This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, October 22, 2016

Samsung Issues Takedown On Video Of Grand Theft Auto 5 Mod Turning Galaxy Note 7 Into A Bomb

GTA 5, of course, is the video game Grand Theft Auto 5. And, like many video games, it's possible to mod (modify) those video games to add in other elements. And so it appears that someone took the "ripped from the headlines" stories of exploding Note 7s and created a GTA 5 mod that made such things into weapons you could use in the game.

The company is trying to erase it from the internet completely. Samsung has issued a DMCA takedown targeting a YouTube video that showcased the mod, which gives the Note 7 explosive, grenade-like capabilities. It was a pretty great way of poking fun at Samsung's ongoing PR crisis — and now the company is responding in a terrible way: ridiculous overreach and misuse of the DMCA tool.



In case you still don't get what's going on here, let's lay it out for you: there's a big story going on these days about how Samsung's Galaxy Note 7 devices are, well, catching fire (some prefer exploding, but it seems that they're mostly just setting themselves on fire). It's causing injuries and Samsung is in full on panic mode. It's now a felony to bring a Galaxy Note 7 on an airplane. This is the kind of stuff that business school case studies are written about years later, describing how Samsung handled this kind of crisis.



The Note-as-bomb mod, created by HitmanNiko, is clearly a parody of a rather unfortunate real world situation. He didn't copy anything. But that didn't stop Samsung from filing a bogus copyright claim. As a result, the video that we originally linked to earlier this month has been pulled from YouTube, and there's little mystery about the party responsible.

It's unclear whether the original uploader has appealed Samsung's request. Thankfully, other videos featuring the mod remain available for viewing, such as the one embedded below. Instead of pursuing YouTube users, Samsung should probably point those resources to customers affected by the dangerous product that's now been ushered into technology disaster history.




SOURCE: YouTube, Techdirt


Massive DDoS attacks on Dyn DNS cause outages at Twitter, Spotify, SoundCloud and other sites

Several waves of major cyberattacks against an internet directory service knocked dozens of popular websites offline yesterday, with outages continuing into the morning GMT +8 (Manila time).

Twitter, SoundCloud, Spotify, Shopify, and other websites have been inaccessible to many users throughout the day. The outages are the result of several distributed denial of service (DDoS) attacks on the DNS provider Dyn, the company confirmed. The outages were first reported on Hacker News.

“We are actively in the third flank of this attack,” Dyn’s chief strategy officer Kyle York told reporters around 4:30 p.m. ET today. “It’s a very smart attack. As we mitigate, they react.”

Dyn’s general counsel Dave Allen added that, with the help of other infrastructure companies Akamai and Flashpoint, Dyn has determined that some of the traffic used in the attacks comes from the Mirai botnet, a network of infected Internet of Things devices used in other recent large-scale DDoS attacks.


(print screen from digitalattackmap.com)

Dyn and other DNS providers operate as a link between the URLs you type into your browser and the corresponding IP addresses. DDoS attacks are frequently used to censor specific websites by overwhelming them with junk traffic and knocking them offline. However, by attacking Dyn, it’s possible to overwhelm that directory function and cause outages and loading problems across a large swath of the internet.



(print screen from cybermap.kaspersky.com) hmm notice all attacks originate from China?)

Other sites experiencing issues include Box, Boston Globe, New York Times, Github, Airbnb, Reddit, Freshbooks, Heroku and Vox Media properties. Users in Europe and Asia  (Symbianize) may experience fewer problems than those in the U.S. — according to DownDectector’s outage map, the DDoS attacks against Dyn are primarily impacting U.S. users. 


 (print screen from norsecorp)


The DDoS attacks on Dyn began yesterday morning. Service was temporarily restored around 9:30 a.m. ET, but a second attack began around noon, knocking sites offline once again.The DNS provider said engineers were working on “mitigating” the issue, but a third wave began around 4:30 p.m. ET before being resolved roughly two hours later.

At the moment, Dyn DNS is still dealing with the attack and its cause remains unknown.

Update: This incident has been resolved. Posted about 7 hours ago. Oct 21, 2016 - 22:17 UTC

The nation-wide internet outage was enabled thanks to a Mirai botnet that hacked into connected home devices, according to security intelligence company Flashpoint. 

Mirai is not a new hacking tool. A massive Mirai attack took down the site of popular security researcher Brian Krebs in late September, peaking at a nearly unprecedented 620 Gbps. 


Mirai takes advantage of weak security protocols on IoT devices -- in the Krebs case, 145,000 devices were infiltrated, including security cameras and DVRs in homes and offices around the world.

The author of the Mirai malware made its code open-source, and security experts have been warning of a possible large-scale attack since this information came to light.


Watch Live Worldwide Cyber attack on your PC  click here



Here’s a list of websites that readers have told us they are having trouble accessing:

ActBlue
Basecamp
Big cartel
Box
Business Insider
CNN
Cleveland.com
Etsy
Github
Grubhub
Guardian.co.uk
HBO Now
Iheart.com (iHeartRadio)
Imgur
Intercom
Intercom.com
Okta
PayPal
People.com
Pinterest
Playstation Network
Recode
Reddit
Seamless
Spotify
Squarespace Customer Sites
Starbucks rewards/gift cards
Storify.com
The Verge
Twillo
Twitter
Urbandictionary.com (lol)
Weebly
Wired.com
Wix Customer Sites
Yammer
Yelp
Zendesk.com
Zoho CRM
Credit Karma
Eventbrite
Netflix
NHL.com
Fox News
Disqus
Shopify
Soundcloud
Atom.io
Ancersty.com
ConstantContact
Indeed.com
New York Times
Weather.com
WSJ.com
time.com
xbox.com
dailynews.com
Wikia
donorschoose.org
Wufoo.com
Genonebiology.com
BBC
Elder Scrolls Online
Eve Online
PagerDuty
Kayak
youneedabudget.com
Speed Test
Freshbooks
Braintree
Blue Host
Qualtrics
SBNation
Salsify.com
Zillow.com
nimbleschedule.com
Vox.com
Livestream.com
IndieGoGo
Fortune
CNBC.com
FT.com
Survey Monkey
Paragon Game
Runescape


If you’re experiencing connection problems, you can try changing your DNS settings (instructions for how to do this on Mac and Windows are here). Anecdotally, our staff has used OpenDNS (208.67.222.222 and 208.67.220.220) and OpenNIC servers and seen connectivity improve. 


Source: https://www.dynstatus.com/incidents/nlr4yrr162t8




Globe Telecom Inc signed agreements with China, totaling $750 million new LTE and Fiber technologies

President Rodrigo Duterte witnessed the signing of the agreements in Beijing, China with Huawei Technologies, Nokia and Wuhan Fiberhome International Technologies, according to Globe.

Globe Telecom signed several agreements with its Chinese partners worth US$750 million for the improvement and enhancement of its LTE technologies in the country.
 

"We are confident that our collaboration with Huawei, Nokia and Wuhan FiberHome will translate into a more robust Globe network that will meet the country’s future digital demands,” Globe President and CEO Ernest Cu said in a statement on Friday.

The agreements covered the deployment of new LTE spectrum in the Philippines.

Cu and Globe Director Fernando Zobel de Ayala signed a memorandum of confirmation with Chen Yuhua, the head of Nokia international business, on the implementation of the project in the Visayas and Mindanao.


President Duterte (seated, 3rd from left) witnesses the signing of several agreements between Globe Telecom and its technology partners Huawei Technologies, Nokia and Wuhan FiberHome International Technologies. Above photo also shows Globe president and CEO Ernest Cu (5th from right, standing) and Globe director Fernando Zobel de Ayala (4th from right, standing).
Globe Release |image source  mb.com.ph

 


A similar memorandum of confirmation was signed between Globe and Huawei CEO Kevin Gao on deployment of the LTE spectrum in Luzon.

The project aims to provide wider LTE coverage and better indoor penetration, through an estimated 4,600 sites in the country. The project will increase data and fixed-wireless broadband capacity to provide telecommunications services in many areas in the country that at present have no access to broadband services, Globe said.

“This is a significant agreement with a longstanding collaborator," Mike Wang, president of Nokia Networks Greater China, said. "It strengthens Nokia’s position as Globe Telecom’s premier end-to-end solution provider. We are committed to delivering technologies that allow operators to smoothly transit to intelligent, virtual networks and seamless connectivity, to change how people communicate and connect.”

Globe signed a separate memorandum of confirmation with Huawei and Nokia on capacity expansion for corporate data network. The fixed line network modernization project will improve the quality of its corporate network with capabilities, capacities, features and functionalities that are constantly responsive to business and enterprise requirements.

"The project will redesign and transform the network to make it future-proof and meet specified minimum engineering and technology end-state requirement, making the network more agile in serving the heavy data traffic of its enterprise customers," Globe noted.

In addition, Globe signed another memorandum of confirmation with Huawei and Wuhan FiberHome on building fiber infrastructure to support the rollout of fixed broadband lines in Filipino homes.

Globe signed the agreement with Wuhan Fiberhome International Technologies President Zhiqiang Fan, Wuhan Fiberhome International Technologies Philippines CEO Hui Liu and Huawei CEO Kevin Gao. 


source: GMA News

Friday, October 21, 2016

Over 43 Million Weebly Accounts Hacked

Over 43 Million users have been stolen from the San Francisco-based website building service Weebly, according to breach notification site LeakedSource, who had already indexed a copy of the stolen data that it received from an anonymous source.

LeakedSource posted details of the cyber attack in its blog post on Thursday explaining what happened. The attack believed to have been carried out in February 2016.

"Unlike nearly every other hack, the Co-founder and CTO of Weebly Chris Fanini fortunately did not have his head buried deeply in the sand and actually responded to our communication requests," LeakedSource says. 
"We have been working with them to ensure the security of their users meaning password resets as well as notification emails are now being sent out."

The stolen data contains personal data of 43,430,316 Weebly customers, which includes usernames, email addresses, passwords, and IP addresses.




