Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Data Storage

Intel Launches Flurry of 3D NAND-Based SSDs For Consumer and Enterprise Markets (hothardware.com) 1

MojoKid writes: Intel launched a handful of new SSD products today that cover a broad spectrum of applications and employ 3D NAND technology. The SSD 600p Series is offered in four capacities ranging from 128GB, to 256GB, 512GB and 1TB. The drivers are targeted at consumer desktops and notebooks and are available in the M.2 form-factor. The entry-level 128GB model offers sequential reads and writes of up to 770 MB/sec and 450 MB/sec respectively. At higher densities, the multi-channel 1TB model offers sequential reads and writes that jump to 1,800 MB/sec and 560 MB/sec respectively. The 128GB SSD 600p weighs in at $69, while the 1TB model is priced at $359, or about .36 cents per GiB. For the data center, Intel has also introduced the DC P3520 and DC S3520 Series SSDs in 2.5-inch and PCIe half-height card form-factors. Available in 450GB to 2TB capacities, the range-topping 2TB model offers random reads/writes of 1,700 MB/sec and 1,350 MB/sec respectively. Finally, Intel launched the SSD E 6000p (PCIe M.2) and SSD E 5420s Series (SATA). The former supports Core vPro processors and is targeted at point-of-sale systems and digital signage. The latter is aimed at helping customers ease the transition from HDDs to SSDs in IoT applications.
NASA

NASA's Voyager 2 Flew By Saturn 35 Years Ago Today (space.com) 17

An anonymous reader quotes a report from Space.com: Thirty-five years ago today, a NASA spacecraft got an up-close look at beautiful, enigmatic Saturn. On Aug. 25, 1981, the Voyager 2 probe zoomed within 26,000 miles (41,000 kilometers) of the ringed planet's cloud tops. The discoveries made by Voyager 2 -- and by its twin, Voyager 1, which had flown past Saturn nine months earlier -- reshaped scientists' understanding of the Saturn system and planted the seed for NASA's Cassini mission, which began orbiting the ringed planet in 2004, NASA officials said. Voyager 1 and Voyager 2 launched a few weeks apart in 1977, tasked with performing a "grand tour" of the solar system's big planets -- Jupiter, Saturn, Uranus and Neptune. The two spacecraft accomplished that goal, eyeing all four gaseous worlds up close, and also studying 48 of their moons. (Voyager 1 flew past Jupiter and Saturn, while Voyager 2 had close encounters with all four planets.) The Voyagers weren't the first spacecraft to fly by Saturn; that distinction belongs to NASA's Pioneer 11 probe, which did so in 1979. But the Voyagers broke a lot of new ground; they discovered four new Saturn moons, for example, and revealed an incredible diversity of landscapes on satellites such as Dione, Tethys and Iapetus, NASA officials said. August 25th appears to be a good day for nerds. You can view some out-of-this-world photos from NASA's Voyager 1 and 2 probes here.
Software

Linus on Linux's 25th Birthday (zdnet.com) 46

The creator of Linux, Linus Torvalds, posted his famous message announcing Linux on August 25, 1991, claiming that it was "just a hobby, won't be big and professional like gnu." ZDNet's Steven J. Vaughan-Nichols caught up with Linus Torvalds and talked about Linux's origins in a series of interviews: "SJVN: What's Linux real birthday? You're the proud papa, when do you think it was? When you sent out the newsgroup post to the Minix newsgroup on August 25, 1991? When you sent out the 0.01 release to a few friends?

LT: I think both of them are valid birthdays. The first newsgroup post is more public (August 25), and you can find it with headers giving date and time and everything. In contrast, I don't think the 0.01 release was ever announced in any public setting (only in private to a few people who had shown interest, and I don't think any of those emails survived). These days the way to find the 0.01 date (September 17) is to go and look at the dates of the files in the tar-file that still remains. So, both of them work for me. Or either. And, by the way, some people will argue for yet other days. For example, the earliest public semi-mention of Linux was July 3: that was the first time I asked for some POSIX docs publicly on the minix newsgroup and mentioned I was working on a project (but didn't name it). And at the other end, October 5 was the first time I actually publicly announced a Linux version: 'version 0.02 (+1 (very small) patch already).' So you might have to buy four cakes if you want to cover all the eventualities."
Vaughan-Nichols goes on to pick Linus' brain about what he was doing when he created Linux. In honor of Linux's 25th birthday today, let's all sing happy birthday... 1... 2... 3...
Medicine

The Big Short: Security Flaws Fuel Bet Against St. Jude (securityledger.com) 38

chicksdaddy writes: "Call it The Big Short -- or maybe just the medical device industry's 'Shot Heard Round The World': a report from Muddy Waters Research recommends that its readers bet against (or 'short') St. Jude Medical after learning of serious security vulnerabilities in a range of the company's implantable cardiac devices," The Security Ledger reports. "The Muddy Waters report on St. Jude's set off a steep sell off in St. Jude Medical's stock, which finished the day down 5%, helping to push down medical stocks overall. The report cites the 'strong possibility that close to half of STJ's revenue is about to disappear for approximately two years' as a result of 'product safety' issues stemming from remotely exploitable vulnerabilities in STJ's pacemakers, implantable cardioverter defibrillator (ICD), and cardiac resynchronization therapy (CRT) devices. The vulnerabilities are linked to St. Jude's Merlin at home remote patient management platform, said Muddy Waters. The firm cited research by MedSec Holdings Ltd., a cybersecurity research firm that identified the vulnerabilities in St. Jude's ecosystem. Muddy Waters said that the affected products should be recalled until the vulnerabilities are fixed. In an e-mail statement to Security Ledger, St. Jude's Chief Technology Officer, Phil Ebeling, called the allegations 'absolutely untrue.' 'There are several layers of security measures in place. We conduct security assessments on an ongoing basis and work with external experts specifically on Merlin at home and on all our devices,' Ebeling said."

More controversial: MedSec CEO Justine Bone acknowledged in an interview with Bloomberg that her company did not first reach out to St. Jude to provide them with information on the security holes before working with Muddy Waters. Information security experts who have worked with the medical device industry to improve security expressed confusion and dismay. "If safety was the goal then I think (MedSec's) execution was poor," said Joshua Corman of The Atlantic Institute and I Am The Cavalry. "And if profit was the goal it may come at the cost of safety. It seems like a high stakes game that people may live to regret."

Crime

US Unveils Charges Against KickassTorrents, Names Two More Defendants (arstechnica.com) 55

A total of three men are said to be operators of file-sharing site KickassTorrents (KAT), according to U.S. prosecutors. Last month, federal authorities arrested the 30-year-old Ukrainian mastermind of KAT, Artem Vaulin, and formally charged him with one count of conspiracy to commit criminal copyright infringement, one count of conspiracy to commit money laundering, and two counts of criminal copyright infringement. Two other Ukrainians were named in the new indictment (PDF): Levgen (Eugene) Kutsenko and Oleksander (Alex) Radostin. While only Vaulin has been arrested, bench warrants have been issue for the arrest of all three men. Ars Technica reports: "Prosecutors say the three men developed and maintained the site together and used it to 'generate millions of dollars from the unlawful distribution of copyright-protected media, including movies, [...] television shows, music, video games, computer software, and electronic books.' They gave out 'Reputation' and 'User Achievement' awards to users who uploaded the most popular files, including a special award for users who had uploaded more than 1,000 torrents. The indictment presents a selection of the evidence that the government intends to use to convict the men, and it isn't just simple downloads of the copyrighted movies. The government combed through Vaulin's e-mails and traced the bitcoins that were given to him via a 'donation' button."
Patents

Apple Patenting a Way To Collect Fingerprints, Photos of Thieves (appleinsider.com) 50

An anonymous reader quotes a report from Apple Insider: As published by the U.S. Patent and Trademark Office, Apple's invention covering "Biometric capture for unauthorized user identification" details the simple but brilliant -- and legally fuzzy -- idea of using an iPhone or iPad's Touch ID module, camera and other sensors to capture and store information about a potential thief. Apple's patent is also governed by device triggers, though different constraints might be applied to unauthorized user data aggregation. For example, in one embodiment a single failed authentication triggers the immediate capture of fingerprint data and a picture of the user. In other cases, the device might be configured to evaluate the factors that ultimately trigger biometric capture based on a set of defaults defined by internal security protocols or the user. Interestingly, the patent application mentions machine learning as a potential solution for deciding when to capture biometric data and how to manage it. Other data can augment the biometric information, for example time stamps, device location, speed, air pressure, audio data and more, all collected and logged as background operations. The deemed unauthorized user's data is then either stored locally on the device or sent to a remote server for further evaluation.
Encryption

