ARM Develops IoT For Students
ARM has created a course to teach IoT skills to students at University College London (UCL)
The course is designed to encourage graduates in science, technology, engineering and maths (Stem) to seek careers in IT.
The IoT Education Kit will teach students how to use the Mbed IoT operating system to create smartphone apps that control mini-robots or wearable devices.
Students are expected to be interested in building their own IoT business, or joining IoT-focused enterprises like ARM. The course will also try to limit the number of Stem graduates pursuing non-technology careers.
ARM reported statistics from a 2012 study by Oxford Policy and Research revealing how many engineering graduates (36 percent of males, 51 percent of females), technology graduates (44 percent, 53 percent) and computer scientists (64 percent, 66 percent) end up with non-Stem jobs.
The IoT Education Kit will be rolled out by UCL’s Department of Electronics from September 2015, with a week-long module for full-time and continuing professional development students.
The Kit comprises a complete set of teaching materials, Mbed-enabled hardware boards made by Nordic Semiconductor, and software licensed from ARM. A second teaching module for engineering graduates is being developed for 2016.
“Students with strong science and mathematical skills are in demand and we need to make sure they stay in engineering,” said ARM CTO Mike Muller.
“The growth of the IoT gives us a great opportunity to prove to students why our profession is more exciting and sustainable than others.”
UCL professor Izzat Darwazeh also highlighted the importance of Stem skills, saying that “many students are not following through to an engineering career and that is a real risk to our long-term success as a nation of innovators”.
Can Imagination Push IoT?
Imagination Technologies will take on the Raspberry Pi with the release of a single-board minicomputer for both Android and Linux developers.
In a bid to power a range of devices in the ever-growing world of the Internet of Things (IoT) space, the MIPS-based Creator CI20 can run both Linux and Android operating systems (OS) and is said to deliver both high performance and low energy consumption.
When it hits the market in January, the development board will target the likes of open source developers, the maker community and system integrators to provide them with tools and encourage them to create a wide range of applications and projects.
The Creator CI20 is based around a system on a chip (SoC) combining CPU, graphics and I/O circuitry, featuring an I/O connector block compatible with that of the Raspberry Pi, meaning it could be plugged into many of the same projects.
The board comes with a 1.2GHz MIPS32-based dual-core processor and 1GB of RAM with PowerVR SGX540 graphics for OpenGL 2.1 and ES 2.0 compatibility, meaning its capable of 1080p gaming at 30fps. It also features Ethernet connectivity alongside 802.11b/g/n Wi-Fi and Bluetooth 4.0 plus 4GB storage onboard.
While it’s easy to compare the Creator CI20 to the Raspberry Pi, Imagination’s executive vice president of marketing, Tony King-Smith, told V3.co.uk that the develop board is not intended as a direct rival.
“We’re not trying to compete with devices like Raspberry Pi and Arduino, which many developers will already have, we’re giving them more options, and we believe this is a pretty rich offering,” he said.
King-Smith said that the Creator CI20 is ideal for the IoT revolution because of its embedded wireless capabilities, but also because it is capable of running mature OS such as Linux and Android that support graphical user interfaces.
“This will make IoT interesting, whether you’re looking at a thermostat or a sensor or whatever, it’s a compelling user interface that gets people excited,” he added.
Imagination has also launched a Creator Programme alongside the developer board to stimulate an IoT ecosystem around the device.
Should Encryption Be The Norm?
Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.
The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.
It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.
“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”
The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.
The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.
However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.
These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.
Adobe Eases Privacy Concerns
November 14, 2014 by admin
Filed under Around The Net
Comments Off on Adobe Eases Privacy Concerns
Tests on the latest version of Adobe System’s e-reader software reveals the company is now collecting less data following a privacy-related row last month, according to the Electronic Frontier Foundation.
Digital Editions version 4.0.1 appears to only collect data on e-books that have DRM (Digital Rights Management), wrote Cooper Quintin, a staff technologist with the EFF. DRM places restrictions on how content can be used with the intent of thwarting piracy.