Stolen passwords were stored using the strong hashing function "BCrypt," making it difficult for hackers to obtain user's actual password.


These password hashes also believed to have used a Salt – a random string added to the hashing process to further strengthen passwords in order to make it more difficult for hackers to crack them.

Weebly confirmed the data breach, saying the company has started notifying affected customers and already initiated password reset process and new password requirements.

LeakedSource has also published details of a data breach affecting more than 22.5 million customers of location-based check-in service Foursquare, though the company denied the claims.

Even if stolen passwords are much difficult to crack, it's still a good idea to change the password for your Weebly account, just to be safe.


This is just the latest in a string of megabreaches. Yahoo recently revealed that data for 500 million users were stolen, and breaches of Dropbox, MySpace and Tumblr have all come to light this year.

source: www.leakedsource.com

Massive Indian ATM Hack Hits 3.2 Million Debit Cards Affected

India is undergoing the biggest data breaches to date with as many as 3.2 Million debit card details reportedly stolen from multiple banks and financial platforms.

According to an Economic Times report, the hack may be among the biggest ever financial data breaches in India with several victims reporting unauthorised transactions that have reportedly originated in China.

SBI, HDFC Bank, ICICI Bank, YES Bank and Axis Bank were among the worst hit, according to the report. Of 3.2 Million debit cards about 2.6 million affected cards are reportedly on the Visa and Mastercard platform, while 600,000 are on RuPay.

Hackers allegedly used malware to compromise the Hitachi Payment Services platform — which is used to power country's ATM, point-of-sale (PoS) machines and other financial transactions — and stole details of 3.2 Million debit cards, reports The Economic Times.




Hacked Debit Cards Reportedly Used in China

It is not yet clear who is behind the cyber attack, but the report adds that a number of affected customers have observed unauthorized transactions made by their cards in various locations in China.

Some banks, including the country's biggest lender SBI, have announced that they'll replace compromised debit cards, while others banks, including HDFC Bank, have urged their customers to change their ATM PINs and avoid using ATMs of other banks.


The extent of damage due to breach also depends on the type of cards customers are using.
Cards which use Magnetic Stripe transmit your account number and secret PIN to merchants in a way that it could make easy for fraudsters to hack them, making these cards easier to clone.


Whereas, banks who are using EMV (Europay, MasterCard, and Visa) chip-equipped cards (better known as Chip-and-Pin cards) store your data in encrypted form and only transmit a unique code (one-time-use Token) for every transaction, making these cards more secure and lot harder to clone.



SBI Blocks and will Re-Issue 600,000 Debit Cards

 The statement added that SBI' systems have not been compromised, but the bank is in the process of issuing new cards to card holders whose cards have been blocked.

"This is a cards industry incident (not only SBI)," the statement added.

Times of India reported earlier that SBI is reissuing 600,000 debit cards in addition to asking its customer to change their PINs.

A Yes Bank spokesperson told HuffPost India in a statement the bank has "undertaken a comprehensive review of its ATMs" and found no evidence of a breach or compromise on its ATMs.

An Axis Bank spokesman said, "the breach occurred in the case of customers who have used certain non Axis Bank ATMs. "Over the last few weeks, Axis Bank has proactively reached out to the affected customers and advised them to change their Debit Card PINs. The Axis Bank ATM network is fully secured and customers should ideally use Axis Bank ATMs to change their Debit Card PINs."

Payments Council of India has, meanwhile, begun a forensic audit to check into signs of financial fraud into customer accounts. NPCI Managing Director AP Hota told ET that NPCI had received complaints from banks about debit cards being used in China which had aroused suspicion"

HDFC Bank has also reportedly advised its customers to change its ATM pin and only use HDFC ATMs for transactions, as non-HDFC ATMs may not have the security controls at par with its own.

A Mastercard spokesperson said in an e-mailed statement, "We are aware of the data compromise event. To be clear, Mastercard's own systems have not been breached." The statement added it is currently working on the investigations with regulators, issuers, acquirers, global and local law enforcement agencies and third party payment networks to assess the current situation.

Visa has said that while it doesn't currently process domestic debit ATM transactions in India, it is working closely with all networks and its financial institution partners to support with the investigations. It also urged Visa cardholders to report any suspicious activity and change PIN numbers as a precautionary measure.

The breach is said to have originated through a malware that was introduced in the systems of Hitachi Payment Services, a provider of ATMs and Point of Sale services. Hitachi couldn't be reached for comment.

Spokespeople for ICICI, Axis Bank, and HDFC, weren't immediately available for comment.



source: The Economic Times, HuffPost India 



Nintendo Switch's wild modular controller: the Joy-Con

Nintendo just unveiled its next console, now officially known as the Nintendo Switch. The Switch features an interesting controller scheme called the "Joy-Con."

As seen in the video, each Switch seems to come with a Joy-Con that consists of two halves, the Joy-Con (R) and the Joy-Con (L), that slot into the sides of the Switch console.