PSA: PlayStation Network Gets Two-Step Verification (arstechnica.com) 27

Consider this a public service announcement: Sony has (finally) added two-factor authentication to PlayStation Network accounts. If you're a PlayStation user and are reading this right now, you really should go set it up so that someone doesn't try to take over your account and steal your password. Ars Technica details how you can set up the new security features: "Turn on your PS4 and go to Settings -> PlayStation Network Account Management -> Account Information -> Security -> 2-Step Verification. You can also set it up through the web by logging into your PSN account on the web and going through the Security tab under the Account header. From there, on-screen instructions will walk you through the process of using a text message to confirm your mobile device as a secondary layer of security for your PSN account. Two-factor support is not available when logging on to older PlayStation systems, so Sony recommends you generate a 'device setup password' to help protect the PS3, Vita, or PSP." Two-factor authentication comes five years after hackers breached PSN's security and stole 77 million accounts.
Communications

FCC Proposes 5G Cybersecurity Requirements, Asks For Industry Advice (fedscoop.com) 25

Presto Vivace quotes a report from FedScoop: "Cybersecurity issues must be addressed during the design phase for the entire 5G ecosystem, including devices. This will place a premium on collaboration among all stakeholders," said FCC chairman Tom Wheeler during a National Press Club event on June 20. "We continue to prefer an approach that emphasizes that industry develop cybersecurity standards just as we have done in wired networks." The FCC published a request Wednesday for comment on a new set of proposed 5G rules to the Federal Register focused on adding specific "performance requirements" for developers of example internet-connected devices. If a company hopes to secure a license to access higher-frequency 5G spectrum in the future then they will need to adhere to these specific requirements -- in other words, compliance is non-negotiable. Notably, these FCC "performance requirements" now include the submission of a network security plan. The report adds: "A quick review of the FCC's proposed 5G cybersecurity plan shows a six category split, organized by a companies' security approach, coordination efforts, standards and best practices, participation with standards bodies, other security approaches and plans with information sharing organizations. Security plans must be submitted to the commission at least six months before a 5G-ready product enters the market, according to the notice."
Open Source

Princeton Researchers Announce Open Source 25-Core Processor (pcworld.com) 72

An anonymous reader writes: Researchers at Princeton announced at Hot Chips this week their 25-core Piton Processor. The processor was designed specifically to increase data center efficiency with novel architecture features enabling over 8,000 of these processors to be connected together to build a system with over 200,000 cores. Fabricated on IBM's 32nm process and with over 460 million transistors, Piton is one of the largest and most complex academic processors every built. The Princeton team has opened their design up and released all of the chip source code, tests, and infrastructure as open source in the OpenPiton project, enabling others to build scalable, manycore processors with potentially thousands of cores.
Google

Google Fiber To Cut Staff In Half After User Totals Disappoint, Says Report (dslreports.com) 131

An anonymous reader quotes a report from DSLReports: Sources claim that Google Fiber has been disappointed with the company's overall number of total subscribers since launching five years ago. A paywalled report over at The Information cites a variety of anonymous current and former Google employees, who say the estimated 200,000 or so broadband subscribers the company had managed to sign up by the end of 2014 was a fary cry from the company's original projection of somewhere closer to 5 million. Google Fiber has never revealed its total number of subscribers. A report last October pegged the company's total broadband subscribers at somewhere around 120,000, though it's unclear how many of those users had signed up for Google Fiber's symmetrical 5 Mbps tier, which was originally free after users paid a $300 installation fee. Disappointed by sluggish subscriber tallies, The Information report states that last month Alphabet CEO Larry Page ordered Google Fiber boss Craig Barratt to cut the total Google Fiber staff in half to roughly 500 people. That's a claim that's sure to only fuel continued speculation that the company is starting to get cold feet about its attempts to bring broadband competition to a broken duopoly market.
Wireless Networking

Italy Quake Rescuers Ask Locals To Unlock Their Wi-Fi (bbc.com) 101

Rescue teams searching for earthquake survivors in central Italy have asked locals to unlock their Wifi passwords. The Italian Red Cross says residents' home networks can assist with communications during the search for survivors, reports BBC. From the report: On Wednesday a 6.2 magnitude earthquake struck central Italy and killed more than 240 people. More than 4,300 rescuers are looking for survivors believed to still be trapped in the rubble. On Twitter, the Italian Red Cross posted a step-by-step guide which explains how local residents can switch off their Wifi network encryption. Similar requests have been made by the National Geological Association and Lazio Region. A security expert has warned that removing encryption from a home Wifi network carries its own risks, but added that those concerns are trivial in the context of the rescue operation.
AT&T

