Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

IBM Acquires EZSource

June 14, 2016 by  
Filed under Computing

Comments Off on IBM Acquires EZSource

The digital transformation revolution is already in full swing, but for companies with legacy mainframe applications, it’s not always clear how to get in the game. IBM announced an acquisition that could help.

The company will acquire Israel-based EZSource, it said, in the hopes of helping developers “quickly and easily understand and change mainframe code.”

EZSource offers a visual dashboard that’s designed to ease the process of modernizing applications. Essentially, it exposes application programming interfaces (APIs) so that developers can focus their efforts accordingly.

Developers must often manually check thousands or millions of lines of code, but EZSource’s software instead alerts them to the number of sections of code that access a particular entity, such as a database table, so they can check them to see if updates are needed.

IBM’s purchase is expected to close in the second quarter of 2016. Terms of the deal were not disclosed.

Sixty-eight percent of the world’s production IT workloads run on mainframes, IBM said, amounting to roughly 30 billion business transactions processed each day.

“The mainframe is the backbone of today’s businesses,” said Ross Mauri, general manager for IBM z Systems. “As clients drive their digital transformation, they are seeking the innovation and business value from new applications while leveraging their existing assets and processes.”

EZSource will bring an important capability to the IBM ecosystem, said Patrick Moorhead, president and principal analyst with Moor Insights & Strategy.

“While IBM takes advantage of a legacy architecture with z Systems, it’s important that the software modernizes, and that’s exactly what EZSource does,” Moorhead said.

Large organizations still run a lot of mainframe systems, particularly within the financial-services sector, noted analyst Frank Scavo, president of Computer Economics.

“As these organizations roll out new mobile, social and other digital business experiences, they have no choice but to expose these mainframe systems via APIs,” Scavo said.

But in many large organizations, skilled mainframe developers are in short supply — especially those who really understand these legacy systems, he added.

“Anything to increase the productivity of these developers will go a long way to ensuring the success of their digital business initiatives,” Scavo said. “Automation tools to discover, expose and analyze the inner workings of these legacy apps are really needed.”

It’s a smart move for IBM, he added.

Source- http://www.thegurureview.net/computing-category/looking-to-transform-mainframe-business-ibm-acquires-ezsource.html

Malware Turns Computers Into Cellular Antenna

August 19, 2015 by  
Filed under Security

Comments Off on Malware Turns Computers Into Cellular Antenna

A team of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.

They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.

While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.

Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.

“If somebody wanted to get access to somebody’s computer at home — let’s say the computer at home wasn’t per se connected to the Internet — you could possibly receive the signal from outside the person’s house,” said Yisroel Mirsky, a doctoral student at Ben-Gurion University and study co-author.

The air-gapped computer that is targeted does need to have a malware program developed by the researchers installed. That could be accomplished by creating a type of worm that infects a machine when a removable drive is connected. It’s believed this method was used to deliver Stuxnet, the malware that sabotaged Iran’s uranium centrifuges.

The malware, called GSMem, acts as a transmitter on an infected computer. It creates specific, memory-related instructions that are transmitted between a computer’s CPU and memory, generating radio waves at GSM, UMTS and LTE frequencies that can be picked up by a nearby mobile device.

The GSMem component that runs on a computer is tiny. “Because our malware has such a small footprint in the memory, it would be very difficult and can easily evade detection,” said Mordechai Guri, also a doctoral student at Ben-Gurion.

Source

Microsoft To Open Source Radio Code

August 3, 2015 by  
Filed under Computing

Comments Off on Microsoft To Open Source Radio Code

Microsoft has begun to open source some more of its code, this time for the Microsoft Research Software Radio (Sora).

“We believe that a fully open source Sora will better support the research community for more scientific innovation,” said Kun Tan, a senior researcher on the Sora project team.

Sora was created to combat the problem of creating software radio that could keep up with the hardware developments going on around it.

The idea behind it is to run the radio off software on a multi-core PC running a basic operating system. In the example, it uses Windows. But then it would.

A PCIe radio control board is added to the machine with signals processed by the software for transmission and reception, while the RF front-end, with its own memory, interfaces with other devices.

The architecture also supports parallel processing by distributing processing pipelines to multiple cores exclusively for real-time SDR tasks.

