Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Ericsson Acquires Fabrix Systems

September 25, 2014 by  
Filed under Around The Net

Comments Off on Ericsson Acquires Fabrix Systems

The distinctions between TV and mobile services continues to merge and in many cases that occurs in the cloud.

That’s the logic behind Ericsson’s planned $95 million acquisition of Fabrix Systems, which sells a cloud-based platform for delivering DVR (digital video recorder), video on demand and other services.

The acquisition is intended to help service providers deliver what Ericsson calls TV Anywhere, for viewing on multiple devices with high-quality and relevant content for each user. Cable operators, telecommunications carriers and other service providers are seeing rapid growth in video streaming and want to reach consumers on multiple screens. That content increasingly is hosted in cloud data centers and delivered via Internet Protocol networks.

Fabrix, which has 103 employees in the U.S. and Israel, sells an integrated platform for media storage, processing and delivery. Ericsson said the acquisition will make new services possible on Ericsson MediaFirst and Mediaroom as well as other TV platforms.

Stockholm-based Ericsson expects the deal to close in the fourth quarter. Fabrix Systems will become part of Ericsson’s Business Unit Support Solutions.

Other players usually associated with data networks are also moving into the once-specialized realm of TV. At last year’s CES, Cisco Systems introduced Videoscape Unity, a system for providing unified video services across multiple screens, and at this year’s show it unveiled Videoscape Cloud, an OpenStack-based video delivery platform that can be run on service providers’ cloud infrastructure instead of on specialized hardware.

Source

Intel Shows Wireless

September 22, 2014 by  
Filed under Computing

Comments Off on Intel Shows Wireless

Intel demoed its “no wires future” of wireless gigabit docking at its Intel Developer Forum (IDF) in California.

Intel wireless gigabit docking is a fully cable-free experience that includes wireless docking, wireless display and wireless charging. Intel demonstrated a reference design based on a next generation 14nm Intel processor on stage during its opening keynote on Tuesday.

Intel hopes to implement this technology by the end of 2015.

“Not only your wireless display, but storage, keyboard and mouse – all the other peripherals you have that have been weighing down our backpacks or strewn across our desk, we’re eliminating with one technology, and that’s wireless gigabit,” said an Intel expert on stage.

“It’s not only a secure and also localised connection – so you can use it in high dense areas such as in an office – but also extremely fast performing at over three times the performance of today’s WiFi.

“But while that’s cool we still have one more cord in our bag and let’s get rid of it: ditch that brick. That last thing that’s weighing us down is [resolved by] wireless power; the ease of use and installation it has is really going to be an advantage using the wireless resonance technology.”

The technology works over a simple receiver that goes into client devices, along with a resonance board that acts as a dock, which creates its own wireless hotspot.

Intel demonstrated how the standard will work using a laptop that automatically powered up and charged as soon as it reached the surface of the table due to the magnetic charging field built into the desk surface.

Intel said that this technology could also charge wireless Bluetooth earpieces, wearable devices, tablets and notebooks. However, it doesn’t have to be built into devices to work, as Intel said it can also be retrofitted into the cases of the devices we are carrying around.

Intel’s wireless gigabit technology is another push towards the firm’s vision of a cable-free future, meaning there’ll be no annoying wires or leads connecting computers to monitors, laptops to plug sockets or tablets to projectors.

The semiconductor giant first announced this view in August, saying that it’s looking to change the enterprise IT market with a strategy that will offer “three major experiences” in the office, that is, wireless display connectivity, wireless docking and wireless charging.

Source

WD’s My Passport Goes Wireless

September 19, 2014 by  
Filed under Consumer Electronics

Comments Off on WD’s My Passport Goes Wireless

Western Digital has announced the latest addition to its My Passport series of portable external hard drives.

The My Passport Wireless, as the name suggests, is WD’s entry in the current crop of WiFi Direct attached storage devices.

Available in capacities of 500GB, 1TB and 2TB, the My Passport Wireless drive can sit directly on a WiFi network or act as a pass-through device, linking up to eight devices regardless of type and operating system.

One touch syncing with Dropbox, Onedrive and Google Drive allows users to keep local copies of files without clogging up their computer hard drives.

With an optimal battery life of eight hours and standby life of 20 hours on a single charge, My Passport Wireless is capable of streaming HD video to multiple screens, and connects with wireless cameras via FTP for simultaneous backup during photo sessions.

An external SD card slot is also included for devices that do not have a direct connection, or if you need a little extra boost in storage space.

