Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Will Computer Obtain Common Sense?

December 10, 2013 by  
Filed under Computing

Comments Off on Will Computer Obtain Common Sense?

Even though it may appear PCs are getting dumbed down as we see constant images of cats playing the piano or dogs playing in the snow, one computer is doing the same and getting smarter and smarter.

A computer cluster running the so-called the Never Ending Image Learner at Carnegie Mellon University runs 24 hours a day, 7 days a week searching the Internet for images, studying them on its own and building a visual database. The process, scientists say, is giving the computer an increasing amount of common sense.

“Images are the best way to learn visual properties,” said Abhinav Gupta, assistant research professor in Carnegie Mellon’s Robotics Institute. “Images also include a lot of common sense information about the world. People learn this by themselves and, with [this program], we hope that computers will do so as well.”

The computers have been running the program since late July, analyzing some three million images. The system has identified 1,500 types of objects in half a million images and 1,200 types of scenes in hundreds of thousands of images, according to the university.

The program has connected the dots to learn 2,500 associations from thousands of instances.

Thanks to advances in computer vision that enable software to identify and label objects found in images and recognize colors, materials and positioning, the Carnegie Mellon cluster is better understanding the visual world with each image it analyzes.

The program also is set up to enable a computer to make common sense associations, like buildings are vertical instead of lying on their sides, people eat food, and cars are found on roads. All the things that people take for granted, the computers now are learning without being told.

“People don’t always know how or what to teach computers,” said Abhinav Shrivastava, a robotics Ph.D. student at CMU and a lead researcher on the program. “But humans are good at telling computers when they are wrong.”

He noted, for instance, that a human might need to tell the computer that pink isn’t just the name of a singer but also is the name of a color.

While previous computer scientists have tried to “teach” computers about different real-world associations, compiling structured data for them, the job has always been far too vast to tackle successfully. CMU noted that Facebook alone has more than 200 billion images.

The only way for computers to scan enough images to understand the visual world is to let them do it on their own.

“What we have learned in the last five to 10 years of computer vision research is that the more data you have, the better computer vision becomes,” Gupta said.

CMU’s computer learning program is supported by Google and the Office of Naval Research.

Source

3D Printer Goes Retail

December 3, 2013 by  
Filed under Around The Net

Comments Off on 3D Printer Goes Retail

MakerBot, a 3D printer maker which opened two new retail stores last week, is among the companies trying to bring the cutting-edge digital manufacturing technology to Main Street consumers, but skeptics say the debut may be premature.

MakerBot, a unit of Stratasys Ltd, opened retail stores this week in Boston and in Greenwich, Connecticut, both of which are twice the size of MakerBot’s first store, 1,500 square feet in downtown Manhattan.

The company offers designs for more than 100,000 items through its “Thingiverse” online user community. The products range from knick-knacks like zombie sculptures to jewelry, sink drains and even medical devices. They are printed using its line of corn-based plastic fibers in more than a dozen colors.

“For most people 3D printing is futuristic science fiction. We’re here to make it real,” said CEO Bre Pettis, who cut the ribbon at the store on Boston’s fashionable Newbury Street using scissors made on one of MakerBot’s Replicator printers which start at $2,199.

Pettis, who has purchased splashy magazine ads to promote 3D printers as holiday gifts, believes there could soon be a 3D printer on every block in America.

Yet some technology experts say 3D printers may not be ready for prime time because they are still much less user friendly than most modern consumer electronics.

“There is so much hype,” said Pete Basiliere, an analyst at technology research firm Gartner. “People are getting a little bit misled as to how easy it is,” he said.

Some investors also are skeptical of 3D printing’s readiness for the market. Short-seller Citron this week published an article questioning the earnings of Germany’s voxeljet AG’s, and shares in the sector fell, including those of MakerBot parent Stratasys and rivals 3D Systems Corp and ExOne Co.

Source

Twitter Tightens Security

December 2, 2013 by  
Filed under Security

Comments Off on Twitter Tightens Security

Twitter Inc said it has put in place a security technology that makes it harder to spy on its users and called on other Internet firms to do the same, as Web providers look to thwart spying by government intelligence agencies.

The online messaging service, which began scrambling communications in 2011 using traditional HTTPS encryption, said on Friday it has added an advanced layer of protection for HTTPS known as “forward secrecy.”

“A year and a half ago, Twitter was first served completely over HTTPS,” the company said in a blog posting. “Since then, it has become clearer and clearer how important that step was to protecting our users’ privacy.”

Twitter’s move is the latest response from U.S. Internet firms following disclosures by former spy agency contractor Edward Snowden about widespread, classified U.S. government surveillance programs.

Facebook Inc, Google Inc, Microsoft Corp and Yahoo Inc have publicly complained that the government does not let them disclose data collection efforts. Some have adopted new privacy technologies to better secure user data.

