Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Are Some IoT Gadgets Pointless?

November 30, 2015 by  
Filed under Around The Net

The man who first coined the term “Internet of Things” (IoT) has hit out at the bastardisation of the concept, calling on UK developers to lead the charge on making it a reality.

In an address on day two of Microsoft’s Future Decoded event in London, Kevin Ashton showed examples of supposed IoT devices such as the wine bottle that tells you if you’re drunk and the toothbrush that tells you if you’ve brushed your teeth.

Describing Kickstarter as “where bad ideas go to get funded”, he talked about the true nature of IoT and its roots in machine-to-machine communication that’s neither accessed nor processed by humans.

“This information isn’t going on a spreadsheet or a pivot table,” he explained. “It’s a sensor on a device in the world sending data to another device which makes a decision which feeds out into the world.”

In short: “We don’t collect data. Machines collect data from sensors and we turn the world into data.”

The perfect example of this is the mobile phone. “We call a phone a phone for legacy reasons,” he said. “A phone is just an app on your device. You probably use Candy Crush or Angry Birds more than you use it for actual calls. What a smartphone actually is, is a wireless sensor platform.”

He said that historically the UK has been at the forefront of internet developments, so it’s only right that the country takes a leading role in the evolution of the IoT.

Citing self-driving cars as a good example of the IoT at work, he predicted that by 2030 such vehicles will be the norm, and that the question should not be “Are self-driving cars safe?” but “Are human-driven cars safe?”, pointing out that 3,000 people are killed on the roads every day by human-driven cars, and so far at least, there have been no serious accidents involving autonomous vehicles.

Courtesy-http://www.thegurureview.net/computing-category/are-some-iot-gadgets-pointless.html

November 25, 2015 by  
Filed under Around The Net

Beancounters working for analysts Navigant Research have added up some numbers and divided by their shoe size and decided that global revenues from residential IoT devices expected to total more than $330 billion by 2025.

These are devices like smart thermostats that allow users to remotely control household temperatures or LED lights that can be switched on and off from a smartphone. Basically it is the same thing as the IoT concept in the residential setting.

Navigant Research, global revenue from shipments of residential IoT devices is expected to total more than US$330 billion from 2015-2025. That is a lot of talking fridges and Internet connected underware.

Neil Strother, principal research analyst with Navigant Research said that the IoT is like putting together a jigsaw puzzle without any edge pieces, with the number of pieces growing exponentially into the billions.

“Communicating devices in the IoT traverse a wide range of industries and sectors-virtually all areas of life can expect to see some form of this connected world.”

Despite the many drivers for the residential IoT market, there are at present multiple protocols and standards that are creating an interoperability barrier, he said.
Wi-Fi, ZigBee, Bluetooth, and others are all vying for market viability, which is creating confusion for consumers and stalling overall adoption, he said.

Courtesy-Fud

November 24, 2015 by  
Filed under Computing

Imagination Technologies has introduced three new additions to the MIPS Warrior CPU family, updating its embedded 32-bit M-class CPUS with the new M6200 and M6250, as well as the higher performing P-class CPU with the 64-bit P6600.

The MIPS P6600 is touted as “the next evolution” of the P-class family and is intended to “pave the way” to future generations of higher performance 64-bit processors.

The MIPS P6600 builds on the 32-bit P5600 CPU, which was the company’s first CPU core based on the MIPS Series 5 architecture and announced about two years ago. The MIPS Series 5 was designed to accelerate compute-intensive applications and thereby appeal to the embedded and mobile markets.

The P6600 CPU boasts a higher performing 64-bit architecture while other improvements over its predecessor include a deep 16-stage pipeline with multi-issue and Out-of-Order execution to deliver better computational throughput for complex software workloads.

“The P6600 CPU is the most balanced mainstream high-performance CPU choice, enabling powerful multicore 64-bit system of chips with optimal area efficiency for applications in segments including mobile, home entertainment, networking, automotive, HPC or servers, and more,” said the chip firm, adding that customers have already licensed the P6600 for applications including high-performance computing and advanced image and vision systems.

Like the P5600, MIPS P6600 is an OmniShield-ready design that supports full hardware virtualisation and security features. It is said to be able to handle up to 15 guest operating systems running simultaneously in fully isolated and trusted environments, too.

