Acer presents a new Chromebook has, on paper, an excellent up to 14 hours. If confirmed by our tests, this would make an interesting machine.
Five years after releasing his first Chromebook, Acer returns again to the charge with the Chromebook 14, a model that provides up to 14 hours of battery life.
This computer has a 14-inch IPS screen proposed two definitions: Full HD (1920x1080) or HD (1366x768). And it is precisely with this HD screen that the manufacturer claims a battery life of 14 hours, without specifying the capacity of the battery. With Full HD screen, it falls to 12 hours.
Also new, it has an all-aluminum chassis for lightness. It weighs only 1.55 kg for a thickness of just 17 mm according to Acer.
Inside, we find, depending on the model, a quad Celeron processor N3060 or a double heart, accompanied by 2 or 4 GB of RAM and 16 or 32GB of storage space. This Chromebook also comes with 100 GB of free storage on Google Drive so users can keep their carefree photos, documents and other files.
connectivity, the Chromebook 14 is provided with two USB 3.1, Bluetooth, Wi-Fi and an HDMI port. Webcam 720p (1280x720) offers a wide field of view, allowing you to frame several people in a video conference, for example.
The Acer Chromebook 14 will be available in the month of April from 249 euros. Pricing and equipment that make it an interesting alternative to the Chromebook 14 HP .
In the US, a company specialized in amicable settlements wants to set up a more aggressive system to encourage pirates to pay.
Six years after its creation, the Hadopi seems not really a deterrent vis-à-vis internet users illegally downloading movies. But if in France the warning is measured way, Americans can deal with agencies - private this time - much more aggressive. Recover money from those who do not respect thecopyright has even become a separate activity. And Rightscorp , one of the industry leaders, intends to take the browser users hostage to force them to pay.
Silver or trial
According to the website Torrent Freak , he would develop a system calledScalable Copyright that would send warnings as notifications on the browser.The goal is to avoid sending emails too often ignored at the firm taste. After a number of warnings, the browser would end completely blocked. Only solution out his credit card and pay tens of dollars.
In recent years, Rightscorp specialized in this field by sending threatening emails to those who have broken the law. The company has developed partnerships with many Internet Service Providers (ISPs) US to retrieve the names associated with IP addresses, as does the Hadopi in France with the support of the TMG business. Except that the tone is a bit edgier. To avoid being sued - and risk a fine of up to $ 150 000, the user is prompted to pay on the spot about thirty dollars. Part of the money is then paid to the beneficiaries.
A precedent in France
Unfortunately for Rightscorp, individuals do not easily give in to blackmail, probably aware that legal action would be too costly for the company. In 2015, the company has also accused a net loss of $ 3.5 million.
Developing Scalable Copyright sounds like a last attempt to extort money massively to users. But American ISP might not follow the lead of Rightscorp for fear of being perceived as too intrusive by their clients.
In France, such a system would be unlikely to emerge. In 2007, a French lawyer had itself tried to do so, asking 400 euros Internet users accused of having hacked the game Call of Juarez . She had been heavily condemned by the Council of the Paris Bar. Finally, the initiative looks Rightscorp especially a new confession of impotence against the piracy.
The QTE, short for quick time event is a phase of play that reduces the gameplay to its simplest expression. A button appears on the screen, it is necessary to press at the right time not to interrupt the drive. Popularized by Shenmue and Sword of the Berserk: Gut's rage in 1999, this type of action already existed. Unique gameplay mechanicsDragon's Lair was released in 1983, now located in the most games. Until overdose?
Used to make the player feel the tension in a particularly brutal action in God of War,the QTE can enhance immersion. Gears of War would it be the same without his duels with a chainsaw? The examples of this type m
issing and not in these games QTE fit naturally into the gameplay, since they are not prevailing. Conversely, their predominance in the introduction of Resident Evil 6 fails to revive the player's interest in scenes that are desperately short of pace. Worse, they literally crippling action.
But the QTE can be downright a distressing uselessness, and we really wonder what is going through your head developers of Blue Dragon, when they decided it would bludgeon the A button to Open ... doors dungeons! The principle of cinematic action of Final Fantasy XIII-2 is also questionable: after the attack on our successful character, why inflict handling more in order to conclude it also mention the case of Asura's Wrath where failure of a QTE has no influence on the drive, only the end of level score being modified.
