Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Apple

Sapphire Glass Didn't Pass iPhone Drop Test According to Reports 207

A reader notes reports about why Apple didn't use sapphire glass screens in the latest iPhones as many expected. Sapphire screens were part of the iPhone 6 design until the glass repeatedly cracked during standard drop tests conducted by Apple suppliers. So Apple abandoned its sapphire plans before the iPhone 6 product launch September 9. VentureBeat has learned that recent supplier channel checks by an IDC analyst yielded several reports of the sapphire failures and Apple's decision against using the glass material. As we heard on Tuesday in Cupertino, both the iPhone 6 and the larger iPhone 6 Plus will ship with screens made of "ion-strengthened" glass. This was apparently Apple's second choice. IDC analyst Danielle Levitas says it isn't clear when exactly the drop-test failures took place, or when Apple abandoned plans for sapphire-screened iPhones. She says the poor drop-test results, combined with the relative high cost of sapphire glass, could have made plans to ship sapphire glass phones too risky. One researcher who covers GT Advanced Technologies, the company that was to produce the glass for the iPhone 6, wrote in a research note earlier this week that plans for the sapphire screens were cancelled in August, just weeks before the September 9 launch. The new Apple Watches (except the "Sport" version) do use sapphire for their screens. Levitas believes that the glass for the smaller 1.5-inch and 1.7-inch watch screens was less likely to break in drop tests.
Biotech

Medical Milestone: Scientists Reset Human Stem Cells 75

A reader sends news that researchers from the University of Cambridge have made a breakthrough in the production of human pluripotent stem cells. The goal when developing this kind of stem cell is to have them as early in the cell's lifecycle as possible, so that they're more like true embryonic stem cells and can fulfill whatever role is needed. But all of them made so far are advanced slightly down their developmental pathway. The new work, published in the journal Cell (abstract), has found a way to "reset" the cells by introducing two genes that induce a developmental "ground state."
Iphone

Mining iPhones and iCloud For Data With Forensic Tools 85

A reader points out an article that walks us through the process of using forensic tools to grab data from iPhones and iCloud using forensic tools thought to have been employed in the recent celebrity photo leak. There are a number of ways to break into these devices and services depending on what kind of weakness an attacker has found. For example, if the attacked has possession of a target's iPhone, a simple command-line toolkit from Elcomsoft uses a jailbreak to bypass the iPhone's security. A different tool can extract iCloud data with access to a computer that has a local backup of a phone's data, or access to a computer that simply has stored credentials.

The discusses also details a method for spoofing device identification to convince iCloud to restore data to a device mimicking the target's phone. The author concludes, "Apple could go a long way toward protecting customer privacy just by adding a second credential to encrypt stored iCloud data. An encryption password could be used to decrypt the backup when downloaded to iTunes or to the device, or it could be used to decrypt the data as it is read by iCloud to stream down to the device."
Classic Games (Games)

Ask Slashdot: What Are the Best Games To Have In Your Collection? 382

A reader writes: I am not a "gamer," per se. I grew up on "old school" arcade/Atari-type games. My question is: What are the very best games to own? Let's assume platform is irrelevant — any console, any computer, any operating system, any mobile device. I'd just like to know what you think are the most indispensable games to have in your collection. Let's expand this to include board games and other tabletop games as well. What games do you make sure to always have on hand for get-togethers?
NASA

Eye Problems From Space Affect At Least 21 NASA Astronauts 109

A reader sends this report from Universe Today: How does microgravity affect your health? One of the chief concerns of NASA astronauts these days is changes to eyesight. Some people come back from long-duration stays in space with what appears to be permanent changes, such as requiring glasses when previously they did not. And the numbers are interesting. A few months after NASA [said] 20% of astronauts may face this problem, a new study points out that 21 U.S. astronauts that have flown on the International Space Station for long flights (which tend to be five to six months) face visual problems. These include "hyperopic shift, scotoma and choroidal folds to cotton wool spots, optic nerve sheath distension, globe flattening and edema of the optic nerve," states the University of Houston, which is collaborating with NASA on a long-term study of astronauts while they're in orbit.
Android

Researchers Hack Gmail With 92 Percent Success Rate 87

A reader sends this report from CNET: Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information. Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory. "The assumption has always been that these apps can't interfere with each other easily," said Zhiyun Qian, an associate professor at UC Riverside. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user." To demonstrate the method of attack, first a user must download an app that appears benign, such as a wallpaper, but actually contains malicious code. Once installed, the researchers can use it to access the shared memory statistics of any process (PDF), which doesn't require any special privileges.

