT&T did change its policy to stop the automatic throttling of many unlimited data plans, but the company’s older, more draconian throttling policy still applies to customers with unlimited LTE data. AT&T told Ars the policy will be changed for all customers sometime in 2015, but it did not say whether that will happen closer to the beginning of the year or the end of the year. Here’s how it works: Customers who have 3G or non-LTE 4G phones and “ legacy unlimited data plans ” are throttled for the remainder of the billing period after they exceed 3GB of data in a month, but only “at times and in areas that are experiencing network congestion.” 4G and LTE are practically synonymous these days, but AT&T also applies the 4G label to its HSPA network technology. Read 14 remaining paragraphs | Comments

Visit site:
AT&T still throttles “unlimited data”—even when network not congested

Police officer fired for refusing to turn on body cam

The idea of putting body-worn cameras on police officers has spread since protests and unrest following the shooting of an unarmed teenager in Ferguson, Missouri. Earlier this week, the Obama administration proposed federal funding to get 50,000 more officers equipped with the cameras. The increased use of cameras makes a few policy questions around them more pressing. One such question: what happens when a police officer fails—or straight-up refuses—to turn on the body camera? The issue was highlighted in today’s Wall Street Journal , which features a story about a New Mexico police officer who “was fired for allegedly not following an order to record and upload all contacts with citizens,” according to the Albuquerque Police Department and the officer’s lawyer. Read 5 remaining paragraphs | Comments

Continue reading here:
Police officer fired for refusing to turn on body cam

FBI seizes 20 boxes of documents on LAUSD iPad program

On Monday morning, the FBI seized 20 boxes of documents pertaining to a $1.3 billion iPad program from the Los Angeles Unified School District (LAUSD), according to the Los Angeles Times . The program, which was intended to give iPads to every student, teacher, and campus administrator of the nation’s second-largest school district, has met with many catastrophic difficulties, and this latest federal investigation led the new superintendent of the school system to shelve the project indefinitely on Tuesday. The program first hit a bump in the road back in 2013 when a number of students “hacked” the iPads —which is to say they deleted profile information that designated the user as a student, thus letting the student browse the Internet unencumbered by the filter restrictions enforced by the school district. At the same time, many teachers reported that they felt ill-equipped to use and teach with the iPads. In October, the LAUSD Superintendent John Deasy resigned amid allegations of malfeasance , although he claimed no wrongdoing. Deasy drew attention after the disclosure of his ties to Apple and curriculum-provider Pearson. On Tuesday, Deasy told the Los Angeles Times that he had had no contact with the FBI, nor did he know what the investigation was about. Ars contacted the FBI for more details about the investigation, but a spokesperson said she could not comment. Read 2 remaining paragraphs | Comments

Read More:
FBI seizes 20 boxes of documents on LAUSD iPad program

T-Mobile forced to stop hiding slow speeds from throttled customers

When T-Mobile US customers exceed their monthly data caps, they aren’t cut off from the Internet entirely. Instead, T-Mobile throttles their connections to 128Kbps or 64Kbps, depending on which plan they have, for the rest of the month. But T-Mobile has made it difficult for those customers to figure out just how slow their connections are, with a system that exempts speed test applications from the throttling. After complaints from consumer advocates , the Federal Communications Commission (FCC) investigated the issue and has forced T-Mobile to be more honest about its network’s throttled speeds. Announced today , an agreement between T-Mobile and the FCC ensures that customers will be able to accurately gauge their throttled speeds. Read 9 remaining paragraphs | Comments

More:
T-Mobile forced to stop hiding slow speeds from throttled customers

Here’s how to run homebrew on your 3DS

A video showing off Smealum’s Ninjhax homebrew exploit in action. Earlier this week, hacker Jordan “Smealum” Rabet announced that obscure 2011 3DS platformer Cubic Ninja held the key to unlocking the 3DS hardware to run homebrew code, causing an immediate run on the hard-to-find game . Now, Smealum has published the details of his hack , along with the instructions and tools needed to unlock the system. What Smealum is calling “Ninjhax” exploits an error in Cubic Ninja ‘s level creation and sharing function, which passes created level data via generated QR codes. Scanning a specifically manufactured QR code, generated by a tool on Smealum’s site to match any current 3DS hardware/firmware combination, causes the game to run a boot file loaded on the SD card. At that point, the bootloader downloads additional code over Wi-Fi and installs and runs a front-end channel that can run other homebrew software stored on the SD card. After that initial QR code scan, the homebrew menu can be loaded simply by accessing the save game file through Cubic Ninja . Read 3 remaining paragraphs | Comments