However, there are modern games completely based on QTE, and we must say that their receptions diverge: while that Heavy Rain has divided the players, his critics accusing him of being a simple interactive movie where the life of a character was based only on a button at the right time, The Walking Dead won all the votes while offering a gameplay similar in its action phases. Fad or simple evolution of morals?
Still, the QTE divide. While the same difficulty of the current games divided updevelopers, more than ever it is time to ask whether the QTE really add value to Thurs or should we eliminate it in order not to fear the loss the gameplay it represents?
We know a little more about the avenues explored to develop the next mobile radio standard. The World Radiocommunication Conference held in late November adopted a roadmap for this.
This is a victory Bitter who managed mobile operators this November 27th.Even though they won some new frequencies, the World Radiocommunication Conference (WRC) has resulted in the maintenance in the state for at least eight more years, Ultra High Frequency (UHF) into the hands of terrestrial television.
Between 470 MHz and 694 MHz, this band was coveted by the telcos to boost 4G and have been useful to develop 5G. But the next standard of mobile broadband will have to do without. Options to make up for it are not lacking, however, validated by this same CMR and discussed at the conference organized by the ANFR this December 8 at Bercy.
"The 5G surely rely on a patchwork of frequencies", said Wladimir Bocquet, head of Spectrum Policy, GSMA, the global trade association for GSM operators. And it will pass first through the reallocation of existing frequencies, or the so-called practice of "refarming".
"Today, more than 60% connectivity even through 2G worldwide. In 2019, these 60% will switch to 4G or 4G +. This will free up frequencies ", further emphasizes Wladimir Bocquet. And actually, we already witnessing in France in 1800 MHz 4G reuse, while it was initially vested in the 2G.
A specter is best used
To increase the cellular network data transfer speed, all on a greater distance, a technique is studied closely by scientists for many years: the "massive MIMO" found sometimes also referred to by the term "smart antennas".Instead of relying only one antenna at the receiver and transmitter, it is to use several.
But these multiple entry and exit will not be without consequences, according to Olivier Huart, CEO of TDF. "This will pose constraints in terms of street furniture for local authorities and operators will also redesign the architecture of their mobile network", advance there.
Millimeter radio waves
Another way to dig, the rise in frequency. Mobile operators need more spectrum width to get more bandwidth. Between 500 MHz and 1 GHz in the ideal. Is very far above 20 MHz which is limited 4G. With more bandwidth, throughput would be higher in each radio cell.
Always at the last (CMR), operators have therefore advocated that in 2019, the frequency bands called "millimeter" lying beyond the 6 GHz are allocated to the 5G. Why beyond 6 GHz? Because the spectrum it offers the famous quality required bandwidth while being satisfactory spread.
A claim granted by the conference. She chose to study a frequency range between 24.25 and 86 GHz.
Experiments to 2020
We are now entering a phase of experimentation. Because this is to check whether the sharing of frequency bands mentioned possible, before retaining them as world standard. This particular will be the task of Orange as part of a European public-private partnership. The French operator is the first in France to have obtained authorization from ARCEP to test frequencies between 100 GHz and 6 in Belfort during the year 2016. The operator hopes to reach a theoretical speed 10-100 times that of 4G.
The frequency bands of the 5G will eventually identified at the next conference to be held in 2019. A life-size experiments will however be soon in 2018 at the Winter Olympics in South Korea, and in 2020 at the Summer Olympics in Japan.
Once the determined specifications, started to 5G networks should be made in France between 2020 and 2022. Yet he must have compatible smartphones. The 5G should therefore not be a reality for users before 2023, even if the operators and the European Commission always show the ambition of a commercial launch in 2020.
Wired magazine is almost certain: the creator of the digital currency called Craig Steven Wright, it is Australian and is 44 years old. A smart enough and crazy man for wearing only this revolutionary project.
Satoshi Nakamoto, the mysterious creator of Bitcoin, really be called Craig Steven Wright. A brilliant computer-graduate on the LinkedIn profile that dizzy,which hardly anyone had heard before Wired does today published an article demonstrating, with near certainty, that he is the creator of the famous digital currency. And blockchain, this great technology that could disrupt the economy by making it completely peer-to-peer.
Let's be frank: Wired is not 100% certain of having discovered the creator of Bitcoin. It must be said that many media who thought he discovered the anonymous genius, broke teeth. Newsweek relaunched the paper versionwith the (false) scoop. The New York Times was also his idea.
