Several readers sent word that Android Police has leaked details about YouTube's upcoming subscription service, Music Key. The benefits for users will include ad-free music, offline playback, and audio-only streams. It's expected to cost $10 per month. "Of course, one of Music Key's major value propositions is that users will have access not just to official discographies, but to concert footage, covers, and remixes. Play Music already houses some remixes and covers, but YouTube as a platform is significantly more open and workable for derivative content — the platform is much easier to add content to, and user discoverability is substantially different from Play Music." Others note Google still has to negotiate terms with many independent musicians, who could subsequently see their work blocked if they aren't willing to play by Google's rules.
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
stephendavion writes Looks like Chinese device maker, Xiaomi, is taking its "Apple of the East" tag too literally. First, their CEO brazenly copies Steve Jobs' signature look, sitting cross-legged on the floor. And now, Xiaomi's latest version of Android shamelessly rips off iOS 7. MIUI 6, which is Xiaomi's upcoming edition of Android for its latest phones and tablets, looks almost exactly like Apple's operating system for iPhones, iPads and the iPod Touch. It features the same bright color palette and a flat design. Heck, it even does away with Google's "app drawer" and puts all apps on your home screen. It's like the CEO handed iPhones to the design team and barked: "Here, copy this!"
DeviceGuru (1136715) writes Skully Systems has achieved Indiegogo funding for a high-tech Android 4.4 based motorcycle helmet with a head-up display (HUD), GPS navigation, and a 180-degree rearview camera. The Skully AR-1 helmet launched on Indiegogo on Aug. 10 and quickly blasted past its $250,000 flexible funding goal and has already surpassed $900,000 in funding. The helmet runs a heavily modified version of Android 4.4, with both screen size and safety in mind, according to Skully's Tow. 'You should not think of it as being Android as seen in a phone; it doesn't run the same skin,' wrote Tow on the Skully forum page. 'You instead should think of it as a variant of Linux, not Android per se. What counts is the device drivers, graphics rendering for our turn by turn directions and vehicle telemetry, etc. More nerdy things like communication over the I2C bus to the image processing module.' Helmets are available starting at $1,399, with shipments due in May 2015.
New submitter MorgyTheMole writes Porting C++/OpenGL based games using Emscripten and WebGL has been an approach pushed by Mozilla for some time now. Games using the technology are compatible with most modern browsers and require no separate install. We've seen Epic Games demonstrate UnrealEngine 4 in browser as well as Unity show off a variety of games. Now as the technology matures, indie devs are looking to get into the mix, including this near one-to-one port of E McNeill's Auralux, a simplified RTS game, from Android and iOS. (Disclosure: I am a programmer who worked on this title.)
New submitter Mauro sends word that Microsoft has announced upcoming Xbox One support for streaming media both from attached USB devices, such as flash drives, and DLNA media servers. Compatibility with a broad list of media formats will be added by the end of the year, including .MKV files. They also followed up last week's announcement of a digital TV tuner with an interesting twist: it will be able to stream broadcasts over a local network to devices running the Smartglass app, which is available on Windows, Android, and iOS.
lrosen (attorney Lawrence Rosen) writes with a response to an article that appeared on Opensource.com late last month, detailing a court case that arose between Versata Software and Ameriprise Financial Services; part of the resulting dispute hinges on Versata's use of GPL'd software (parsing utility VTD-X, from Ximpleware), though without acknowledging the license. According to the article's author, attorney Aaron Williamson (former staff attorney for the Software Freedom Law Center), "Lawyers for commercial software vendors have feared a claim like this for essentially the entire 20-odd-year lifetime of the GPL: a vendor incorporates some GPL-licensed code into a product—maybe naively, maybe willfully—and could be compelled to freely license the entire product as a result. The documents filed by Amerprise in the case reflect this fearful atmosphere, adopting the classically fear-mongering characterization of the GPL as a 'viral' license that 'infects' its host and 'requires it to become open source, too.'" Rosen writes: I want to acknowledge Aaron's main points: This lawsuit challenges certain assumptions about GPLv2 licensing, and it also emphasizes the effects of patents on the FOSS (and commercial) software ecosystem. I also want to acknowledge that I have been consulted as an expert by the plaintiff in this litigation (Ximpleware vs. Versata, et al.) and so some of what I say below they may also say in court. Read on for the rest (and Williamson's article, too, for a better understanding of this reaction to it). An important take-away: it's not just the license that matters.
