Monday, December 9, 2013

Intel Planning 15-Core Ivytown Processor For High End Servers

Remember the peak of the megapixel war, where every single camera manufacturer was popping out a new point-and-shoot model with a slightly higher MP rating? It feels like we may be entering a similar leapfrog battle in the silicon world, as the race to produce chips with "more cores than the other guys" hits full stride. Though more cores generally make a meaningful difference in performance in multi-threaded workloads, more pixels don't always result in higher quality imaging if optics aren't up to par. At any rate, a new report suggests that Intel's latest project internally involves a massively packed 15-core Ivytown chip.
The high-end processor will ship first to customers in the enterprise market, with high end servers and the like apt to be first in line for the new platform. Ivytown will be based on Intel's Ivy Bridge-E architecture, and it will assume the top position in Intel's CPU stack over their existing top-end chip, the 12-core Xeon E5 v2. The new 15-core chip will probably head towards 4 to 8-socket servers which generally are only found in high performance mission critical-type applications. But, of course, these types of things can eventually trickle down to consumer products in due time.
AMD, as you may know, already as 16 cores in its newest Opteron 6300 chips. The new Ivytown processors will be built using Intel's 22 nanometer process technology, and will slot into the Xeon E7 v2 server lineup. Naturally, pricing details aren't yet available, but they'll no doubt make a serious dent in the corporate card.

Misfit Shine

Misfit Shine
 Showing 1-2 of 2 

The basics

You’ve probably never heard of the Misfit Shine - its creator’s last big hit was an glucometer for iPhone owners with diabetes. It’s the David of the fitness band world, taking on the likes of Fitbit, Nike and Adidas for a spot on your wrist in your daily life - and it just might have what it takes to topple Goliath. It’s waterproof, works for most sporting activities, and runs for up to six months on a charge. On paper, it sounds perfect: how does it work in practice? We strapped one on and hit the track to find out.

The good

The Misfit Shine is far more stylish than anything Fitbit or Withings has to offer - and much more subtle than Nike’s Fuelband too. It’s a tiny little disc the size of two 10p coins, it weighs less than 10 grams and it’s waterproof. You can wear it on your wrist with the bundled sportsband - and the lights that indicate progress towards the daily goal that you set also show the time - or clip it to your clothing, even hide it underneath your shirt cuff. It’s an elegant design that’s almost invisible.
It’s invisible because all the tracking data is outsourced to an iPhone app: you sync it just by holding the Shine on your phone’s screen for a few seconds. Despite this simplicity, it does a lot however: you can triple tap it to begin logging a certain type of activity, which can be anything from cycling to sleeping, and see how you did afterwards using the handy graphs it generates. Between the daily targets and statistics it provides, you’ve got a real personal coach you won’t find yourself hating after a few days.
What makes the Misfit Shine so extraordinary however is its battery life: because it uses Bluetooth Low Energy, it can run for up to half a year on a single battery - and on a simple cell you can replace yourself when it’s drained. We can’t emphasise enough just how convenient this makes the Shine: no having to remember to charge it up via USB makes for a much more useful activity monitor you’ll actually end up wearing all the time.

The bad

At a little under £100, the Misfit Shine isn’t the cheapest fitness band on the market. Fitbit’s line of activity trackers start at around £35 for the Zip, hitting £70 for the Flex, and if you’re in need of something more sedate - a simple pedometer rather than a monitor for tracking lengths in the pool - they’re arguably a better bet. That said, you get plenty in the box with the Shine, including a variety of clips, and we’d also argue that epic battery life more than makes up for the extra cost.
Cyclists and ramblers should also be aware that the Misfit Shine also lacks an altimeter. Though it can track your bike rides and long walks, it can’t detect altitude, so if you’ve got dreams of snagging the white and pink Tour De France jersey, this isn’t the device for you.
Lastly, like the Nike Fuelband, it only works with iPhone, so Google phone owners will have to wait. The good news is that Misfit does plan to launch an Android app sometime soon, optimised for Google Nexus 4 and 5, Samsung Galaxy Note 3 and Galaxy S4 phones - though other Bluetooth 4.0 compatible Google gizmos may work too.

The bottom line

All of the wristband fitness monitors we’ve seen so far have suffered from one flaw or another: one doesn’t show the time, another doesn’t work with Android, some are useless for cycling and swimming. So it’s refreshing to have a newcomer stroll right in - or should that be run - and beat them all with an affordable fitness band that does just about everything, and does it well. Ignore this lesser known gadget at your peril, get-fit fans: it could be the perfect device to help you stick to your New Year resolutions.