But the famous American magazine, if he takes tweezers, brings a number of clues and documents that nobody had met him before, elements that tend to show that its reporter Andy Greenberg and the enigmatic Gwern have beautiful Branwen and well solved one of the greatest mysteries of the decade geek.
A proper investigation of a detective novel
The investigation that led to the name of Steven Craig Wright takes almost the detective novel. Andy Greenberg went to bed with a security researcher, specialist in dark web, which responds to Celtic pseudonym Gwern Branwen.This magazine has provided several valuable documents that a "source close to Wright" was entrusted.
Wired does not publish, but first evokes a blog post published by Wright in August 2008-three months before the introduction of Bitcoin- in which he describes a scientific paper on "cryptomonnaies". More interestingly, another article in the same blog, dated November 2008, offers its readers to get in touch with its author via PGP encryption key associated with Satoshi Nakamoto ..., which published a few days before the famous article Bitcoin initiate the revolution.
A final paper (image below) shows a screenshot of the blog of January 10, 2009, which clearly indicates the direct involvement of Wright in Bitcoin. One can in particular read: "beta Bitcoin will be launched tomorrow. It is decentralized ... We will test until it works. "
The ultimate proof? Not so sure. First, because this message of January 10, while Bitcoin has already been launched. Wired tries to explain by jet lag, Wright living at the time in eastern Australia. But that's not all: this message was changed later ... then completely erased.
Fortunately, Wired has further evidence in his wallet. Branwen also provided the strength newspaper emails, accounting extracts and even Wright's mail to his lawyer, dating from June 2008, in which he imagines a "ledger distributed P2P." This is very similar to the ... blockchain, this database that lists all of the Bitcoin transactions.
But there is even better. Wright would have shared a lot of his project with a certain David Kleiman. Since deceased, the analyst would have founded with him a fund called "TulipTrust" on which have been handed ... the very first mined BTC. 1.1 million Bitcoin precisely. Equivalent, at current prices, over 420 million euros! A credible figure because it represents a huge visible on blockchain portfolio - which is public but anonymous, we remind you - usually attributed to Satoshi.
Wired still ahead of others rather convincing evidence, as the correspondence between Wright and the Australian Treasury, dating from 2014, in which our man advance the name of Satoshi Nakamoto to defend its arguments. "I did my best to hide the fact that I've been running Bitcoin since 2009, but I think everyone will end up knowing. "He says in particular.
Wright, a nerd who has staked everything on cryptomonnaies
The newspaper contacted Wright to try to confirm his information. He replied in a strange way, with an email address whose domain is "Tessier-Ashpool" the name of the company must hack Case, the hacker fantasy cyberpunk novel Neuromancer Willam Gibson. And IP address, from Panama, also corresponded to those used by Vistomail, a service previously used ... by Satoshi.
Wright responded to Wired by funny puzzles. "You dig, the question is: how deep are you located? "" You seem to know a few tricks. More than you should. " Or "There are too many to know secrets. The world does not need to know. No need to be a dictator to lead the change. ".
The man then simply stopped responding to the demands of the journalist.Just a few hours, it also closed one of its blogs and Twitter account, which was already protected.
According to documents recovered by the newspaper, the crazy low profile in any case correspond completely to that, dreamed, Satoshi. For in this decidedly amazing article, we also learn that Wright had three of its mortgaged properties and spent over a million dollars to invest in ... supercomputers. Tulip Trading, one of his companies, has also designed two machines that are classified in the famous top 500 of the most powerful computers in the world. Machines that it would have probably been used to create the first virtual coins.
So he is the creator of Bitcoin Wright? If Greenberg is not completely certain, it still indicates that, if this were not the case, Wright would have played him an incredible turn, developing a "hoax almost as ambitious as Bitcoin itself."We now strongly waiting for his reaction.
After the tablet surface and the Phone Book surface area could make an appearance next year.
The rumor around a Surface Phone is increasingly insistent. After supposedly benchmark results, here as other information seem to support the idea of the output of such a smartphone sometime in 2016.
According to the website Windows Central, after the abandonment of a first metal smartphone project, a brand new mobile is now in preparation. But unlike the previous one, it would be the baby of the team of Panos Panay, the man who created and area that surprised the high-tech world with the Living Book last few weeks. Panay would also be invested in the project so that the unit would be called "Panos's phone" within the company!
