Intel Buys KNO Software
Intel has acquired educational software developer Kno to add to its Education division.
Speaking in the company blog, Intel Sales and Marketing Group VP John Galvin explained that in a world where kids are being bombarded by technology, Intel Education has a mission to support the rollout of technology in the classroom.
Galvin said, “The Kno platform provides administrators and teachers with the tools they need to easily assign, manage and monitor their digital learning content and assessments.”
This acquisition brings Intel’s global digital content library to over 225,000 [higher education] and K-12 titles from 74 education publishers. “We’re looking forward to combining our expertise with Kno’s rich content so that together, we can help teachers create classroom environments and personalized learning experiences that lead to student success,” Galvin added.
Intel Education has been working for the past decade with over 10 million teachers that it has assisted to integrate technology with education.
In the UK alone there have been tremendous strides in educational software over the past 30 years, dating back to the government pledge to provide a computer in every school, which led to the creation of the BBC Microcomputer designed specifically for that purpose.
Today, not only is ICT a dedicated lesson in its own right, but it forms one of the key skills that educators are expected to incorporate into all lesson plans, putting it on a par with English and Maths, showing just how far we’ve come from making Venn diagrams with ascii art.
Intel’s Bay Trail M Is On The Way
Intel launched its Bay Trail-M ultra low voltage processors for netbooks and mobile devices over the weekend. According to CPU World the new mobile CPUs, branded this time as Celeron and Pentium, can manage twice the CPU performance, and up to three times faster graphics.
They do all that while using the same amount of juice as their “Cedar Trail” predecessors. Most chips have higher clock speeds than N2805, N2810 and N2910 SKUs and come with Burst Performance technology. They can operate at a higher maximum operating temperature which makes them easier to cool. Finally, in addition to 4 N28xx/N29xx Celerons Intel also released Pentium N2920.
Then there are new dual-core Bay Trail-M microprocessors like the Celeron N2806, N2815 and N2820 which can operate at frequencies from 1.6 GHz to 2.13 GHz, when going downhill had the wind is behind them. They also have the maximum burst speed ranging from 2 GHz to 2.39 GHz. The processors come with 1 MB L2 cache, Ivy Bridge graphics clocked at 311 MHz and up to 756 MHz, and support for DDR3L-1066 memory. The N2806 has 4.5 Watt TDP while the N2815 and N2820 have 7.5 Watt TDP. All of the Celeron N28xx processors are priced at $132.
Two new quad-core microprocessors are Celeron N2920 and Pentium N3520. The CPUs have 2 MB L2 cache, and run at 1.86 GHz and 2.17 GHz respectively, with burst frequencies reaching 2 GHz and 2.42 GHz. Both parts integrate Ivy Bridge graphics, that can be clocked as high as 854 MHz. The Celeron can deal with DDR3L-1066 memory, and the Pentium supports 1333 MHz memory data rate. They fit into 7.5 Watt power envelope. The official prices of Celeron N2920 and Pentium N3520 are $132 and $180.
Will nVidia’s Tegra 5 Go LTE?
The tradition continues. Our sources are confirming that Nvidia’s Logan SoC, possibly called Tegra 5, doesn’t come with an integrated LTE modem. Just like Apple, Nvidia makes a big fast chip with impressive Kepler based GPU, but it won’t put a an icera LTE solution inside the same chip.
Icera i500 is Tegra 5 compatible and it has AT&T certification. As the launch draws near, it should become compatible with other US and international LTE carriers like Verizon and T-mobile.
This should not be a big issue for Nvidia’s target market, manufacturers will have to choose two chips instead of one, a clear competitive disadvantage compared to future Qualcomm chips with Adreno 400 graphics and updated CPU cores, expected in early 2014.
During Nvidia’s recent conference call, CEO Jen Hsun Huang said devices based on the new Tegra 4i with integrated LTE should be announced in Q1 and ship no later than Q2. Jensen also mentioned that people are going to be “delighted by the OEM that it comes from” which is probably his way of of announcing some big brand design wins, but he also emphasised that the designs will be global rather than US. For US success you need CDMA Jensen said, but as far as we know Verizon is the only company using it.