An anonymous reader writes In yet another example of the quality of Comcast's customer service, a story surfaced today of a Comcast customer who was over-charged for a service that was never provided. At first, the consumer seemed to be on the losing end of a customer service conversation, with Comcast insisting that the charges were fair. But then, the consumer whipped out a recording of a previous conversation that he had with another Comcast representative in which not only was the consumer promised that he wouldn't be charged for services not rendered, but the reason why was explained. Suddenly Comcast conceded, and the fees were dropped. But most telling of all, the Comcast rep implied that she only dropped them because he had taped his previous interaction with Comcast customer service. I wish I had recordings of every conversation that I've ever had with AT&T, the USPS, and the landlord I once had in Philadelphia. Lifehacker posted last year a few tips on the practicality of recording phone calls, using Google Voice, a VoIP service, or a dedicated app. Can anyone update their advice by recommending a good Android app (or iOS, for that matter) designed specifically to record sales and service calls, complete with automated notice?
MojoKid (1002251) writes Ever since Nvidia unveiled its 64-bit Project Denver CPU at CES last year, there's been discussion over what the core might be and what kind of performance it would offer. Visibly, the chip is huge, more than 2x the size of the Cortex-A15 that powers the 32-bit version of Tegra K1. Now we know a bit more about the core, and it's like nothing you'd expect. It is, however, somewhat similar to the designs we've seen in the past from the vanished CPU manufacturer Transmeta. When it designed Project Denver, Nvidia chose to step away from the out-of-order execution engine that typifies virtually all high-end ARM and x86 processors. In an OoOE design, the CPU itself is responsible for deciding which code should be executed at any given cycle. OoOE chips tend to be much faster than their in-order counterparts, but the additional silicon burns power and takes up die area. What Nvidia has developed is an in-order architecture that relies on a dynamic optimization program (running on one of the two CPUs) to calculate and optimize the most efficient way to execute code. This data is then stored inside a special 128MB buffer of main memory. The advantage of decoding and storing the most optimized execution method is that the chip doesn't have to decode the data again; it can simply grab that information from memory. Furthermore, this kind of approach may pay dividends on tablets, where users tend to use a small subset of applications. Once Denver sees you run Facebook or Candy Crush a few times, it's got the code optimized and waiting. There's no need to keep decoding it for execution over and over.
Def Con shows no mercy. As gleefully reported by sites several Blackberry-centric sites, researcher Justin Case yesterday demonstrated that he could root the much-heralded Blackphone in less than five minutes. From n4bb.com's linked report: "However, one of the vulnerabilities has already been patched and the other only exploitable with direct user consent. Nevertheless, this only further proves you cannot add layers of security on top of an underlying platform with security vulnerabilities." Case reacts via Twitter to the crowing: "Hey BlackBerry idiots, stop miss quoting me on your blogs. Your phone is only "secure" because it has few users and little value as a target."
They may be well reviewed and China's new top selling phone, but reader DavidGilbert99 writes with reason to be cautious about Xiaomi's phones: Finnish security firm F-Secure has seemingly proven that Xiaomi smartphones do in fact upload user data without their permission/knowledge despite the company strongly denying these allegations as late as 30 July. Between commercial malware and government agencies, how do you keep your phone's data relatively private?
An anonymous reader writes "Google today released a preview SDK of Google Fit available to developers. The tool provides APIs for apps and device manufacturers to store and access activity data from fitness apps and sensors on Android and other devices (like wearables, heart rate monitors or connected scales). Google warns that the preview release contains the Google Fit APIs for Android, but does not contain the REST API or the Android Wear APIs, which will be included in the official release. Furthermore, while it will let you develop and test fitness apps, they cannot be published to Google Play until official release."
OpenSignal, by means of mobile apps for iOS and Android, has been amassing data on Wi-Fi and cell-network signal strength. They released yesterday a few of their findings on the speed of Wi-Fi available at U.S. chain hotels (download speeds, specifically). Though it shouldn't be surprising that (as their data shows) more expensive hotels generally have faster speeds, I know it hasn't always matched my own experience. (Hotel chains also vary, even within brands, in whether the in-room Wi-Fi is free, cheap, or exorbitant.) If the in-room connection is flaky or expensive, though, from the same report it seems you'll do better by popping into a Google-networked Starbucks location than one fed by AT&T, and McDonalds beats Panera Bread by quite a bit.