Essentially, the left and right portions of the wireless controller slide out and reattach to a portable display you remove from the base station. Joy-Con also lets you play multiplayer games by using each tiny Wiimote-like peripheral as a standalone handheld controller.



This opens up all sorts of possibilities. In fact, Twitter user Ryan Salamanda has devised a fascinating Joy-Con peripheral concept that would make the right unit swappable for game-specific modules. He came up with a Pokémon Snap shutter-release button that would also give you an optical zoom wheel.



He also included a fishing option with a physical reel, a Gamecube module for playing old-school titles like Super Smash Bros., and a gun attachment for third- and first-person shooters. For Yo-kai Watch fans, Salamanda even put together a physical spinning disc concept to replicate how the game’s touchscreen controls work for charging special moves. These could be bundled with new Switch games, the concept suggests.


The Verge FB page posted a video preview



Activision, EA, Bethesda, and more pledge support for Nintendo Switch

The company has announced dozens of publishers, developers, and middleware companies pledging to support the new platform. All the major third-party publishers are here, including Activision, Electronic Arts, Ubisoft, and Bethesda (Skyrim, or something that looked very similar to Skyrim, appeared in the Switch debut trailer).
 
Nintendo Switch is scheduled to launch March 2017, just months from now.





Apple lawsuit reveals 90% Apple Lightning-to-USB Cables Sold on Amazon are fake

Claiming that genuine Apple accessories like Lightning-to-USB cables and USB power adapters sold on Amazon and Groupon are 90 per cent fake, the Cupertino-based tech giant has filed a lawsuit against US-based Mobile Star LLC, accusing it of selling counterfeit accessories online.

According to the details of the lawsuit posted by Patently Apple, Cupertino bought and tested over 100 Lightning cables and chargers marked "Fulfilled by Amazon" over the past nine months. The result? Around 90 percent of the chargers were fake. Now, we all know there's an abundance of counterfeit Apple goods out there, but people tend to trust listings sold by Amazon itself. And in this case, Amazon clearly stated that the items were "original." Check out one example below the fold to see what we mean.


When Apple got in touch with Amazon about the issue, the website told the former that it got most of its chargers from Mobile Star LLC. The iPhone-maker stressed that since counterfeit cables and chargers don't go through consumer safety testing and could be poorly designed, they're prone to overheating and catching fire. They might even electrocute users. Tim Cook and co. are now asking the court to issue an injunction against the defendant. They also want the court to order the seizure and destruction of all the fake chargers in addition to asking for damages.

Reacting to this as for Amazon, it told 9to5mac that it "has zero tolerance for the sale of counterfeits on [its] site" and the the company "work[s] closely with manufacturers and brands, and pursue wrongdoers aggressively."





source: Patently Apple, 9to5mac







Thursday, October 20, 2016

Russian arrested over giant LinkedIn password hack back in 2012

The social networking website LinkedIn was hacked on 5 June 2012, and passwords for nearly 6.5 million user accounts were stolen by Russian cybercriminals. It sounds like you might soon get some justice.

Czech police acting on behalf of the FBI and Interpol say they have arrested a Russian citizen suspected of compromising both LinkedIn and other US targets. Officials quietly caught the unnamed man in Prague on October 5th, but are only confirming the bust now for "tactical reasons." A court will decide whether or not the alleged hacker faces extradition to the US.

Czech police spokesman Jozef Bocan said the man was arrested in a Prague hotel; the suspect collapsed after being arrested and was then hospitalized. According to the Associated Press, a video of the arrest identified the man as "Yevgeniy N." 


Russia, not surprisingly, is demanding that officials send the accused back to his homeland. It might have a tough time making that happen, however. Prague is considered a staging point for Russian activities in Europe, and it's no secret that the US is more determined than ever to hold Russian hackers accountable (the arrested man isn't connected to the spate of hacks targeting the Democratic party). If the FBI gets its wish, this man could serve as a warning to hackers hoping that geography will keep American police at bay.



source: New York Times, Mashable


Researchers Build Miniature On-Body Robots as Mobile Wearables

Researchers at MIT and Stanford teamed up to develop Rovables, miniature robots chock full of sensors that roam around the human body while the wearer goes about their lives, miniature sensor-laden bots that can crawl up and down normal clothing.

This gives them an edge over traditional static wearables, the research teams says in their paper: Rovables might seamlessly assemble into a wristwatch or nametag, reacting to the host or the environment. The bots are little bigger than a ring box, but they pack a microcontroller, wireless communications and a battery that powers them for 45 minutes of continual use. Their magnetic gripping wheels on either side of clothing let them crawl up, down and around unmodified garments.


By mimicking the locomotion typical of living organisms, Rovables can become truly autonomous, the team argues. Movement lets them perform self-maintenance, like plugging themselves back in to charge, or maneuver to let their sensors get different readings. Finally, it would let the devices tuck themselves away when done, suggesting an eerie but efficient vision of wee bug-like robots storing themselves after performing their function.