Intel also is part of: the foundry participate in the development of a chip for smartphones that would replace traditional Lumia Qualcomm processors.Chips that could help turn the traditional Windows applications ... and suddenly make this smartphone a real Pocket PC.
This smartphone could come out in the second half of 2016, estimates the US site, which will even forward two possible dates. The first would be an exit area Phone in August, parallel to the arrival of the next major version of Windows 10, Redstone.
The second option is an output during the fall. The arrival of the Surface phone would address while lower sales of other Microsoft smartphones, this date would have some sense if Microsoft decided to operate on an annual basis for its products area, a bit like its rivals Apple and Google.
Security researchers have identified a group of pirates probably in the pay of private actors. It penetrates gently into the large enterprise networks to steal confidential information.
They hacked Twitter, Facebook, Apple and Microsoft and forty other large companies in the last three years. They have a very good technical level, and they earn a lot of money. Welcome to the world of Butterfly, a group of hackers who specialized in industrial espionage, probably mercenaries employed by investors or competitors who are looking for confidential information. It is in all cases the conclusion came Gavin O'Gorman. This analyst Symantec today presented the technical details of Butterfly attacks during the security conference Botconf 2015, in Paris.
The track of the theft of confidential information was particularly glaring for a US airline and a pharmaceutical company. In both cases, hacking was executed shortly after the publication of a newspaper article which announced a significant change that could affect the share price. "They penetrate the network, steal information and sell them to brokers . For the latter, it is ultimately a very effective way to make money, because the operation is very difficult to track ", explains the researcher.
In any case, business obviously work very well for these pirates, as they use zero-day vulnerabilities they buy most likely to demand on the black market.Given the timeliness of their campaigns, they could not wait until one of them get their hands on such a vulnerability. In February 2013, when they attacked the high-tech companies, they relied on a zero-day flaw Java. In 2014, they used a zero-day flaw in Internet Explorer 10. "Such a flaw in Internet Explorer costs at least $ 100,000, or even several hundred thousand dollars," says Gavin O'Gorman.
The technical level of the pirates is "not crazy", but high enough to raise eyebrows at the Symantec analyst. He was able to recover the image of a command and control servers (C & C). It did not contain anything aside from a large file 400GB entitled "HD-porn-corrupted_tofix.rar". Obviously, this is not really an X file, but the file of a virtual machine VirtualBox encrypted TrueCrypt. Piracy operations were carried out through this machine. Once completed, nothing could be exploitable recovered from the physical machine, even if the search. "This is the first time I see such a level of operational security in a C & C server," says Gavin O'Gorman which, however, noted some deficiencies in the detection or antivirus engines and processes in memory of camouflage. This is one more reason why Symantec do not think that this is a secret service because intelligence agencies have mastered quite well these topics.
Perhaps based in the US
At the team level, several indices for language and activity schedules suggest that this is a small group dispersed around the world, but based in the United States. Furthermore, its level of dangerousness seems also higher than for other similar espionage groups. "In one case, they were able to physically access the computer of a victim in his home to install a malware", tells Gavin O'Gorman. A procedure which is reminiscent of against-espionage and explains why the analyst did not want to be filmed during his presentation.
Symantec has released a white paper last July Butterfly, with the key of many technical details. "Since we no longer perceive any activity on this group. It is likely that it is renewing its tools ", adds the analyst. But one thing is certain, Butterfly strike again.
To mark the release of "Star Wars 7: The Rise of force", Google adds voice C-3PO, R2-D2 and BB-8 with its navigation app Waze community.
The force is with Waze users! The famous participatory browser Google enjoys today French voices robots Starwars. It includes course C-3PO, which we expect a great obsequiousness, but the sound effects of R2-D2 and BB-8, hero of the new album, "Episode 7: The Rise of the Force" which will be released in French theaters on 16 December.
Menu / Settings / Audio
To enable Starwars sounds in Waze, simply click on the menu (the little ghost bottom left) then click Settings (the gear) and then "Audio". Then, scroll to the French vote and select "French - Starwars". If the force is with you, stay relax aboard your Landspeeder: Dark Radar lurking ...
According to TorrentFreak, illegal copies of the latest series of tenors 4K video streaming are available on sharing networks. This would mean that HDCP was circumvented ...
All Wall eventually collapse and now it would be the protection HDCP 2.2 that protects 4K content from Netflix and Amazon who took the lead in the wing.According to the specialized website TorrentFreak, illegal copies of two new sets of services are now available on sharing networks, such as the highly anticipated adaptation of the novel by Philip K. Dick, "Man in the High Castle" exclusive Amazon.
