Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×
schleprock63 writes "The FCC ruled today that Verizon cannot charge extra for users for 4G Wi-Fi tethering. The FCC used the original agreement in the auction of the C block spectrum which said 'licensees offering service on C Block spectrum "shall not deny, limit, or restrict the ability of their customers to use the devices and applications of their choice on the licensee's C Block network, subject to narrow exceptions."' So Verizon cannot charge for tethering on 4G service, this raises the question of whether they can continue to charge for tethering on 3G or 1x?"
An anonymous reader writes "South Korea's second largest wireless service provider has apologized after personal data of 8.7 millions of its mobile phone subscribers was stolen by hackers. The details are suspected to have been sold to marketing firms, netting the hackers close to $1 million. From the article: 'South Korean police have arrested two men who allegedly stole the personal information of about 8.7 million cellphone customers from KT Corp., the second biggest mobile carrier in South Korea. The company alerted police on July 13 after detecting traces of hacking attacks. The data was collected for the last five months, starting in February 2012.'"
Busshy writes "A few months after the rather subdued release of the PSVita comes the release of the Larger screened 3DS XL, improvements are the obvious larger screens and much improved battery life, CVG report that the 3D effect has noticeably improved. As you'd expect with a larger display, the sweet spot in which you have to angle the device to consume your trio of dimensions is far easier to find on the XL. The console is shipping in 3 variations with sites such as Amazon offering different deals depending on where you live in Europe. Those wanting the Transparent version of the 3DS XL are out of luck at this time. Slashdotters in the USA will have to wait till Mid August for the new console."
cylonlover writes "General Motors is working to expand upon its vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication systems that allow information to be shared between vehicles and infrastructure to provide advance warning of potential road hazards, such as stalled vehicles, slippery roads, road works, intersections, stop signs and the like. The automaker is now looking to add pedestrians and cyclists to the mix using Wi-Fi Direct technology so a car can detect them in low visibility conditions before the driver does."
theodp writes "'What's the point of a mobile device,' asks WSJ reporter and iPad-beatdown-victim Rolfe Winkler, 'if people don't feel safe using it while they're mobile?' A lucrative secondhand market for today's electronics devices — a used iPad or iPhone can fetch $400+ — has produced an explosion in 'Apple picking' by thieves. So, how big is the iCrime wave? In New York City alone, there were more than 26,000 incidents of electronics theft in the first 10 months of 2011 — 81% involving mobile phones — according to an internal NYPD document. And plenty of the crimes are violent. The best way to deter theft is to reduce the value of stolen device — the wireless industry is moving to adopt a national registry that would deny service to such devices. A remote kill switch has been discussed as another approach. For its part, Apple says the company 'has led the industry in helping customers protect their lost or stolen devices,' although some are unimpressed."
Hugh Pickens writes "Reuters reports that Apple will buy fingerprint sensor technology developer AuthenTec for about $356 million, striking a deal that could help Apple bring fingerprint technology, already used in mobile phones in Japan for authentication of mobile payments, to markets such as the United States, where mobile-wallet services have been slow to catch on. Some analysts expect the iPhone 5 to include some form of mobile payments technology. 'In the past 5 years, the growth of iPhone and Android smartphones has made mobile data security essential, not just a "nice-to-have" feature,' says Ben Yu, Managing Director of Sierra Ventures, one of the early investors in AuthenTec. 'People have their whole lives on the phones.' AuthenTec's embedded fingerprint scanners and other identity-related software is particularly useful now that Near Field Communications, or NFC-enabled, phones have begun to appear in the market. Analyst Colin Gillis says AuthenTec technology could potentially also help Apple combat problems such as theft of its more portable products such as iPhones. 'If they could have a way where they could tie the phone to a user more tightly, that would make sense for them,' says Gillis. The price tag for AuthenTec is a drop in the bucket of Apple's cash pile of $117.2 billion. 'We'll see if it's a one-off or if Tim Cook will start to level his cash balance and acquire talent,' adds Gillis."
