Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Kodak Enters The Smartphone Space

January 12, 2015 by  
Filed under Smartphones

Comments Off on Kodak Enters The Smartphone Space

Many people use their smartphone as their primary camera because it is always with them and sharing those photos is easy from your phone. Kodak announced they will be offering an Android-powered smartphone at CES in a couple weeks with a tablet and connected camera coming later in 2015.

The Kodak brand has been synonymous with cameras so it is encouraging to see them placing their brand on a new smartphone.

Apple’s iPhone is one of the most popular camera phones, primarily due to its simplicity and solid quality. The press release states that Kodak will not compromise on design and user experience while improving the printing and sharing experience.

The release also states that Kodak will include advanced remote management software to allow family members and friends to provide help and support. This sounds like Amazon’s Mayday service for the Fire Phone. With statements like this, it sounds like the new Kodak Android smartphone will be targeted to the masses and not the smartphone enthusiast.

Source

Can The USPS Win At E-commerce?

January 8, 2015 by  
Filed under Around The Net

Comments Off on Can The USPS Win At E-commerce?

Dealing with a decline in the mail it has been delivering since the days of America’s Revolutionary War, in 2012 the U.S. Postal Service began aggressively targeting e-commerce and lapsed customers as the way to salvage its slumping business.

“Really it started almost at the level of cold-calling, talking to people who really hadn’t spoken to us in a long time,” said Nagisa Manabe, who joined the USPS in May 2012 as chief marketing and sales officer from Coca-Cola Co after a career in the private sector. “And really trying to persuade them to consider us as a very viable alternative in the shipping market.”

With further drops in its traditional bread-and-butter products ahead, the USPS wants to capitalize on e-commerce, which consulting firm Detroit LLP has predicted should grow 14 percent this holiday season alone. But industry experts question whether the USPS has enough space in its delivery vans and whether its unionized work force can handle a greater proportion of the e-commerce market.

Over the past two years the USPS has rolled out real-time scanning for packages, a vital tool for online retailers and consumers alike to track their packages. It is also upgrading all of its delivery workers’ handheld scanners.

The rise of the Internet has taken a heavy toll on first-class mail, the USPS’s most profitable product. That falling business played a significant role in the USPS’s fiscal 2014 loss of $5.5 billion, its eighth consecutive year in the red.

From 2009 to 2013, the volume of first-class mail deliveries dropped more than 20 percent. In the fiscal year ending Sept. 30, USPS deliveries declined to 155.4 billion pieces from 158.2 billion. First-class deliveries accounted for 2.2 billion pieces of that decline.

But package deliveries rose to more than 4 billion pieces from 3.7 billion, accounting for $1.1 billion of the USPS’s revenue growth of $1.9 billion. In the run-up to Christmas, the USPS has been doing Sunday deliveries for Amazon.com Inc in a number of cities. Manabe adds that the agency will handle the online retailer’s push into same-day and next-day deliveries “in many markets.”

EBay Inc is another major customer and Manabe says “pretty much anyone who’s in the e-commerce space at least does some volume with us.”

Source

Oracle Acquires Datalogix

January 6, 2015 by  
Filed under Computing

Comments Off on Oracle Acquires Datalogix

On Monday, Oracle agreed to purchase Datalogix for an undisclosed sum, saying that together the companies will provide marketers with a richer understanding of what consumers do, say and buy, allowing them to measure the effectiveness of their different campaigns and advertising channels.

Oracle plans to link the Datalogix service, which provides the spending data to customers through a cloud-based tool, to its other cloud-based services via Oracle Identity Graph. This, it said, will allow it to connect consumer identities to build better profiles that can be used to personalize online and mobile services — and even to target them offline and via the TV.

It made no commitment to maintain the existing Datalogix product roadmap, saying that it was still reviewing its plans. The companies set no timeline for completing the deal, which they said must meet customary closing conditions including obtaining regulatory approval.

Source

Will Marriott Block Wi-Fi

January 5, 2015 by  
Filed under Around The Net

Comments Off on Will Marriott Block Wi-Fi

The U.S. Federal Communications Commission will render a decision on whether to establish rules regarding hotels’ ability to block personal Wi-Fi hotspots inside their buildings, a practice that recently earned Marriott International a $600,000 fine.

In August, Marriott, business partner Ryman Hospitality Properties and trade group the American Hotel and Lodging Association asked the FCC to clarify when hotels can block outside Wi-Fi hotspots in order to protect their internal Wi-Fi services.