WD’s My Cloud app, which also powers its My Cloud range of NAS devices, has been given a facelift to include access to the My Passport wireless. New features include an embedded music and video player, and remote configuration of drive settings.

The 500GB model will retail at $150.00, with the 1TB and 2TB editions priced at $200.00 and $250.00, respectively.

As part of the launch of the My Passport Wireless, WD also introduced two new limited edition wired My Passport devices to commemorate ten years of the range. The My Passport Ultra Metal Edition and My Passport Ultra Anniversary Editions were described by Scott Vouri, WD VP of Consumer Marketing as “a souvenir of ten years of a classic device”.

Source

Intel Debuts A Slew Of Core M Chips

September 18, 2014 by  
Filed under Computing

Comments Off on Intel Debuts A Slew Of Core M Chips

Intel’s new Core M chips — which bring PC-like performance to slim design tablets — will initially be in many Windows 8.1 tablets, but no Android devices are yet on the radar.

The chips will be in five to seven detachable tablets and hybrids by year end, and the number of devices could balloon to 20 next year, said Andy Cummins, mobile platform marketing manager at Intel.

Core M chips, announced at the IFA trade show in Berlin on Friday, are the first based on the new Broadwell architecture. The processors will pave the way for a new class of thin, large-screen tablets with long battery life, and also crank up performance to run full PC applications, Intel executives said in interviews.

“It’s about getting PC-type performance in this small design,” Cummins said. “[Core M] is much more optimized for thin, fanless systems.”

Tablets with Core M could be priced as low as US$699, but the initial batch of detachable tablets introduced at IFA are priced much higher. Lenovo’s 11.6-inch ThinkPad Helix 2 starts at $999, Dell’s 13.3-inch Latitude 13 7000 starts at $1,199, and Hewlett-Packard’s 13.3-inch Envy X2 starts at $1,049.99. The products are expected to ship in September or October.

Core M was also shown in paper-thin prototype tablets running Windows and Android at the Computex trade show in June. PC makers have not expressed interest in building Android tablets with Core M, but the OS can be adapted for the chips, Cummins said.

The dual-core chips draw as little as 4.5 watts, making it the lowest-power Core processor ever made by Intel. The clock speeds start at 800MHz when running in tablet mode, and scales up to 2.6GHz when running PC applications.

The power and performance characteristics make Core M relevant primarily for tablets. The chips are not designed for use in full-fledged PCs, Cummins said.

“If you are interested in the highest-performing parts, Core M probably isn’t the exact right choice. But if you are interested in that mix of tablet form factor, detachable/superthin form factor, this is where the Core M comes into play,” Cummins said.

For full-fledged laptops, users could opt for the upcoming fifth-generation Core processor, also based on Broadwell, Cummins said. Those chips are faster and will draw 15 watts of power or more, and be in laptops and desktops early next year.

New features in Core M curbed power consumption, and Intel is claiming performance gains compared to chips based on the older Haswell architecture. Tablets could offer around two more hours of battery life with Core M.

Source

Acers To Launh Cheap Tablets

September 17, 2014 by  
Filed under Consumer Electronics

Comments Off on Acers To Launh Cheap Tablets

Acer’s latest low-cost 8-inch tablets will come to market in both Android and Windows flavors.

The Iconia Tab 8 W runs Windows on an Intel Atom Z3735G quad-core processor. It offers 8 hours of battery life, weighs 370 grams and is 9.75 millimeters thick. The 8-inch screen has a resolution of 1280 by 800 pixels.

For the $149 price tag, Acer includes a one-year subscription to the Personal version of Office 365, which includes access to Word, Excel, PowerPoint, OneNote and Outlook.

Android fans will prefer the Iconia One 8, running Android 4.4. It has the same Intel processor and screen dimensions as its Windows cousin, but is slightly lighter at 340 grams and only 8.5 millimeters thick.

Buyers can choose between 10 colors, including red, green, blue, purple and pink.

Acer also took the covers off the Iconia 10, an Android-based 10-inch tablet. The device has a quad-core processor from MediaTek. The screen is protected using Gorilla glass and has Full HD resolution. Using Dolby Digital Plus, surround sound is simulated from two-channel stereo audio headphones.

Available in black or white and with a price of $199, the Iconia Tab 10 includes a micro HDMI port and Wireless Display support for showing photos and videos on a bigger TV.

