The agency for Science, Technology and Research (A*STAR) is currently researching the possibility of increasing storage capacity of the Heat assisted magnetic recording (HAMR) storage drives. The A*STAR institute in Singapore conducted investigations iron-platinum (FePt) nanocrystals can be used in ultra high density magnetic drive's performance.
Zhanhong Cen who is working at the A*STAR data institute said that,"Decreasing the size of magnetic particles makes the magnetic information become thermally unstable due to an effect called super paramagnetism. FePt nanoparticles are very promising, because for these nanoparticles, super paramagnetism is suppressed at room temperature." Cen also added that his simulations showed that introducing carbon into FePt nanocomposite boosts optical performance. This also helps to maintain the drive more energy efficient when reading and writing data as it required smaller optical spot for recording data.
A new leak has sprung today regarding Samsung's upcoming Galaxy S5's display resolution. The next-gen smartphone was outed in a supposed screenshot of its system info screen that says the S5's screen will be of the 5.25-inch class, and will have a refresh rate of 60Hz. However, the big news is not the screen size, but rather the 1440x2560 pixel resolution the leak unveils.
This leak all but confirms that the Galaxy S5 will feature a full QHD 2K display with a pixel density of 560 pixels per inch, making it one of the sharpest screens ever featured on a smartphone. What this means for the consumer, is that unlike 720p and 1080p, you will not notice any "screen door effect" when looking at the display up close. This is because anything above 300 pixels per inch is undetectable by the human eye.
This new screen resolution from Samsung also demonstrates Android's ability to grow the smartphone marketplace and push the technology to new heights with every new generation. In just 2 generations we have went from 720p all the way up to 2K resolutions on main-stream phones, while Apple is still stuck on its Retina technology, that was first introduced on the fourth generation iPhone 4. With the seventh generation iPhone 5S still featuring the same technology, Samsung is the clear leader in display technology at the moment.
Many people will only know the infamous Kim Dotcom for his trouble with law enforcement over the file sharing website, MegaUpload, but Dotcom is actually most famous for being the best Call of Duty player in the world. For the past few years, Dotcom has dominated the world leader boards in several CoD games including Black Ops II as well as the recent title; Call of Duty: Ghosts, but all good things must come to an end.
Today Dotcom announced that he would be retiring from the Call of Duty franchise after becoming the first person in the world to reach 100,000 kills in Free-For-All mode in Call of Duty Ghost. A score of 5,000,000 accompany's that achievement, and to really put things into perspective, Dotcom managed to kill 100,000 players with only dying about 31,000 times himself, meaning for every time he died, he killed almost 3.5 people.
Dotcom's next goal is to become the best Titanfall player in the world, and with the game being developed by two past COD developers, there are a lot of similarities, making this the perfect game for Dotcom to dominate. With Betas active now, and the game officially releasing in March, we wont have very long to wait until we find out just how good Dotcom is at Titanfall either!
Google recently acquired an Israel based startup called 'SlickLogin', which indicates that the company is making plans to replace passwords and even two-factor authentication methods with an inaudible sound unique to your phone and Google login.
SlickLogin has a patented technology where your passwords and two-factor authentication setups can be replaced with a unique and inaudible sound. Once enabled, the website's login page would typically listen to this inaudible sound via your phone and then granting access to your account. This could solve a lot of problems and overcome the possibility of your email account being hacked by someone. All you have to do is hold your smartphone near your PC with the website's login page, and the access will be granted.
Following recent high-profile security breaches of U.S. retailers, the Securities and Exchange Commission (SEC) plans to host a roundtable discussion next month focused on cybersecurity. As cyber threats become more common place, lawmakers also are concerned a standardized customer notice system isn't in place for retailers to follow.
Retailers and financial institutions argue over which side should be held responsible for fraud activity on customer accounts. There are now trade groups teaming up to try and help work through the issue together, though cyber money crimes contribute to a booming multi-billion-dollar industry.
Following the Target and Neiman Marcus breaches specifically, consumers are increasingly frustrated by sometimes lackadaisical security practices. The Obama Administration recently released cybersecurity guidelines for select industries, though didn't make it mandatory to implement any of the ideas.
