Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

EPIC Wants Biometric Data From The FBI

April 19, 2013 by  
Filed under Around The Net

Comments Off on EPIC Wants Biometric Data From The FBI

The Electronic Privacy Information Center (EPIC) has pressed the US Federal Bureau of Investigation (FBI) for access to its database of US citizens’ biometric data.

EPIC already tried to get access twice last September, and now it is trying again. It said that it has sent repeated freedom of information act requests regarding the database, and that the FBI has failed to respond. Now it has filed a lawsuit for access (PDF).

It warned that the Next Generation Identification system (NGI) is a massive database that “when completed, [will] be the largest biometric database in the world”.

The NGI will use CCTV systems and facial recognition, and it includes DNA profiles, iris scans, palm prints, voice identification profiles, photographs, and other “identifying information”.

The FBI has an information page about the NGI, and there it said that photographs of tattoos are also included and that the system is designed to speed up suspect detection and response times.

“The NGI system will offer state-of-the-art biometric identification services and provide a flexible framework of core capabilities that will serve as a platform for multimodal functionality,” it said.

“The NGI Program Office mission is to reduce terrorist and criminal activities by improving and expanding biometric identification and criminal history information services through research, evaluation, and implementation of advanced technology”.

In its lawsuit EPIC said that the NGI database will be used for non law enforcement purposes and will be made available to “private entities”.

EPIC said that it has asked the FBI to provide information including “contracts with commercial entities and technical specifications”.

It said that so far it has received no information from the FBI in response to its requests.

Source

6 of 10 Companies Approve BYOD

April 18, 2013 by  
Filed under Around The Net

Comments Off on 6 of 10 Companies Approve BYOD

More than six out of 10 companies allow or mandate the use of employee-owned mobile devices for work in order to increase productivity, according to a survey published on Tuesday.

While the BYOD (bring your own device) push has been at the forefront of press coverage, the majority of companies still provide at least a subset of devices to employees. One third of companies strictly mandate which devices can be used for work purposes and don’t allow any type of device provided by the employee, according to the survey conducted by the Computing Technology Industry Association (CompTIA), a nonprofit trade group.

The online survey of 502 U.S. IT and business executives was conducted in February. It also found that the most popular option, at 58%, was to have a mix of corporate-owned and employee-owned devices.

For 53% of those surveyed, the top reason for allowing employees to use or select their own devices was to increase productivity while employees are away from the office. Another reason was that employees like to use familiar devices.

Twelve percent of the respondents stated it was simply too difficult to stop employees from using their own devices.

CompTIA’s report said that companies looking to maximize the benefits of a mobile device-enabled workforce must “look beyond simply which devices are used and re-examine business processes and workforce needs.”

Companies should assess the specific needs of workers, rather than just deploying one device over another on a corporate-wide basis, said Seth Robinson, director, technology analysis, at CompTIA.

Source

AT&T Gets GM

March 5, 2013 by  
Filed under Around The Net

Comments Off on AT&T Gets GM

AT&T Monday said it will provide LTE wireless services to most General Motors automobiles starting in 2014 in the U.S. and Canada.

A multi-year agreement between AT&T and GM subsidiary OnStar calls for vehicles to continue getting OnStar’s safety and security services while adding information and entertainment services for backseat drivers, AT&T said.

Millions of vehicles will be affected, as AT&T rolls out LTE to reach 300 million people in the U.S. by the end of 2014.

The AT&T-GM announcement is part of an explosion in the number of devices connected to the Internet, many of them wirelessly, in what some have termed the “Internet of Things.”

“The is a big announcement for connected devices,” Glenn Lurie, president of emerging enterprises and partnerships at AT&T, said in an interview at Mobile World Congress here.

Source…

IBM Moves Into Oracle And HP Turf

February 14, 2013 by  
Filed under Computing

Comments Off on IBM Moves Into Oracle And HP Turf

Big Blue wants to take on competitors such as Oracle and Hewlett Packard by offering a cheap and cheerful Power Systems server and storage product range.

Rod Adkins, a Senior Vice President in IBM’s Systems & Technology Group said the company was was rolling out new servers based on its Power architecture with the Power Express 710 starting at $5,947. He said that the 710 is competitively priced to commodity hardware from Oracle and HP.

Adkins added that IBM is expanding its Power and Storage Systems business into SMB and growth markets. The product launches on Tuesday. IBM said it will start delivering by February 20.

Source…

Energy Star Goes To Tablets

January 24, 2013 by  
Filed under Around The Net

Comments Off on Energy Star Goes To Tablets

Coming to a tablet near you soon, Energy Star ratings.

The specification will be part of the Energy Star version 6.1, according to documents posted on the U.S. Energy Star website. But a date for ratings on tablets has not yet been established, said Robert Meyers, product manager at Energy Star computers. Energy Star is a joint effort between the U.S. Environmental Protection Agency and the U.S. Department of Energy.

The Energy Star specification helps shoppers identify the most power-efficient products when making purchases. The Energy Star program already covers laptops, desktops, monitors, light bulbs, servers, household appliances and other products that are identified with a label. The use of Energy Star-labeled products helped cut close to US$18 billion from U.S. utility bills in 2010, according to the organization.

The EPA and DOE originally floated the idea of including tablets as part of Energy Star version 6.0 for products like laptops, desktops, displays, thin clients and networking equipment, which goes into effect on June 1. Some IT vendors that participate in the Energy Star program argued against the immediate inclusion of tablets, saying that those devices are more like smartphones than PCs and have different assembly and equipment. They argued that tablets and laptops differ on components such as batteries and networking equipment, and thus cannot be grouped together with PCs. The EPA and those stakeholders are now trying to gather a consensus on the definition of tablets and how to rate the devices.

