Kodak Enters The Smartphone Space
January 12, 2015 by admin
Filed under Smartphones
Comments Off on Kodak Enters The Smartphone Space
Many people use their smartphone as their primary camera because it is always with them and sharing those photos is easy from your phone. Kodak announced they will be offering an Android-powered smartphone at CES in a couple weeks with a tablet and connected camera coming later in 2015.
The Kodak brand has been synonymous with cameras so it is encouraging to see them placing their brand on a new smartphone.
Apple’s iPhone is one of the most popular camera phones, primarily due to its simplicity and solid quality. The press release states that Kodak will not compromise on design and user experience while improving the printing and sharing experience.
The release also states that Kodak will include advanced remote management software to allow family members and friends to provide help and support. This sounds like Amazon’s Mayday service for the Fire Phone. With statements like this, it sounds like the new Kodak Android smartphone will be targeted to the masses and not the smartphone enthusiast.
Will Marriott Block Wi-Fi
January 5, 2015 by admin
Filed under Around The Net
Comments Off on Will Marriott Block Wi-Fi
The U.S. Federal Communications Commission will render a decision on whether to establish rules regarding hotels’ ability to block personal Wi-Fi hotspots inside their buildings, a practice that recently earned Marriott International a $600,000 fine.
In August, Marriott, business partner Ryman Hospitality Properties and trade group the American Hotel and Lodging Association asked the FCC to clarify when hotels can block outside Wi-Fi hotspots in order to protect their internal Wi-Fi services.
In that petition, the hotel group asked the agency to “declare that the operator of a Wi-Fi network does not violate [U.S. law] by using FCC-authorized equipment to monitor and mitigate threats to the security and reliability of its network,” even when taking action causes interference to mobile devices.
The comment period for the petition ended Friday, so now it’s up to the FCC to either agree to Marriott’s petition or disregard it.
However, the FCC did act in October, slapping Marriott with the fine after customers complained about the practice. In their complaint, customers alleged that employees of Marriott’s Gaylord Opryland Hotel and Convention Center in Nashville used signal-blocking features of a Wi-Fi monitoring system to prevent customers from connecting to the Internet through their personal Wi-Fi hotspots. The hotel charged customers and exhibitors $250 to $1,000 per device to access Marriott’s Wi-Fi network.
During the comment period, several groups called for the agency to deny the hotel group’s petition.
The FCC made clear in October that blocking outside Wi-Fi hotspots is illegal, Google’s lawyers wrote in a comment. “While Google recognizes the importance of leaving operators flexibility to manage their own networks, this does not include intentionally blocking access to other commission-authorized networks, particularly where the purpose or effect of that interference is to drive traffic to the interfering operator’s own network,” they wrote.
Intel Shows New IoT Platform
Intel showed off a new platform which it claims makes it easier for companies to create Internet-connected smart products using its chips, security and software.
Intel’s platform is like Lego and based on the chipmaker’s components and software for companies to create smart, connected devices. The only difference is that you can’t enact your own Doctor Who scene from it.
Doug Davis, head of Intel’s Internet of Things business, said at a launch event in San Francisco it will make it a doddle to connect to data centres in order analyse data collected from devices’ sensors.
Intel’s chips should compute capability in end-point devices that scale from its highest performance Xeon processor to the Quark family of products.
Intel’s Internet of Things Group had $530 million in revenue in the September quarter. That accounted for just 4 percent of Intel’s total revenue in the quarter, but it grew 14 percent over the previous year, which was faster than the company’s PC business.
Dell, SAP, Tata Consultancy, Accenture and other companies are working with the new reference model, Davis said.
Symantec Uncovers Advanced Spying Malware
Comments Off on Symantec Uncovers Advanced Spying Malware
An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.
The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.
Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.
The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”
Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.
Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”
Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.
Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.
Should Encryption Be The Norm?
Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.
The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.
It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.
“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”
The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.
The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.
However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.
These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.
New Data Suggest IT Hiring Increasing
November 21, 2014 by admin
Filed under Around The Net
Comments Off on New Data Suggest IT Hiring Increasing
Whenever IT hiring increases, as it did last month, the default explanation from analysts is this: The economy is improving.
That might be true, and it may well explain the U.S. Department of Labor’s report today that showed the U.S., overall, added 214,000 jobs last month.
Of that total employment gain, IT hiring grew by 7,800 jobs in October, compared with a gain of 6,900 jobs in September, according to TechServe Alliance, an IT industry group.
Another IT labor analyst group, Janco Associates, calculated last month’s IT gains at 9,500 jobs.
