Multicore Fiber Transfers Data At 255Tbps

A joint research project between universities in the United States via the University of Central Florida and the Netherlands via Eindhoven University of Technology have developed a multicore cable capable of transmitting data at 255 Terabytes per second.

The cable uses seven channels for transmitting information through the stuffed data conduit’s interior. Each channel cable or ‘core’ within the multicore cable was able to transmit 5.1 Tbps at the same time, allowing for a massive passage of information.

Multicore technology has been used in the past, but managing such a feat with multiple cores has difficult technical barricades in the way. High data rates are difficult to maintain, with issues such as overheating, cable sensitivity and signal generation that can damage current commercial equipment.

The team is directed by Chigo Okonkwo, an assistant professor of electro-optical communications in the Netherlands and Rodrigo Amezcua Correa, research assistant professor of micro-structured fibers in the United States.

To explain the process of sending such high amounts of information, the researchers compared it to sending three cars driving on top of each other in the same lane. Multiply those cars by three lanes and you have a lot of information being shipped one way at high speeds. Hopefully this technology makes its way to our cities so we can stream movies even faster on AT&T and FreedomPop LTE. At least that’s what I’ll be doing.

Although the process is a one-way data transmission, the potentially for international data transfer is great. Mutual speeds can be achieved by either sending another multicore cable in the opposite direction or halving the speed and sending traffic in two directions.

Continue Reading...
Posted on October 30, 2014

Rovio Releases “Flappy Bird” Inspired “Retry” App

Flappy Bird was massive when it came out. Although none of us really understood the app’s extreme popularity, it became extremely popular nonetheless. This sparked Rovio to try and hone in on that type of success, and they’ve done just that with Retry.

This game is awesome, Susan McGalla was telling me about it earlier, and I just had to download it to my iPhone 6 Plus.

You literally just tap the screen to control the gas on the tiny airplane that you help guide through levels. The longer you hold, the more gas until the plane performs a loop the loop.

However, that’s where the difficulty comes in, You have to navigate complicated levels, the entire time carefully controlling the throttle, so that you can climb or descend quickly, accordingly.

Considering it’s totally free, there’s almost no reason to not give Retry a shot.

Continue Reading...
Posted on October 27, 2014

Old Fraud Gains New Traction With Today’s Technology

Something that most people and businesses take for granted is their phone provider. The user dials a number, speaks with another person on the other end, and when he or she presses the button to end the conversation, normally a person can trust that the connection was actually ended. However, computer hackers are taking advantage of many businesses susceptibility to use “Voice Over Internet Protocol” for their phone services, and the businesses are having to pay huge sums of money due to fraudulent calls made by the hackers.

The scheme is pretty simple. Typically the attacks occur on weekends or overnight periods when there aren’t employees around to note strange behavior concerning the company’s telecommunications. Hackers can gain access to the phone system after tracing the number to figure out what company is providing the voice services.

After learning that bit of knowledge, the hackers then have a good idea of where to begin infiltrating a particular company’s phone lines. Hackers will use all of the phone lines to start dialing foreign premium phone numbers. We asked security analyst Igor Cornelsen about these. Cornelsen believes these premium numbers are usually for phone sex or psychic hotlines, which can quickly rack up the charge to an exorbitant amount.

Some of the hacking groups are connected with terrorism operations overseas, making solving these crimes a high priority for both consumers and law enforcement. However, it has proven to be difficult to catch these criminals, as they constantly switch numbers, target different businesses in different states simultaneously, and rarely attack the same business twice. For businesses to protect themselves, it is advised that phone lines are secured as competently as other web-enabled devices like computers.

Continue Reading...
Posted on October 24, 2014

3 Apps To Lessen The Burden On Your Wallet

The best innovation that the iPhone and associated apps have brought us, are the ways that they can infinitely improve your quality of life. There are apps for everything, from time management, to expanding the abilities of your brain, and even helping you lose weight. But there are even applications that can help you save money as well, and Jared Haftel helps me outline 3 that will be perfect for just that:

  1. Poshmark

Sort of like a great eBay app, where you can sell old shoes, clothes, and jewelry items that you just never wear, or that you were gifted, that you just aren’t a fan of.

  1. Key Ring

Helps you store and keep track of all discount cards that you receive from grocery stores, and any other major outlet. We all know how annoying that can be.

  1. GasBuddy

Actively tracks gas prices in your area, so that the app can point you to the cheapest location. While, you’re probably only talking about saving a few bucks per trip, over the course of an entire year you’re saving hundreds, or maybe even a grand. That’s not nothing.

Continue Reading...
Posted on October 23, 2014

Apple Wants All Apps To Make The Jump To 64-bit Code By February

Apple rolled out the ability for applications to use 64-bit code over a year ago, but now they will be requiring all new applications to utilize this format. They will also be enforcing updates to all current apps, so that they fall in line with the new specifications.

Apple will not directly kick out apps like FreedomPop if they aren’t able to update in time . But all future updates, and applications will have to be compatible with 64-bit code.

The whole point being a more streamlined experience on phones and tablets from the technology giant. 64-bit code as a requirement will mean faster performance from games, applications, and even videos on Apple products. So the move will have massive implications for the future of these devices.

Continue Reading...
Posted on October 22, 2014

Google Glass Addiction: The Latest Disorder?

Mental health experts disagree on whether or not internet addiction or social media addiction are actual disorders. A recent case suggests that Google Glass may be addictive. A patient who had been using Google Glass for as long as 18 hours per day was forced to enter an addiction program for his condition.

This is simply one example of a fairly pervasive issue, says Khaled Shaheen on Vimeo. Many people claim to be addicted to computer games, Facebook or the internet in general. Internet Addiction Disorder is not yet officially recognized by the mental health community as a disorder – it’s not included in the Diagnostic and Statistical Manual of Mental Disorders. This, however, is something that is likely to change in the near future.

Google Glass and similar devices have the potential to be even more addictive than computers or phones. When a person can actually wear a device, he or she can theoretically wear it all day long. Can safeguards be built into such devices to prevent against this type of problem? The makers of wearable technology such as Google Glass could, for example, place limitations on how long someone could wear the device at a time. Or an alarm of some type could be placed within the device, similar to the way some modern automobiles can detect if the driver is intoxicated.

The issue of internet addiction is still being studied and debated. As technology advances, there will be an increasing need to address this side effect of ever more sophisticated gadgets.

Continue Reading...
Posted on October 20, 2014

UK Cell Phones Pass Data onto the Police Automatically

The telecommunications companies EE, Vodafone and Three have passed along data about their customer’s call records to the cops, which can be accessed via a simple computer program.

It gets even better: it’s an automatic process. An employee of one of the firms referred to the system being “like a cash machine.”

A spokesperson for Privacy International said that “if companies are providing communications data to law enforcement on autopilot, it’s as good as giving police direct access [to individual phone bills.]” However, not all UK companies are in on this racket, and the operator 02 has a policy requiring all police requests for data to be reviewed before release.

It is required by law that all mobile operators must keep records of the call lists made by their customers for a year. This store is open access for the police force who can dig their noses in without applying for a warrant. This legal ability is known as the Regulation of Investigatory Powers Act (RIPA).

This law has been viewed as the holy grail for those wishing to engage in mass surveillance of the people’s communication habits. However, there have been a lot of displeased people investigating the law after it was used to expose sources used by journalists. London resident Keith Mann is among those dissatisfied.

Journalists have the legal right to protect their sources.

Thanks to the abilities of modern technology, an awful lot of the data gathered by the police force is gathered automatically. This brings up questions about how much data they should be allowed to access and, indeed, if most of it is totally irrelevant to their operations.

Source – The Guardian

Continue Reading...
Posted on October 17, 2014

Password Security and Personal Protection

Passwords… they are a part of everyday life now, they have been for years. In the modern age, passwords are an important part of all that we do, and they keep us protected from the outside world.

There are hackers out there, people who make the need for secure passwords very important. In this age where technology has helped us to advance, it has also advanced the cause of those who would like to harm us and take what is ours. The hackers’ attempts to hack Dropbox recently shows just how much we need to worry about our passwords.

We don’t want people to be able to access our content without our permission, so password security for casual users like Marnie Bennett is a must. When there are people out there who we know are seeking to steal the information and photos that we have online, we need to be sure to look out for ourselves by creating passwords that are safe and secure.

Poodle Web Threat Could Affect Thousands of Computers

Another day, another web security threat. This time around it’s Poodle (Padding Oracle on Downloaded Legacy Encryption). This is an encryption standard SSL 3.0 which is 18 years old, and was just recently discovered as a possible exploit by Google.

The backdoor could let any software system that’s vulnerable to Poodle be controlled by an outside hacker. Allowing them to take control of personal information stored on the machine, or even hacking emails, and other types of secure accounts too.

But there’s also a growing fear that it could be used to hack patients medical records. Exposing sensitive material to the world.

Although, luckily for people like Brad Reifler that spend their entire careers online, Google’s discovery means that a patch should be coming out pretty soon. Most reputable software devs, and corporations will be working on the issue presently.

Continue Reading...
Posted on October 16, 2014