The team hasn't built a microprocessor powerful enough to handle the complex algorithms required for 3D movement, they told Recode. Aside from the lengthy development needed to turn these petite rovers into the self-assembling swarm of bots imagined by the team, there's no way to predict whether other innovators will latch on to the concept. After all, it's much easier to just cram sensors into a wristband.

source: Recode



Yahoo wants the US to explain its email scanning system surveillance order

Yahoo's call, outlined in a letter published on Wednesday, comes after a report from Reuters showed that the web company built a powerful surveillance system that scanned all incoming emails for a specific string of characters. Yahoo built the system at the request of the US government in 2015, according to Reuters.

In a letter to James Clapper, the director of national intelligence, Yahoo's general counsel, Ron Bell, called on the government to clarify the "national security orders they issue to internet companies to obtain user data."  The company said that although the letter references allegations made against Yahoo, "it is intended to set a stronger precedent of transparency for our users and all citizens who could be affected by government requests for user data."



"We appreciate the need for confidentiality in certain aspects of investigations involving public safety or national security," the letter reads, "However, transparency is critical to ensure accountability and in this context must include disclosing how and under what set of circumstances the US government uses specific legal authorities, including the Foreign Intelligence Surveillance Act [FISA], to obtain private information about individuals' online activities or communications."

The American Civi Liberties Union (ACLU) also filed a motion this week before the Foreign Intelligence Surveillance Court, calling for the court to release the Yahoo order. As Reuters reports, the ACLU also asked the court to release more than 20 other orders that were previously issued.

Yahoo did not admit to building the email scanning system in the letter, nor did it detail the specific order it reportedly received to create it, saying "we find ourselves unable to respond in detail." National Security Letters and FISA court orders usually involve gag orders and are rarely made public. In a post published Wednesday, Yahoo characterized reports about its email scanning system as "misleading."

"As we've said before, recent press reports have been misleading; the mail scanning described in the article does not exist on our systems," the company said. "We therefore trust that the US government recognizes the importance of clarifying the record in this case," the company added.

Facebook, Google, Apple, and Microsoft said earlier this month that they have never received a surveillance request like the one Yahoo reportedly received.


source: Reuters



Wednesday, October 19, 2016

Researchers accidentally convert carbon dioxide into ethanol

In a new twist to waste-to-fuel technology, scientists at the Department of Energy’s Oak Ridge National Laboratory have developed an electrochemical process that uses tiny spikes of carbon and copper to turn carbon dioxide, a greenhouse gas, into ethanol.

Accidentally discovery Science has a long and storied history of looking for one thing but finding something better instead. Penicillin, radioactivity, science boxes...I mean microwave ovens -- all of these discoveries came in the the search for something else accidentally.

On Monday, researchers at the Oak Ridge National Laboratory in Tennessee announced that they too had unintentionally discovered something incredible: a means of transforming carbon dioxide directly into ethanol using a single catalyst.

The team was already looking for a way to convert C02 into ethanol but were convinced that doing so would require multiple steps and catalysts. Turns out they were wrong. The system is surprisingly simple. The team created a tiny array of nanoscale copper and carbon spikes mounted on a silicon surface.


A nanodroplet of nitrogen sits on the tip of each point. When exposed to carbon dioxide and a small electrical charge, this catalyst sets off an complex chain reaction that essentially reverses the combustion process and converts the gas into liquid ethanol. What's more, because the catalyst is so small, there is virtually no side reactions so the ethanol is quite pure. I mean, you wouldn't want to make a martini with it but it can go straight into a generator and work. Plus, the entire reaction works at room temperature.


Were this technology ramped up for commercial or municipal use, it could provide a viable alternative for utility-scale batteries, like the one's Tesla sells. That is, in times of excess energy production from renewable resources, rather than store that electricity in a giant battery, we could instead convert it to ethanol and use that to power generators when renewable sources aren't producing. Plus it would be carbon neutral since the carbon dioxide generated from burning the ethanol would be reclaimed by the catalytic process. There's no word, however, on when this accidental invention will make it out of the lab.

source:  Oak Ridge National Lab 


Nokia wires an apartment complex with 52Gbps fiber in South Korea

Seoul, South Korea - Nokia and SK Broadband have provided the fastest fiber access speeds ever to a first set of apartment buildings in Seoul, South Korea, reaching aggregate speeds of 52.5 Gbps. 

SK Broadband is known as one of the leading service providers in fiber ultra-broadband, in terms of network coverage, number of users and the speeds offered.

Nokia just partnered with SK Broadband to wire an apartment complex in Seoul, South Korea with fiber optics delivering aggregate speeds of 52.5Gbps. That doesn't guarantee that every user will get that speed (only "selected" customers saw those rates), but it increases the chances that you'll receive gigabit-class bandwidth in your rental.


The trick was to use Nokia's "next generation" approach to passive optical networks, which lets internet providers implement multiple fiber technologies on an existing line. That, in turn, will save your telecom from having to spend a fortune to upgrade your tenement (assuming it already has fiber, that is).