Government data can be reported in different ways, depending on which job categories are included in the IT job estimates, and it is why analysts report job numbers differently.
Hiring trends are also affected by Labor Department adjustments, and the government’s adjusted data adds nearly 25,000 telecom jobs over the past two months, according to Janco. Because of this adjustment, Janco termed the recent growth in IT over the past several months “explosive,” while TechServe put last month’s results as “modestly stronger.”
There is no one reason for October’s gain. An improving economy may be at the heart of any answer. Independent of the government numbers, Computer Economics, in a recent report on contingent versus full-time hiring, said it is seeing a drop in the use of contract workers at large companies and more reliance on full-time workers, which is a sign of an improving economy.
New Malware Targeting Apple Devices
Comments Off on New Malware Targeting Apple Devices
Palo Alto Networks Inc has uncovered a new group of malware that can infect Apple Inc’s desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.
The “WireLurker” malware can install third-party applications on regular, non-jailbroken iOS devices and hop from infected Macs onto iPhones through USB connector-cables, said Ryan Olson, intelligence director for the company’s Unit 42 division.
Palo Alto Networks said on Wednesday it had seen indications that the attackers were Chinese. The malware originated from a Chinese third-party apps store and appeared to have mostly affected users within the country.
The malware spread through infected apps uploaded to the apps store, that were in turn downloaded onto Mac computers. According to the company, more than 400 such infected apps had been downloaded over 350,000 times so far.
It’s unclear what the objective of the attacks was. There is no evidence that the attackers had made off with anything more sensitive than messaging IDs and contacts from users’ address books, Olson added.
But “they could just as easily take your Apple ID or do something else that’s bad news,” he said in an interview.
Apple, which Olson said was notified a couple weeks ago, did not respond to requests for comment.
Once WireLurker gets on an iPhone, it can go on to infect existing apps on the device, somewhat akin to how a traditional virus infects computer software programs. Olson said it was the first time he had seen it in action. “It’s the first time we’ve seen anyone doing it in the wild,” he added.
Qualcomm’s Snapdragon Goes WiGi
he WiGig standard has been around since 2009, but we haven’t really seen it hitting that many retail devices. Back at IDF 2014, Intel demonstrated WiGig 802.11ad video, peripherals, 4K video transfer and it promised that Skylake based laptops will come out of the box with the technology.
WiGig will let you transfer up to 7Gbpps of audio, video or data via 2.4, 5 or 6GHz bands and is as fast as eight-antenna 802.11ac and nearly 50 times faster than highest 802.11n rate. It is backward compatible with WiFi standards, but due to its high frequency it is limited to short distances, usually up to 10 meters, cannot really penetrate walls but it can propagate by reflecting off of walls, ceilings or objects using beam forming.
Now Qualcomm showcased this technology for the first time and promised it inside Snapdragon 810 based devices. Qualcomm demonstrated peer-to-peer connection and transfer of 4K video between two 20nm Snapdragon 810 based tablets. One of the tablets was the sync side and it was connected directly to a 4K TV and it was clear that you could play a content from one tablet and sync it to the second one.
WiGig’s 7Gbps translates to 875MB per second in the best case scenario. The Qualcomm demo shows a Plutonium MSM8994 based tablet hitting up to 187MB a second (1.5 Gbit per second) available for data transfer, with 4K multi-device streaming on the side. WiGig can possibly get to external storage, enabling faster NAS systems, future peripherals such as keyboard and mouse and on a longer run it can completely eliminate the necessity for docking stations. It will take some time but this is the grand idea.
It remains to be seen when we will be able to buy first Snapdragon 810 device with 802.11ad WiGig abilities. Qualcomm mentioned 2015 a number of times, but there’s nothing more specific than that. A potential problem for this standard might be the speed of flash storage that is used in tablets and phones today. According to Androbench, the HTC One M8 can sequentially read 92.29 MB/s, sequentially write only 17 MB/s, while Nvidia’s Shield tablet can sequentially read 67.75 MB/s, and write only 14.09 MB/s.
The performance gets even less impressive with smaller files, but with numbers we are getting from latest 2014 devices, the flash has to increase speed up to 10 times in order to be ready to write files at 150MB. For theoretical maximum of ridiculously fast 875 MB/s we need about 50 times faster memory that the 14-17MB/s write speed available in the current generation of high end mobile devices.
Will Verizon Throttle Users?
October 15, 2014 by admin
Filed under Smartphones
Comments Off on Will Verizon Throttle Users?