Lucas123 (935744) writes "A new company has just opened a crowdsourcing campaign for a heads-up display that plugs into your car's OBD II port and works with iPhones and Android OS-enabled mobile devices via Bluetooth to project a 5.1-in transparent screen that appears to float six feet in front of the windshield. The HUD, called Navdy, works with navigation apps such as Google Maps for turn-by-turn directions, and music apps such as Spotify, Pandora, iTunes Music and Google Play Music. Using voice commands via Apple's Siri or Google Voice, the HUD can also write, read aloud or display notifications from text messages or social media apps, such as Twitter. Phone calls, texting or other applications can also be controlled with hand gestures enabled by an infrared camera."
New submitter redseo writes Xiaomi, known as the Apple of China, and recently enjoying its new-found fame and glory in the Indian market, has achieved yet another milestone. It has overtaken Samsung, to become China's best selling smartphone manufacturer, in Q2 2014. Xiaomi sold total of 15 million smartphones in China in Q2, which is a three-fold increase from a year ago. That's pretty good for a company founded only four years ago, with no stores of its own. (And though Xiaomi's phones are not widely sold in the U.S., they're offered by third-party sellers on Amazon and elsewhere; CNet has mostly good things to say about the company's Mi 3.)
Recently, you had the chance to ask CIO for the City University of Hong Kong and AI researcher Andy Chun about his system that keeps the Hong Kong subway running and the future of artificial intelligence. Below you'll find his answers to those questions.
Nerval's Lobster writes The "Compubody Sock," which anyone with knitting skills can make at home, is a giant sock-hoodie-bag in which you place your laptop or tablet, along with your head and hands, giving you total privacy while freaking out anyone who happens to be sitting next to you. Designer Becky Stern told Forbes' Kashmir Hill that the Sock was meant more as commentary on privacy and device addiction; even so, considering how NSA employees reportedly drape themselves in hoods in order to thwart hidden cameras while typing in passwords, it's not outside the realm of possibility that an ultra-paranoid someone could find a practical use for a body sock. But that paranoid android better have expert knitting skills: putting together the Sock necessitates a whole lot of steps ("Purl 5, purl 2 together, purl 1, turn the work," etc.). Your other option, of course, is to simply avoid working on sensitive stuff in public.
An anonymous reader points out this pilot program in San Francisco to help blind passengers better navigate the airport. San Francisco Airport is testing out location-aware beacons to help visually-impaired people navigate around one of its newest terminals, a program it could roll out to the rest of the airport if successful. An early version of the system was shown off to press today for use on Apple iOS devices, though SFO also plans to make it available for Android users and eventually expand the system to serve up information for those who can see. The beacons are coming from an indoor positioning company Indoo.rs and have been installed throughout the terminal. Each beacon will connect to a smartphone app to pop up with information when a user gets within range. For the visually impaired, the system uses Apple's Voiceover technology to read out points of interest as they come on screen, though an early version of the app also gives people visual cues for how to navigate to locations from a directory that can be sorted. That means you could tell it to help you find the nearest power outlet to juice your gear, or the nearest coffee shops to recharge your body.
An anonymous reader writes: Despite support for Windows XP finally ending three months ago, the ancient OS has only now fallen below the 25 percent market share mark. To add to the bad news for Microsoft, after only nine full months of availability, its latest operating system version, Windows 8.1, has lost share for the first time. For desktop browser share, Chrome is up, taking mostly from Internet Explorer and Firefox. For mobile browsers, Safari continues to fall while Chrome maintains strong growth.
DroidJason1 writes: Microsoft has filed a contract dispute lawsuit against Samsung over what Microsoft claims is a breach of contract by Samsung involving Android patent royalties. Back in 2011, Samsung voluntarily entered into a legally binding contract with Microsoft in a cross-licensing IP agreement involving Android patents. Samsung has grown over the past few years and now believes that Microsoft's recent acquisition of Nokia nulls the agreement. Microsoft has gone to court and is asking to settle the disagreement with Samsung in order to continue the original agreement.
An anonymous reader writes with a snippet from Ars Technica that should make you (even more) skeptical about plugging in random USB drives, or allowing persons unknown physical access to your computer's USB ports: When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran's heavily fortified Natanz nuclear facility, trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can't be detected by today's defenses. Dubbed BadUSB, the hack reprograms embedded firmware to give USB devices new, covert capabilities. In a demonstration scheduled at next week's Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers. A different drive will similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The presenters will demonstrate similar hacks that work against Android phones when attached to targeted computers. They say their technique will work on Web cams, keyboards, and most other types of USB-enabled devices.