Forward secrecy prevents attackers from exploiting one potential weakness in HTTPS, which is that large quantities of data can be unscrambled if spies are able to steal a single private “key” that is then used to encrypt all the data, said Dan Kaminsky, a well-known Internet security expert.

The more advanced technique repeatedly creates individual keys as new communications sessions are opened, making it impossible to use a master key to decrypt them, Kaminsky said.

“It is a good thing to do,” he said. “I’m glad this is the direction the industry is taking.”

Source

Intel’s Bay Trail M Is On The Way

November 26, 2013 by  
Filed under Computing

Comments Off on Intel’s Bay Trail M Is On The Way

Intel launched its Bay Trail-M ultra low voltage processors for netbooks and mobile devices over the weekend. According to CPU World the new mobile CPUs, branded this time as Celeron and Pentium, can manage twice the CPU performance, and up to three times faster graphics.

They do all that while using the same amount of juice as their “Cedar Trail” predecessors. Most chips have higher clock speeds than N2805, N2810 and N2910 SKUs and come with Burst Performance technology. They can operate at a higher maximum operating temperature which makes them easier to cool. Finally, in addition to 4 N28xx/N29xx Celerons Intel also released Pentium N2920.

Then there are new dual-core Bay Trail-M microprocessors like the Celeron N2806, N2815 and N2820 which can operate at frequencies from 1.6 GHz to 2.13 GHz, when going downhill had the wind is behind them. They also have the maximum burst speed ranging from 2 GHz to 2.39 GHz. The processors come with 1 MB L2 cache, Ivy Bridge graphics clocked at 311 MHz and up to 756 MHz, and support for DDR3L-1066 memory. The N2806 has 4.5 Watt TDP while the N2815 and N2820 have 7.5 Watt TDP. All of the Celeron N28xx processors are priced at $132.

Two new quad-core microprocessors are Celeron N2920 and Pentium N3520. The CPUs have 2 MB L2 cache, and run at 1.86 GHz and 2.17 GHz respectively, with burst frequencies reaching 2 GHz and 2.42 GHz. Both parts integrate Ivy Bridge graphics, that can be clocked as high as 854 MHz. The Celeron can deal with DDR3L-1066 memory, and the Pentium supports 1333 MHz memory data rate. They fit into 7.5 Watt power envelope. The official prices of Celeron N2920 and Pentium N3520 are $132 and $180.

Source

Tizen Announces New Partners

November 25, 2013 by  
Filed under Smartphones

Comments Off on Tizen Announces New Partners

Samsung and Intel announced on Tuesday that the open source Tizen operating system now has 36 partners, including eBay, Trend Micro and Panasonic.

The full list of new partners was announced at the Tizen Developer Summit, and includes a mix of firms from different sectors. Among the 36 backers are eBay, Nokia’s Here mapping service, Konami, McAfee, Panasonic, Sharp and The Weather Channel, giving us some insights as to what software applications are likely to appear on the Linux based operating system.

Trevor Cornwell, founder and CEO of Appbackr, one of Tizen’s newly added partners, said that his firm found the operating system appealing due to its open nature, perhaps hinting that it is more open than Google’s Android mobile operating system.

He said, “The Tizen OS promises to be the most open and comprehensive software platform available for those companies wishing to target the consumers of connected devices.

“The Association’s commitment to support HTML5 applications, combined with their vision that extends beyond the smartphone and tablet ecosystem to a wider array of other connected device segments, makes it attractive to all types of companies. We look forward to collaborating with the Tizen Association to ensure that all stakeholders can contribute to the development of a platform for this growing market opportunity.”

It’s still unclear when Samsung’s first Tizen powered smartphone will make it to market, but online speculation suggests we’ll be seeing the firm’s debut Android challenging smartphone at some point in 2014.

Further speculation suggests that Samsung’s first Tizen phone will be an updated version of the Galaxy S4, possibly to reduce its reliance on Android.

Source

Will nVidia’s Tegra 5 Go LTE?

November 22, 2013 by  
Filed under Computing

Comments Off on Will nVidia’s Tegra 5 Go LTE?

The tradition continues. Our sources are confirming that Nvidia’s Logan SoC, possibly called Tegra 5, doesn’t come with an integrated LTE modem. Just like Apple, Nvidia makes a big fast chip with impressive Kepler based GPU, but it won’t put a an icera LTE solution inside the same chip.

Icera i500 is Tegra 5 compatible and it has AT&T certification. As the launch draws near, it should become compatible with other US and international LTE carriers like Verizon and T-mobile.

This should not be a big issue for Nvidia’s target market, manufacturers will have to choose two chips instead of one, a clear competitive disadvantage compared to future Qualcomm chips with Adreno 400 graphics and updated CPU cores, expected in early 2014.