ISP Lobbyists Pushing Telecom Act Rewrite (dslreports.com) 67

Karl Bode, reporting for DSLReports:Telecom lobbyists are pushing hard for a rewrite of the Telecom Act, this time with a notable eye on cutting FCC funding and overall authority. AT&T donated at least $70,000 to back Republican House Speaker Paul Ryan, and clearly expects him to spearhead the rewrite and make it a priority in 2017. The push is an industry backlash to a number of consumer friendly initiatives at the FCC, including new net neutrality rules, the reclassification of ISPs under Title II, new broadband privacy rules, new cable box reform and an attempt to protect municipal broadband. AT&T's Ryan donation is the largest amount AT&T has ever donated to a single candidate, though outgoing top AT&T lobbyist Jim Cicconi has also thrown his support behind Hillary Clinton.
IOS

iPhones and iPads Fail More Often Than Android Smartphones (softpedia.com) 138

An anonymous reader writes: The main question when picking a new phone is whether to choose an Android one or an iPhone. A new study coming from Blancco Technology Group sheds some light on which devices are the most reliable, based on reliability. The study entitled State of Mobile Device Performance and Health reveals the device failure rates by operating systems, manufacturers, models and regions, as well as the most common types of performance issues. The report reveals that in Q2 2016, iOS devices had a 58% failure rate, marking the first time that Apple's devices have a lower performance rate compared to Android. It seems that the iPhone 6 had the highest failure rate of 29%, followed by iPhone 6s and iPhone 6S Plus. Android smartphones had an overall failure rate of 35%, an improvement from 44% in Q1 2016. Samsung, Lenovo and LeTV were among the manufacturers with the weakest performance and higher failure rates. Samsung scored 26% in failure rate, while Motorola just 11%. The study also reveals that iOS devices fail more frequently in North America and Asia compared to Android. Specifically, the failure rate in North America is 59%, while in Asia 52%. The failures could be influenced by the fact that the quality of smartphones shipped around the world varies.
Windows

Windows 10 Computers Crash When Amazon Kindles Are Plugged In (theguardian.com) 206

It appears that many users are facing an issue with their Windows 10 computers when they plug in an Amazon Kindle device. According to reports, post Windows 10 Anniversary Update installation, everytime a user connect their Amazon Paperwhite or Voyage, their desktop and laptop lock up and require rebooting. The Guardian reports:Pooka, a user of troubleshooting forum Ten Forums said: "I've had a Kindle paperwhite for a few years no and never had an issue with connecting it via USB. However, after the recent Windows 10 updates, my computer BSOD's [blue screen of death] and force restarts almost as soon as I plug my Kindle in." On Microsoft's forums, Rick Hale said: "On Tuesday, I upgraded to the Anniversary Edition of Windows 10. Last night, for the first time since the upgrade, I mounted my Kindle by plugging it into a USB 2 port. I immediately got the blue screen with the QR code. I rebooted and tried several different times, even using a different USB cable, but that made no difference."
Government

Malware Sold To Governments Helped Them Spy on iPhones (washingtonpost.com) 30

One of the world's most evasive digital arms dealers is believed to have been taking advantage of three security vulnerabilities in popular Apple products in its efforts to spy on dissidents and journalists, reports The New York Times. (Editor's note: the link could be paywalled, here's an alternate source). From the report: Investigators discovered that a company called the NSO Group, an Israeli outfit that sells software that invisibly tracks a target's mobile phone, was responsible for the intrusions. The NSO Group's software can read text messages and emails and track calls and contacts. It can even record sounds, collect passwords and trace the whereabouts of the phone user. In response, Apple on Thursday released a patched version of its mobile software, iOS 9.3.5. Users can get the patch through a normal software update.The Washington Post reports that these "zero-day" flaws were previously used by the governments to take over victims' phones by tricking them into clicking on a link to a text message. Motherboard says that this is the first time anyone has uncovered such an attack in the wild. "Until this month, no one had seen an attempted spyware infection leveraging three unknown bugs, or zero-days, in the iPhone. The tools and technology needed for such an attack, which is essentially a remote jailbreak of the iPhone, can be worth as much as one million dollars."

Slashdot Top Deals