How to Protect Yourself From Unethical Or Illegal Spying

A quick Google search for “spy software” yields over a 100 million results. Clearly, there is massive interest in spying software and gadgets. Irrespective of the motivation or justification for spying (such as spousal infidelity), spying is illegal and a gross invasion of privacy in most countries around the world.
This article takes you through the different methods that your spouse, employer or anyone else with an interest — nefarious or otherwise — in your private affairs can use to snoop on you. In each case, I have endeavored to provide practical defenses.

Smartphone Spying Applications

The digital age has accorded us many comforts and conveniences. One of these is the smartphone. But, our high dependence on smartphones makes us easy targets for spying. Mobile spy applications are selling like hot cakes.
Once installed on your smartphone, such applications use your data connection to secretly send logs to a remote server. These logs can include:
  • Calls
  • Text messages
  • Data from Facebook, Twitter, WhatsApp, Skype and Viber
Spy applications can also upload stored camera images and can activate the phone’s microphone so that the spy can listen in on your conversations. Advanced applications even allow the spy to listen in on phone conversations using a technique similar to conference calling. Spy applications also log and upload location information using the built-in GPS receiver, wireless networks or cell network IDs.
These applications do not have a user interface so you can’t easily locate them on your smartphone. The spy can access the logs via a web interface from anywhere in the world.
mobile hacking

What to do: Actual possession of the smartphone is required in order to install spyware. It takes only five minutes on average. The spy will usually achieve this by waiting until you leave your phone unattended. More devious and creative methods can also be used such as pretending their phone has a dead battery and borrowing your phone to make a call.
Therefore, the first common sense step to defending yourself is to ensure you have your phone with you at all times. Next, implement the following measures:
  1. Use a good strong screen lock password
  2. Avoid pattern locks and Face Unlock on Android, which can easily be hacked.
  3. Beware of prying eyes when typing your password. You would be surprised at how easy it is to read someone’s unlock code when they are unaware you are looking.
  4. It is possible to tell if your phone has spyware installed by watching the phone for weird behavior such as the backlight coming on for no particular reason.
  5. Check your data notification bar to see if your phone is connecting to the Internet for no apparent reason.
  6. Monitor your bandwidth usage using a data monitoring application. Spy applications tend to hog bandwidth as they upload logs to the remote server. Check your list of applications for any strange apps and uninstall anything you don’t recognize.
  7. If you can’t find anything, but strongly believe that your Android phone has been compromised, back up your data and restore the phone to factory settings.
  8. Install a mobile security application such as F-Secure to prevent future spyware installations.
iPhones need to be Jailbroken in order for spyware to be installed. The best evidence of jailbreaking on an iPhone is the Cydia app (see image below), which provides access to the alternative store for jailbroken iOS devices. If you find the Cydia icon, you have good reason to suspect your iPhone is bugged. Get rid it by upgrading the firmware; this reverses the jailbreak. However, the fact that you can’t find the Cydia icon does not mean that your phone hasn’t been jailbroken. The spy may have covered his/her tracks by installing an app that hides icons.SBSettings is a Cydia app which can prevent certain icons from appearing. It even hides its own icon. Locate SBSettings by swiping from left to right on your status bar. Open it and check to see if there are any hidden icons.
Cydia_Sources

Desktop Spying

Remote access applications and key loggers are the weapons of choice for spies keen on hacking into your computer. An application such as VNC allows someone to remotely view all your activity on a computer.  A key logger records all key strokes. All the spy needs to do is read the log and find passwords to your email, Facebook and other sites.
computer hacking

What to do: To avoid your computer from being spied on, take the following measures:
  1. Set your computer to lock the screen whenever it is idle for three minutes.
  2. Use a good strong password.
  3. As a general rule, never allow anyone to use your computer as an administrator. If you share a computer with other people at home, create separate user accounts. Only the administrator should be able to install applications. If this is not possible, regularly check the list of installed software to see if there is any software you don’t recognize.
If you suspect your office computer is being monitored, avoid visiting any sites that you wouldn’t want your boss to know about.
It is important to mention that most spyware is completely undetectable. A key logger may not appear in your Add/Remove Programs list or even in the task manager. To get rid of key loggers and other spyware in Windows you need to install an anti-spyware program such as the free version of SpyBot Search & Destroy or Malwarebytes. If you are unable to fix the problem, boot into safe mode (press and hold down F8 as your computer restarts) and try running the anti-spyware program again. MacScan works well for Macs. If you still can’t get rid of the problem, back up your important files and re-install the operating system. That should completely delete malware still in your system. Also, read Aibek’s article on how to cheat key logger software.