Since Apple can pull of two chip designs from day one, we can only assume that two chip approach won’t cost much battery life compared to single chip design that has LTE on board (Snapdragon 600 and 800 ed. ). However, Nvidia is likely going to be making bets on its Kepler based GPU, expected to be the fastest graphics core ever integrated in a mobile SoC that will rock tablets and some phones around the world. The fact that Logan is likely to pack very powerful graphics sans on-die LTE makes it a bit more interesting for tablets than phones, which is exactly what we saw with the Tegra 4.
We expect to see Tegra 5 devices announced at CES 2014 so early January and with some luck we might see them shipping very early in 2014.
Can Acer Go High-End?
Most popular for its low-cost laptops, Acer doesn’t really inspire thoughts of premium products. But building high-end hardware could be the Taiwanese vendor’s best chance as it looks for a way to rescue its struggling business.
With consumers flocking to tablets and smartphones, Acer’s once-thriving PC business has been left in the dust. Quarterly financial losses have become routine at the company and its PC shipments declined more sharply in the past year than at any other major vendor, according to IDC.
The grim situation forced CEO J.T. Wang to resign from his post last Tuesday. Acer will also cut 7 percent of its global workforce and has assembled an advisory committee to come up with a new strategy, the company announced.
Bright spots are hard to find. The Wintel model that propelled Acer for years and helped it become the second-largest PC vendor in 2009 has been falling apart amid the demand for mobile gadgets. And Windows 8 and Intel’s Ultrabook strategy have failed to resuscitate the market.
It hasn’t helped that Acer is so reliant on sales to consumers, said IDC analyst Bryan Ma. The entire PC industry has been hurt by tablets, but Dell and Hewlett-Packard have at least managed to find cover selling PCs to businesses, which are still buying them. And Lenovo has capitalized on its position in China, now the world’s largest PC market.
“Acer didn’t really have the commercial PC business to protect themselves. That’s why they were hit harder,” Ma said.
Acer — whether to its benefit or detriment — has instead gained a reputation for low-priced PCs. Even in tablets it has tried to undercut rivals — its Iconia W4, an 8-inch Windows 8.1 tablet, starts at US$329.99, while its Iconia B Android tablet goes for $129.99. The low prices have helped keep the company on consumers’ radar, but at the expense of profits.
One option for Acer is to build a brand as a higher-end PC player. It took a step in that direction last year with the Aspire S7, a Windows laptop with a slender, aluminum chassis that sells for $1,200 and up. That product and its successors have had some success for the company, with sales of 2,000 to 3,000 units per month, said James Wang, an analyst with research firm Canalys.
“I think Acer has started to learn they are able to sell some expensive products,” he said.
Selling higher-end PCs could help stop the bleeding in Acer’s finances, but with the overall PC market still shrinking it’s unlikely to help it expand in any meaningful way. “You can’t really expect vendors in desktops and notebooks to find growth,” Wang said. “You win in the market by not falling in shipments.”
Did Stuxnet Infect A Russian Nuclear Plant?
Comments Off on Did Stuxnet Infect A Russian Nuclear Plant?
Kaspersky has claimed that the infamous Stuxnet computer worm “badly infected” the internal network of an unnamed Russian nuclear plant after it caused chaos in Iran’s nuclear facilities.
Speaking at a keynote presentation given at the Canberra Press Club 2013, Kaspersky CEO Eugene Kaspersky said a staffer at the unnamed nuclear plant informed him of the infection.
“[The staffer said] their nuclear plant network which was disconnected from the internet was badly infected by Stuxnet,” Kaspersky said.
“So unfortunately these people who were responsible for offensive technologies, they recognise cyber weapons as an opportunity.”
Stuxnet was discovered to have spread throughout industrial software and equipment in 2010 and is believed to have been created by the United States and Israel to attack Iran’s nuclear facilities. According to Kaspersky’s source, the malware was carried into the Russian nuclear plant and installed on a physically separated “air-gapped” network.
Kaspersky also made a rather outlandish joke during his speech, saying that all data is subject to theft. “All the data is stolen,” Kaspersky said. “At least twice.”
“If the claim of the Russian nuclear plant infection is true, then it’s easy to imagine how this “collateral damage” could have turned into a very serious incident indeed, with obvious diplomatic repercussions,” said security expert Graham Cluley.
“There is no way to independently verify the claim, of course. But it is a fact that Stuxnet managed to infect many computer systems outside of its intended target in Iran,” Cluley added. “Indeed, the very fact that it spread out of control, was what lead to its discovery by security firms.”