Comment Re:Actually it's both. (Score 1) 360

It's not atmospheric pressure, it's internally induced pressure due to buoyancy differences, which are normally created due to gravity and a connection that is rigid enough to withstand the internally induced pressure. If you have a closed system of two non-rigid containers connected by a rigid body, then the fluid will try to flow in the direction of its buoyancy. Helium balloons connected internally by a straw (even a curvy one) would try to fill the higher balloon, right?

So yeah, he's right that in the absence of gravity, a normal siphon will not work. But, if you took that siphon system on the ISS and put one end outside in space, and one inside, you'll have a siphon-like effect due to air pressure. Likewise, if you take two balloons of water with a rigid connector and submerge one in a pool of Hg, then that "siphon" will work against gravity. :D

Encryption

OpenSSL Cleanup: Hundreds of Commits In a Week 379

A new submitter writes with this news snipped from BSD news stalwart undeadly.org: "After the news of heartbleed broke early last week, the OpenBSD team dove in and started axing it up into shape. Leading this effort are Ted Unangst (tedu@) and Miod Vallat (miod@), who are head-to-head on a pure commit count basis with both having around 50 commits in this part of the tree in the week since Ted's first commit in this area. They are followed closely by Joel Sing (jsing@) who is systematically going through every nook and cranny and applying some basic KNF. Next in line are Theo de Raadt (deraadt@) and Bob Beck (beck@) who've been both doing a lot of cleanup, ripping out weird layers of abstraction for standard system or library calls. ... All combined, there've been over 250 commits cleaning up OpenSSL. In one week.'" You can check out the stats, in progress.
Security

NSA Allegedly Exploited Heartbleed 149

A user writes: "One question arose almost immediately upon the exposure of Heartbleed, the now-infamous OpenSSL exploit that can leak confidential information and even private keys to the Internet: Did the NSA know about it, and did they exploit if so? The answer, according to Bloomberg, is 'Yes.' 'The agency found the Heartbeat glitch shortly after its introduction, according to one of the people familiar with the matter, and it became a basic part of the agency's toolkit for stealing account passwords and other common tasks.'" The NSA has denied this report. Nobody will believe them, but it's still a good idea to take it with a grain of salt until actual evidence is provided. CloudFlare did some testing and found it extremely difficult to extract private SSL keys. In fact, they weren't able to do it, though they stop short of claiming it's impossible. Dan Kaminsky has a post explaining the circumstances that led to Heartbleed, and today's xkcd has the "for dummies" depiction of how it works. Reader Goonie argues that the whole situation was a failure of risk analysis by the OpenSSL developers.
Earth

Famous Paintings Help Study the Earth's Past Atmosphere 126

A user writes "From European Geosciences Union: 'A team of Greek and German researchers has shown that the colours of sunsets painted by famous artists can be used to estimate pollution levels in the Earth's past atmosphere. In particular, the paintings reveal that ash and gas released during major volcanic eruptions scatter the different colours of sunlight, making sunsets appear more red.' The original paper can be found here. In the last 150 years, the sunsets have become redder, likely reflecting increased man-made pollution."
Government

CIA Accused: Sen. Feinstein Sees Torture Probe Meddling 187

A reader writes with this news from the Washington Post: "In an extraordinary public accusation, the head of the Senate Intelligence Committee declared on Tuesday that the CIA interfered with and then tried to intimidate a congressional investigation into the agency's possible use of torture in terror probes during the Bush administration. The CIA clandestinely removed documents and searched a computer network set up for lawmakers, said Sen. Dianne Feinstein in a long and biting speech on the Senate floor. In an escalating dispute with an agency she has long supported, she said the CIA may well have violated criminal laws and the U.S. Constitution."

Slashdot Top Deals

The flow chart is a most thoroughly oversold piece of program documentation. -- Frederick Brooks, "The Mythical Man Month"

Working...