In that petition, the hotel group asked the agency to “declare that the operator of a Wi-Fi network does not violate [U.S. law] by using FCC-authorized equipment to monitor and mitigate threats to the security and reliability of its network,” even when taking action causes interference to mobile devices.

The comment period for the petition ended Friday, so now it’s up to the FCC to either agree to Marriott’s petition or disregard it.

However, the FCC did act in October, slapping Marriott with the fine after customers complained about the practice. In their complaint, customers alleged that employees of Marriott’s Gaylord Opryland Hotel and Convention Center in Nashville used signal-blocking features of a Wi-Fi monitoring system to prevent customers from connecting to the Internet through their personal Wi-Fi hotspots. The hotel charged customers and exhibitors $250 to $1,000 per device to access Marriott’s Wi-Fi network.

During the comment period, several groups called for the agency to deny the hotel group’s petition.

The FCC made clear in October that blocking outside Wi-Fi hotspots is illegal, Google’s lawyers wrote in a comment. “While Google recognizes the importance of leaving operators flexibility to manage their own networks, this does not include intentionally blocking access to other commission-authorized networks, particularly where the purpose or effect of that interference is to drive traffic to the interfering operator’s own network,” they wrote.

Source

Ericsson Goes After Xiaomi

December 22, 2014 by  
Filed under Smartphones

Comments Off on Ericsson Goes After Xiaomi

Ericsson has thrown a spanner into Chinese firm Xiaomi’s expansion plans, and has reportedly stopped it from selling handsets in India.

According to reports, this is already happening. We have asked Ericsson to confirm its role and what it wants to say about it. It told us that the reports are true and that it is ready to defend itself.

“It is unfair for Xiaomi to benefit from our substantial R&D investment without paying a reasonable licensee fee for our technology. After more than 3 years of attempts to engage in a licensing conversation in good faith for products compliant with the GSM, EDGE, and UMTS/WCDMA standards, Xiaomi continues to refuse to respond in any way regarding a fair license to Ericsson’s intellectual property on fair, reasonable and non-discriminatory (FRAND) terms,” it said in a statement.

“Ericsson, as a last resort, had to take legal action. To continue investing in research and enabling the development of new ideas, new standards and new platforms to the industry, we must obtain a fair return on our R&D investments. We look forward to working with Xiaomi to reach a mutually fair and reasonable conclusion, just as we do with all of our licensees.”

Xiaomi has responded to Bloomberg but it declined to say too much until it has access too all of the information.

“Our legal team is currently evaluating the situation based on the information we have,” said the spokesperson. “India is a very important market for Xiaomi and we will respond promptly as needed and in full compliance with India laws.”

The banning on the sale of devices was approved by a court in Delhi India, according to reports, and is based on an Ericsson claim on eight patents that it owns.

Xiaomi has bold plans for its own future and sees itself competing against rivals like Samsung and Apple. It has given itself between five and 10 years to do this, and will presumably want to include the Indian market in those plans.

Source

McAfee’s Biometric Software Coming Soon

December 9, 2014 by  
Filed under Computing

Comments Off on McAfee’s Biometric Software Coming Soon

A McAfee security product that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week.

“Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again,” Skaugen said.

Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.

An average user has about 18 passwords and biometric authentication will make PCs easier to use, Skaugen said.

Biometric authentication isn’t new. It’s being used in Apple Pay, where fingerprint authentication helps authorize credit card payments through the iPhone or iPad. Intel has been working on multiple forms of biometric authentication through fingerprint, gesture, face and voice recognition.

McAfee is owned by Intel, and the chip maker is building smartphone, tablet and PC technology that takes advantage of the security software. Intel has also worked on biometric technology for wearable devices like SMS Audio’s BioSport In-Ear Headphones, which can measure a person’s heart rate.

Intel also wants to make PCs and tablets easier to use through wireless charging, display, docking and data transfers. Such capabilities would eliminate the need to carry power brick and cables for displays and data transfers. Such capabilities will start appearing in laptops next year with sixth-generation Core chips code-named Skylake, which will be released in the second half.

Source

Symantec Uncovers Advanced Spying Malware

December 5, 2014 by  
Filed under Computing

Comments Off on Symantec Uncovers Advanced Spying Malware

An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.

The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.

Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.

The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”

Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.

Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”

Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.

Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.

Source

Oracle And SAP Settle Piracy Dispute

November 24, 2014 by  
Filed under Computing

Comments Off on Oracle And SAP Settle Piracy Dispute

Oracle has won a limited victory in its long-running lawsuit with rival SAP.