HangingChad sends this excerpt from PCMag: "Microsoft this week admitted that its upcoming Surface tablet might hurt its relationships with PC maker partners. As first noted by the New York Times, Redmond said in a Thursday filing with the Securities and Exchange Commission that 'our Surface devices will compete with products made by our OEM partners, which may affect their commitment to our platform.'" The filing also made note of the difficulties in building up another app marketplace: "In order to compete, we must successfully enlist developers to write applications for our marketplace and ensure that these applications have high quality, customer appeal and value. Efforts to compete with these application marketplaces may increase our cost of revenue and lower our operating margins."
First time accepted submitter hawkinspeter writes "Just one day after Chief Cathy Lanier made it illegal for MPD cops to take recording equipment, a 26-year-old local man had his phone taken as he was trying to record a violent arrest. They eventually gave back his phone, but without the memory card which also contained photos of his daughter along with the record of the alleged police brutality."
tlhIngan writes "Some interesting news has come out of Apple's filings against Samsung. First, Google warned Samsung that their 'P1' (Galaxy Tab) and 'P3' (Galaxy Tab 10.1) tablets were 'too similar' to the iPad. In addition, Samsung's own Product Design Group note it was 'regrettable' that the Galaxy S 'looks similar' to the iPhone. Finally, how designers at a Samsung-sponsored evaluation noted the Galaxy S 'copied the iPhone too much' and 'innovation is needed.' Of course, Samsung has some ammunition of its own, including how Apple copied Sony's designs. In unrelated news, Judge Grewal has sanctioned Samsung for not preserving emails from automatic deletion, even after litigation has begun."
alphadogg writes "At the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out a way to break into both the Google/Samsung Nexus S and Nokia N9 by means of the Near Field Communication (NFC) capability in the smartphones. NFC is still new but it's starting to become adopted for use in smartphone-based purchasing in particular. The experimentation that Miller did, which he demonstrated at the event, showed it's possible to set up NFC-based radio communication to share content with the smartphones to play tricks, such as writing an exploit to crash phones and even in certain circumstances read files on the phone and more."
judgecorp writes "Nokia has closed down the Meltemi low-end Linux phone which was supposed to replace its System 40 devices. The platform had never been officially announced and now, apparently, will never see the light of day. Feature phones still make up a giant market where Nokia has dominated, but this leaves its upgrade path in question."
An anonymous reader writes "Ex-Sun employees did what Sun/Oracle failed to do since the iPhone launched. They brought Java to iOS and other mobile devices. They are getting major coverage from Forbes, DDJ, hacker news and others. They are taking a unique approach of combining a Swing-like API with a open source and SaaS based solution."
DavidGilbert99 writes "Ahead of a legal battle with Apple, Samsung has begun disabling the local Google search functionality on the international version of the Galaxy S3. This mean S3 owners will no longer be able to search contacts, messages, or other content stored locally on their phones using the in-built Google app. The interesting thing is that Apple has yet to sue Samsung over this feature in the EU or the UK and so it seems as if Samsung is being ultra cautious ahead of the the companies' big court date on Monday next."
Hugh Pickens writes "Reuters reports that Apple shed more than five percent of its stock price value in after-hours trading after the company reported its second quarterly miss on results in less than a year, highlighting how the Apple brand is becoming less resistant to the economic and product cycles that have plagued rivals. 'Clearly it was a disappointment,' says Channing Smith, Co-Manager of Capital Advisors Growth Fund. 'We expected a lot of consumers will probably delay their upgrade and their purchases until the iPhone 5 comes out. We saw a similar trend occur last year with the iPhone 4S.' Executives acknowledged buyers were refraining from purchases because of 'rumors and speculation' around the iPhone 5, which sources have said will ship in September with a thinner and larger screen. 'The iPhone 5 is already the most hyped device and for it to exceed expectations is going to be really hard,' says BGC Partners analyst Colin Gillis. This is one of many reasons Apple is so notoriously secretive. With the levels of hype that Apple product launches garner, it would undoubtedly crush its own sales if it announced products even months in advance. Instead, Apple slowly and silently draws down inventory in distribution channels, and then the upgraded product is available immediately (or nearly immediately) after it's announced. According to Apple CEO Tim Cook, 'there is an incredible anticipation out there or for future products and as you would expect given what we've been able to deliver in the past.'"