Microsoft’s Grand Gaming Plans: Upgradeable Xbox, Unified Platform

Microsoft Xbox boss Phil Spencer has revealed the company’s plans for its gaming division, painting a vision of the future where the Xbox console becomes more like a PC and the PC gaming experience becomes more like the one on consoles.Speaking at the …



Microsoft Xbox boss Phil Spencer has revealed the company's plans for its gaming division, painting a vision of the future where the Xbox console becomes more like a PC and the PC gaming experience becomes more like the one on consoles.

Speaking at the annual Xbox Spring Showcase, Spencer expanded upon the already in place plans to unify the Windows and Xbox platforms. With game streaming now a possibility on Windows 10 for Xbox One owners, new games created using the Universal Windows Platform can now be ported to work on both the Xbox One and in Windows 10 more easily than ever before.

But it's not just the games that will blur the line between PC and console gaming, the console hardware too may see a radical change to make it more PC like in the future, according to Spencer. The problem, according to Spencer, is that once a console generation is released, it's seven years usually before another hardware upgrade comes along. While slimmer and quieter version of the same console may get released along the way, and developers may be able to unlock more from the console and make the games look and play better, the reality is that unlike PC and mobile gaming, the hardware largely remains static.

"[On PC and mobile] you get a continuous innovation that you rarely see on console. Consoles lock the hardware and the software platforms together at the beginning of the generation. Then you ride the generation out for seven or so years, while other ecosystems are getting better, faster, stronger," says Spencer.

Spencer adds that Microsoft is looking to bring the "capability of hardware iteration" to consoles, suggesting that a more powerful version of the Xbox One may be released in the future, while games will remain compatible across all versions of the console.

Microsoft isn't the only ones thinking about consoles hardware upgrades. Rivals Sony also revealed a similar concept last year that may mean a "Super PS4" that not only adds beefier hardware, also may also add Ultra HD Blu-ray support.

San Bernardino DA says seized iPhone may hold “dormant cyber pathogen”

He says iPhone might be “a weapon” to trigger some nefarious worm of some sort.

The San Bernardino District Attorney told a federal judge late Thursday that Apple must assist the authorities in unlocking the iPhone used by Syed Farook, one of the two San Bernardino shooters that killed 14 people in a killing rampage in December. The phone, which was a county work phone issued to Farook as part of his Health Department duties, may have been the trigger to unleash a "cyber pathogen," county prosecutors said in a brief court filing.

"The iPhone is a county owned telephone that may have connected to the San Bernardino County computer network. The seized iPhone may contain evidence that can only be found on the seized phone that it was used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino's infrastructure," according to a court filing (PDF) by Michael Ramos, the San Bernardino County District Attorney.

The county declined to directly comment. A spokesman, David Wert, told Ars in an e-mail that "The county didn't have anything to do with this brief. It was filed by the district attorney." The DA's office, which did not immediately respond for comment, followed up with a statement to Ars, saying that there is a "compelling governmental interest in acquiring any evidence of criminal conduct, additional perpetrators, potential damage to the infrastructure of San Bernardino County, and in protecting the California Constitutionally guaranteed due process rights of the victims, deceased and living, arising from state crimes committed on December 2, 2015."

Read 5 remaining paragraphs | Comments

The ugly truth behind those “cute baby bird” Internet memes

Birds are buying alligator protection using baby bird sacrifice.

This Florida egret doesn't mind tossing a few of its chicks to the alligators. (credit: Audobon Society)

Everybody loves a cute picture of a baby bird, which is why the Internet is packed with shots of these tiny balls of fluff, watched over by their adoring parents. Nature's reality, however, is a lot less adorable. Many wading birds—including egrets, herons, and storks—actually feed their babies to local alligators in exchange for protection from other predators.

A new study published in PLoS One explores the complicated relationship between colonies of wading birds and alligators in the Florida Everglades. Environmental scientists have known for a lot time that birds and alligators thrive in part thanks to a mutually beneficial arrangement that's called "facilitation." The birds choose to nest in trees right in the middle of alligator territories, and the reason seems obvious. Their nests are high enough to keep the birds out of chomping range, so the alligators focus on killing the raccoons and possums that would normally eat birds' eggs. Alligators keep tropical flooded islands and swamps safe from predators.

Rarely did anyone wonder what alligators got out of this deal. They can get raccoons anywhere, so why stick around bird colonies? Answering that question is the focus of this new study.

Read 12 remaining paragraphs | Comments

To get back at Apple, GOP congressman introduces pointless bill

With a deadlocked Congress, GovTrack gives bill a 1 percent chance of passage.

(credit: Maurizio Pesce)

A Florida congressman has introduced a new bill that would forbid federal agencies from purchasing Apple products until the company cooperates with the federal court order to assist the unlocking of a seized iPhone 5C associated with the San Bernardino terrorist attack.

In a statement released on Thursday, Rep. David Jolly (R-Fla.) blasted Apple.

"Taxpayers should not be subsidizing a company that refuses to cooperate in a terror investigation that left 14 Americans dead on American soil," he said. "Who did the terrorist talk to? Who did he message with? Did he go to a safe house? Is there information on the phone that might prevent a future attack on US soil? Following the horrific events of September 11, 2001, every citizen and every company was willing to do whatever it took to side with law enforcement and defeat terror. It’s time Apple shows that same conviction to further protect our nation today."

Read 6 remaining paragraphs | Comments

Stretchable, glowing capacitors used to make a touch-sensitive robot

A hydrogel sandwich provides some interesting electrical properties.

(credit: Larson, et. al., Science)

For many of us, the term "robot" still evokes an image of R2D2 or a terminator-style collection of metal parts. But there's no reason to limit our construction materials to hard parts. A number of labs are working on soft-bodied robots and have shown they can do some rather interesting things, like squeeze through narrow spaces.

A team of researchers from Cornell and the Istituto Italiano di Tecnologia has taken a soft-bodied robot and made it glow. Their method of producing the light, however, has some interesting side effects: it allows the robot to determine how much it has flexed, and it makes the robot responsive to touch.

These days, "glow" is usually synonymous with "LED." But the authors used a very different technique, relying on what's called an electroluminescent phosphor—basically, something that glows when it's place in an alternating electric field. The phosphors (zinc sulfide, in this case) can be embedded in a silicone gel, making them stretchable and bendable. Different dopants in the phosphor will cause it to glow in different colors.

Read 8 remaining paragraphs | Comments

Amazon removed device encryption from Fire OS 5 because no one was using it

New Fire tablets and old ones that were upgraded to Fire OS 5 can’t be encrypted.

Amazon's $50 Fire tablet, which runs Fire OS 5. (credit: Mark Walton)

In the wake of Apple's high-profile fight with the FBI, more users and journalists have been paying attention to encryption of local storage in phones and tablets. Apple began encrypting all devices by default in iOS 8. Google made encryption a requirement for all Google-approved Android phones that ship with Marshmallow (after a false start in Lollipop), and it has been available as an optional Android security feature for years.

Amazon's Fire OS is a fork of Android, based on the Android Open Source Project (AOSP) code but without Google's apps and services or guaranteed compatibility with apps developed for Google-approved Android. Amazon has heavily customized the UI and provides its own app store, but it typically leans on AOSP code for under-the-hood, foundational features—in older Fire OS versions, the optional device encryption was handled the same way it was on any Android device. However, according to user David Scovetta and others on Amazon's support forums, that encryption support has been deprecated and removed in recent releases of Fire OS 5, both for new Fire tablets and for older devices that have been upgraded.

We contacted Amazon for comment, and the company told us that local device encryption support was removed in FireOS 5 because the feature wasn't being used:

Read 3 remaining paragraphs | Comments

NASA may have found snow-covered mountains on Pluto

Don’t book your ski vacation yet; we hear airfare to Pluto is exorbitant.

From visual images and a spectral analysis, scientists think methane ice caps some of Pluto's mountains.

After studying images and data that characterize a range of mountains that run for 420km across Pluto's Cthulhu feature, planetary scientists now think they are seeing peaks capped with methane snow.

Pluto's Cthulhu region, about the size of Alaska, is characterized by reddish hues in contrast to the more pale, heart-shaped feature known as Sputnik Planum. Cthuhlu likely gets this darker color from tholins, complex organic molecules that form when ultraviolet light strikes simple organic molecules like methane. Tholins have been found on several worlds in the outer solar system, including Titan.

However, higher resolution images of mountains within the Cthulhu region have shown that the upper slopes on the highest peaks are much brighter. The most obvious explanation for this is a methane snow that has condensed out of Pluto's thin atmosphere, scientists say.

Read 1 remaining paragraphs | Comments

Samsung Notebook 9 ultrabooks now available for $1000 and up (starting at 1.9 pounds)

Samsung Notebook 9 ultrabooks now available for $1000 and up (starting at 1.9 pounds)

Samsung launched a new line of thin and light notebooks in January, with the smallest models weighing as little as 1.9 pounds. Now the Samsung Notebook 9 series laptops are available for purchase for $1000 and up from stores including Samsung, B&H, and Amazon. The laptops are svelte, but powerful: every model has an Intel Core i5 […]

Samsung Notebook 9 ultrabooks now available for $1000 and up (starting at 1.9 pounds) is a post from: Liliputing

Samsung Notebook 9 ultrabooks now available for $1000 and up (starting at 1.9 pounds)

Samsung launched a new line of thin and light notebooks in January, with the smallest models weighing as little as 1.9 pounds. Now the Samsung Notebook 9 series laptops are available for purchase for $1000 and up from stores including Samsung, B&H, and Amazon. The laptops are svelte, but powerful: every model has an Intel Core i5 […]

Samsung Notebook 9 ultrabooks now available for $1000 and up (starting at 1.9 pounds) is a post from: Liliputing

Can Google, with its big data, map and zap the spread of Zika?

Tech giant and researchers hunt for spatial modeling, which could prove key.

Google software engineers John Li and Zora Tung with UNICEF research scientist Manuel Garcia Herranz and UX designer Tanya Bhandari working on the open source data platform. (credit: Google)

A vaccine would be a priceless weapon in the fight against Zika, a virus currently tearing through the Western Hemisphere and linked to devastating birth defects and paralyzing neurological conditions. But a vaccine wouldn’t be everything, of course. If the frustrating wars against measles and polio have proven anything, it’s that eradicating an infectious disease requires relentless public health outreach, surveillance, and containment, as well as medical advances. Indeed, the one and only eradication of an infectious disease of humans—smallpox—was accomplished not just with a vaccine, but tight networks for disease monitoring and strategic vaccination campaigns around disease hotspots—in other words, spatial data and responses.

While Zika is very different from smallpox and scientists are likely to be years away from having a vaccine, the importance of spatial data in stamping out a scourge are the same. And, when it comes to mapping Zika, Google thinks it’s uniquely suited for the task.

Thursday, the tech giant announced that it has assembled a team of volunteer engineers, designers, and data scientists that will use weather, travel, and disease data to map and forecast the spread of the virus. Google hopes that the resulting open source modeling will help governments and public health organizations monitor and anticipate outbreaks in real time so that they can direct resources and responses accordingly.

Read 4 remaining paragraphs | Comments

New attack steals secret crypto keys from Android and iOS phones

Researcher-devised exploit threatens Bitcoin wallets and other high-value assets.

Researchers have devised an attack on Android and iOS devices that successfully steals cryptographic keys used to protect Bitcoin wallets, Apple Pay accounts, and other high-value assets.

The exploit is what cryptographers call a non-invasive side-channel attack. It works against the Elliptic Curve Digital Signature Algorithm, a crypto system that's widely used because it's faster than many other crypto systems. By placing a probe near a mobile device while it performs cryptographic operations, an attacker can measure enough electromagnetic emanations to fully extract the secret key that authenticates the end user's data or financial transactions. The same can be done using an adapter connected to the USB charging cable.

"An attacker can non-invasively measure these physical effects using a $2 magnetic probe held in proximity to the device, or an improvised USB adapter connected to the phone's USB cable, and a USB sound card," the researchers wrote in a blog post published Wednesday. "Using such measurements, we were able to fully extract secret signing keys from OpenSSL and CoreBitcoin running on iOS devices. We also showed partial key leakage from OpenSSL running on Android and from iOS's CommonCrypto."

Read 6 remaining paragraphs | Comments