Adobe was criticized in early October after it was discovered Digital Editions collected metadata about e-books on a device, even if the e-books did not have DRM. Those logs were also sent to Adobe in plain text.
Since that data was not encrypted, critics including the EFF contended it posed major privacy risks for users. For example, plain text content could be intercepted by an interloper from a user who is on the same public Wi-Fi network.
Adobe said on Oct. 23 it fixed the issues in 4.0.1, saying it would not collect data on e-books without DRM and encrypt data that is transmitted back to the company.
Quintin wrote the EFF’s latest test showed the “only time we saw data going back to an Adobe server was when an e-book with DRM was opened for the first time. This data is most likely being sent back for DRM verification purposes, and it is being sent over HTTPS.”
If an e-book has DRM, Adobe may record how long a person reads it or the percentage of the content that is read, which is used for “metered” pricing models.
Other technical metrics are also collected, such as the IP address of the device downloading a book, a unique ID assigned to the specific applications being used at the time and a unique ID for the device, according to Adobe.
Is Unity Up to Something Big?
Earlier today Unity Technologies caused quite a stir in the games industry with the announcement that former Electronic Arts chief exec John Riccitiello would be taking over the CEO job for David Helgason. While EA struggled to make shareholders happy, Unity has been seeing tremendous growth, becoming a favorite toolset for large and small publishers and especially indies. In fact, the company serves over 600,000 monthly developers. But what does Unity really have up its sleeve? Is the hiring of a notable leader like Riccitiello a sign that the company is indeed being groomed for a buyout or public offering?
“John Riccitiello’s corporate moves will rightfully inspire speculation about major changes in the companies involved and as Unity is the dominant independent development platform, what happens next could affect most developers and publishers outside of the top ten,” remarked independent analyst Billy Pidgeon. “An acquisition is very possible although Unity CTO Joachim Ante has denied this. Unity needs to be independent and available to all to retain and grow its value, so a sale to a major publisher or developer would sharply decrease the company’s revenue flow. But a buyer outside the industry could allow Unity to remain somewhat independent, although clients might be wary of doing business with Unity’s new owner.”
EEDAR’s Patrick Walker, head of insights and analytics, largely agreed with Pidgeon, commenting, “While the stature of Riccitiello as a hire and his interest in helming the Unity ship suggest that there are big plans in the works for the company, it is unlikely that these plans are focused on the short term, such as preparation for a near-term buyout. A buyout has been rumored for a while, and the Unity executive team, including founder David Helgason and CTO Joachim Ante, has been consistent in their messaging statement focusing on the company mission rather than pursuit of a buyout. More likely, Riccitiello is being brought on board to spur growth for a longer-term play, such as an eventual IPO or larger-scale buyout.”
Regardless of whether a longer-term buyout is in the cards, Riccitiello has the experience to help accelerate Unity’s growth in the next few years, most believe.
“Unity is a well-positioned company with several paths to increase growth. While game publishing is one route to spur growth, there is also an opportunity for the company to leverage the strengths, such as cross-platform flexibility, that have given it such broad penetration in the indie market to increase penetration in other development verticals,” Walker continued. “Riccitiello has an ideal background, having led major companies both inside and outside the games industry and having served on the Unity board for the past year, to drive partnerships that will help grow Unity as a major development platform across the full spectrum of publishers and developers.”
Wedbush Securities’ Michael Pachter added, “He is certainly capable of leading them, and also well equipped to sell the company. [But] I don’t know the reason for the change.”
Perhaps one major reason for the change is to offload some of the business responsibility from Helgason who may wish to focus more on product development.
“Unity has been growing quickly for several years. The company now has over 300 employees and its technology is being used by hundreds of thousands of developers on practically every platform out there. I suspect that Dave recognized some time ago that the company had to get an experienced business manager at the helm or risk flying off the rails at some point, and that’s exactly what JR is,” observed Lewis Ward, IDC’s gaming research director.
