posted about 4 hours ago on ars technica
Flickr user Prayitno Our brains start soaking in details from the languages around us from the moment we can hear them. One of the first things infants learn of their native languages is the system of consonants and vowels, as well as other speech sound characteristics, like pitch. In the first year of life, a baby’s ear tunes in to the particular set of sounds being spoken in its environment, and the brain starts developing the ability to tell subtle differences among them—a foundation that will make a difference in meaning down the line, allowing the child to learn words and grammar. But what happens if that child gets shifted into a different culture after laying the foundations of its first native language? Does it forget everything about that first language, or are there some remnants that remain buried in the brain? According to a recent PNAS paper, the effects of very early language learning are permanently etched into the brain, even if input from that language stops and it’s replaced by another language. To identify this lasting influence, the researchers used functional magnetic resonance imaging (fMRI) scans on children who had been adopted to see what neural patterns could be identified years after adoption. Read 11 remaining paragraphs | Comments

Read More...
posted about 4 hours ago on ars technica
A video showing off Smealum's Ninjhax homebrew exploit in action. Earlier this week, hacker Jordan "Smealum" Rabet announced that obscure 2011 3DS platformer Cubic Ninja held the key to unlocking the 3DS hardware to run homebrew code, causing an immediate run on the hard-to-find game. Now, Smealum has published the details of his hack, along with the instructions and tools needed to unlock the system. What Smealum is calling "Ninjhax" exploits an error in Cubic Ninja's level creation and sharing function, which passes created level data via generated QR codes. Scanning a specifically manufactured QR code, generated by a tool on Smealum's site to match any current 3DS hardware/firmware combination, causes the game to run a boot file loaded on the SD card. At that point, the bootloader downloads additional code over Wi-Fi and installs and runs a front-end channel that can run other homebrew software stored on the SD card. After that initial QR code scan, the homebrew menu can be loaded simply by accessing the save game file through Cubic Ninja. Read 3 remaining paragraphs | Comments

Read More...
posted about 5 hours ago on ars technica
Via Tsuji Days after a BuzzFeed journalist revealed that an Uber executive floated the idea of using its “God mode” ability to snoop on journalists who write about the ridesharing service, rival firm Lyft has changed its policy to prevent most employees from doing something similar. Erin Simpson, a Lyft spokeswoman, told Ars in a statement by e-mail that the company’s “longstanding policy prohibits employees or contractors from accessing any user personal information except to the extent such use is necessary to do their job.” As of Thursday, the company has “proactively made additional updates to further safeguard our community members' privacy, including the development of tiered access controls that further limit access to user data to a smaller subset of employees and contractors. Ride location data is restricted to an even smaller subset of people.” Read 1 remaining paragraphs | Comments

Read More...
posted about 5 hours ago on ars technica
Network neutrality protest at Google headquarters. Steve Rhodes "The European parliament is poised to call for a break-up of Google" in a vote next week, the Financial Times reported today. The resolution would be nonbinding, because any final action would have to be taken by the European Commission, the executive branch of the European Union. "A draft motion seen by the Financial Times says that 'unbundling [of] search engines from other commercial services' should be considered as a potential solution to Google’s dominance," the paper wrote. "It has the backing of the parliament’s two main political blocs, the European People’s Party and the Socialists." While the parliament itself "has no formal power to split up companies," it does have "increasing influence on the [European] Commission, which initiates all EU legislation," the report said. "The commission has been investigating concerns over Google’s dominance of online search for five years, with critics arguing that the company’s rankings favor its own services, hitting its rivals’ profits." Read 4 remaining paragraphs | Comments

Read More...
posted about 5 hours ago on ars technica
FCC Chairman Tom Wheeler. Computer History Museum It won't be a surprise if the Federal Communications Commission gets sued when it issues net neutrality rules. In fact, FCC Chairman Tom Wheeler expects it. Since November 10, when President Obama called on the FCC to reclassify Internet service as a utility and impose strict net neutrality rules, the FCC has been urged to act quickly. But it appears the commission won't issue final rules before the end of 2014. When reporters today asked Wheeler when he'll act, he said he's taking his time because he wants to make sure the commission's net neutrality rules aren't overturned in court. "We are going to be sued," he said in a Q&A after the FCC's monthly meeting. "That's the history. Every time in this whole discussion anytime the commission has moved to do something, one of the big dogs has gone to sue... We don’t want to ignore history. We want to come out with good rules that accomplish what we need to accomplish, an open Internet, no blocking, no throttling, no fast lanes, no discrimination, and we want those rules to be in place after a court decision. So we want to be sure we’re thoughtful in the way in which we structure them and we're thoughtful in the way we present what will ultimately be presented to a court." Read 4 remaining paragraphs | Comments