Sora has already won a number of awards, and the Sora SDK and API were released in 2011 for academic users. More than 50 institutions now use it for research or courses.

As such, and in line with the groovy open Microsoft ethos, the software has now been completely open sourced, with customizable RF front-ends, customizable RCB with timing control and synchronization, processing accelerators and support for new communication models such as duplex radios.

The Sora source code is now up on GitHub. Use cases already in place include TV whitespace, large scale MIMO and distributed MIMO systems.

Microsoft has made a number of moves towards open sourcing itself over the past year. Most notably, The .NET Framework at the heart of most Windows programs was offered up to the newly created .NET Foundation.

It was announced yesterday that Google is releasing its Kubernetes code to the Linux Foundation to set up a standardized format for containerization.

Source

Oculus Buys Pepple

July 27, 2015 by  
Filed under Around The Net

Comments Off on Oculus Buys Pepple

Facebook’s Oculus unit announcd that it has agreed to acquire Israeli gesture recognition technology developer Pebbles Interfaces for an undisclosed amount.

The announcement was made in a blog posted by Oculus.

Israel’s Calcalist financial news website said the deal was worth tens of millions of dollars.

While other companies pioneering the virtual reality field focus on full-body movement, Pebbles’ technology detects and tracks hand movement. It is aimed primarily at gamers but also has applications for TV, computers, or smartphone operation while driving.

Recently Pebbles integrated its technology with Oculus glasses, which translate finger gestures into virtual movement through a camera mounted on the glass frame, Calcalist said.

Investors in Pebbles include Chinese mobile phone maker Xiaomi, Israeli venture capital fund Giza and U.S. storage firm SanDisk, Calcalist said.

Source

Ericsson Acquires Fabrix Systems

September 25, 2014 by  
Filed under Around The Net

Comments Off on Ericsson Acquires Fabrix Systems

The distinctions between TV and mobile services continues to merge and in many cases that occurs in the cloud.

That’s the logic behind Ericsson’s planned $95 million acquisition of Fabrix Systems, which sells a cloud-based platform for delivering DVR (digital video recorder), video on demand and other services.

The acquisition is intended to help service providers deliver what Ericsson calls TV Anywhere, for viewing on multiple devices with high-quality and relevant content for each user. Cable operators, telecommunications carriers and other service providers are seeing rapid growth in video streaming and want to reach consumers on multiple screens. That content increasingly is hosted in cloud data centers and delivered via Internet Protocol networks.

Fabrix, which has 103 employees in the U.S. and Israel, sells an integrated platform for media storage, processing and delivery. Ericsson said the acquisition will make new services possible on Ericsson MediaFirst and Mediaroom as well as other TV platforms.

Stockholm-based Ericsson expects the deal to close in the fourth quarter. Fabrix Systems will become part of Ericsson’s Business Unit Support Solutions.

Other players usually associated with data networks are also moving into the once-specialized realm of TV. At last year’s CES, Cisco Systems introduced Videoscape Unity, a system for providing unified video services across multiple screens, and at this year’s show it unveiled Videoscape Cloud, an OpenStack-based video delivery platform that can be run on service providers’ cloud infrastructure instead of on specialized hardware.

Source

Powerful “Flame” Virus Found In Iran

June 4, 2012 by  
Filed under Computing

Comments Off on Powerful “Flame” Virus Found In Iran

Security experts have uncovered a highly sophisticated computer virus in Iran and other Middle Eastern states that they believe was deployed at least five years ago to engage in state-sponsored cyber espionage.

Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that claimed responsibility for discovering the virus.

Kaspersky researchers said on Monday they have yet to determine whether Flame had a specific mission like Stuxnet, and declined to say who they think built it.

Iran has accused the United States and Israel of deploying Stuxnet.

Cyber security experts said the discovery publicly demonstrates what experts privy to classified information have long known: that nations have been using pieces of malicious computer code as weapons to promote their security interests for several years.

A cyber security agency in Iran said on its English website that Flame bore a “close relation” to Stuxnet, the notorious computer worm that attacked that country’s nuclear program in 2010 and is the first publicly known example of a cyber weapon.

Iran’s National Computer Emergency Response Team also said Flame might be linked to recent cyber attacks that officials in Tehran have said were responsible for massive data losses on some Iranian computer systems.

Source…