Microsoft brings Android, iOS apps to Windows 10

SAN FRANCISCO—Microsoft announced a four-pronged effort to bring developers and their apps to Windows at its build conference today. One of these prongs—a way for Web developers to present their sites as apps—was already announced at Mobile World Congress earlier in the year. The second prong is logical but not altogether surprising. In Windows 10, developers will be able to specially prepare existing Windows apps, whether Win32, .NET WinForms, .NET WPF, or any other Windows development technology, and sell them through the Windows Store. Unlike the “traditional” Windows application installation experience, these apps will be guaranteed to install, update, and uninstall cleanly—one of the important things that Store apps do to ensure that users feel confident trying apps out and removing them if they don’t like them. Behind the scenes, virtualization technology will be used to provide this isolation and robustness. Islandwood and Astoria The next two prongs are the more surprising: Microsoft is going after Android and iOS developers. With Project Islandwood, iOS developers will be able to take their iOS apps and build them for Windows. Microsoft has developed an Objective C toolchain and middleware layer that provide the operating system APIs that iOS apps expect. A select group of third parties have been using the Islandwood tools already, with King’s Candy Crush Saga for Windows Phone being one of the first apps built this way. King’s developers had to change only a “few percent” of the code in order to fully port it to Windows Phone. Read 6 remaining paragraphs | Comments

Original post:
Microsoft brings Android, iOS apps to Windows 10

AT&T/DirecTV merger likely to be approved

Despite Comcast abandoning  its Time Warner Cable (TWC) purchase in the face of government opposition, mergers of Internet and TV providers are still on the table. AT&T’s proposed $48.5 billion acquisition of DirecTV is likely to win approval from the Federal Communications Commission,  The Wall Street Journal reported . And TWC could still be acquired, but by Charter Communications instead of Comcast. The FCC hasn’t publicly revealed its position on AT&T’s attempt to buy the satellite TV provider. But despite opposing Comcast/TWC, the commission “sees the AT&T deal as helping competition and aiding the spread of broadband into rural areas that lack service, people familiar with the matter said,” according to the Journal report. FCC officials haven’t yet finalized concessions that AT&T would make in exchange for approval, “but the commission’s staff is inclined to recommend the approval of the deal.” Read 6 remaining paragraphs | Comments

Excerpt from:
AT&T/DirecTV merger likely to be approved

170-year-old champagne provides clues to past winemaking

Divers discovered bottles in a shipwreck off the Finnish Aland archipelago in the Baltic Sea in 2010. After tasting the bottles on site, the divers realized they were likely drinking century-old champagne. Soon after, 168 unlabeled bottles were retrieved and were identified as champagnes from the Veuve Clicquot Ponsardin (VCP), Heidsieck, and Juglar (known as Jacquesson since 1832) champagne houses. A few of the recovered bottles had been lying horizontal in close-to-perfect slow aging conditions. Discovery of these wines, likely the oldest ever tasted, unleashed a flood of questions. When were these wines produced? What winemaking processes were in use at the time? Where was the wine going when the shipwreck occurred? An analytic approach A team of scientists gathered to search for the answers through the application of current analytical techniques, an approach called archaeochemistry. Using a combination of targeted and nontargeted modern chemical analytic approaches, the researchers aimed to uncover aspects of the winemaking practices. Read 14 remaining paragraphs | Comments

See more here:
170-year-old champagne provides clues to past winemaking

Microsoft’s Office 365 “lockbox” gives customers last word on data access

One of the concerns that keeps many companies from adopting software-as-a-service for e-mail and other collaboration services has been the issue of who has control over the security of the content. Today at the RSA Conference, Microsoft is announcing changes to its Office 365 service that will allay some of those concerns, giving customers greater visibility into the security of their applications and control over what happens with them. At the same time, it will potentially be harder for government agencies and law enforcement to secretly subpoena the contents of an organization’s e-mail. In an interview with Ars, Microsoft’s general manager for Office 365 Julia White outlined the three new features, which are being announced in a blog post from Office 365 team Corporate Vice President Rajesh Jha today . Office 365 will now include a “Customer Lockbox” feature that puts customer organizations in control of when Microsoft employees can gain access to their data, requiring explicit permission from a customer before systems can be accessed to perform any sort of service on their Office 365 services. The capability will be turned on by the end of 2015 for e-mail and for SharePoint by the end of the first quarter of 2016. “We have automated everything we can to prevent the need for our people having to touch customer data,” White told Ars. “It’s almost zero—there are very rare instances when a Microsoft engineer has to log in to a customers’ services. Now we’re going to, in those rare instances, make customer approval mandatory to do so.” That would also apply to law enforcement requests for access, White acknowledged. “When the customer opts into the Lockbox, all requests would go into that process. So it’s a customer assurance of transparency. We want to systematically look at what kind of control and transparency customers want and provide it to them,” White said. Read 2 remaining paragraphs | Comments