More here:
Here’s how to run homebrew on your 3DS

Local judge unseals hundreds of highly secret cell tracking court records

Scott A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device. According to the Charlotte Observer , the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used. The newspaper also reported on Friday that the Mecklenburg County District Attorney’s office, which astonishingly had also never previously seen the applications filed by the Charlotte-Mecklenburg Police Department (CMPD), will now review them and determine which records also need to be shared with defense attorneys. Criminals could potentially file new claims challenging their convictions on the grounds that not all evidence was disclosed to them at the time. Read 13 remaining paragraphs | Comments

Follow this link:
Local judge unseals hundreds of highly secret cell tracking court records

Gorilla Glass 4 promises to save your phone from street drops

This video screencap comes after a Gorilla Glass 4 device fell for a full meter and landed directly onto a sandpaper-coated surface. Look: no breakage, no shattering. Corning On Thursday, Corning Incorporated, the creators of Gorilla Glass, unveiled the fourth generation of its thin, durable glass technology for use in smartphones, tablets, and other mobile electronics. Gorilla Glass 4 is already being advertised as “up to two times stronger” than any “competitive” mobile screen, with a specific focus on surviving everyday drops in the real world. Corning confirmed to Ars Technica that the upgraded glass will reach consumer devices “this quarter.” Global marketing director David Velasquez was unwilling to reveal “what we did to the glass to make it better,” but he talked at length about one major change to the company’s lab testing: a single sheet of sandpaper. After analyzing “thousands upon thousands” of screens broken in the real world, Corning confirmed that a major contributor to common breakage was dropping a phone on “rough surfaces like asphalt and concrete.” That might seem like a head-smackingly obvious issue, but Velasquez insists that the smartphone glass-making industry, which hasn’t even existed for a full decade, has “no standard” for such testing. Most drop tests employ surfaces like stainless steel or granite, which replicate surfaces in a home. “The best way to approximate what asphalt does [to a phone screen] is 180-grit sandpaper,” Velasquez said. That can more consistently reproduce the microscopic breakage of a rough surface than even a giant sheet of asphalt (which, Corning learned after a few tests, actually smooths out at a point of contact after a few drops). Read 2 remaining paragraphs | Comments

More:
Gorilla Glass 4 promises to save your phone from street drops

FTC: Windows tech support scams took another $120 million from PC users

Beware, scammer! Aurich Lawson Windows tech support scams have been conning PC users out of money for years, and there’s seemingly no end in sight. The Federal Trade Commission today announced that “a federal court has temporarily shut down two massive telemarketing operations that conned tens of thousands of consumers out of more than $120 million by deceptively marketing computer software and tech support services.” This is the third in a series of actions against such operations, the FTC said, and if the past is any indication, it won’t be the last. The FTC announced a big crackdown in late 2012 and another in late 2013 . But PC users continued to hand over money to nearly identical scammers, according to the latest FTC complaints. Today’s FTC press release described a method that has tricked PC users time and again: According to the FTC’s complaints, each scam starts with computer software that purports to enhance the security or performance of consumers’ computers. Typically, consumers download a free trial version of software that runs a computer system scan. The defendants’ software scan always identifies numerous errors on consumers’ computers, regardless of whether the computer has any performance problems. The software then tells consumers that, in order to fix the identified errors, they will have to purchase the paid version of the software. In reality, the FTC alleges, the defendants pitching the software designed these highly deceptive scans to identify hundreds or even thousands of “errors” that have nothing to do with a computer’s performance or security. After consumers purchase the “full” version of the software at a cost of $29 to $49, the software directs them to call a toll-free number to “activate” the software. When consumers call the activation number, however, they are connected to telemarketers who try to sell computer repair services and computer software using deceptive scare tactics to deceive consumers into paying for unneeded computer support services. According to the FTC, the telemarketers tell consumers that, in order to activate the software they have just purchased, they must provide the telemarketers with remote access to their computers. The telemarketers then launch into a scripted sales pitch that includes showing consumers various screens on their computers, such as the Windows Event Viewer, and falsely claiming that these screens show signs that consumers’ computers have significant damage. After convincing consumers that their computers need immediate help, the telemarketers then pitch security software and tech support services that cost as much as $500. The FTC teamed up with the State of Florida on the latest cases, winning federal court orders against the companies that “also temporarily freeze the defendants’ assets and place the businesses under the control of a court-appointed receiver.” The complaints say the defendants have been scamming consumers since at least 2012. Read 2 remaining paragraphs | Comments

Visit site:
FTC: Windows tech support scams took another $120 million from PC users