“Some people just aren’t cut out to be CEOs of big businesses – just look at Notch. I suspect that Dave is going to be happier staying focused on the core product strategy and building relationships with studios and indie developers. From JR’s perspective, it’s a great opportunity to ride the beast that has been Unity growth over the past 3+ years. It’s a remarkable story, and I think John is probably going to enjoy the role and stepping back into an important spotlight in the industry.”
What Will Facebook Do With WhatsApp?
October 21, 2014 by admin
Filed under Around The Net
Comments Off on What Will Facebook Do With WhatsApp?
Facebook, which closed its acquisition of mobile messaging service WhatsApp earlier this week, has said that it has no near-term plan to make money from it.
Chief Executive Mark Zuckerberg, who is visiting India to participate in an event to boost Internet usage, refused to say much more, but it does indicate that the company has not worked out a cunning plan yet.
Facebook’s final WhatsApp acquisition price tag has risen an additional $3 billion to roughly $22 billion because of the increased value of Facebook’s stock in recent months. This means that Zuckerberg is under pressure to make a bob or two from the deal.
WhatsApp works across different types of phones, across borders, and without advertising. The app only charges a 99 cent annual subscription fee, which is waived for the first year.
FBI Worried About Encryption
October 9, 2014 by admin
Filed under Smartphones
Comments Off on FBI Worried About Encryption
The U.S. Federal Bureau of Investigation expressed some concerns about moves by Apple and Google to include encryption on smartphones, the agency’s director has stated.
Quick law enforcement access to the contents of smartphones could save lives in some kidnapping and terrorism cases, FBI Director James Comey said in a briefing with some reporters. Comey said he’s concerned that smartphone companies are marketing “something expressly to allow people to place themselves beyond the law,” according to news reports.
An FBI spokesman confirmed the general direction of Comey’s remarks. The FBI has contacted Apple and Google about their encryption plans, Comey told a group of reporters who regularly cover his agency.
Just last week, Google announced it would be turning on data encryption by default in the next version of Android. Apple, with the release of iOS 8 earlier this month, allowed iPhone and iPad users to encrypt most personal data with a password.
Comey’s remarks, prompted by a reporter’s question, came just days after Ronald Hosko, president of the Law Enforcement Legal Defense Fund and former assistant director of the FBI Criminal Investigative Division, decried mobile phone encryption in a column in the Washington Post.
Smartphone companies shouldn’t give criminals “one more tool,” he wrote. “Apple’s and Android’s new protections will protect many thousands of criminals who seek to do us great harm, physically or financially. They will protect those who desperately need to be stopped from lawful, authorized, and entirely necessary safety and security efforts. And they will make it impossible for police to access crucial information, even with a warrant.”
Representatives of Apple and Google didn’t immediately respond to requests for comments on Comey’s concerns.
Insurers To Use Mobile Phones To Track
September 15, 2014 by admin
Filed under Around The Net
Comments Off on Insurers To Use Mobile Phones To Track
A new usage-based insurance (UBI) software platform will enable insurers to track drivers’ behavior through smartphone sensors and geolocation services.
Agero, one of the nation’s largest suppliers of roadside safety software and services to automakers and insurance companies, said its new UBI telematics suite will transmit to insurers the information needed to offer discounts to good drivers, penalize others, and send alerts to emergency assistance service providers.
The UBI suite consists of the PolicyPal app, which tracks driving habits in real time, and Auto Crash Notification (ACN), which automatically notifies emergency services within moments of an accident.
Currently, State Farm’s In-Drive and Progressive’s Snapshot program, offer customers the opportunity to voluntarily participate in programs in which their insurer collects vehicle data and uses the information to determine driving habits, which in turn can be used to offer lower-rate incentives to safer operators.
Unlike Agero’s new platform, however, In-Drive and Snapshot, use a small data collection device that plugs into a vehicle’s standard OBDII onboard diagnostics port under the dashboard and transmits data from a car’s central computer to insurance companies.
Agero’s new mobile suite will greatly expand upon the universe of consumers who can vie for “discount rates” based on their driving profiles. The mobile device also travels with them in or out of the vehicle.