GPS tracking devices

Planting a GPS device on a car is extremely easy. Any self-respecting spy will think of placing a GPS tracker on your car.
What to do: There are many tell-tale signs that your car is being tracked. If you suspect someone is keeping tabs on you via GPS, the following are the ideal spots for hiding GPS devices:
  • Inside plastic bumper
  • Under bug shield
  • Under grill
  • Gap between hood and window
  • Under front dashboard
  • Inside door speakers
  • Top of the roof
  • Inside rear speakers
  • Under rear dashboard fabric
  • Inside the rear third brake light
  • Inside the rear plastic bumper
  • In the glove compartment
where to hide a gps device in a car

These days, trackers can be as small as a matchbox, so you have to be really thorough. You should also check your vehicle’s OBD (On Board Diagnostics) port for anything plugged in. This is the port that your mechanic plugs in a computer to perform a computer diagnostic. It is usually located under the front dashboard. An OBD GPS tracker has the advantage of drawing power directly from the car’s electrical system. Non-OBD tracking devices will eventually run out of power so anyone keen on keeping tabs on you over the long haul will prefer an OBD device. If gadgets are not your thing, you can always hire an electronics specialist to check your car for any tracking devices.
You can also jam a GPS signal with a GPS jamming gadget. These gadgets are easily available at online stores and only cost a couple of bucks. Most of them plug into a car’s 12 V adapter and can interfere with any GPS signal within a range of 500 meters. However, GPS jamming devices are illegal in some countries, such as the United States and Australia.

Cameras & Microphones

Due to great advances in camera technology such as the introduction of night vision and miniaturization, hidden cameras are being deployed on a massive scale.
hidden camera

What to do: If you suspect there are hidden cameras in your home, office or car, you can begin by searching the usual places. For buildings, check:
  • Light fixtures
  • Smoke detectors
  • Shelves
  • Speakers
  • Underneath table tops
  • Shelves
  • Flower pots
  • Lamp shades
  • Clocks
  • Wall pictures
  • Any other place that could conceivably conceal a miniature camera
Also, look for black dots in walls that may alert you to the presence of a pinhole camera. You can also turn off the lights at night and look for tiny green or red LED lights. Shine a flashlight against mirrors to pick up any hidden cameras. In cars, check the rear view mirror, roof and dashboard. If you want to be absolutely sure, a radio frequency (RF) detector equipped with a hidden camera lens finder costs less than 50 bucks and will detect all types of hidden cameras. Wireless cameras transmit at frequencies ranging from 900 MHz to 5.8 GHz. The RF detector will alert you to a transmission and you can then investigate the area further to determine the source. The lens camera finder will detect wired cameras. It emits red LED light which bounces off the lens of the spy camera. All you need to do is look through the scope to see the sparkle of the camera lens. Hidden microphones can also be detected using an RF detector.
rf detector hidden camera finder

What Next?

Finding out that you are being illegally spied on by your boss or a peeping tom is fairly easy to deal with; notify the law enforcement authorities immediately.
But if it’s your spouse who is spying on you, it can be pretty upsetting and even traumatizing, especially if you are completely innocent. The thought that a loved one harbors mistrust can evoke strong emotions. I can’t tell you what to do in such a situation; you would have to make that decision on your own. On the other hand, if your spouse spies on you and catches you cheating, that would leave you in a catch-22.

Typo keyboard case turns your iPhone into a BlackBerry - for better and worse!

Typo keyboard case turns your iPhone into a BlackBerry - for better and worse!
Sure, BlackBerry has received a lot of flack over the past few months, but one thing is still clear: its keyboards are top-notch, and still leave many iPhone users with QWERTY envy. That’s set to change, all thanks to the Typo keyboard case, which grants you ‘Berry style physical keys on your Apple handset! Is this the best of both worlds, or just a mobile monstrosity?
Despite the name, the Typo keyboard should boost your typing skills on your iPhone 5 or 5sthanks to its backlit, tactile keys, as well as provide you with more battery life on your blower thanks to an integrated battery pack. The keyboard itself looks like it’s been lifted straight from a BlackBerry Q10 (They say imitation is the sincerest form of flattery), while the case itself also adds protection to the rear of your iPhone – as well as making it taller. It also charges up in an hour and it handily pairs with your iPhone over Bluetooth.
Unfortunately, as much as the Typo case adds more keys to your iPhone, it also covers up one important one: the home button. That means for you iPhone 5s owners, that covers up the Touch ID sensor, making your quick log-ins a thing of the past. Still, if that’s a trade-off you’re willing to make for some tactile keys, or you’re rocking an iPhone 5, the Typo keyboard case starts shipping in January for $99 (£60.44).
Do you fancy physical keys on your iPhone, or are you happy with the software keyboard? Let us know what you think in the comments below.
Tags:

Here’s How to Keep the Robots From Stealing Our Jobs

Photo: Steve Helber/AP
Here’s a paradox: While companies talk about the “war for talent” and their struggle to fill certain positions, they’re simultaneously accelerating their efforts to automate work.
This means that some high-skilled work becomes indispensable while much routine work becomes disposable. Still, this is a much more realistic way of looking at the discussion around whether robots will take our jobs – commonly framed as the race against (or with) the machine.
Why does the way we work have to be set up this way at all? Because of the way companies have been organized since the beginning of time, or rather, since the existence of the modern firm itself. Asdescribed by Ronald Coase in his 1937 essay, “The Nature of the Firm,” the modern firm exists to do the activities that could be done at a lower cost inside the organization than obtained outside in the marketplace. So firms continue to organize in a way that favors scale to minimize transaction costs.
Companies want predictability. They depend on accurate forecasts and plans to ensure that the right resources are in the right place at the right time to meet anticipated demand. These models can be hugely efficient when the plans are accurate. But if plans are undermined by unpredicted events, the result is great inefficiency. Which is why the leaders of most organizations overly script and standardize processes in pursuit of predictability, defining work in such a way that it becomes easily automatable.
The irony is that the workers carefully following these scripts have bullseyes on their backs: Machines, after all, are far more predictable than humans (and far less demanding to boot).
But the world demands creativity. We need creativity at the company level to respond effectively to increasing competition and uncertainty. We also need creativity at the worker level to define jobs that will be augmented, rather than replaced, by machines.
This means we need to rethink the nature of work, and with it, the nature of the firm.
Why does the firm exist was a question answered (again, efficient transaction costs) long before the Internet and robots. Now, however, digital technology infrastructures and fewer government regulations are dramatically reducing the transaction costs across independent entities — witness the use of outsourcing and offshoring, microwork and virtual timeshares, the sharing economy, and more.
When the accepted rationale for the firm becomes less compelling, what will take its place? Or will large corporations simply disappear over time? Well, we believe there is still a reason for large firms to exist, but those reasons will be very different from today’s (and definitely from yesterday’s).
The reason for the firm to exist now? Talent development. Firms will exist so that workers can learn and grow much faster than they could on their own.
John Hagel & John Seely Brown
John Hagel III and John Seely Brown are co-chairman and independent co-chairman, respectively, of the Deloitte Center for the Edge. Their books include The Power of Pull, The Only Sustainable Edge, Out of the Box, The Social Life of Information, Net Worth, and Net Gain.  
Now, that’s easy to say but harder to implement. Especially because scalable efficiency — and the predictability it requires — is profoundly hostile to scalable learning. Learning, talent development, and creativity require risk-taking and a tolerance of failure.
If we adhere relentlessly to tightly scripted, standardized processes, where’s the opportunity to tinker, experiment, or hack your way to a better solution?
Some companies have begun to take steps toward creating work environments that foster learning and development on the job, rather than isolating it to the training room. Consider what Toyota did on the factory floor of its automobile assembly plants. It redefined the primary job of the frontline workers to be creative — to identify problems on the assembly line as they surfaced and solve them on the spot, rather than report and wait for someone else to find an answer. If they couldn’t address the issue, the workers were to pull a cord that would bring the entire assembly line to a halt, and a team would swarm the worker to help solve the problem. And the worker would be a hero, not an inconvenient interrupter, for pulling the chord — after all, spotting a problem gives the factory an opportunity to learn how to achieve even higher performance.
Take another example. When Steve Jobs owned Pixar, he became deeply involved in the layout of the new facilities. One of his design principles was to put the restrooms and break areas in the center of the building so that employees would have to leave their own work areas and venture into areas that were attracting employees from across the company. The capacity of the dining facilities was also purposely limited to force employees to line up to get their food.
How does this aid talent development? These facility design choices significantly increased the likelihood of serendipitous encounters — you never knew who you might run into. Perhaps you might strike up a conversation with someone with interesting insight into a problem you were working on while you were both standing in line. Compared to this, uber-efficient, functionally-specific workplaces reduce the potential for the kind of learning that comes from unexpected encounters.
And then there’s the importance of talent beyond the enterprise. The kind of expertise that can help employees learn faster if tapped. There are many crowdsourcing, innovation management, and enterprise management software platforms that help companies connect to a broad array of talent to find answers faster. Companies like Samsung and governments in cities like San Francisco are embracing various forms of hackathons and incubators that invite people from outside the organization to devise new products and solutions in a limited period of time.
Yet these examples remain rare. Despite the publicity such efforts receive, they’re not really that widespread. Most companies are mired in the practices of the past, and moving from a mindset of efficiency to one of learning will be difficult for them.
But the rewards will be enormous. If we can tap into the same network effects that drive the internet economy and bring it into the firm, we have the potential to build businesses that don’t just benefit the bottom line but create a culture of participation and learning. And that’s when we’ll find that machines are far less adept at delivering the imagination, creativity, genuine insight, and emotional and moral intelligence that is uniquely human. The things that not only allow us to cope with uncertainty … but live a balanced life.

Download: Android 4.4.1 Update for the Nexus 10

Nexus 10
Nexus devices including the Nexus 5, Nexus 4, and variants of the Nexus 7 were receiving an OTA update last week to build number KOT49E of Kit Kat, Android 4.4.1. The update is now available for Nexus 10 tablet owners, who can either wait for the update to roll out or simply sideload the file using adb. Either way, when you own a Nexus, it’s nice to have options. 
Download Link (51.3MB)
In order to sideload this, you’ll have to be running stock KRT16S. Sideload instructions can be found here.

Microsoft, Apple, Google, Facebook call for NSA muzzle

it-security
Household names including Apple and Google have formally called for changes to U.S. surveillance practices and policy, arguing that current operations undermine the freedom of people.
Eight companies, Google, Apple, Facebook, Twitter, AOL, Microsoft, Yahoo and LinkedIn have formed an alliance called the Reform Government Surveillance group. Although usually fierce competitors, the group have come together in agreement over the U.S. government's spying programs -- brought to light by former National Security Agency (NSA) contractor Edward Snowden -- and have formally requested "wide-scale changes" to the regime.
Snowden's revelations have included alleged wiretapping, the storage of phone call records illegally, fibre-optic cable infiltration used to monitor communication on an international scale, and the use of malware to monitor computer networks by the U.S. agency.
According to the latest document leak, the NSA is gathering close to 5 billion records a day on cellular devices worldwide. The Washington Post says large amounts of domestic data is "incidentally" recorded, which allows the agency to track millions of people worldwide based on how and where mobile devices are used.

Read this

NSA mass surveillance leaks: Timeline of events to date
Updating timeline coverage from ZDNet, CNET, and CBS News of the NSA's mass surveillance leaks.
On the alliance's website, an open letter to President Obama and Congress signed by the firms acknowledges that governments have "a duty to protect their citizens," but argues that Snowden's information leaks over the practices of the NSA and U.S. government in wholesale spying have highlighted "the urgent need to reform government surveillance practices worldwide."
Facebook CEO Mark Zuckerberg said that the revelations show a "real need for greater disclosure and new limits on how governments collect information." Brad Smith, Executive Vice President of Legal & Corporate Affairs at Microsoft said that "surveillance should address specific, suspicious targets under defined legal process rather than bulk collection of Internet communications."
Marissa Meyer, CEO of Yahoo, said "recent revelations about government surveillance activities have shaken the trust of our users, and it is time for the United States government to act to restore the confidence of citizens around the world." Google CEO and chairman Larry Page commented that user data security was "critical" for firms, but this has been "undermined by the apparent wholesale collection of data, in secret and without independent oversight, by many governments around the world."
"The balance in many countries has tipped too far in favor of the state and away from the rights of the individual -- rights that are enshrined in our Constitution," the letter states. "This undermines the freedoms we all cherish. It's time for a change."
The U.S. President agrees to an extent. During a recent appearance on MSNBC's Hardball, Obama said that he plans to "propose some self-restraint on the NSA," and push for "some reforms that that can give people more confidence." At the interview, Obama said:
"All of us spend more and more of our lives in cyberspace. We've got to be in there in some way to protect the American people, even as we're making sure the government doesn't abuse it. The Snowden exposures have identified some areas of legitimate concern, but some of it has also been highly sensationalized.
The people at the NSA generally are looking out for the safety of the American people. They are not interested in reading your emails or text messages, and that's not something that's done."
The company alliance states that they are all taking steps to keep user data secure, including the deployment of encryption technology to scupper "unauthorized surveillance on our networks," and plan to push back government requests to ensure they are both legal and reasonable.
It is this statement that is double-edged. Public outrage over Snowden's revelations have wounded consumer trust in technology companies whose names become involved, and if the target market has doubts, then this can end up damaging both a firm's reputation and profit lines. While improving encryption and security is all to the good, it is worth keeping in mind that data collection is within the realms of both government surveillance and corporations -- in short, both sides are battling over which has control and dominance over the data we generate while using communications-based services.
By formally protesting against governmental spying and data collection, the firms have the opportunity to boost their own reputations and potentially rebuild the trust of consumers -- as well as join the fight to retain authority over customer data which is collected for the company's benefit. Just as Microsoft's Smith wrote in a blog post -- "people won't use technology they don't trust."