The first of the new tablets to start shipping will be the Iconia 10, available this month in the Americas and Europe, Middle East and Africa (EMEA).

The Iconia Tab 8 W will go on sale in October in EMEA and in November in the Americas.

Source

UPS Breached

September 3, 2014 by  
Filed under Security

Comments Off on UPS Breached

Credit and debit card information belonging to customers made purchases at 51 UPS Store Inc. locations in 24 states this year may have been illegally accessed as the result of an intrusion into the company’s networks.

In a statement on Wednesday, UPS said it was recently notified by law enforcement officials about a “broad-based malware intrusion” of its systems.

A subsequent investigation by an IT security firm showed that attackers had installed previously unknown malware on systems in more than four-dozen stores to gain access to cardholder data. The affected stores represent about 1% of the 4,470 UPS Store locations around the country.

The intrusion may have exposed data on transactions conducted at the stores between Jan. 20 and Aug. 11, 2014. “For most locations, the period of exposure to this malware began after March 26, 2014,” UPS said in a statement.

In addition to payment card information, the hackers also appear to have gained access to customer names, as well as postal and email addresses.

Each of the affected locations is individually owned and runs private networks that are not connected to other stores, UPS added. The company provided alist of affected locations.

The breach is the third significant one to be disclosed in the past week. Last Thursday, grocery store chain Supervalu announced it had suffered a malicious intrusion that exposed account data belonging to customers who had shopped at about 180 of the company’s stores in about a dozen states. The breach also affected customers from several other major grocery store chains for which Supervalu provides IT services.

Source

Is Windows ‘Threshold’ Enroute?

August 29, 2014 by  
Filed under Computing

Comments Off on Is Windows ‘Threshold’ Enroute?

Microsoft will unveil a preview of “Threshold,” the current code name for Windows 8′s successor, as soon as next month, according to an online report on Monday.

ZDNet’s Mary Jo Foley, citing unnamed sources, said that Microsoft will deliver a “technical preview” of Threshold late in September or early in October. Previously, Foley had reported that Microsoft would offer a preview of some kind this fall.

Threshold may be officially named “Windows 9″ by Microsoft — the company has said nothing about either the code name or labeled the next iteration of its desktop and tablet OS — although there are arguments for dumping a numerical title because of the possible association with Windows 8, which has widely been pegged as a failure.

“Technical Preview” is a moniker that Microsoft has used in the past for its Office suite. For both Office 2013 and Office 2010, Microsoft used the term to describe an invitation-only sneak peek. Both application suites were later released as public betas prior to their official launch.

Windows, however, has used a different nomenclature. For 2012′s Windows 8, Microsoft called the early looks ”Developer Preview,””Consumer Preview” and “Release Preview,” all open to everyone. The first was analogous to an alpha, the second to a beta, and the third to a done-but-not-approved release candidate.

Windows 7, however, had used the more traditional “Beta” to describe the first public preview in early 2009. The previous fall, when Microsoft unveiled Windows 7, the firm had seeded an invite-only “pre-alpha” version, also dubbed a Developer Preview, of the OS to programmers and some influential bloggers.

Within hours, the Windows 7 Developer Preview leaked to file-sharing websites. Microsoft may have changed its practices for Windows 8, letting anyone download the first preview, because of the inevitably of leaks.

In an update to her blog of earlier today, Foley added that the “Technical Preview” nameplate notwithstanding, Microsoft would allow anyone to download Threshold/Windows 9 when it becomes available in the next few weeks.

If Microsoft does ship a preview soon and sets its sights on a second-quarter 2015 final release, it will have significantly accelerated the tempo from past practice. With Windows 7 and Windows 8, Microsoft offered its first previews 12 and 13 months, respectively, and the public beta 8 or 9 months, before launching the operating system.

Eight or nine months from September would be May or June 2015; that, however, assumes that the Technical Preview is of beta quality. The name itself hints at something less.

Microsoft appears eager to put Windows 8 behind it. It has stopped beating the drum about the OS and recently announced that it would not issue any additional major updates. Instead, the firm said last week, it will include improvements or new features in small packets using the same Windows Update mechanism that regularly serves security patches.

Source

Apple Changes Policy In China

August 28, 2014 by  
Filed under Consumer Electronics

Comments Off on Apple Changes Policy In China

Apple Inc has started the processing of keeping the personal data of some Chinese users on servers in mainland China, marking the first time the tech giant is storing user data on Chinese soil.