Over the past decade, the insurance industry has been embroiled in a heated price war, with companies vying to be king of the heap for discount pricing.
“It’s becoming a cutthroat market. They’re competing on price,” said Jeff Blecher, senior vice president of strategy at Medford, Mass.-based Agero. “To break that mold, they need a new business model. UBI does that. Now, they can compete based on the risk profile of drivers.”
UBI offers the insurance industry new opportunities for tailored discount programs. Notably, they can switch from relying OBDII dongles plugged into the customer’s car and instead use mobile apps that travel with the driver, whether he’s traveling in his own car or another vehicle.
“We want to align our strategy… with the smartphone as primary data collection point,” Blecher said.
Apple Changes Policy In China
August 28, 2014 by admin
Filed under Consumer Electronics
Comments Off on Apple Changes Policy In China
Apple Inc has started the processing of keeping the personal data of some Chinese users on servers in mainland China, marking the first time the tech giant is storing user data on Chinese soil.
The storage of user data in China represents a departure from the policies of some technology companies, notably Google Inc, which has long refused to build data centers in China due to censorship and privacy concerns.
Apple said the move was part of an effort to improve the speed and reliability of its iCloud service, which lets users store pictures, e-mail and other data. Positioning data centers as close to customers as possible means faster service.
The data will be kept on servers provided by China Telecom Corp Ltd, the country’s third-largest wireless carrier, Apple said in a statement.
“Apple takes user security and privacy very seriously,” it said. “We have added China Telecom to our list of data center providers to increase bandwidth and improve performance for our customers in mainland china. All data stored with our providers is encrypted. China Telecom does not have access to the content.”
A source with knowledge of the situation said the encryption keys for Apple’s data on China Telecom servers would be stored offshore and not made available to China Telecom.
Apple has said it has devised encryption systems for services such as iMessage that even Apple itself cannot unlock. But some experts expressed scepticism that Apple would be able to withhold user data in the event of a government request.
“If they’re making out that the data is protected and secure that’s a little disingenuous because if they want to operate a business here, that’d have to comply with demands from the authorities,” said Jeremy Goldkorn, director of Danwei.com, a research firm focused on Chinese media, internet and consumers.
“On the other hand if they don’t store Chinese user data on a Chinese server they’re basically risking a crackdown from the authorities.”
Goldkorn added that data stored in the United States is subject to similar U.S. regulations where the government can use court orders to demand private data.
A spokesman for China Telecom declined to comment.
Microsoft Adds Anti-snooping Safeguards
July 16, 2014 by admin
Filed under Around The Net
Comments Off on Microsoft Adds Anti-snooping Safeguards
Microsoft has added encryption safeguards to the Outlook.com webmail service and to the OneDrive cloud storage service, in part to better protect these consumer products from government surveillance.
“Our goal is to provide even greater protection for data across all the great Microsoft services you use and depend on every day. This effort also helps us reinforce that governments use appropriate legal processes, not technical brute force, if they want access to that data,” Matt Thomlinson, vice president, Trustworthy Computing Security, at Microsoft wrote in a blog post.
The move follows similar ones from other cloud computing providers. For example, Google announced end-to-end encryption for Gmail in April, including protection for email messages while they travel among Google data centers. It recently announced similar encryption for its Google Drive cloud storage service.
It’s not clear from Microsoft’s announcement whether the encryption protection it announced covers Outlook.com messages and OneDrive files as they travel within Microsoft data centers. It’s also not clear what, if any, encryption OneDrive and Outlook.com have had until now. Microsoft didn’t immediately respond to a request for comment.
Cloud computing providers like Microsoft, Google, Amazon and many others have been rattled by disclosures from former National Security Agency contractor Edward Snowden regarding government snooping into online communications, due to the effect on their consumer and business customers.
As a result, these companies have been busy boosting encryption on their systems, while also lobbying the U.S. government to stop the stealthy and widespread monitoring of Internet services.