Original post:
Microsoft’s Office 365 “lockbox” gives customers last word on data access

Solar powered Blue Cell provides cellular backhaul without wires

As we mentioned in our earlier coverage of LINK , Bell Labs is expecting that the near future will bring a lot of growth in cellular devices, like smart appliances and sensors. Part of its solution to this flood of new devices is to give them their own chunk of the spectrum to keep them from getting in the way of user-driven devices, like phones and tablets. But that’s only part of the solution; phone and tablet traffic is going to climb as well. The solution there is simply to create more cells so that there are fewer devices talking to a single base tower. But adding more access points isn’t a simple matter. Each requires power and a network connection, and constructing large towers can be a headache of siting permits and contracts. To address this, a research effort at Bell Labs called “Blue Cell” is attempting to simplify cellular access points by getting rid of the wires. As solar panel prices have plunged, getting rid of the power cord has gotten a lot easier. Of course, siting a large solar panel can be just as much trouble as siting a cell phone tower, so one of the major goals of the research was to reduce the energy requirements of a cellular access point. Examining the existing hardware, engineers found that the biggest energy draw was the digital signal processor, which converts the cellular signal into something that can be sent over network cables. Read 3 remaining paragraphs | Comments

Originally posted here:
Solar powered Blue Cell provides cellular backhaul without wires

Verizon’s new “Custom TV” is small step toward a la carte pricing

The dreaded pay-TV bundles that result in US homes watching only about 10 percent of the channels they pay for aren’t going away any time soon, but Verizon’s FiOS TV service is taking a small step in the right direction. Starting Sunday, new and existing FiOS customers will be able to choose from new “Custom TV” bundles that offer more flexibility and could (depending on one’s interests) save subscribers a bit of money. Verizon’s new Custom TV pricing, available beginning Sunday. 6 more images in gallery “It’s a simple way for customers to choose the types of channels they want without paying for those they don’t,” Verizon said in a description of the new pricing system that was e-mailed to reporters. Read 9 remaining paragraphs | Comments

Read this article:
Verizon’s new “Custom TV” is small step toward a la carte pricing

Universal backdoor for e-commerce platform lets hackers shop for victims

As people become more aware of the threat of targeted “phishing” attacks via e-mail and social media, malware-armed attackers are turning to new ways to target specific victims where they least expect it—by exploiting the legitimate websites they frequent and assume to be secure. Last week, Swiss security firm Hi-Tech Bridge disclosed that the Web store of a corporate customer had been used to deliver a targeted attack against a specific site visitor. The attackers were also able to retrieve the store’s customer database, which they may have used to search for desirable targets. The attack exploited a current and patched version of osCommerce Online Merchant (version 2.3.4, released last June), a common Web store content management system used by a number of high-profile companies—including Canonical’s Ubuntu Shop . The attacker inserted malicious PHP script that provided a backdoor into the site and could be configured to check users’ IP addresses and login credentials as they visit the site for specific targets. Once a desired target is detected, the script attempts to download malware to the victim from another site. The attacker can then remotely delete the backdoor and altered PHP files and replace them with the original by connecting to the script with a “?del” parameter added to its URL. The backdoor script is labeled as “osCommerce 2.x.x universal pwner by Piht0z,” and it’s just that: a generic PHP-based backdoor for osCommerce sites. According to Ilia Kolochenko, High-Tech Bridge’s CEO, there have been similar cases of targeted attacks on users of e-commerce sites before, but “it’s the first time we see a universal backdoor for a large e-commerce platform,” he said in a blog post about the discovery. “This means that hackers started using this vector on a regular basis to achieve their goals.” Read on Ars Technica | Comments