Read More...
posted about 6 hours ago on ars technica
The harsh environment of the Tibetan Plateau was made a little more welcoming by the arrival of barley. NASA Western mountain climbers are fortunate that there are Sherpas to guide them up Mount Everest. While Westerners can train for years and still not make the summit—although they may still get headlines—Sherpas do it repeatedly, with little fanfare, and while carrying food, packs, and oxygen for their clients. Anthropologists have long been wondering how any humans ever managed to start living up at the Roof of the World in the first place. New work suggests that one of the keys is very, very mundane—nothing like their having superpowers or anything like that. No, the key is... barley. The northeastern Tibetan Plateau is at an inhospitable elevation, approximately 3,000-4,000 meters above sea level. Yet there are traces of human life there dating back at least 20,000 years BP (Before Present, Present being defined as January 1, 1950, as used in radiocarbon dating). And indications are that at least some aspects of altitude tolerance had evolved long before then (see sidebar). Handprints, footprints, small hearths, and stone tools have been found from this early period, but these artifacts are probably evidence of temporary hunting camps, each used perhaps only once when parties ventured onto the plateau seeking game. These types of objects do not imply any kind of permanent human habitation up there. Read 6 remaining paragraphs | Comments

Read More...
posted about 6 hours ago on ars technica
Divine Harvester Amid complaints that phone companies such as AT&T and Verizon are letting copper networks deteriorate, the Federal Communications Commission today said it will examine the allegations and develop rules that maintain customers' access to emergency services even after old copper networks are discontinued. Today’s vote is one of the first steps in planning for the discontinuation of the primarily copper-based Public Switched Telephone Network (PSTN). The PSTN is being replaced by Internet Protocol (IP)-based voice services that rely on network technologies such as fiber, cable, and wireless. AT&T and Verizon are anxious to make the transition because they want to shed costly infrastructure and century-old utility rules that likely won’t apply to Voice over IP (VoIP) services. Customers from around the country have complained that the companies are letting the copper networks rot in order to push them onto largely unregulated services. Keeping VoIP phones running during power outages is perhaps the biggest concern. Copper lines conduct electricity and supply power to phones from central offices, potentially keeping phones running for weeks on end during outages. This system isn’t foolproof because damage to lines or the central office could result in loss of power, but backup options for VoIP phones are more limited, consisting of batteries in customers’ homes. When the power is out and the batteries for landline phones and cell phones have run out, customers won’t be able to call 911. Read 13 remaining paragraphs | Comments

Read More...
posted about 6 hours ago on ars technica
Wikipedia Target’s massive data breach, in which criminals were able to drop malware onto point-of-sale systems and compromise at least 40 million credit and debit cards, is now the subject of a federal lawsuit by banks who issued those cards. And Target is arguing in court today that those claims should be thrown out, Bloomberg reports—because the company claims it had no obligation to protect the banks from damages. The suit has been brought by five banks—First Federal Savings, Village Bank, Umpqua Bank, Mutual Bank, and Louisiana’s CSE Federal Credit Union. As a group, the banks are claiming losses because the breach exceeded $5 million. The lawsuit is playing out as representatives from financial organizations, including the US’ two major credit union industry associations, are pressing Congress to take action to hold retailers more accountable for payment data breaches and to bring them under the same privacy standards as financial institutions with regard to financial data. Major retailer data breaches over the past year, including the ones at Target and Home Depot, have caused banks and credit unions to have to reissue hundreds of millions of payment cards. The Home Depot breach, first reported in September, was revealed last week to have exposed 53 million customer e-mail addresses, as well as 56 million payment cards. Read 2 remaining paragraphs | Comments

Read More...
posted about 6 hours ago on ars technica
Scott A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device. According to the Charlotte Observer, the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used. The newspaper also reported on Friday that the Mecklenburg County District Attorney’s office, which astonishingly had also never previously seen the applications filed by the Charlotte-Mecklenburg Police Department (CMPD), will now review them and determine which records also need to be shared with defense attorneys. Criminals could potentially file new claims challenging their convictions on the grounds that not all evidence was disclosed to them at the time. Read 13 remaining paragraphs | Comments

Read More...
posted about 7 hours ago on ars technica
Aurich Lawson In early 2013, researchers exposed some unsettling risks stemming from Android-based password managers. In a paper titled "Hey, You, Get Off of My Clipboard," they documented how passwords managed by 21 of the most popular such apps could be accessed by any other app on an Android device, even those with extremely low-level privileges. They suggested several measures to help fix the problem. Almost two years later, the threat remains viable in at least some, if not all, of the apps originally analyzed. An app recently made available on Google Play, for instance, has no trouble divining the passwords managed by LastPass, one of the leading managers on the market, as well as the lesser-known KeePassDroid. With additional work, it's likely that the proof-of-concept ClipCaster app would work seamlessly against many other managers, too, said Xiao Bao Clark, the Australia-based programmer who developed it. While ClipCaster does nothing more than display the plaintext of passwords that LastPass and KeePassDroid funnel through Android handsets, a malicious app with only network privileges could send the credentials to an attacker without the user having any idea what was happening. "Besides the insecurity of it, what annoyed me was that I was never told any of this while I was signing up or setting up the LastPass app," Clark wrote in an e-mail. "Instead I got the strong impression from LastPass that everything was very secure, and I needn't worry about any of it. If they at least told users the security issues using these features brings, then the users themselves could decide on their own trade-off between usability and security. Not mentioning it at all strikes me as disingenuous." Read 12 remaining paragraphs | Comments

Read More...
posted about 7 hours ago on ars technica
Google is giving new Chromebook buyers a place to put their stuff, for a couple of years anyway. Andrew Cunningham Chromebooks don't have much local storage, which is kind of the point—their vision of computing is one where basically everything is done in the cloud, and the computer on your lap is just your window to the Information Superhighway. To make that usage model more plausible, Google is giving new Chromebook buyers 1TB of Google Drive storage free for two years. To take advantage of the deal, you just have to buy any new Chromebook between now and January 1, 2015. Google runs similar promotions with most Chromebooks, though with differing subscription lengths and amounts of storage space. The expensive Chromebook Pixel came with 1TB of storage for three years; the cheaper HP Chromebook 11 came with 100GB for two years. A year of Google Drive on the 1TB plan costs $9.99 a month and there are no yearly subscription options, so the subscription is worth a grand total of $239.76. Chromebooks like Acer's C720 start at $199, though you'd do well to spend more money and get more than 2GB of RAM. If the cloud model doesn't work for you, a new class of cheap Windows laptops like HP's Stream have been creeping down into the $200 price category lately. Read on Ars Technica | Comments

Read More...
posted about 8 hours ago on ars technica
Six members of the United Kingdom’s National Union of Journalists—including comedian and journalist Mark Thomas—have filed suit against London’s Metropolitan Police after discovering that their daily activities were being monitored and recorded in a police database. The database is gathered by the National Domestic Extremists and Disorder Intelligence Unit, a task force led by the Metropolitan Police Service that tracks political and religious groups in the UK and monitors protests. In an interview on BBC Radio 4, Thomas said that the surveillance was discovered through information uncovered by a request under the UK’s Data Protection Act—a law similar to the US’ Freedom of Information Act. “The police are gathering information under the domestic extremist list about journalist and NUJ members, “ he said. “And we know this because six of us have applied to the police using the Data Protection Act to get some of the information the police are holding on us on these lists. And what they are doing is monitoring journalists’ activities and putting them under surveillance and creating databases about them." Thomas has used the Data Protection Act in the name of both journalism and comedy. In 2001, he launched a contest in which he encouraged people to do creative performances in front of surveillance cameras and then submit the videos to him after obtaining them through Data Protection Act requests. Read 2 remaining paragraphs | Comments

Read More...
posted about 8 hours ago on ars technica
A computer programmer whose massive public records request threatened Seattle's plan to put body cameras on its police officers has made peace with the police department. Today's Seattle Times reports that Seattle Police Department COO Mike Wagers has invited the man into police headquarters to meet with him and tech staff to discuss how he could receive video regularly. As a condition of the meeting, he has dropped the public records request. "I’m hoping he can help us with the larger systemic issue—how can we release as much video as possible and redact what we need to redact so we can be transparent?” Wagers told the newspaper. “What do we have to lose? We have nothing to hide. There are no secrets.” Read 7 remaining paragraphs | Comments

Read More...
posted about 10 hours ago on ars technica
Aereo on an iPad. Casey Johnston TV-over-the-Internet startup Aereo has filed for bankruptcy, bringing to a close its long-running copyright battle with US television networks. The filing comes at a time when there actually had been a bright spot on the policy horizon for Aereo. The FCC is set to consider whether some types of online streaming should be considered cable systems. Aereo was created to use a system of using tiny, dime-sized antennas to send broadcast TV signals over the Internet. By renting one antenna and separate storage space to each customer, the company hoped to remain within the bounds of copyright law, despite not having permission from the television networks for its transmissions. The fight was waged in federal courts around the country. The US Court of Appeals for the 2nd Circuit ruled in Aereo's favor, but the decision was overturned this summer by the Supreme Court. Aereo ceased doing business shortly thereafter. Read 3 remaining paragraphs | Comments

Read More...
posted about 12 hours ago on ars technica
We have seen Photoshop work in a browser, and it looked pretty good. "Streaming Photoshop" is Adobe and Google's plan to bring the incomparable photo editor to Chrome OS and the Chrome Browser. We covered the original announcement, but we were recently given the chance to talk to Adobe about the project and see it actually working in a Chrome browser. "Streaming Photoshop" is a Chrome App that you download from the Chrome store (provided you are whitelisted). The app opens in a window that looks just like a local version of Photoshop—there's no browser UI of any kind. Photoshop lives on a computer in the cloud, and a video feed of it is streamed to the Chrome app. The app captures clicks and sends them to the server. It sounds like using it would be a clunky mess, but the whole process looked indistinguishable from a local install of Photoshop. The primary purpose of Photoshop-in-a-browser is to get the app running on Chrome OS, which pretty much can only run a browser. Chrome OS has taken off as a competitor to Windows—the NPD's last estimate put it at 35% of commercial notebook sales—but it lacks a few killer apps like Photoshop. The other benefit is that you can now run Photoshop on just about any computer without having to worry about RAM and CPU usage, since all the computer has to display is a video stream. Adobe says even the $200 Chromebooks on the market today should be fast enough to handle Streaming Photoshop. Read 6 remaining paragraphs | Comments

Read More...
posted about 13 hours ago on ars technica
ntr23 A Virginia-based law enforcement data sharing ring, which allows signatory police agencies to share and analyze seized "telephone intelligence information," was first proposed by federal prosecutors, according to new documents obtained by Ars. Federal involvement suggests that there could be more such databases in other parts of the country. "It’s unsurprising to see the feds encouraging local law enforcement agencies to create these localized databases," Hanni Fakhoury, a staff attorney with the Electronic Frontier Foundation, told Ars. "In fact, there’s a whole division within the Department of Justice that focuses on educating and advancing local law enforcement interests, the National Institute of Justice. And so I would imagine there are others." As Ars reported last month, according to a memorandum of understanding (MOU) first published by the Center for Investigative Reporting, the police departments from Hampton, Newport News, Norfolk, Chesapeake, and Suffolk all participate in something called the "Hampton Roads Telephone Analysis Sharing Network," or HRTASN. Read 20 remaining paragraphs | Comments

Read More...
posted about 23 hours ago on ars technica
An electron micrograph of the wire that was used for testing the caged molecule. Laia Vila Nadal, Felix Iglesias Escudero, Leroy Cronin, Cronin Group, School of Chemistry, University of Glasgow As features on chips get smaller, we're edging closer to where we bump up against basic physics, which dictates that the behavior of wiring will become unpredictable once the number of atoms involved gets small enough. As a result, there's been some preliminary work done on producing processor components out of single molecules, like carbon nanotubes. But it's not just processors we care about. As features of flash memory shrink, we'll eventually run up against a similar problem: the locations where electrons are stored will be too small to hold sufficient charge for the device to actually work. Fortunately, it looks like molecules may be able to help us out here, as well. Researchers are reporting that they've designed a combination of two molecules that can hold electrons for use as flash memory. This isn't the first advance in single-molecule flash memory. Last year, researchers reported building a flash device that included layers of graphene and molybdenum disulfide, both of which form molecular sheets a single atom thick. But these devices required several layers of these materials to work, so the charge ended up stored in several stacked sheets of graphene. Read 8 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
Retro Seattle police car. Curtis Cronn Police in Seattle are just weeks away from implementing pilot program in which 12 officers will test different types of body cameras. It's a first step in a plan to put body cameras on the department's more than 1,000 officers by the year 2016. Now that plan may get put on ice, due in part to an overly broad public records requests. The Seattle Times reported this morning that an anonymous man, known only by the email address policevideorequests@gmail.com, has made an official request for "details on every 911 dispatch on which officers are sent; all the written reports they produce; and details of each computer search generated by officers when they run a person’s name, or check a license plate or address." The requestor also wants all video from patrol car cameras currently in use, and plans to request video from body cams once they are implemented. He has requested the information "every day, in spreadsheet form." Read 11 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
Megan Geuss LOS ANGELES—Throughout the press and trade days at the LA Auto Show, most of the big car makers in attendance hold 30-minute press conferences on the show floor to unveil their latest car or announce new company strategies. Given the gearhead audience, it’s no surprise that most of these announcements focus more on horsepower and design than phone compatibility and computing power. But a few car companies are looking toward the future and switching things up. ​Volvo was one of the few automakers to highlight its infotainment center and consoles in its announcement of the new XC90 seven-seat SUV. (Audi and Honda were the only other automakers of the ten-or-so announcements we attended that spent time extolling the virtues of its new cars’ interior tech.) That may be because Volvo is in a unique position to experience its “rebirth,” as one Volvo spokesman termed it. While many automakers are trying to reinvent themselves after a depressing decade, Volvo has new money from Chinese automaker Geely behind it after its former parent company Ford sold Volvo in 2010. That new money bought changes that are just starting to appear in Volvo’s 2015-and-beyond lineup. The company poured resources into building a small but powerful three turbo engine, which you can read about here, as well as equipping its cars with adaptive cruise control and collision avoidance mechanisms that turn on if the car is going below 30 miles per hour. Read 21 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
Greetings, Arsians! The Dealmaster is here again with a ton of deals courtesy of our partners at TechBargains. Today's featured deal is an HP Stream 7 Windows 8.1 tablet with one year of Office 365 personal for just $99. The 7-inch tablet has a 1280×800 screen, a 1.33GHz Intel Atom Z3735G quad-core processor, and 1GB of RAM. Best of all, it's the "Signature Edition" of the tablet, which means it isn't full of crapware. This and tons more deals are below for your holiday and/or personal shopping. Enjoy! Featured Deal Read 8 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
It looks a little bit like an overgrown MacBook Air. But the Librem is free of corporate oppression. Purism What price can you put on freedom? If you’re talking about software freedom, a new San Francisco-based computer company prices it at $1,949 and up. Purism has turned to the crowdfunding site Crowd Supply to fund and launch its first-ever product—a laptop that's as open source friendly as it is technically feasible. Advertised as a "Free and Open Source laptop that respects your essential freedoms," Purism’s Librem 15 laptop, now in prototype and ready for manufacture, is designed to run entirely with open source software, requiring no proprietary drivers. The only proprietary code on the laptop resides in its Intel firmware. Based on the Intel i7-4712MQ processor, the 15.6-inch Librem 15’s base configuration will come with an Nvidia GT840M, 4GB of RAM, a 500 gigabyte hard drive, and an actual CD/DVD drive. The Librem will have three USB 3.0 ports, an HDMI port, an SDXC card slot, and a “pop-down” RJ-45 Ethernet port, in addition to an Atheros-based 802.11n Wi-Fi adapter, a 720p built-in camera, HD audio, and a backlit keyboard. Read 2 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
Twenty months after it started, Valve's experiment in letting developers sell unfinished games through its Steam Early Access program continues to evolve. Giant Bomb reports that the distribution service has sent a new set of rules and guidelines to Early Access developers about how they should market and position their games. The most important new rule might be the requirement that developers clearly communicate a game's unfinished status wherever Steam keys are sold outside of Valve's storefront. As Valve notes, "We've seen that many of these titles are sold as keys on other websites where there is no explanation of what Early Access is or what the current state of your product is now versus what you hope to achieve." This extends to setting proper expectations for the project "everywhere you talk about your game," Valve says. Early Access developers must also avoid "specific promises about future events," such as when a game will be finished or what features are planned for future updates. "Customers should be buying your game based on its current state, not on promises of a future that may or may not be realized," Valve writes. Read 2 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
Trevor Paglen An unnamed top National Security Agency (NSA) official had a stark internal disagreement with then-director Keith Alexander in 2009 over the bulk metadata program, according to a new report by the Associated Press (AP) on Thursday. The official warned that the program put the agency into new and unlawful territory, saying that if it was made public, it would cause an enormous backlash. That person, who has retired and spoke to the AP under condition of anonymity, said "he knows of no evidence the program was used for anything other than hunting for terrorism plots in the US. But he said he and others made the case that the collection of American records in bulk crossed a line that had been sacrosanct." Read 7 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
Game of Thrones, the adventure game Excitement for the latest Game of Thrones video game has been building for nearly a year, ever since its December 2013 reveal as a point-and-click adventure game being made by Telltale Games, known for its acclaimed virtual take on The Walking Dead. On Thursday, the episodic game received its first gameplay reveal in the form of a 60-second teaser trailer, complete with virtual approximations of series stars Peter Dinklage (Tyrion Lannister), Lena Headey (Cersei Lannister), Natalie Dormer (Margaery Tyrell), and Iwan Rheon (Ramsay Snow). They'll all appear in the game's first episode, with other stars from the TV series to come in future episodes. However, HBO and Telltale took a curious path to unveiling other parts of the game in a Thursday media blitz. Namely, the companies reached out to various gaming and nerd-culture sites and whispered into each of their individual ears, "we have an exclusive for you." The result: At least twelve sites posted stories about the game's trailer, and each outlet added their own trumpeted "exclusive" reveal of a specific in-game character. So far, the following outlets have succumbed to HBO's tease: Entertainment Weekly, Gamespot, IGN, The Nerdist, GamesRadar, Polygon, USA Today, The Verge, Mashable, Game Informer, The Escapist, Yahoo, and Wired. Each site lists an individual character's backstory, all the while unable to confirm whether their site's character will be one of the game's five playable characters. Either way, the combined pool of the game's revealed characters draws heavily from House Forrester, a family that has yet to appear in the televised HBO series despite having an impact in the series' original books. Read 2 remaining paragraphs | Comments

Read More...
posted 1 day ago on ars technica
This video screencap comes after a Gorilla Glass 4 device fell for a full meter and landed directly onto a sandpaper-coated surface. Look: no breakage, no shattering. Corning On Thursday, Corning Incorporated, the creators of Gorilla Glass, unveiled the fourth generation of its thin, durable glass technology for use in smartphones, tablets, and other mobile electronics. Gorilla Glass 4 is already being advertised as "up to two times stronger" than any "competitive" mobile screen, with a specific focus on surviving everyday drops in the real world. Corning confirmed to Ars Technica that the upgraded glass will reach consumer devices "this quarter." Global marketing director David Velasquez was unwilling to reveal "what we did to the glass to make it better," but he talked at length about one major change to the company's lab testing: a single sheet of sandpaper. After analyzing "thousands upon thousands" of screens broken in the real world, Corning confirmed that a major contributor to common breakage was dropping a phone on "rough surfaces like asphalt and concrete." That might seem like a head-smackingly obvious issue, but Velasquez insists that the smartphone glass-making industry, which hasn't even existed for a full decade, has "no standard" for such testing. Most drop tests employ surfaces like stainless steel or granite, which replicate surfaces in a home. "The best way to approximate what asphalt does [to a phone screen] is 180-grit sandpaper," Velasquez said. That can more consistently reproduce the microscopic breakage of a rough surface than even a giant sheet of asphalt (which, Corning learned after a few tests, actually smooths out at a point of contact after a few drops). Read 2 remaining paragraphs | Comments

Read More...