It may take a while before it's easy to get gigabit internet access in any one-bedroom. Nokia has the luxury of running this fiber in South Korea, where population density and government plans work in its favor -- the country wants gigabit broadband available to all residents by 2020. It'd be a tougher prospect in the US and other countries where gigabit-grade data largely remains a pipe dream. Regardless, it's an important step towards democratizing ultra-fast speeds that have been limited to a handful of people worldwide.


source:  NOKIA



Tuesday, October 18, 2016

A British conspiracy theorist investigating UFO sightings found dead on a sofa, days after sending chilling text

A British conspiracy theorist who was visiting Poland to give a talk on UFOs was found dead on a sofa, days after he sent a chilling text to his mum.

Max Spiers, 39, was making a name for himself in the world of conspiracy theories but he was seemingly worried that his work was making him a target.

In a text to mother Vanessa Bates, Max, who was once a classmate of Orlando Bloom, wrote: “Your boy’s in trouble. If anything happens to me, investigate.”

Max’s body was found days later in Warsaw and he was ruled to have died from natural causes - despite no post-mortem examination being carried out on his body.

Now Vanessa believes her son’s dark investigations into UFOs and government cover-ups may have made him enemies who wanted him dead.


 Max Spiers was found dead on a sofa in Poland (SWNS)
 


Vanessa said: “He was making a name for himself in the world of conspiracy theorists and had been invited to speak at a conference in Poland in July.

"He was staying with a woman who he had not known for long and she told me how she found him dead on the sofa.

"But I think Max had been digging in some dark places and I fear that somebody wanted him dead.”


Max, from Canterbury, made a career out of investigating UFO sightings and alleged cover-ups.

More recently, he was said to be probing into the lives of well-known figures in politics, business and entertainment.

His unexplained death, and its subsequent treatment by the authorities, has left many online followers convinced he was killed by government agents.

On one website, Project Camelot, a blogger wrote: “The entire circumstances are suspicious and I urge everyone to encourage the release of details about what really happened and call for an autopsy.”

Another, Craig Hewlett, added: “If it wasn’t true what he talks about then why would they kill him? Healthy people don’t just get sick and die, they get poisoned.”

Vanessa is starting to believe the theories herself.

She added: “Max was a very fit man who was in good health and yet he apparently just died suddenly on a sofa…

"Apparently, he had not suffered any obvious physical injuries but he could have been slowly poisoned, which is why the results of toxicology tests from his post-mortem are so important.”

A post-mortem examination was carried out by a pathologist in east Kent, but Vanessa says that more than two months later she still does not know the result, or whether there will be an inquest.


The North East Kent coroner’s office would only confirm the death was at the "very early” stages of investigation.
 



source: Yahoo! UK





ABM Global Solutions, SAP introduce S/4 HANA through simulation workshop

In an era where digital revolution is the new game, ABM Global Solutions (AGS) has been at the forefront and has continued to introduce innovations to enable businesses to optimize their operations through its digital solutions offerings. A trusted business management solutions provider in the Philippines and an ePLDT subsidiary, AGS, together with SAP, the leading enterprise software company in the world, successfully launched TECH TALKS: ERP Simulation for S/4 HANA at the SAP NAC Office in Taguig City.

SAP S/4HANA is a real-time ERP (Enterprise Resource Planning) suite for digital businesses built on an advanced in-memory platform and offers a personalized, consumer-grade user experience with SAP Fiori. It allows midsize to large enterprises to connect all of their business processes, obtain live information and insights, and seamlessly integrate their enterprises within the digital world. This core digital solution also supports the Internet of Things (IoT), Big Data, real-time analytics, mobile, business networks, third-party systems, and a number of other functions. 


Participants of TECHTALKS: ERP Business Simulation Powered by S/4HANA posed for a group photo opportunity after finishing and learning from a simulation activity on how they can further empower their businesses with SAP’s newest digital core technology. 

The workshop engaged Chief Financial Officers, Chief Information Officers, Procurement, and Sales and Marketing Heads of various companies in an immersive and interactive simulation experience. Participants were grouped together as hypothetical companies where they had to outperform other teams in terms of sales, savings, and growth in a number of simulated challenges based on real-life business scenarios through the S/4 HANA system. At the end of the activity, participants were able to differentiate S/4 HANA from classic SAP ERP.

The workshop aims to educate attendees on how SAP S/4 HANA can empower business users with insights to act in the moment and utilize its immediate, intelligent, and integrated features to go beyond the usual automation of their entire processes. Participants of the event were also encouraged to digitize their business processes to enjoy the opportunities and overcome the common challenges of any business such as data decentralization, business disruptions, excessive spending, and manual errors due to absence of an integrated system.





About ABM Global Solutions (AGS)

 
ABM Global Solutions (AGS), a subsidiary of ePLDT, the digital enterprise enabler of PLDT is the top provider of business management solutions in the country. Beyond numerous certifications, AGS gains consistent high client satisfaction ratings through its quality implementation services for being a trusted partner in offering software applications across industries.

About SAP
SAP empowers people and organizations to work efficiently and effectively by providing business insights and analytics to keep them ahead of the competition. SAP helps its customers run their businesses easily by providing simple and easy-to-understand solutions.