“This unprecedented level of scalability for virtualisation and security gives the MIPS Warrior family another unique advantage in the battle for supremacy in the processor space,” added the firm.

The P6600 packs a faster SIMD engine for accelerating multimedia processing as well as branch prediction and a load/store instruction bonding mechanism: two technologies that Imagination said will provide a boost in real-world workloads while keeping silicon area and power consumption in check.

As for the MIPS M6200 and M6250 chips, these are the latest additions to Imagination’s less powerful M-class family processors for MCUs/MPUs, further broadening the M-class roadmap for high-performance deeply embedded designs in segments requiring higher performance and larger address space.

Imagination said this could include things like wired/wireless modems, GPU supervisor processors, flash and SSD controllers, industrial and motor control, and advanced audio voice processing.

Source-http://www.thegurureview.net/computing-category/imagination-gives-mips-warrior-a-boost.html

November 23, 2015 by  
Filed under Computing

A security firm has released a list of ongoing and incoming threats that cover a range of things from Apple’s iOS to the Internet of Things (IoT).

In its third report this year, Quick Heal warns that Apple users in particular better brace themselves for impact as more and more malware writers who’ve earned their stripes targeting Android users turn their attention to iOS.

“As the number of iPhone owners rises across the world, iOS has become a new potential target for Android malware authors and hackers. It is expected that Android malware will soon be altered to attack iOS users as well, and jailbroken iOS devices will be the first wave of targets for these attacks,” explained the firm (PDF).

“Recently, the ‘XcodeGhost’ malware was found on the Apple App Store and this is just the beginning of such attacks.”

In a section on wearables, Quick Heal predicts hackers will increasingly target fitness trackers, something that other security researchers have already warned about.

A lot of space in the report is reserved for Android-flavoured threats, and users are offered advice on protecting themselves such as if there is an option to use a password over a touch sign-in, then you ought to take it.

“A group of researchers have discovered a serious security flaw in the Android Lollipop version running on devices right now. This flaw allows attackers to bypass the lockscreen of an Android smartphone by using a massive password and thereby exposing the homescreen,” it explains.

“The attack essentially works by opening the in-built camera application and afflicts people using a password to protect their Android device and lock their screen.”

The most significant Android threat is a rascal called Android.Airpush.G, which claims 30 percent of the bug pool and is the kind of adware thing that makes you want to take a hammer to your phone screen. The second most prominent issue is Android.Reaper.A, which can haul in a large data harvest when in place.

Quick Heal is not the only security company in town, and a post on the Symantec website also seems set to put the fear into the Apple user community. That post, read it here – if you dare, says that the Mabouia ransomware is capable of causing a problem for Mac and PC users alike.

Fortunately, Mabouia is a proof-of-concept attack that a researcher shared with both Apple and Symantec. Symantec says that the PoC effort achieves at least one first.

“Mabouia is the first case of file-based crypto ransomware for OS X, albeit a proof-of-concept. Macs have nevertheless already been targeted by ransomware in the form of browser-based threats,” it explained.

“For example, in 2013, researchers at Malwarebytes discovered browser-based ransomware that targeted Safari for Mac users through a malicious website. The website directed Windows users to a drive-by download, while Mac users were served JavaScript that caused Safari to display persistent pop-ups informing the user their browser had been “locked” by the FBI for viewing illegal content.”

Source-http://www.thegurureview.net/computing-category/will-the-xcodeghost-malware-wreak-havoc-on-ios-devices.html

November 20, 2015 by  
Filed under Computing

Mobile equipment maker Ericsson and U.S. networking company Cisco Systems Inc announced that they have agreed to a business and technology partnership that should generate additional revenues of $1 billion for each company by 2018.

Ericsson, whose like-for-like sales are down 7 percent so far this year and were roughly flat over the previous three years, said the partnership means new areas of revenue as it will boost its addressable market, mainly in professional services, software and the resale of Cisco products.

“We are the wireless No. 1 in the world,” Ericsson Chief Executive Hans Vestberg told Reuters.

“Cisco is by far the No. 1 in the world when it comes to IP routers. Together we can create innovative solutions.”

The companies said in a statement they would together offer routing, data center, networking, cloud, mobility, management and control, and global services capabilities.

“The strategic partnership will be a key driver of growth and value for the next decade, with each company benefiting from incremental revenue in calendar year 2016 and expected to ramp (up) to $1 billion or more for each by 2018,” they said.

