Tagged: Could Toggle Comment Threads | Keyboard Shortcuts

  • jkabtech 12:17 pm on March 21, 2018 Permalink | Reply
    Tags: , Charge, Could, MXene, , Supercapacitors:   

    MXene Could Help Make Batteries That Charge as Fast as Supercapacitors: Study 

    Highlights Mxene could pave the way for fully charging your smartphone in just a few Key to faster charging energy storage devices is in the electrode design It would then be capable of charging at much higher rates of batteries

    A new battery electrode design from a highly conductive, two-dimensional material called Mxene could pave the way for fully charging your smartphone in just a few seconds, a new study says.

    The design, described in the journal Nature Energy, could make energy storage devices like batteries, viewed as the plodding tanker truck of energy storage technology, just as fast as the speedy supercapacitors that are used to provide energy in a pinch – often as a battery back-up or to provide quick bursts of energy for things like camera flashes.

    “This paper refutes the widely accepted dogma that chemical charge storage, used in batteries and pseudocapacitors, is always much slower than physical storage used in electrical double-layer capacitors, also known as supercapacitors,” said lead researcher Yury Gogotsi, Professor at Drexel University in Philadelphia, Pennsylvania, US.

    View the Original article

  • jkabtech 12:17 pm on February 24, 2018 Permalink | Reply
    Tags: Could, , Episode, Half-Life, ,   

    Half-Life Writer Posts Plot Details of What Could Have Been Episode 3 

    Highlights Laidlaw posted plot details of Episode 3 on Friday Episode 3 was announced in 2006 but saw production delays Marc Laidlaw retired from Valve in 2016

    Gamers around the world have not forgotten about Half-Life even after a decade since Half-Life 2: Episode 2 came out. Half-Life 2 received critical acclaim in 2004 which was followed by two episodic plots in 2006 and 2007. Sadly, the franchise never saw a third episode, leaving many in a state of limbo over how the story would continue. Luckily, Half-Life writer Marc Laidlaw on Friday posted what he calls Epistle 3 on his blog that outlines the story for what the third part could have been.

    Episode 3 was confirmed in 2006 but saw a number of delays in production and eventually never became realised. It has since achieved vapourware status – a product that has been announced for the public but never actually manufacture nor cancelled. But Laidlaw, who wrote both Half-Life 1 and 2, as well as both the episodes of Half-Life 2, posted what looks like a draft for the never-made Episode 3. The plot has been detailed with a few key-names changed and can be found on his personal website (which is currently down), or can be viewed on Archive.org. You can even read the whole plot on Pastebin, where the names have been corrected.

    Half-Life fans may find some respite by reading Laidlaw’s blog, and there may still be hope yet for an Episode 3. The franchise has never been officially pronounced as concluded by developer Valve, but the prospect of a Half-Life 3 ever becoming real has been waning year after year. Still, you can find out where Alyx Vance and G-Man are in Episode 3 by hitting any of the links provided.

    Writers Marc Laidlaw and Eric Wolpaw retired from Valve back in 2016, while Chet Faliszek who worked on Half-Life 2: Episode 1 and Episode 2 left the company earlier this year. Interestingly, leaked map files for a cancelled Half-Life 2 episode also made it to the Internet earlier this year.

    For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and subscribe to our YouTube channel.

    Tags: Half-Life, Half-Life 2, Half-Life 2: Episode 3, Gaming, Marc Laidlaw, PC, Laptop

    View the Original article

  • jkabtech 4:17 am on November 30, 2017 Permalink | Reply
    Tags: Could, , Maersk's, ,   

    Maersk’s NotPetya losses could hit $378 million 

    Three businesses hard hit by attack.

    Danish shipping giant AP Moller-Maersk will book losses in the hundreds of millions of dollars after three of its businesses fell victim to the NotPetya destructive malware attack in June this year.

    In its interim report

    View the Original article

  • jkabtech 12:17 pm on August 27, 2017 Permalink | Reply
    Tags: Could, ,   

    Now Getting Lost Items Back From Uber Could Cost You $15 

    Image credit: Pexels

    Next time you leave your umbrella, book bag, or phone in an Uber it could cost you $15 to get it back. Starting today, the ride-sharing company is allowing drivers nationwide to charge a flat fee for bringing your missing items back to you.

    A few years ago my friend Bob left his phone in an Uber we shared after a Giants game. We realized the error, got in touch with Uber who connected us with the driver, and a few hours later were reunited with our old driver and Bob’s phone. We tipped the driver close to $100 for the return. New phones are expensive, and we recognized that the time he spent coordinating and making a drop-off with us was time he wasn’t spending working. As it turns out, we were in the minority.