Russia Plans to Turn Civilian Cell Towers Into Cruise Missile Jammers

A nightmare scenario that keeps Russian generals up at night: American submarines and aircraft launching precision-guided cruise missiles by the hundreds. Within minutes, they slam into bases, communications nodes, and the Kremlin’s own missile launchers. Russia is worried enough about this possibility, in the event of a major war, that it’s taking steps to militarize its civilian communications infrastructure.

Russia is taking a more civilian approach to jamming cruise missiles. As Motherboard reports today, the Russian military is planning to mount anti-missile jamming devices called Pole–21s on civilian cellular network towers, giving the Kremlin a wide coverage area in the case of a US missile attack.



As the Russian newspaper Izvestiya noted, the system works with the same antennas already installed on the country's 250,000 cellular towers and could cover "entire regions like a dome that is impenetrable for satellite navigation signals." According to a spokesperson for the Russian Defense Ministry, the system has already been tested.

On the other hand, US equipment like Tomahawk missiles are already designed with onboard anti-jamming devices intended to keep them on course in the face of such interference, so it's unclear how effective a Pole–21 network would be. Deploying the system would also jam Russia's own communications and navigation systems. Still, one Russian military analyst who spoke with Izvestiya said that even milliseconds of jamming activity is enough throw off a missile's accuracy. Regardless of its efficacy, US Army officials seem to believe the missile jamming plan is part of a larger effort by Russia to prepare itself for a major attack.



source:  Motherboard    


First device that can use gigabit LTE is launching this year in Australia

Today, Qualcomm, along with Netgear, Ericsson, and Australian carrier Telstra, is announcing the first product to support gigabit LTE, a mobile hotspot. The hotspot makes use of a variety of technologies to hit those high speeds, including carrier aggregation. It runs on Telstra’s existing LTE networks and will be available to before the end of the year.

In addition, Qualcomm is announcing that its next-generation 800 series smartphone processor platform will include the X16 modem that supports gigabit LTE speeds. Qualcomm says that smartphones with the new chip — which doesn’t yet have an official name, but will succeed the recently-launched Snapdragon 821 — will be available in the first half of next year. The X16 modem represents a significant boost in speed over the 600Mpbs maximum speeds that the current X12 supports. Qualcomm expects that carriers in every market will launch gigabit LTE service once the modem is available and in smartphones.

It’s an incredibly exciting time for mobile technology, and we’re proud to play a leading role in bringing these transformational products and technologies to life.

What’s next for the Snapdragon X16 LTE modem? You’ll find it in the next 800-tier Qualcomm Snapdragon processor. That means Gigabit Class LTE capable smartphones are anticipated to be available in 2017. Stay tuned for more.



While gigabit wireless speeds sound incredible, you likely won’t see them in the real world. Qualcomm’s Sherif Hanna says that in the company’s simulated testing environments, average speeds ranged from 112 to 307Mbps, with a peak of 533Mbps. While that’s not quite a full gigabit, it’s notably faster than most people see on current devices.


Finally, Qualcomm is also looking to the future beyond next year, and is announcing its first 5G compatible modem. The Snapdragon X50 is expected to be available in 2018 and will support speeds up to 5Gbps. It uses the 28GHz millimeter wave band and makes use of beam forming and beam tracking technologies to hit those speeds. Qualcomm says the 5G antennas are much smaller than current 4G ones, and it can use an array of 16, 24, or 32 in the place of one 4G antenna. The first products to use the X50 are expected to launch in the first half of 2018, and Qualcomm says it will use the 2018 winter olympics in Korea as a test bed for 5G technology.

Telstra is expected to make the NETGEAR MR1100 available to its leading customers in the next few months. The mobile router will operate on Telstra’s Gigabit-ready network, which is enabled by Ericsson.

The four companies have been working very closely over the past several months to make this possible. It’s a significant achievement and a milestone for the entire mobile industry. Gigabit Class speed was one of the foundational promises of 4G technology. Today, that promise is realized.

What the past 10+ years of mobile broadband have shown us that Internet speeds have a direct impact on the quality of existing mobile experiences, in addition to supporting entirely new ones.


source: Qualcomm

T-rays research accelerates computer memory by a factor of 1,000

A group of Russian and European researchers has introduced a new method of quickly switching the computer memory cells.Using terahertz radiation named T-rays, the rate of cell-resetting can be increased by a factor of 1,000.

Together with their colleagues from Germany and the Netherlands, scientists at the Moscow Institute of Physics and Technology (MIPT) have found a way to significantly improve computer performance. In their paper published in Nature Photonics, they propose the use of the so-called T-waves, or terahertz radiation as a means of resetting computer memory cells. This process is several thousand times faster than magnetic-field-induced switching.


The research mentions the use of T-rays for swapping out the magnetic fields. This could boost the cell-resetting process by a groundbreaking factor of 1,000, resulting in the creation of ultrafast memory.

You might be wondering what’s so special about T-rays. These are basically a series of short EM pulses at terahertz frequencies. The team has performed an experiment with thulium orthoferrite (TmFeO₃), achieving  higher speeds with an external magnetic field to control the spins.