Ericsson expects full-year cost synergies of 1 billion Swedish crowns ($115 million) in 2018 due to the partnership and said it would continue to explore further joint business opportunities with Cisco.

Source http://www.thegurureview.net/aroundnet-category/ericsson-and-cisco-join-forces-in-network-partnership.html

November 19, 2015 by  
Filed under Computing

Software Giant Microsoft has joined Mozilla and will consider blocking the SHA-1 hashing algorithm on Windows to keep the US spooks from using it to spy on users computers.

Redmond had earlier said that Windows would block SHA-1 signed TLS (Transport Layer Security) certificates from January 1, 2017, but is now mulling moving up the date to June.

There have been concerns about the algorithm’s security as researchers have proven that a forged digital certificate that has the same SHA-1 hash as a legitimate one can be created. Users can then be tricked into interacting with a spoofed site in what is called a hash collision.

In October, a team of cryptoanalysts warned that the SHA-1 standard should be withdrawn as the cost of breaking the encryption had dropped faster than expected to US$75,000 to $120,000 in 2015 using freely available cloud computing.

Programme manager for Microsoft Edge Kyle Pflug wrote in his blog that Redmond will coordinate with other browser vendors to evaluate the impact of this timeline based on telemetry and current projections for feasibility of SHA-1 collisions.

Mozilla said in October that in view of recent attacks it was considering a cut-off of July 1, 2016 to start rejecting all SHA-1 SSL certificates, regardless of when they were issued, ahead of an earlier scheduled date of January 1, 2017.

Courtesy- http://www.thegurureview.net/computing-category/microsoft-to-block-sha-1-hashing.html

November 18, 2015 by  
Filed under Computing

The PC will make a comeback, but the so-called Tablet revolution is history, according to the Chipmaker who missed out on it.

Kirk Skaugen, GM of Intel’s client computing group told the Intel Global Capital Summit that there are more than a billion PCs that are more than three years old and a third of a billion that are over five years old. People are coming back to the PC and refreshing their systems.

It used to be that people upgraded every two years or so, but in the last five years silicon has got so powerful that no one saw the need. The problem is that they still don’t and Skaugen hopes that two-in-one detachable-screen systems, will be a major growth driver.

Sales of two-in-one systems are up 150 per cent, he claimed, and are leading to people wanting to refresh their PCs up to 18 months earlier than they would have. Mini computers are another growth market.

Without the growth in two-in-ones, the laptop market in the US would have shown 4 per cent negative growth, Skaugen said. However the new forms created a one per cent growth. He thinks the new hardware that such systems are starting to carry, particularly 3D cameras are going to have people rushing back to laptops.

The big loser in all of this is going to be the tablet market. Intel had got the growth in tablets wrong, he said, and is now revising its forecasts.

“18 months ago many people thought that tablet sales were going to cross over PCs in 2014. Now we’re sure they won’t ever. Intel has taken a billion units out of our forecasts in the last year,” he said.

That is just as well because Intel never made a sustainable dent into the tablet market, but it also fulfilled our predictions that the technology never solved any problems. It was still the same toy that Microsoft had been attempting to sell without success for years and they never had a use.

Courtesy- http://www.thegurureview.net/computing-category/intel-says-pcs-will-make-a-comeback.html

November 17, 2015 by  
Filed under Around The Net

Sprint Chairman and SoftBank CEO Masayoshi Son has confirmed that job cuts at Sprint will be “in the thousands” as part of a restructuring plan.

His comments came as SoftBank, which owns more than 70% of Sprint, reported its quarterly earnings.

“Sprint is now in the position to increase the pace of user acquisition while cutting costs,” Son said, according to Bloomberg and other news sources. “We will also cut staff. The cuts will be in the thousands.”

Son’s comments are not out of line with things Sprint CEO Marcelo Claure has been telling Sprint workers for months.

On Tuesday, Sprint’s stock price sagged downward after an earnings report included a statement saying that the carrier plans to cut $2 billion or more in operating expenses for its 2016 fiscal year, which begins in April.

Son also said the $2 billion is a “minimum target” and should be the amount slashed annually, according to a report by The Wall Street Journal. The company now has more than $25 billion in annual costs.