View post:
Universal backdoor for e-commerce platform lets hackers shop for victims

Botnet that enslaved 770,000 PCs worldwide comes crashing down

Law enforcement groups and private security companies around the world said they have taken down a botnet that enslaved more than 770,000 computers in 190 countries, stealing owners’ banking credentials and establishing a backdoor to install still more malware. Simda, as the botnet was known, infected an additional 128,000 new computers each month over the past half year, a testament to the stealth of the underlying backdoor trojan and the organization of its creators. The backdoor morphed into a new, undetectable form every few hours, allowing it to stay one step ahead of many antivirus programs. Botnet operators used a variety of methods to infect targets, including exploiting known vulnerabilities in software such as Oracle Java , Adobe Flash , and  Microsoft Silverlight . The exploits were stitched into websites by exploiting SQL injection vulnerabilities and exploit kits such as Blackhole and Styx. Other methods included sending spam and other forms of social engineering. Countries most affected by Simda included the US, with 22 percent of the infections, followed by the UK, Turkey with five percent, and Canada and Russia with four percent. The malware modified the HOSTS file Microsoft Windows machines use to map specific domain names to specific IP addresses. As a result, infected computers that attempted to visit addresses such as connect.facebook.net or google-analytics.com were surreptitiously diverted to servers under the control of the attackers. Often the booby-trapped HOSTS file remains even after the Simda backdoor has been removed. Security researchers advised anyone who may have been infected to inspect their HOSTS file, which is typically located in the directory %SYSTEM32%driversetchosts. People who want to discover if they have been infected by Simda can check this page provided by AV provider Kaspersky Lab. The page is effective as long as a person’s IP address hasn’t changed from when the infection was detected. Read 2 remaining paragraphs | Comments

View post:
Botnet that enslaved 770,000 PCs worldwide comes crashing down

Google Fiber plans expansion, then TWC makes speeds six times faster

With Google Fiber preparing an expansion into Charlotte, North Carolina, incumbent cable operator Time Warner Cable is trying to hold onto customers by dramatically increasing Internet speeds at no extra charge. “The Internet transformation will begin this summer and will include speed increases on TWC residential Internet plans at no additional cost, with customers experiencing increases up to six times faster, depending on their current level of Internet service,” Time Warner Cable announced last week . “For example, customers who subscribe to Standard, formerly up to 15Mbps, will now receive up to 50Mbps, customers who subscribe to Extreme, formerly up to 30Mbps, will now receive up to 200Mbps; and customers who subscribe to Ultimate, formerly up to 50Mbps, will receive up to 300Mbps, at no extra charge.” Google announced plans to enter Charlotte and a few other metro areas in January and is working with local officials to finalize the network design so that construction can begin. Read 5 remaining paragraphs | Comments

View post:
Google Fiber plans expansion, then TWC makes speeds six times faster

Quitting + failures + a microscope in the living room = Nobel Prize

Murray Hill, NJ—When the Nobel Prizes were handed out last year, there was clearly an interesting story behind Eric Betzig, who won in chemistry for his work in developing a microscope that could image well beyond the diffraction limit. Betzig, it was noted, took time out of his scientific career to work in his father’s machine tool business for a number of years. That break occurred after he left Bell Labs in New Jersey. Yesterday, his former home had him back in order to honor him, along with its seven other Nobel winners. Betzig got a prime speaking slot, and he used it to fill in the details of his long odyssey. Although his time at Bell Labs ended with him quitting science, it was clear that his time there was essential to his career’s eventual resurrection. Betzig started at Bell Labs after finishing his PhD at Cornell (the person who hired him, Hosrt Störmer, went on to win a Nobel as well). At the time, he was working on what’s termed “near field” microscopy, where, as he described it, a lens with a tiny aperture is jabbed right up against a sample; images are built by scanning the imaging tip across the sample. To make these tips, he’d been coating glass pipettes with aluminum; once at Bell Labs, he switched to something that was in easy supply there: optical fibers. Read 12 remaining paragraphs | Comments

View original post here:
Quitting + failures + a microscope in the living room = Nobel Prize