redletterdave (2493036) writes “Apple is one of the biggest headphone makers in the world thanks to those signature white earbuds that have shipped with every iPod, iPhone, and iPad since 2001. But even two years after earbuds became ‘EarPods,’ the design could still be improved — and competitors are taking notice. Amazon recently unveiled a […]
Month: June 2014
As reported by the Associated Press, via the Washington Post, an update on the promised (and now at least mostly successful) new disc-shaped craft and parachute technology intended for a NASA mission to Mars, though applicable to other space missions as well: A saucer-shaped NASA vehicle launched by balloon high into Earth’s atmosphere splashed down […]
New submitter TuxHiggs (2691251) writes “Last month, Forbes wrote that Microsoft was preparing a cross-platform smartwatch with the ability to continuously track your heart rate and sync the data to your devices. A trusted source with knowledge of the development has verified some of that information and provided Tom’s Hardware with additional details about the […]
First time accepted submitter Peter Hudson (3717535) writes Cory Doctorow writes on boingboing.net “BitLit works with publishers to get you free or discounted access to digital copies of books you own in print: you use the free app for Android and iOS to take a picture of the book’s copyright page with your name printed […]
KentuckyFC (1144503) writes The banjo is a stringed instrument that produces a distinctive metallic sound often associated with country, folk and bluegrass music. It is essentially a drum with a long neck. Strings are fixed at the end of the neck, stretched across the drum and fixed on the other side. They are supported by […]
NotInHere (3654617) writes In 1996, Markus F. X. J. Oberhumer wrote an implementation of the Lempel–Ziv compression, which is used in various places like the Linux kernel, libav, openVPN, and the Curiosity rover. As security researchers have found out, the code contained integer overflow and buffer overrun vulnerabilities, in the part of the code that […]
jones_supa (887896) writes “IBM security researchers have published an advisory about an Android vulnerability that may allow attackers to obtain highly sensitive credentials, such as cryptographic keys for some banking services and virtual private networks, and PINs or patterns used to unlock vulnerable devices. It is estimated that the flaw affects 86 percent of Android […]
McGruber (1417641) writes In December 2013, Slashdot reported the arrest of seven metro Atlanta residents for allegedly selling counterfeit MARTA Breeze cards, stored-value smart cards that passengers use as part of an automated fare collection system on Atlanta’s subway. Now, six months later (June 2014), the seven suspects have finally been indicted. According to the […]
An anonymous reader writes I’ll be returning to North America for July for the first time in a few years, and I’m curious how the phone carrier market compares with the rest of the world. My last time in the U.S., I had to pick up a disposable phone with all kinds of unnecessary environmental […]
New submitter outofluck70 (1734164) writes Got an email today from Microsoft, text is below. [Note: text here edited for formatting and brevity; see the full text at seclists.org.] They are no longer going to send out emails regarding patches, you have to use RSS or keep visiting their security sites. They blame “governmental policies” as […]