HDCP 2.2 circumvented?
All videos of these two services are protected in particular by the High-Bandwidth Digital Copy Protection (HDCP) in its version 2.2, a previously deemed safe encryption.
But according to our colleagues at TorrentFreak, the offending videos are original 4K files (10GB per episode) and not scaled versions, proof that the protection has been, for the first time, bypassed.
If the large size of 4K movies (up to 100 GB!) Should be limited in time dissemination of these files in high definition, it is clear, however, that dealers must already seek to plug the loophole.
The cloud is the technological base of Big Data, whose operation is still in its infancy in the health sector. It also paves the way for services that enable healthcare facilities to reduce their spending. However the nature of the data concerned imposes a specific vigilance.
In full digital transformation, the health sector is full of projects relating to the health and connected to the "quantified self" in its different forms, applications, connected objects ... This revolution requires a technology platform: cloud computing.
As in other innovative areas, elasticity and adaptability of the remote hosting allows healthcare industry to test new services, worldwide. "Our clients are drug manufacturers, insurers, pharmaceutical companies, publishers health software and applications connected to telemedicine services or adherence", lists Pedro Lucas, CEO of Cloud Health Netplus a French web host specializing in health IT. Her clients then have multi-territory hosting services.This is the host to ensure data security and compliance with regulations for each country. What let companies focus on their heart craft. "The medicine of the future will probably be a health service consists of a molecule, an application and a connected subject of health. For develop, manufacturers are conducting many tests," said Pedro Lucas.
Study the side effects of treatment
Depending on their needs, they subscribe to remote hosting services specifically designed for their field, an area where regulatory constraints are precise and binding in order to ensure confidentiality of patient health data. In France there are ten approved hosts that market telemedicine services (sharing medical records between health professionals, tele ...) and connected health. Doctors can better study including side effects of medications. "Cloud computing opens up the exploitation of huge masses of data to assess the effects of the active ingredients after the issuance of the Authorisation on the market," said Thierry Vonfelt, independent consultant and architect digital solutions .
For its part, the National Council of the Medical Association confirms the usefulness of cloud computing and provided in a summary published in 2012:"Telemedicine (...) can not develop at the cost of an excessively fast access and easy to as much data (...) The growing economic constraints make it more relevant and attractive outsourcing of data and the use of pooling provided by an outside operator. "
Digital safes for hospitals
Hospitals and clinics can also use cloud computing, including via digital safes where they can archive checkups - radios, MRI - that caregivers do not need to check daily. Warning: institutions must necessarily appeal to a cloud service provider licensed health care, respecting the commitments in terms of encryption, confidentiality, traceability of interventions and continuity of service, given the nature of the data concerned.
Public authorities could find any application to Big data, cloud computing allows that. "The idea is to study the spread of disease by analyzing public conversations on social networks and the keywords typed into search engines in order to anticipate the deployment of support means," describes Thierry Vonfelt .
The hospital is struggling to move to cloud
Still, the adoption of cloud computing by health facilities is done no ants. The sector CIOs often still hinder decisions on the matter, anxious not to get carried away by wrong this technological wave. "The hospital is really an area that is struggling to move to the cloud because CIOs are trying to protect their in-budget", asserts Pedro Lucas. The cloud may actually be associated with economies of scale can lead to a reduction of the technical teams. But this is a valid concern in other areas.
For this host, there is another reason for this reluctance. It is concerned with organizational. "Who says appeal to cloud providers and develop infrastructure outsourced says create operating manuals, build exploitable architectures to massively improve costs. This is to switch from artisanal phase to the industrial phase Now , there is much room for improvement in the industrial rationalization of health applications, "he loose. The argument of economies of scale potentially "better passes in industrial than in hospital," said the leader of Cloud Netplus Health.
Ensuring data privacy
Care facilities professionals have concerns that go beyond the technique, as suggested synthesis published by the National Medical Association Council.Its authors note, among others, the "questions" to "potential use of data in a commercial purpose or industrial espionage" and "tracing people by geolocation." They regretted "the loss of control of the implementation of the data" and a "lack of clarity as to the subcontractors used."
Finally, they emphasize the "dependence of the quality of the network to access the data." The remote hosting remains dependent effect of a perfect internet ... Here we see dawning fear of inability to access health data in bad weather for example.