During Nvidia’s recent conference call, CEO Jen Hsun Huang said devices based on the new Tegra 4i with integrated LTE should be announced in Q1 and ship no later than Q2. Jensen also mentioned that people are going to be “delighted by the OEM that it comes from” which is probably his way of of announcing some big brand design wins, but he also emphasised that the designs will be global rather than US. For US success you need CDMA Jensen said, but as far as we know Verizon is the only company using it.

Since Apple can pull of two chip designs from day one, we can only assume that two chip approach won’t cost much battery life compared to single chip design that has LTE on board (Snapdragon 600 and 800 ed. ). However, Nvidia is likely going to be making bets on its Kepler based GPU, expected to be the fastest graphics core ever integrated in a mobile SoC that will rock tablets and some phones around the world. The fact that Logan is likely to pack very powerful graphics sans on-die LTE makes it a bit more interesting for tablets than phones, which is exactly what we saw with the Tegra 4.

We expect to see Tegra 5 devices announced at CES 2014 so early January and with some luck we might see them shipping very early in 2014.

Source

Can Acer Go High-End?

November 21, 2013 by  
Filed under Computing

Comments Off on Can Acer Go High-End?

Most popular for its low-cost laptops, Acer doesn’t really inspire thoughts of premium products. But building high-end hardware could be the Taiwanese vendor’s best chance as it looks for a way to rescue its struggling business.

With consumers flocking to tablets and smartphones, Acer’s once-thriving PC business has been left in the dust. Quarterly financial losses have become routine at the company and its PC shipments declined more sharply in the past year than at any other major vendor, according to IDC.

The grim situation forced CEO J.T. Wang to resign from his post last Tuesday. Acer will also cut 7 percent of its global workforce and has assembled an advisory committee to come up with a new strategy, the company announced.

Bright spots are hard to find. The Wintel model that propelled Acer for years and helped it become the second-largest PC vendor in 2009 has been falling apart amid the demand for mobile gadgets. And Windows 8 and Intel’s Ultrabook strategy have failed to resuscitate the market.

It hasn’t helped that Acer is so reliant on sales to consumers, said IDC analyst Bryan Ma. The entire PC industry has been hurt by tablets, but Dell and Hewlett-Packard have at least managed to find cover selling PCs to businesses, which are still buying them. And Lenovo has capitalized on its position in China, now the world’s largest PC market.

“Acer didn’t really have the commercial PC business to protect themselves. That’s why they were hit harder,” Ma said.

Acer — whether to its benefit or detriment — has instead gained a reputation for low-priced PCs. Even in tablets it has tried to undercut rivals — its Iconia W4, an 8-inch Windows 8.1 tablet, starts at US$329.99, while its Iconia B Android tablet goes for $129.99. The low prices have helped keep the company on consumers’ radar, but at the expense of profits.

One option for Acer is to build a brand as a higher-end PC player. It took a step in that direction last year with the Aspire S7, a Windows laptop with a slender, aluminum chassis that sells for $1,200 and up. That product and its successors have had some success for the company, with sales of 2,000 to 3,000 units per month, said James Wang, an analyst with research firm Canalys.

“I think Acer has started to learn they are able to sell some expensive products,” he said.

Selling higher-end PCs could help stop the bleeding in Acer’s finances, but with the overall PC market still shrinking it’s unlikely to help it expand in any meaningful way. “You can’t really expect vendors in desktops and notebooks to find growth,” Wang said. “You win in the market by not falling in shipments.”

Source

Can Robots Run On (NH2)2CO?

November 19, 2013 by  
Filed under Around The Net

Comments Off on Can Robots Run On (NH2)2CO?

Scientists have discovered a way to power future robots using an unusual source — urine.

Researchers at the University of the West of England, Bristol and the University of Bristol collaborated to build a system that will enable robots to function without batteries or being plugged into an electrical outlet.

Based on the functioning of the human heart, the system is designed to pump urine into the robot’s “engine room,” converting the waste into electricity and enabling the robot to function completely on its own.

Scientists are hoping the system, which can hold 24.5 ml of urine, could be used to power future generations of robots, or what they’re calling EcoBots.

“In the city environment, they could re-charge using urine from urinals in public lavatories,” said Peter Walters, a researcher with the University of the West of England. “In rural environments, liquid waste effluent could be collected from farms.”

In the past 10 years, researchers have built four generations of EcoBots, each able to use microorganisms to digest the waste material and generate electricity from it, the university said.

Along with using human and animal urine, the robotic system also can create power by using rotten fruit and vegetables, dead flies, waste water and sludge.

Ioannis Ieropoulos, a scientist with the Bristol Robotics Laboratory, explained that the microorganisms work inside microbial fuel cells where they metabolize the organics, converting them into carbon dioxide and electricity.