Source…

Passwords Continue As The Weakest Link

January 11, 2013 by  
Filed under Computing

Comments Off on Passwords Continue As The Weakest Link

Passwords aren’t the only failure point in many recent widely publicized intrusions by hackers.

But passwords played a part in the perfect storm of users, service providers and technology failures that can result in epic network disasters.  Password-based security mechanisms — which can be cracked, reset and socially engineered — no longer suffice in the era of cloud computing.

The problem is this: The more complex a password is, the harder it is to guess and the more secure it is. But the more complex a password is, the more likely it is to be written down or otherwise stored in an easily accessible location, and therefore the less secure it is. And the killer corollary: If a password is stolen, its relative simplicity or complexity becomes irrelevant.

Password security is the common cold of our technological age, a persistent problem that we can’t seem to solve. The technologies that promised to reduce our dependence on passwords — biometrics, smart cards, key fobs, tokens — have all thus far fallen short in terms of cost, reliability or other attributes. And yet, as ongoing news reports about password breaches show, password management is now more important than ever.

All of which makes password management a nightmare for IT shops. “IT faces competing interests,” says Forrester analyst Eve Maler. “They want to be compliant and secure, but they also want to be fast and expedient when it comes to synchronizing user accounts.”

Source…

Amazon Goes To Court

November 9, 2012 by  
Filed under Computing

Comments Off on Amazon Goes To Court

Amazon is suing Daniel Powers, its ex VP in charge of global sales for Amazon Web Services because he joined Google in a cloud role.

Taking the new job, asserts Amazon, violates Powers’ non-compete agreement with Amazon, which let Powers go this summer with a reasonable severance package.

There is a risk that Powers could take important information that he learned about the Amazon web services business to its rival, Google, and that is what the firm is seeking to stop.

According to Geekwire Amazon wants an injunction against Powers to prevent him from “engaging in any activities that directly or indirectly support any aspect of Google’s cloud computing business”.

A court filing claims that Amazon has an agreement with Powers that says he will not join a rival for a “limited time following the termination of his employment”.

Powers, it warns, is a veteran who knows the cloud business from “top to bottom”, adding that he has “acquired and currently possesses extensive knowledge of Amazon’s trade secrets and its highly confidential information”.

The complaint says that he has extensive and detailed information about Amazon Web Services’ prospects, business, potential business partners, pricing strategies and goals.

Amazon has not provided us with further comment.

Source…

Cloud Storage Specs Approved

October 29, 2012 by  
Filed under Computing

Comments Off on Cloud Storage Specs Approved

The International Organization for Standardization (ISO) has ratified the Cloud Data Management Interface (CDMI), a set of protocols defining how businesses can safely transport data between private and public clouds.

The Storage Networking Industry Association’s (SNIA) Cloud Storage Initiative Group submitted the standard for approval by the ISO last spring. CDMI is the first industry-developed open standard specifically for data storage as a service.

“There is strong demand for cloud computing standards and to see one of our most active consortia partners contribute this specification in such a timely fashion is very gratifying,” Karen Higginbottom, chairwoman of the ISO committee, said in a statement. “The standard will improve cloud interoperability.”

The CDMI specification is a way to create an interface for accessing data in the cloud by preserving metadata about information that an enterprise stores in the cloud. With metadata associated with the information, companies can retrieve data no matter where it’s stored.

“With the metadata piece, it’s also complementary with existing interfaces. The standard can be used with Amazon, for file or block data and it can use any number of storage protocols, such as NFS, CIFS or iSCSI,” said SNIA Chairman Wayne Adams.

Based on a RESTful HTTP protocol, CDMI provides both a data path and control path for cloud storage and standardizes a common interoperable format for securely moving data and its associated data requirements from cloud to cloud. The standard applies to public, private and hybrid deployment models for storage clouds.

Source…

I.T. Spending On The Rise

September 17, 2012 by  
Filed under Computing

Comments Off on I.T. Spending On The Rise

Worldwide IT spending remains on track to increase by 6% in 2012 despite the grim economic conditions in Europe, thanks to strong software, storage, smartphone and tablet sales, according to IDC.

While 2012 has been a tough year for many IT vendors, they have done better overall than many expected in the first half of the year, IDC said.

For example, software spending has been robust, even in parts of the world where the economy has been weakest, as businesses hope software tools and applications will help them implement cost-reduction strategies.

The 6% growth compares to a 7% increase in worldwide IT spending last year. IDC expects 6% growth in 2013.

Software, storage, enterprise network and mobile device markets have offset weaker sales in servers, peripherals and PCs. However, the launch of Windows 8 during the fourth quarter should help the PC market recover next year, IDC said.

U.S. IT spending will grow by 5.9% in 2012, compared to 8.5% last year. However, the strength of the dollar during the first six months of the year means that IT spending in dollar terms will grow just 4% for the full year.

Source…

Intel Partners With WMware

September 7, 2012 by  
Filed under Computing

Comments Off on Intel Partners With WMware

Intel has teamed up with Microsoft’s rival VMware to deliver a platform for “trusted cloud.”

The technology will mix Intel’s Trusted Execution Technology (TXT) and VMware’s vSphere 5.1, platform for building cloud infrastructures. Intel said its hardware-enhanced security capabilities integrated directly into the processor combined with vSphere 5.1 would provide a hardened and high-integrity platform to run business-critical applications in private and public cloud environments.

Intel thinks that the biggest barrier to cloud adoption is the fact that companies are worried about security. Jason Waxman, general manager of Intel’s Cloud Infrastructure Group, in a statement that Intel TXT provides hardware enforcement to help overcome some of the most challenging aspects of cloud security, including detection and prevention of bios attacks and evolving forms of stealthy malware, such as rootkits.

Source…

« Previous PageNext Page »