The storage of user data in China represents a departure from the policies of some technology companies, notably Google Inc, which has long refused to build data centers in China due to censorship and privacy concerns.

Apple said the move was part of an effort to improve the speed and reliability of its iCloud service, which lets users store pictures, e-mail and other data. Positioning data centers as close to customers as possible means faster service.

The data will be kept on servers provided by China Telecom Corp Ltd, the country’s third-largest wireless carrier, Apple said in a statement.

“Apple takes user security and privacy very seriously,” it said. “We have added China Telecom to our list of data center providers to increase bandwidth and improve performance for our customers in mainland china. All data stored with our providers is encrypted. China Telecom does not have access to the content.”

A source with knowledge of the situation said the encryption keys for Apple’s data on China Telecom servers would be stored offshore and not made available to China Telecom.

Apple has said it has devised encryption systems for services such as iMessage that even Apple itself cannot unlock. But some experts expressed scepticism that Apple would be able to withhold user data in the event of a government request.

“If they’re making out that the data is protected and secure that’s a little disingenuous because if they want to operate a business here, that’d have to comply with demands from the authorities,” said Jeremy Goldkorn, director of Danwei.com, a research firm focused on Chinese media, internet and consumers.

“On the other hand if they don’t store Chinese user data on a Chinese server they’re basically risking a crackdown from the authorities.”

Goldkorn added that data stored in the United States is subject to similar U.S. regulations where the government can use court orders to demand private data.

A spokesman for China Telecom declined to comment.

Source

The FCC Extends Deadline

August 25, 2014 by  
Filed under Around The Net

Comments Off on The FCC Extends Deadline

U.S. Federal Communications Commission has said it would accept public comments on its proposed new “net neutrality” rules through Sept. 15, giving the American public extra time to voice their opinions and concerns on how they think Internet traffic should be regulated.

The FCC has received more than 1 million comments already on new rules for how Internet services providers should be allowed to manage web traffic on their networks.

The FCC had set a deadline of July 15 for the initial comments and then September 10 for replies to those initial comments. However, the surge in submissions overwhelmed the FCC’s website and the agency had delayed the first deadline by three business days.

“To ensure that members of the public have as much time as was initially anticipated to reply to initial comments in these proceedings, the Bureau today is extending the reply comment deadline by three business days,” the FCC said on Friday, delaying the final deadline for comments to September 15.

Source

Is Epic Turla Exploiting Windows XP?

August 22, 2014 by  
Filed under Security

Comments Off on Is Epic Turla Exploiting Windows XP?

Kaspersky Lab has discovered an espionage network that successfully attacked government institutions, intelligence agencies and European companies.

The firm has dubbed the spy operation Epic Turla, and said that it is in no doubt about its capabilities.

“Over the last 10 months, Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call ‘Epic Turla’,” it said.

“The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including government institutions, embassies, military, education, research and pharmaceutical companies.”

Kaspersky said that Epic Turla used two zero-day exploits that affected Adobe and Microsoft software, along with some backdoor and social engineering tricks.

In particular, Kaspersky said a vulnerability in Windows XP and Windows 2003 – CVE-2013-5065 – termed a “privilege escalation vulnerability” is being used. “The CVE-2013-5065 exploit allows the backdoor to achieve administrator privileges on the system and run unrestricted. This exploit only works on unpatched Microsoft Windows XP systems.”

The use of this Windows XP flaw underlines the risk that the unsupported Windows XP OS poses. Kaspersky went on to explain that, once inside, attackers install their own rootkits and other malware tools and begin their surveillance.

“Once the attackers obtain the necessary credentials without the victim noticing, they deploy the rootkit and other extreme persistence mechanisms,” it said. “The attacks are still ongoing as of July 2014, actively targeting users in Europe and the Middle East.”

The attacks are just the latest in a long line of incidents that businesses need to be aware of as cyber attacks continue at an alarming rate.

In June the security firm Crowdstrike alerted the industry to Putter Panda, a cute-sounding but nasty piece of malware. That firm pointed an accusatory finger at China and charged it with espionage on the US and Europe.

Crowdstrike CEO George Kurtz said at the time, “China’s decade-long economic espionage campaign is massive and unrelenting. Through widespread espionage campaigns, Chinese threat actors are targeting companies and governments in every part of the globe.” Chinese authorities disputed this.

The report comes in the same week Hold Security reported uncovering a huge trove of 1.2 billion web passwords and login details that have been gathered by Russian cyber criminals.

Source

« Previous PageNext Page »