However, when T-rays were used, the spins were controllable at a much faster rate and, without an external field, too. The researchers claim that their study is the first one to make use of such mechanism to control the resetting of magnetic subsystems.

The scientists are yet to publish their results on the actual PC memory cells. So, it can’t be predicted when we’ll see T-rays being used in our PCs.



The figure shows the spin and lattice structure of thulium orthoferrite (TmFeO₃) on the left and the T-ray-induced transitions between the energy levels of thulium ions (Tm³⁺), which trigger coherent spin dynamics (memory switching), on the right.

The scientists expect their “T-ray switching” to work with other materials as well. Thulium orthoferrite, which was used in the experiment, happens to be convenient for the purposes of demonstration, but the proposed magnetization control scheme itself is applicable to many other magnetic materials.

“There was a Soviet research group that used orthoferrites in their studies, so this was always kind of a priority field for us. This research can be seen as a follow-up on their studies,” says Anatoly Zvezdin.



source: Nature Photonics


NASA Orbital ATK’s Antares rocket is scheduled to lift off at 7:40 p.m. EDT today

NASA Orbital ATK’s Antares rocket is scheduled to lift off at 7:40 p.m. EDT today to the International Space Station. This cargo resupply mission will deliver over 5,100 pounds of science, research and supplies to the orbiting laboratory and its crew.

Since then, the Antares has gone through an extensive upgrade, as the vehicle’s main engines have been replaced. Now, Orbital is finally ready to get back to launching the Antares to the International Space Station for NASA.

Situated on top of the Antares is Orbital’s Cygnus cargo capsule, filled with food, supplies, and science experiments for the crew of the ISS. Ironically, many of its experiments revolve around the study of fire and combustion in space. The Cool Flames experiment, for instance, will look at fires that burn at low temperatures in microgravity — research that could help engineers develop new space propulsion systems. And the Cygnus will be carrying the second Saffire experiment, a project that will study how nine different materials catch and spread fire in space.

The flight was originally supposed to take place on Sunday, but NASA delayed the launch after ground support cable didn't work like it was supposed to. Orbital had spare cables, though, and was reworking the issue yesterday.


More: http://go.nasa.gov/2ekBM0f


source: NASA


Monday, October 17, 2016

China launch its first crewed mission to the Tiangong 2 space station

At 7:30PM US ( 7:30 am/2330 GMT) China launch its first crewed mission to the Tiangong 2 space station.which will test the station’s life support and conduct a variety of experiments over the next 30 days. The mission will be the longest flight the country has conducted to date.

This is the first crewed mission for the country since 2013, and will be carried out by a pair of taikonauts: Jing Haipeng and Chen Dong. The pair will ride into space aboard the Shenzhou-11, which will launch atop China’s Long March-2F rocket from the Jiuquan launch site in the Gobi desert. The two astronauts will arrive at Tiangong-2 two days after launching. This will be the longest crewed mission China has conducted: the prior record for the country was 15 days, during the Shenzhou 10 mission.

Spending a month aboard a space laboratory that is part of a broader plan to have a permanent manned space station in service around 2022.



According to SpacePolicyOnline, the Taikonauts will carry out experiments, which will include "taking ultrasound measurements for the first time in space, cultivating plants, and testing the three winners of an experimental design competition in Hong Kong for secondary students." A second mission designed to refuel the station is planned for April 2017.



China launched the Tiangong-2, an 8.6 metric ton space station, into orbit on September 15th, and is designed as a testbed for the country’s larger ambitions in low-Earth orbit, which include a much larger, permanent space station to be launched in the 2020s. Tiangong-2 will replace the Tiangong-1 space station, which was originally launched into orbit in 2011. The country recently lost control of the original station, which is expected to reenter the Earth’s atmosphere sometime next year. 

The Shenzhou 11 blasted off on a Long March rocket at 7:30 am (2330 GMT) from the remote launch site in Jiuquan, in the Gobi desert, in images carried live on state television. 

Watch Live Stream (Replay) CCTV-News is China's preeminent 24-hour English language television channel.





 

The U.S. Defense Department has highlighted China's increasing space capabilities, saying it was pursuing activities aimed at preventing other nations using space-based assets in a crisis.

Advancing China's space program is a priority for Beijing, with President Xi Jinping calling for the country to establish itself as a space power.

China insists its space program is for peaceful purposes.



China has been working to develop its space program for military, commercial and scientific purposes, but is still playing catch-up to established space powers the United States and Russia.

China's Jade Rabbit moon rover landed on the moon in late 2013 to great national fanfare, but soon suffered severe technical difficulties.

The rover and the Chang'e 3 probe that carried it there were the first "soft landing" on the moon since 1976. Both the United States and the Soviet Union had accomplished the feat earlier.

China will launch a "core module" for its first space station some time around 2018, a senior official said in April, part of a plan for a permanent manned space station in service around 2022.




Source: TheVerge, CCTV NEWS, SpacePolicyOnline, Reuters