LG G2 Sales Are Significantly Less than Expected; Even at Home in South Korea

LG-G2-T-Mobile
The LG G2 has been one of the most successful LG flagships, however, according to a new report, it’s still significantly less than what LG expected. The LG G2 sales have barely broken 600,000 in South Korea, which is only about 10 percent more than what the Optimus G Pro sold early this year in the same amount of time (4 months).
LG wanted to sell at least 3 million units internationally, too, but they’ve only sold 2.3 million, which is 20 percent less than what they were expecting to sell. To reach even those 2.3 million customers, LG had to increase its marketing budget, too, but it doesn’t look like their marketing campaigns have been very effective. Unfortunately for LG, marketing campaign effectiveness also depends on how strong your brand is and if you’re the kind of company that creates excellent products.
This means that you have to have an excellent track record in creating great products first. So even if the LG G2 itself was great, a lot of people make their purchasing decision based on a company’s track record, and advertising is not so effective without a good track record. LG has just started pushing flagship products to US, so I don’t think a lot of customers trust them yet, other than the people who know they made the Nexus 4 and Nexus 5, and know they can make some pretty decent products.
LG also needs something to differentiate themselves more from Samsung. They’ve been having this line of thinking that if they do what Samsung does, they will be successful, and maybe that has worked relatively well for them so far, but if they want to be treated as a serious mobile company (especially in US), they need to step out of Samsung’s shadow, and have software and devices that are significantly different than what Samsung is offering. The LG G2 seemed to have an interface that has never been closer to Samsung’s Nature UX/TouchWiz.
Wanting to imitate Samsung so much also means they’re repeating a lot of Samsung’s own mistakes, such as using glossy plastic and poor designs for the phones, and adding as much software bloat as possible between new releases. So if LG wants to be successful on their own, they need to follow their own path, and create things that they think are best for customers, rather than making what Samsung thinks is best for customers.

Nokia intros Lumia-colored, Shuffle-sized Bluetooth headset

It's roughly iPod Shuffle-sized, but the familiar-looking BH-121 is more smartphone accessory than screenless music player. The square device ships with a pair of headphones and has a built-in 3.5mm jack, should you want to get fancy and bring your own cans to the party (BYOC). The module has built-in NFC for one-tap pairing -- or you can just pair it to your handset the old fashioned Bluetooth way. The tile also has a single button for playing music and taking calls. It'll arrive later this month priced at €39 ($53.50)

Day 2 of Motorola’s $150-off Moto X Promo Happens Today at 9AM Pacific!

moto x motomaker
You ready for day-2 of Motorola’s $150-off Moto X MotoMaker promo code giveaway?
To make up for a botched Cyber Monday deal, Motorola decided to re-do this incredible full retail price discount on their 2013 flagship by handing out promo codes over two separate days that can be redeemed within a week. This not only decreases the stress on their custom phone software, but also gives you time to finalize your custom phone. For those not familiar with the promo, $150 off the full retail price of a Moto X gets you into a 16GB version for $350 or the 32GB version for $399, and that’s without a contract. It’s most certainly the deal of the season. 
As you all know if you hung out with us last week, the codes don’t hang around for long, so be ready a couple of minutes before 9:00AM Pacific (12:00PM Eastern). Last Wednesday, all codes were gone with 10 minutes. Thankfully, we had the community donate a couple of dozen to hand out to you, the glorious DL community.
We don’t have the official links for this week’s sign-up form, but feel free to try these as we get closer to go-live (9AM Pacific, 12PM Eastern):