Like the human heart, the robotic system works by using artificial muscles that compress a soft area in the center of the device, forcing fluid to be expelled through an outlet and delivered to the fuel cells. The artificial muscles then relax and go through the process again for the next cycle.

“The artificial heartbeat is mechanically simpler than a conventional electric motor-driven pump by virtue of the fact that it employs artificial muscle fibers to create the pumping action, rather than an electric motor, which is by comparison a more complex mechanical assembly,” Walter said.

Source

Adobe Data Found Online

November 18, 2013 by  
Filed under Around The Net

Comments Off on Adobe Data Found Online

A computer security firm has discovered data it says belongs to some 152 million Adobe Systems Inc user accounts, suggesting that a breach reported a month ago is much larger than Adobe has so far disclosed and is one of the largest on record.

LastPass, a password security firm, said that it has found email addresses, encrypted passwords and password hints stored in clear text from Adobe user accounts on an underground website frequented by cyber criminals.

Adobe said last week that attackers had stolen data on more than 38 million customer accounts, on top of the theft of information on nearly 3 million accounts that it disclosed nearly a month earlier.

The maker of Photoshop and Acrobat software confirmed that LastPass had found records stolen from its data center, but downplayed the significance of the security firm’s findings.

While the new findings from LastPass indicate that the Adobe breach is far bigger than previously known, company spokeswoman Heather Edell said it was not accurate to say 152 million customer accounts had been compromised because the database attacked was a backup system about to be decommissioned.

She said the records include some 25 million records containing invalid email addresses, 18 million with invalid passwords. She added that “a large percentage” of the accounts were fictitious, having been set up for one-time use so that their creators could get free software or other perks.

She also said that the company is continuing to work with law enforcement and outside investigators to determine the cost and scope of the breach, which resulted in the theft of customer data as well as source code to several software titles.

The company has notified some 38 million active Adobe ID users and is now contacting holders of inactive accounts, she said.

Paul Stephens, director of policy and advocacy for the non-profit Privacy Rights Clearinghouse, said information in an inactive database is often useful to criminals.

He said they might use it to engage in “phishing” scams or attempt to figure out passwords using the hints provided for some of the accounts in the database. In some cases, people whose data was exposed might not be aware of it because they have not accessed the out-of-date accounts, he said.

“Potentially it’s the website you’ve forgotten about that poses the greater risk,” he said. “What if somebody set up an account with Adobe ten years ago and forgot about it and they use the same password there that they use on other sites?”

Source

Google Expands Malware Blocker

November 15, 2013 by  
Filed under Computing

Comments Off on Google Expands Malware Blocker

Google has expanded malware blocking in an early development build of Chrome to sniff out a wider range of threats than the browser already recognizes.

Chrome’s current “Canary” build — the label for very-early versions of the browser, earlier than even Chrome’s Dev channel — will post a warning at the bottom of the window when it detects an attempted download of malicious code.

Features added to the Canary build usually, although not always, eventually make it into the Dev channel — the roughest-edged of the three distributed to users — and from there into the Beta and Stable channels. Google did not spell out a timetable for the expanded malware blocking.

Chrome has included malware blocking for more than two years, since version 12 launched in June 2011, and the functionality was extended in February 2012with Chrome 17.

Chrome is now at version 30.

Canary’s blocking, however, is more aggressive on two fronts: It is more assertive in its alerts and detects more malware forms, including threats that pose as legitimate software and monkey with the browser’s settings.

“Content.exe is malicious, and Chrome has blocked it,” the message in Canary reads. The sole visible option is to click the “Dismiss” button, which makes the warning vanish. The only additional option, and that only after another click, is to “Learn more,” which leads to yet another warning.

In Canary, there is no way for the user to contradict the malware blocking.

That’s different than in the current Stable build of Chrome, which relies on a message that says, “This file is malicious. Are you sure you want to continue?” and gives the user a choice between tossing the downloaded file or saving it anyway.

As it has for some time, Chrome will show such warnings on select file extensions, primarily “.exe,” which in Windows denotes an executable file, and “.msi,” an installation package for Windows applications. Canary’s expansion, said Google, also warns when the user tries to download some less obvious threats, including payloads masquerading as legitimate software — it cited screen savers and video plug-ins in a  blog posting — that hijack browser settings to silently change the home page or insert ads into websites to monetize the malware.

Google’s malware blocking is part of its Safe Browsing API (application programming interface) and service, which Chrome, Apple’s Safari and Mozilla’s Firefox all access to warn customers of potentially dangerous websites before they reach them.

In Chrome’s case, the malware warning stems not only from the Safe Browsing “blacklist” of dodgy websites, but according to NSS Labs, a security software testing company, also from the Content Agnostic Malware Protection (CAMP) technology that Google has baked into its implementation of Safe Browsing.

Source

« Previous PageNext Page »