It was reported earlier that Nokia was in serious trouble with the Indian government over a tax evasion dispute of a jaw-dropping amount of $542 Million. As a result, the authorities raided the company's factories and offices in India. The matter is still pending in the court, but the situation escalated to a point where the company later threatened to pull its entire manufacturing business from India. In September 2013, Microsoft made a deal with Nokia to acquire the company.
Because of the tax evasion dispute that involves its factories in India, the company's planned sale to Microsoft would become complicated, according to WSJ. The report explained that that this complication involves a factory in Chennai which makes millions of mobiles per year and the deadline to complete this transaction should be completed by the end of Q1 2014. If the factory is not included during the transition, it may continue its operations as a "contract manufacturer" for Microsoft until the disputes are cleared. This step however would make it more complicated for Nokia.
The Queensland Police are now able to quickly and accurately map a crime scene using a handheld mapping scanner developed by the Commonwealth Scientific and Industrial Research Organisation (CSIRO).
The device can measure up to 30 meters away with laser technology coupled with a remote-sensing scanner able to measure gravitational forces, velocity and orientation.
"The benefits of this new technology will reduce interference at a scene, save time and allow access to previously hard to reach areas such as steep declines and bushland," said Ian Stewart, Queensland Police Commissioner, in a statement.
The CSIRO Zebedee Scanner is mainly seeing use in the field by crime scene investigators, though could be used in auto collisions and other routine incidents, officials say
American attorneys were caught up with the NSA's global surveillance program, as an unnamed U.S. law firm representing an overseas client currently in a bitter legal battle with the U.S. government. Specifically, the Australian and U.S. governments agreed to share information on a law firm that was retained by the Indonesian government - and information protected under attorney-client privilege was likely included.
Attorney-client privilege isn't protected from NSA eavesdropping, though the American Bar Association demands attorneys to "make reasonable efforts" so confidential information isn't shared with others.
There has been growing concern that governments conducting spying and surveillance could breach attorney-client privilege with little recourse.
The controversial NSA surveillance program has shown frightening sophisticated practices, with U.S. residents, foreign citizens, government leaders, and others being spied on. Former NSA IT worker Edward Snowden, currently in Russia on temporary asylum, has greatly informed the public of spying behavior in the digital age.
Penn Manor High School in Lancaster, Pennsylvania will embrace the open source Linux platform, installing it on more than 1,700 laptops. Every student at Penn Manor HS received an Acer TravelMate laptop powered by the Ubuntu 13.10 OS - and the student body was encouraged to explore the OS and push its limits.
"We encourage our students to install software and lift the hood of the system to better understand what makes it tick," said Charlie Reisinger, Penn Manor district technology director, in a statement to Linux.com. "I hope our students run local webservers, toy with Python or simply explore graphics programs such as GIMP. Linux offers so many opportunities to explore computing, programming, and the arts."
Desktop Linux market share, at just 1.60 percent, is dwarfed by the Microsoft Windows operating systems - but still plays an important role in our everyday lives. Google Android, for example, got its successful starting using Linux, while set-top boxes, supercomputers, researchers use open source technology, and many cloud-based services rely on Linux in one its software layers.
U.S. companies and universities are desperate to try and increase student interest in science, technology, engineering, and math (STEM) fields.
The CyberPatriot VI tournament, designed as a youth cyber defense competition, will host 26 teams of U.S. high school students alongside two middle school teams in March. The schools are broken down into certain categories, such as public and private schools, Junior ROTC units, and other go through a series of tests for the groups to compete against one another.
"We don't teach hacking, we don't teach offensive techniques, but we very much teach defending against those things - that's the whole purpose of the competition," said retired Brig. Gen. Bernie Skoch, commissioner of the CyberPatriot effort, when speaking to the Air Force Times.
Skoch also added that he believes there will be around 330,000 unfilled cyber security jobs worldwide in 2015, despite a higher payday and job availability.
There is increased interest in continued improvement of cyber security efforts, especially for government agencies and critical infrastructure. The Obama Administration recently released security guidelines for utilities, banks, and other select industries, though the recommendations aren't necessarily a set of requirements that must be followed.