Sprint has been investing in attracting new customers — an effort that has been costly but effective. On Tuesday, Sprint reported it gained 237,000 postpaid phone customers in its second fiscal quarter, which ended Sept. 30. It was the first time the company had showed gains on that measure in two years. It also reported its lowest customer cancellation rate in company history.

In November 2014, Sprint had said it would cut 2,000 jobs as part of $1.5 billion in cost reductions. That announcement came after Sprint had cut 5,000 jobs from January through September 2014. The company had 31,000 workers at the start of its current fiscal year on April 1.

Source- http://www.thegurureview.net/mobile-category/sprint-confirms-thousands-of-jobs-to-be-cut.html

November 16, 2015 by  
Filed under Around The Net

Britain has announced plans for sweeping new surveillance powers, including the right to find out which websites people visit, measures ministers say are vital to keep the country safe but which critics denounce as an assault on freedoms.

Across the West, debate about how to protect privacy while helping agencies operate in the digital age has raged since former U.S. intelligence contractor Edward Snowden leaked details of mass surveillance by British and U.S. spies in 2013.

Experts say part of the new British bill goes beyond the powers available to security services in the United States.

The draft was watered down from an earlier version dubbed a “snoopers’ charter” by critics who prevented it reaching parliament. Home Secretary Theresa May told lawmakers the new document was unprecedented in detailing what spies could do and how they would be monitored.

“It will provide the strongest safeguards and world-leading oversight arrangements,” she said. “And it will give the men and women of our security and intelligence agencies and our law enforcement agencies … the powers they need to protect our country.”

They would be able to require communication service providers (CSPs) to hold their customers’ web browsing data for a year, which experts say is not available to their U.S. counterparts.

“What the British are attempting to do, and what the French have already done post Charlie Hebdo, would never have seen the light of day in the American political system,” Michael Hayden, former director of the U.S. National Security Agency and Central Intelligence Agency, told Reuters.

May said that many of the new bill’s measures merely updated existing powers or spelled them out.

Police and spies’ access to web use would be limited to “Internet connection records” – which websites people had visited but not the particular pages – and not their full browsing history, she said.

“An Internet connection record is a record of the communications service that a person has used – not a record of every web page they have accessed,” May said. “It is simply the modern equivalent of an itemised phone bill.”

Source-http://www.thegurureview.net/aroundnet-category/britains-new-surveillance-plans-raise-ire-of-privacy-advocates.html

November 13, 2015 by  
Filed under Computing

Seagate has become the first hard drive company to create an 8TB unit aimed specifically at the surveillance market, targeting system integrators, end users and system installers.

The Seagate Surveillance HDD, as those wags in marketing have named it, is the highest capacity of any specialist drive for security camera set-ups, and Seagate cites its main selling points as maximizing uptime while removing the need for excess support.

“Seagate has worked closely with the top surveillance manufacturers to evolve the features of our Surveillance HDD products and deliver a customized solution that has precisely matched market needs in this evolving space for the last 10 years,” said Matt Rutledge, Seagate’s senior vice president for client storage.

“With HD recordings now standard for surveillance applications, Seagate’s Surveillance HDD product line has been designed to support these extreme workloads with ease and is capable of a 180TB/year workload, three times that of a standard desktop drive.

“It also includes surveillance-optimized firmware to support up to 64 cameras and is the only product in the industry that can support surveillance solutions, from single-bay DVRs to large multi-bay NVR systems.”

The 3.5in drive is designed to run 24/7 and is able to capture 800 hours of high-definition video from up to 64 cameras simultaneously, making it ideal for shopping centers, urban areas, industrial complexes and anywhere else you need to feel simultaneously safe and violated. Its capacity will allow 6PB in a 42U rack.

Included in the deal is the Seagate Rescue Service, capable of restoring lost data in two weeks if circumstances permit, and sold with end users in mind for whom an IT support infrastructure is either non-existent or off-site. The service has a 90 percent success rate and is available as part of the drive cost for the first three years.

Seagate demonstrated the drive today at the China Public Security Expo. Where better than the home of civil liberty infringement to show off the new drive?

Earlier this year, Seagate announced a new co-venture with SSD manufacturer Micron, which will come as a huge relief after the recent merger announcement between WD and SanDisk.

Courtesy-http://www.thegurureview.net/computing-category/seagate-goes-8tb-for-surveillance.html

Comments