Earlier this year, Symantec claimed that the Stuxnet computer worm could date back further than 2010 and was more widespread than originally believed.
Symantec’s report called “The Missing Link” found a build of the Stuxnet attack tool, dubbed Stuxnet 0.5, which it said dated back to 2005 and used different techniques to sabotage industrial facilities.
Google Expands Malware Blocker
Google has expanded malware blocking in an early development build of Chrome to sniff out a wider range of threats than the browser already recognizes.
Chrome’s current “Canary” build — the label for very-early versions of the browser, earlier than even Chrome’s Dev channel — will post a warning at the bottom of the window when it detects an attempted download of malicious code.
Features added to the Canary build usually, although not always, eventually make it into the Dev channel — the roughest-edged of the three distributed to users — and from there into the Beta and Stable channels. Google did not spell out a timetable for the expanded malware blocking.
Chrome has included malware blocking for more than two years, since version 12 launched in June 2011, and the functionality was extended in February 2012with Chrome 17.
Chrome is now at version 30.
Canary’s blocking, however, is more aggressive on two fronts: It is more assertive in its alerts and detects more malware forms, including threats that pose as legitimate software and monkey with the browser’s settings.
“Content.exe is malicious, and Chrome has blocked it,” the message in Canary reads. The sole visible option is to click the “Dismiss” button, which makes the warning vanish. The only additional option, and that only after another click, is to “Learn more,” which leads to yet another warning.
In Canary, there is no way for the user to contradict the malware blocking.
That’s different than in the current Stable build of Chrome, which relies on a message that says, “This file is malicious. Are you sure you want to continue?” and gives the user a choice between tossing the downloaded file or saving it anyway.
As it has for some time, Chrome will show such warnings on select file extensions, primarily “.exe,” which in Windows denotes an executable file, and “.msi,” an installation package for Windows applications. Canary’s expansion, said Google, also warns when the user tries to download some less obvious threats, including payloads masquerading as legitimate software — it cited screen savers and video plug-ins in a blog posting — that hijack browser settings to silently change the home page or insert ads into websites to monetize the malware.
Google’s malware blocking is part of its Safe Browsing API (application programming interface) and service, which Chrome, Apple’s Safari and Mozilla’s Firefox all access to warn customers of potentially dangerous websites before they reach them.
In Chrome’s case, the malware warning stems not only from the Safe Browsing “blacklist” of dodgy websites, but according to NSS Labs, a security software testing company, also from the Content Agnostic Malware Protection (CAMP) technology that Google has baked into its implementation of Safe Browsing.
Raspberry PI Breaks Record
Sinclair ZX80 and runaway success story, the Raspberry Pi might be about to get its own monitor after a Kickstarter campaign to create a low cost 9in screen for it has exceeded its $90,000 goal in a single weekend.
The HDMIPi monitor from startup Raspi.tv presently stands at $100,996 on Kickstarter, an increase of $8,000 in just the last four hours. The concept behind the monitor is to create something small and affordable but with maximum 1920×1080 resolution. Even though the project has had to scale down its ambitions to 1200×800 resolution to fit the business plan, Raspberry Pi fans have flocked to crowdfund the device.
Put in perspective, that’s higher than HD 720p resolution, or as they describe it, “slightly better resolution than the 720p HD footage on BBC iPlayer”.
Monitor cases will be available in a variety of colours, designed by none other than Paul Beech, who designed the original Raspberry Pi logo.
Although primarily designed for the Raspberry Pi, the HDMIPi is a standard HDMI monitor and can be used for other devices – Android sticks, video cameras, games consoles and beyond.
Raspi.tv has pledged to ship orders in February 2014, delays permitting, and is already working on enhancements. It has described touch functionality as something that might become available as a bolt-on at a later date, saying that “enough people have mentioned it that we are sitting up and taking notice”.
As ever with the Raspberry Pi ecosystem, everything is a bit Ryanair, and power supplies, surrounds and so on are not automatically included, though of course, in the true DIY spirit, you can always make your own.
Africa To Lead Global Bandwidth Demand
Comments Off on Africa To Lead Global Bandwidth Demand
Africa’s demand for Internet access to the rest of the world will grow by an average of 51 percent every year until 2019, ahead of all other regions, according to a forecast by research company Telegeography.