Verizon Wireless backed away from a widely criticized plan to slow down the connections of heavy data users with unlimited LTE plans.
The carrier had announced in July it would extend a practice it calls network optimization to unlimited LTE subscribers starting in October. Network optimization targets the top 5 percent of data users on the network when a cell site is under the heaviest demand, and slows down those users’ network performance. Verizon had already applied the practice to the top users of its 3G network.
“We’ve greatly valued the ongoing dialogue over the past several months concerning network optimization and we’ve decided not to move forward with the planned implementation of network optimization for 4G LTE customers on unlimited plans,” the carrier said in a statement on Wednesday. “Exceptional network service will always be our priority and we remain committed to working closely with industry stakeholders to manage broadband issues so that American consumers get the world-class mobile service they expect and value.”
U.S. Federal Communications Commission Chairman Tom Wheeler attacked the plan in a letter to Verizon, suggesting it was a ploy to get customers to switch from their unlimited plans to ones with a cap on monthly data usage. Verizon no longer sells new unlimited plans but allows subscribers with those plans to keep them.
“I know of no past Commission statement that would treat as ‘reasonable network management’ a decision to slow traffic to a user who has paid, after all, for ‘unlimited’ service,” Wheeler wrote in the late July letter to Verizon Wireless President and CEO Dan Mead.
Digital rights group Public Knowledge also attacked so-called data throttling, as well as practices by AT&T, Sprint and T-Mobile USA.
The showdown demonstrated the tension over increasing demand for mobile data, which carriers say puts a strain on their networks. Among other things, that demand has led operators to seek ever more spectrum and apply network management techniques they say are necessary to keep serving all subscribers well. Though LTE makes much more efficient use of the airwaves than 3G does, LTE networks are serving a rapidly growing number of subscribers.
Mobile Carriers Dash To Enter FCC Auction
October 14, 2014 by admin
Filed under Uncategorized
Comments Off on Mobile Carriers Dash To Enter FCC Auction
Three of the four largest U.S. mobile operators and satellite provider Dish Network Corp plan to bid in the Federal Communications Commission’s November auction of airwaves, according to initial applications released on Wednesday.
As expected, the largest U.S. wireless carrier Verizon Communications Inc, No. 2 AT&T Inc, No. 4 T-Mobile US Inc and Dish appeared to be the largest companies to indicate an interest in bidding in the upcoming auction of frequencies known as AWS-3.
Applications from Northstar Wireless LLC and SNR Wireless LicenseCo LLC reported they had entered bidding agreements with Dish, which had indirect ownership interest in both companies.
Northstar’s disclosures showed direct and indirect ownership interest by Alaska Native corporation Doyon Ltd and indirect ownership interest by financial firm Catalyst Investors. Asset manager BlackRock Inc had membership shares in SNR, according to the documents.
T-Mobile and AT&T did not appear to plan joint bids with other companies, and T-Mobile’s Kathleen Ham, vice president of federal regulatory affairs, said the carrier had no such agreements with any company.
A Verizon spokesman did not respond to inquiries about potential joint bidding and Dish representatives declined comment beyond confirming the submission of its application, citing FCC’s anti-collusion rules.
A total of 80 entities submitted initial applications. Interested parties, which may or may not actually bid for wireless licenses in the auction, included smaller U.S. companies such as Bluegrass Wireless LLC, Guam-based wireless company Docomo Pacific Inc and individual spectrum investors.
Scheduled to begin on Nov. 13, the auction is expected to raise at least $10 billion and will include airwaves previously occupied by multiple federal users, including the Department of Homeland Security.
Dish applied to bid in the auction as American AWS-3 Wireless I LLC and disclosed joint bidding arrangements with SNR and Northstar, which in turn had to disclose ownership and other information.
SNR listed former FCC Wireless Bureau Chief John Muleta, now CEO of consulting firm Atelum LLC, as a contact. Muleta, reached late on Wednesday, declined comment, citing FCC’s restrictions.
Northstar’s disclosures listed Allen Todd, assistant secretary at Doyon, a Fairbanks-based Alaska Native Regional Corporation with numerous affiliates in various fields including oil and gas land drilling. Todd could not be reached for comment on Wednesday.
SNR’s and Northstar’s, as well as AT&T’s, initial application appeared to be incomplete, which can be caused by small bureaucratic omissions. Of the 80 applications, 47 were deemed incomplete and have to be properly finished by Oct. 15 to allow the companies to participate.
All initial applications have to put down an upfront payment by Oct. 15 to confirm participation.