A Solution to Skimpy Storage Is in Our Future

Originally posted on Tech:

As we rely more on phones and tablets for our computing needs, it seems like we’re always running out of storage. Most mobile devices top out at 64GB, and while you might see a tablet with 128GB of 256GB of storage, that’s still a long way from the terabyte or more that you find on even the most basic laptops and desktops.

The problem lies with solid-state, or flash-based, storage, which is found in almost every phone and tablet. Flash storage is faster and more power-efficient than traditional hard drives, but it’s much more expensive, and as storage size increases, flash storage is more prone to breakdowns. What we really need is a breakthrough.

Fortunately, there are two of them on the horizon.

Samsung, the world’s largest maker of memory chips, has created a “3D Vertical NAND” flash chip that supposedly sidesteps the reliability issues of existing flash storage.

Engadget…

View original 461 more words

Zeus: Bank Account Stealing Trojan Virus Spreading on Facebook

frdmfghtrv:

This happened to me, even with multiple layers of protection. Constant vigilance is necessary.

Originally posted on Tech:

Be careful what links you click on Facebook. A gang of international cybercrooks has resurrected a six-year-old Trojan virus named Zeus, using it to harvest personal information and drain unsuspecting victims’ bank accounts.

It appears as if the virus threat is being distributed via Facebook groups, especially through spam advertisements offering discount merchandise, counterfeit designer wear, or some similar Facebook scam. The virus made its first reappearance in February of this year, with incidents of infection rapidly growing month-to-month.

Once Zeus infects your computer, the virus lays in wait until you use an online banking account. When you do, the malicious code stores your login and password, using it to empty your coffers. The virus can collect other personal information to sell, as well. According to Malloy Labs, this data eventually makes its way to a group known as the Russian Business Network, a gang of cybercriminals involved…

View original 155 more words

Insect repellent clothes bug mosquitoes

Originally posted on Business 360:

[cnn-video url="http://edition.cnn.com/video/#/video/business/2013/05/28/sayah-egypt-insect-repellent.cnn"]

(CNN) — Egyptian scientists say they have developed the first insect repellent material in the region, which has the power to protect people from being bitten by any bug, including mosquitoes.

Mohamed Hashem and his team at the Egypt National Research Center developed the textile, which he says is infused with what a natural and environmentally friendly material. Hashem would not reveal the exact composition of the substance, but said that it had the power to kill insects that were exposed to it for prolonged periods.

Insect repellent materials already exist in the West, but this development will allow regional manufacturers to buy it for much less, and Hashem says there are plans for it to be used by the Egyptian armed forces.

View original

Twilight of the Idol: A Portrait of Mickey Mantle in Decline

Originally posted on LIFE:

The greater the athlete, the tougher it is to leave the arena. History is filled with examples of players, in pretty much every sport, who should have hung up their spikes, or their skates, or their racquets long before they finally retired but simply would not — could not — leave at the top of their game. Brett Favre, Michael Jordan, Willie Mays, Gordie Howe — in the eyes of so many fans, the legacy of these and countless other Hall of Famers would have been far brighter if they had finally left the locker room a few years earlier.

Granted, one can also point to a number of greats who left at the top of their game — Jim Brown, Steffi Graf, the amazing Sandy Koufax — but the list of those who stuck around for too long is far lengthier, and for sports fans, far more fun to debate…

View original 578 more words

This Apple-1 Is the Most Expensive Apple Computer Ever

frdmfghtrv:

Spend’m if you gottem.. Wish I were an Apple fan.

Originally posted on Tech:

$671,400. It seems like rather a lot of money for any personal computer — and especially for one that is too out of date to run the latest software.

Except that the computer in question is an Apple-1, the bare-bones machine that Steve Wozniak designed and Steve Jobs marketed in 1976, shortly before they devised the groundbreaking and wildly popular Apple II. As the New York Times’ Steve Lohr reports, an auction house in Cologne, Germany, sold it today to an anonymous entrepreneur from the Far East.

The Apple-1 is a rare computer, no doubt: Wozniak and Jobs sold only a few hundred of them at most in the first place, at the famous list price of $666.66. But when I wrote an article on collectible PCs in 2007, the going rate for an Apple-1 was a relatively affordable $15,000 to $25,000. It’ll be interesting to see if…

View original 131 more words

Apple May Be Able to Bypass Your iPhone’s Password, but There’s a Waiting List

frdmfghtrv:

Once again we lose fractions of our privacy at the hands of government, although for reasons for capturing intelligence involving criminal activity, but still invasive, and one step closer to a catalyst for legislation that involves agencies to access our information, legal or not. What did we do before we had to capture intel from a electronic device… Actual foot work to gather evidence? If they would only allow the access with extreme cases where probable cause exists, the idea might be tolerated, but for now I’ll never believe any government agency.

Originally posted on Tech:

Break the law and Apple may follow up by breaking into your iPhone, reports CNET, though if you represent the long arm of the law asking Cupertino to give you a hand (or would the proper term be demanding?), it sounds like you’ll have to wait in line: up to seven weeks, in seems.

Why? Because requests from law enforcement officials to hack into someone’s iPhone have been so overwhelming that Apple’s had to create a waiting list to manage them all.

Using a highly secure password on your phone (think long and completely random) should keep just about everyone at bay — but not someone with backdoor access. You knew there were rumors of a backdoor on the iPhone, right? Still, even if those rumors haven’t been wildly exaggerated, it sounds like there’s a significant waiting period to enlist Apple’s help.

Cnet unearthed court documents revealing that an agent…

View original 230 more words