Rapid economic growth and wider Internet use will drive the increase in demand, which will be met mostly by turning on unused capacity in existing cables, according to Telegeography analyst Erik Kreifeldt. Terrestrial links are in demand partly because much of Africa still relies on satellite, which is far more expensive per bit than wired broadband, he said.
Most Internet bandwidth between continents is provided by undersea cables built and financed by groups of service providers. From Africa, most of those links go to Europe. Other carriers pay to tap into those cables and link their customers to the Internet. In some parts of Africa, running cables from coastal areas to the interior is a challenge so satellite remains the major Internet source, Kreifeldt said.
The capacity of international cables landing on African shores is just a fraction of the bandwidth available between Europe, the U.S. and Asia. After seven years of the growth that Telegeography forecasts, from 2012 through 2019, Africa will have 17.2Tbps (bits per second) of links to the outside world. That’s up from just 957Gbps in 2012 but will still be only about one-quarter of the international capacity of Latin America and less than that of Canada, according to Telegeography.
The hunger for the Internet varies among African countries. Through 2019, bandwidth demand is expected to grow fastest in Angola, at 71 percent per year; Tanzania, at 68 percent; and Gabon, at 67 percent.
Many new cables have been built to Africa and around the continent in the past several years, giving service providers excess fiber capacity that can be turned on when needed, Kreifeldt said. As that fiber gets lit up and supply rises, prices should fall for enterprises and other users in African countries, he said. However, due to relative scarcity, a given amount of bandwidth between Africa and Europe costs about 10 times as much as the same size connection between Europe and North America, he said. Africa’s bandwidth gains aren’t expected to shrink that gap.
ATM Malware Found In Mexico
A malicious software program identified in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.
Two versions of the malware, called Ploutus, have been discovered, both of which are engineered to empty a certain type of ATM, which Symantec has not identified.
In contrast to most malware, Ploutus is installed the old-fashioned way — by inserting a CD boot disk into the innards of an ATM machine running Microsoft Windows. The installation method suggests that cybercriminals are targeting standalone ATMs where access is easier.
The first version of Ploutus displays a graphical user interface after the thief enters a numerical sequence on an ATM’s keypad, although the malware can be controlled by a keyboard, wrote Daniel Regalado, a Symantec malware analyst, on Oct. 11.
Ploutus is programmed for a specific ATM model since it assumes there is a maximum of four cassettes per dispenser in the ATM. It then calculates the amount of money that should be dispensed based on the number of bills. If any of the cassettes have less than the maximum number of 40 bills, it releases whatever is left, repeating that process until the ATM is empty.
Kevin Haley, director of Symantec Security Response, said in an interview earlier this month that the attackers have deep knowledge of the software and hardware of the particular ATM model.
“They clearly know how this machine worked,” he said.
The source code of Ploutus “contains Spanish function names and poor English grammar that suggests the malware may have been coded by Spanish-speaking developers,” Regalado wrote.
In a new blog post, Regalado wrote that the attackers made Ploutus more robust and translated it into English, indicating the same ATM software can be exploited in countries other than Mexico.
The “B” variant of Ploutus has some differences. It only accepts commands through the keypad but will display a window showing the money available in the machine along with a transaction log as it dispenses cash. An attacker cannot enter a specific number of bills, so Ploutus withdraws money from the cassette with the most available bills, Regalado wrote.
Symantec advised those with ATMs to change the BIOS boot order to only boot from the hard disk and not CDs, DVDs or USB sticks. The BIOS should also be password protected so the boot options can’t be changed, Regalado wrote.
SAP To Stop Offering SME
The maker of expensive esoteric software which no-one is really sure what it does, SAP has decided to pull the plug on its offering for small businesses. Business weekly Wirtschaftswoche said SAP would stop the development of a software dubbed Business By Design, although existing customers will be able to continue to use it.
SAP insists that development capacity for Business By Design was being reduced, but that the product was not being shut down. Business by Design was launched in 2010 and was supposed to generate $1 billion of revenue. The product, which cost roughly 3 billion euros to develop, currently has only 785 customers and is expected to generate no more than 23 million euros in sales this year.
The Wirtschaftswoche report said that ever since the SAP product’s launch, customers had complained about technical issues and the slow speed of the software.