The action was taken in reference to events dating back to 2007, which saw employees of SAP’s TomorrowNow unit accused of illegally downloading Oracle software.

German company TomorrowNow was bought by SAP as a means to undercut Oracle’s internal tech support rates, with the ambition of getting customers to migrate to SAP solutions, reports Reuters.

In 2006, TomorrowNow started the process of undermining its parent’s position, offering cut-price support to users of the Siebel database and CRM.

Oracle was originally awarded $1.3bn back in 2010, but this was adjusted downwards on multiple appeals.

SAP acknowledged that its employees had been in the wrong, but disputed the damages awarded. SAP offered a $306m payment in 2012, but did so more in hope than expectation given its admissions.

Earlier in the year, a federal judge gave Oracle the option to settle for $356.7m or force a retrial, and the company has now decided on the former with a further $2.5m in interest.

“We are thrilled about this landmark recovery and extremely gratified that our efforts to protect innovation and our shareholders’ interests are duly rewarded,” said Oracle’s general counsel Dorian Daley.

“This sends a strong message to those who would prefer to cheat than compete fairly and legally.”

SAP agreed: “We are also pleased that, overall, the courts hearing this case ultimately accepted SAP’s arguments to limit Oracle’s excessive damages claims and that Oracle has finally chosen to end this matter.”

SAP announced a partnership with IBM last month to bring its HANA service to enterprise cloud users.

Source

Silk Road 2.0 Shutdown

November 20, 2014 by  
Filed under Computing

Comments Off on Silk Road 2.0 Shutdown

U.S. governmnent authorities said they have shut down the successor website to Silk Road, an underground online drug marketplace, and charged its alleged operator with conspiracy to commit drug trafficking, computer hacking, money laundering and other crimes.

Blake Benthall, 26, was arrested last Wednesday in San Francisco and was expected to make an initial court appearance in federal court there later on Thursday.

The charges against Benthall carry a maximum sentence of life in prison.

A lawyer for Benthall could not immediately be identified.

Silk Road 2.0 was launched late last year, weeks after authorities had shuttered the original Silk Road website in October and arrested its alleged owner, Ross Ulbricht, who went by the online alias, Dread Pirate Roberts.

“Let’s be clear – this Silk Road, in whatever form, is the road to prison,” Manhattan U.S. Attorney Preet Bharara, whose office is prosecuting both cases, said in a statement.

Benthall, known as “Defcon” online, became the operator of Silk Road 2.0 in December, one month after an unnamed co-conspirator launched the site, according to prosecutors.

Silk Road 2.0 provided an online bazaar where users across the world could buy and sell drugs, computer hacking tools and other illicit items, using the digital currency Bitcoin as payment, authorities said.

As of September, the site was generating at least $8 million a month in sales, they said.

The government’s investigation included an undercover agent who was able to infiltrate the administrative staff of the website and interact directly with Benthall, prosecutors said.

Ulbricht, 30, has pleaded not guilty and is scheduled for trial in New York in January.

Source

New Malware Targeting Apple Devices

November 19, 2014 by  
Filed under Computing

Comments Off on New Malware Targeting Apple Devices

Palo Alto Networks Inc  has uncovered a new group of malware that can infect Apple Inc’s  desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.

The “WireLurker” malware can install third-party applications on regular, non-jailbroken iOS devices and hop from infected Macs onto iPhones through USB connector-cables, said Ryan Olson, intelligence director for the company’s Unit 42 division.

Palo Alto Networks said on Wednesday it had seen indications that the attackers were Chinese. The malware originated from a Chinese third-party apps store and appeared to have mostly affected users within the country.

The malware spread through infected apps uploaded to the apps store, that were in turn downloaded onto Mac computers. According to the company, more than 400 such infected apps had been downloaded over 350,000 times so far.

It’s unclear what the objective of the attacks was. There is no evidence that the attackers had made off with anything more sensitive than messaging IDs and contacts from users’ address books, Olson added.

But “they could just as easily take your Apple ID or do something else that’s bad news,” he said in an interview.

Apple, which Olson said was notified a couple weeks ago, did not respond to requests for comment.

Once WireLurker gets on an iPhone, it can go on to infect existing apps on the device, somewhat akin to how a traditional virus infects computer software programs. Olson said it was the first time he had seen it in action. “It’s the first time we’ve seen anyone doing it in the wild,” he added.

Source

« Previous PageNext Page »