    Most people don’t take the driver into consideration when asking for an item to be returned. While the driver is a contractor with Uber, they’re not an employee, which means when they’re delivering your item back that’s essentially a personal trip for them. You’re preventing them from picking up other fares and asking them to spend their time and gas money to do you, a person whom they just met for 10 minutes, a favor. It’s a big of a big ask for a stranger.

    Driver’s forums are littered with reports of people like us requesting the return of lost items, and when they’re returned not even offering so much as a

    View the Original article

  • jkabtech 4:31 am on June 22, 2016 Permalink | Reply
    Tags: Could, , , ,   

    Your smartphone could be hacked without your knowledge 

    1:50 PM ETCNBC.comSHARES

    Hacking your smartphone

    The majority of smartphone users unknowingly give hackers access to their phones by doing this one thing. CNBC’s Andrea Day explains.

    Not only can your smartphone be hacked, it can be done very easily without your knowledge.

    “At the end of the day, everything is hackable. What I am surprised about is that people sometimes forget that it’s so easy to hack into these devices,” said Adi Sharabani, the co-founder of mobile security company Skycure, who used to work for Israeli Intelligence.

    Even if a malicious attacker cannot get into your phone, they can try to get the sensitive data stored inside, including contacts, places visited and e-mails.

    “It’s important to realize that the services your smartphone relies on are much more attractive target to attackers. So for example, the photo leak that happened from iCloud where a bunch of celebrities had their photos posted all over the Internet is the perfect example,” said Alex McGeorge, the head of threat intelligence at cybersecurity company Immunity, Inc.

    Often, the hack or data breach occurs without the consumer’s knowledge, according to Sharabani.

    And it’s not just consumers that criminals target. With the rise of smartphones and tablets in the workplace, hackers attempt to attack enterprises through vulnerabilities in mobile devices.

    Both Sharabani and McGeorge perform attack simulations for clients and find that these hacking demonstrations usually go undetected.

    “It’s usually very rare that a breach that originated through a mobile device or is just contained to a mobile device is likely to be detected by a corporation’s incident response team,” McGeorge said.

    And Sharibani agrees. He says he’s still waiting for someone to call him and say that their IT department identified the attack demonstration.

    “No one knows,” he said. “And the fact that organizations do not know how many of their mobile devices encountered an attack in the last month is a problem.”

    Read MoreCost of data breaches hits $4 million on average: IBM

    But there is a silver lining, according to the wireless industry.

    “The U.S. has one of the lowest malware infection rate in the world thanks to the entire wireless ecosystem working together and individually to vigilantly protect consumers,” said John Marinho, vice president of technology & cybersecurity at CTIA, the wireless association. CTIA is an industry group which represents both phone carriers and manufacturers.

    Here are the three ways a smartphone is most likely to be breached.

    View the Original article

  • jkabtech 3:51 am on April 29, 2016 Permalink | Reply
    Tags: Could, Criminals, ,   

    How criminals could steal your tax return 

    Getty Images

    On March 22 an employee at software company Pivotal Labs received an email purporting to be from CEO Rob Mee, asking for personal information about employees. Assuming the email was legitimate, the worker sent W-2 information

    View the Original article

  • jkabtech 1:21 am on April 29, 2016 Permalink | Reply
    Tags: Could, , , moving, ,   

    How $80B moving through NY Fed daily could be vulnerable to hackers 

    Steve Liesman 6 Hours AgoCNBC.comSHARES

    The Federal Reserve Bank of New York, in its first extensive remarks on cybersecurity following the theft of $81 million from accounts it held for the central bank of Bangladesh, said the incident is a “wake-up call” for the global financial system and the Fed is taking the issue “very seriously.”

    However, a senior New York Federal Reserve official said in an interview with CNBC that the central bank has no authority to inspect or oversee the cybersecurity precautions at foreign central banks that keep their assets at the New York Fed. That means there can be varying cybersecurity risk levels around the world for transactions between global central banks and the New York Fed.

    The New York Fed stands at the center of the globalized, dollar-denominated world, maintaining as many as 250 accounts for central banks that contain approximately $3 trillion in assets. One of the reasons those funds are concentrated in New York is that the United States is seen as among the safest places in the world for central bankers looking to protect assets. At the same time, that massive pool of money represents a rich and tempting target for international thieves and their growing attempts at cybertheft.

    View the Original article

  • jkabtech 6:16 pm on March 13, 2016 Permalink | Reply
    Tags: , Could, ,   

    How the Feds Could Get Into iPhones Without Apple’s Help 

    Caption: Josh Valcarcel/WIRED

    Caption: Chart showing other cases in which the government is using the All Writs Act to compel Apple to assist it in extracting data from iPhones. Not included in this chart is the San Bernardino case or the one involving the drug case in New York.

    Skip Article Header. Skip to: Start of Article. brick-phone-3.jpg Josh Valcarcel/WIRED
Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc
%d bloggers like this: