China Unicom replaces Cisco devices over security concerns

As the world’s largest maker of networking equipment, Cisco occupies a large market share in China. It accounts for over a 70 percent share of China Telecom’s 163 backbone network and over an 80 percent share of China Unicom’s 169 backbone network.

via China Unicom replaces Cisco devices over security concerns – Companies & Industries – Morning Whistle – Latest chinese economic, financial, business, political and society news.

The Game Console Is Dead. What Will Replace It?

The pressure to evolve even further has become immense now that the quality gap between cheap-or-free games and full-price ones is narrowing. The best iPad games look like middle-of-the-road Xbox 360 games. Your smartphone is quickly getting to the point where its hardware could display good-looking games in 1080p on your television, and it won’t be long before your phone and TV can sync up without cables.

via Consolation Prize: The Game Console Is Dead. What Will Replace It? | Game|Life | Wired.com.

Gaming aficionados will pay up, they say, because the bigger games are of higher quality. But only a handful of developers can now afford to play in this rarefied and risky space, and even for these few, the returns will be smaller. The new leaders in the game, insiders predict, will be those who can shift resources into less ambitious, higher-return products, leaving the future of high-end games in serious doubt over the long haul.

Texas college hacks drone in front of DHS

Humphrey tells Fox News that for a few hundreds dollar his team was able to “spoof” the GPS system on board the drone, a technique that involves mimicking the actual signals sent to the global positioning device and then eventually tricking the target into following a new set of commands. And, for just $1,000, Humphreys says the spoofer his team assembled was the most advanced one ever built.

via Texas college hacks drone in front of DHS — RT.

“In five or ten years you have 30,000 drones in the airspace,” he tells Fox News. “Each one of these could be a potential missile used against us.”

The periodic table of tech

But beyond the chemistry lab, most elements appear in everyday tech gear, too. We’ve researched each element to learn more about its properties and typical uses, and found common products that spawn from that element. From iPhones to microwave ovens, from alkaline batteries to camera lenses, and from hybrid-car fuel cells to plasma HDTVs, everything starts with elements. Here’s the breakdown.

via The periodic table of tech | TechHive.

Inside social media’s fake fan industry

Even the already famous seem to have enjoyed an artificial boost. In August, UK social media management firm StatusPeople scanned several massively popular Twitter accounts using a service it developed called Fake Follower Check. According to StatusPeople, more than 70 percent of President Barack Obama’s 19 million Twitter followers were either fake or inactive accounts. Fake Follower Check returns roughly similar results for Mitt Romney, Lady Gaga, and Justin Bieber.

via Almost Famous: Inside social media’s fake fan industry | ITworld.

“It used to be the main metric of social media success for many companies was how many Likes or fans they had,” says Mike Nail, vice president of operations for the company. “But what really matters is engagement, and when you’re buying Likes to pad that number, your engagement rate actually goes down. You can’t have engagement with people who don’t exist. The real reason to use social media is to get leads, and you can’t get leads from fake people.”

DRM be damned: how to protect your Amazon e-books from being deleted

If you buy e-books from Amazon, and want to engage in a bit of digital civil disobedience—by stripping the files’ DRM and making sure that Amazon can’t deny you access—we’re about to show you how. Yes, many parts of the Internet have known about this technique for some time now, but we feel that it bears mentioning again here..

via DRM be damned: how to protect your Amazon e-books from being deleted | Ars Technica.

Now, as West himself noted, these files are for your personal use only—they’re not meant to be distributed anywhere. Enjoy!

Using eBox As Windows Primary Domain Controller

eBox Platform is an open source small business server that allows you to manage all your services like firewall, DHCP, DNS, VPN, proxy, IDS, mail, file and printer sharing, VoIP, IM and much more. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators.

This tutorial shows you step by step how to use eBox as Windows Primary Domain Controller. At the end of it you will be using eBox Platform 1.2 for users and shared resources management on your Windows domain.

via Using eBox As Windows Primary Domain Controller | HowtoForge – Linux Howtos and Tutorials.

Open Compute Project Driving Open-Source Hardware Development

Facebook launched the Open Compute Project in April 2011 with the intention of sharing the designs of the social networking giant’s data center in Prineville, Oregon, as well as custom designs for servers, power supplies and UPS units. Since then, the project has been growing, adding new partners and introducing new technologies designed specifically for use in webscale data centers.

via Open Compute Project Driving Open-Source Hardware Development.

The Open Compute v2 machines were unveiled at the third Open Compute Summit in May. The new OCP v2 servers are double-stuffed machines that can fit two two-socket x86 servers, their power supplies, and fans into a 1.5U Open Computer chassis.

AMD and Intel have contributed motherboard designs used in OCP v1 and v2. The new motherboards stripped out many features found in traditional motherboards to optimize power and reduce costs.

A Bandwidth Breakthrough

Testing the system on Wi-Fi networks at MIT, where 2 percent of packets are typically lost, Medard’s group found that a normal bandwidth of one megabit per second was boosted to 16 megabits per second. In a circumstance where losses were 5 percent—common on a fast-moving train—the method boosted bandwidth from 0.5 megabits per second to 13.5 megabits per second. In a situation with zero losses, there was little if any benefit, but loss-free wireless scenarios are rare.

via A Bandwidth Breakthrough – Technology Review.

The technology transforms the way packets of data are sent. Instead of sending packets, it sends algebraic equations that describe series of packets. So if a packet goes missing, instead of asking the network to resend it, the receiving device can solve for the missing one itself. Since the equations involved are simple and linear, the processing load on a phone, router, or base station is negligible, Medard says.

Huawei offers access to source code and equipment

“Huawei has done a very poor job of communicating about ourselves and we must take full responsibility for that,” said John Lord, chairman of Huawei’s Australian arm.

He added that the company needed to be more open and would give the Australian authorities “complete and unrestricted access” to its software source code and equipment.

via BBC News – Huawei offers access to source code and equipment.