Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

IBM Goes Bare Metal

March 18, 2015 by  
Filed under Computing

Comments Off on IBM Goes Bare Metal

IBM has announced the availability of OpenPower servers as part of the firm’s SoftLayer bare metal cloud offering.

OpenPower, a collaborative foundation run by IBM in conjunction with Google and Nvidia, offers a more open approach to IBM’s Power architecture, and a more liberal licence for the code, in return for shared wisdom from member organisations.

Working in conjunction with Tyan and Mellanox Technologies, both partners in the foundation, the bare metal servers are designed to help organisations easily and quickly extend infrastructure in a customized manner.

“The new OpenPower-based bare metal servers make it easy for users to take advantage of one of the industry’s most powerful and open server architectures,” said Sonny Fulkerson, CIO at SoftLayer.

“The offering allows SoftLayer to deliver a higher level of performance, predictability and dependability not always possible in virtualised cloud environments.”

Initially, servers will run Linux applications and will be based on the IBM Power8 architecture in the same mold as IBM Power system servers.

This will later expand to the Power ecosystem and then to independent software vendors that support Linux on Power application development, and are migrating applications from x86 to the Power architecture.

OpenPower servers are based on open source technology that extends right down to the silicon level, and can allow highly customised servers ranging from physical to cloud, or even hybrid.

Power systems are already installed in SoftLayer’s Dallas data centre, and there are plans to expand to data centres throughout the world. The system was first rolled out in 2014 as part of the Watson portfolio.

Prices will be announced when general availability arrives in the second quarter.

Source

Uber Suffers A Data Breach

March 12, 2015 by  
Filed under Security

Comments Off on Uber Suffers A Data Breach

The names and license plate numbers of about 50,000 Uber drivers were exposed in a security breach last year, the company revealed on Friday.

Uber found out about a possible breach of its systems in September, and a subsequent investigation revealed an unauthorized third party had accessed one of its databases four months earlier, the company said.

The files accessed held the names and license plate numbers of about 50,000 current and former drivers, which Uber described as a “small percentage” of the total. About 21,000 of the affected drivers are in California. The company has several hundred thousand drivers altogether.

It’s in the process of notifying the affected drivers and advised them to monitor their credit reports for fraudulent transactions and accounts. It said it hadn’t received any reports yet of actual misuse of the data.

Uber will provide a year of free identity protection service to the affected drivers, it said, which has become fairly standard for such breaches.

The company said it had filed a “John Doe” lawsuit Friday to help it confirm the identity of the party responsible for the breach.

Source

Can Android AT Work Entice The Enterprise?

March 9, 2015 by  
Filed under Around The Net

Comments Off on Can Android AT Work Entice The Enterprise?

Google Inc rolled out an initiative  to make smartphones running its Android software more appealing to corporations, a move that could help extend the Internet technology giant reach into workplaces.

Google said on its official blog that its Android for Work program will provide improved security and management features for corporations that want to give their employees Android smartphones. Smartphones supported by the new initiative will be able to keep an employee’s work and personal apps separate, and a special Android for Work app will allow businesses to oversee key tools such as email, calendar and contacts.

Google said it is partnering with more than two dozen companies including Blackberry Ltd, Citrix Systems Inc, Box Inc.

Google’s Android software is the world’s most popular mobile operating system, but many corporations, which have significant security and device management requirements, give their employees smartphones made by Blackberry or Apple Inc.

Source

Will Apple Go All-In On Car Batteries?

March 6, 2015 by  
Filed under Around The Net

Comments Off on Will Apple Go All-In On Car Batteries?

A year and a half ago, Apple Inc applied for eight patents related to car batteries. Recently, it has added a slew of engineers, just one of whom had already filed for 17 in his former career, according to a Thomson Reuters.

The recent spate of hires and patent filings shows that Apple is fast building its industrial lithium-ion battery capabilities, adding to evidence the iPhone maker may be developing a car.

Quiet, clean electric cars are viewed in Silicon Valley and elsewhere as a promising technology for the future, but high costs and “range anxiety”, the concern that batteries will run out of power and cannot be recharged quickly, remain obstacles. Those challenges could also be seen as opportunities to find solutions to take the technology mainstream.

The number of auto-related patents filed by Apple, Google Inc, Korea’s Samsung, electric carmaker Tesla Motors Inc and ride-sharing startup Uber tripled from 2011 to 2014, according to an analysis by Thomson Reuters IP & Science of public patent filings.

Apple has filed far fewer of these patents than rivals, perhaps adding impetus to its recent hiring binge as it seeks to get up to speed in battery technologies and other car-building related expertise.

As of 18 months ago, Apple had filed for 290 such patents. By contrast, Samsung, which has been providing electric vehicle batteries for some years, had close to 900 filings involving auto battery technology alone.

The U.S. government makes patent applications public only after 18 months, so the figures do not reflect any patents filed in 2014.

Earlier this month, battery maker A123 Systems sued Apple for poaching five top engineers. A search of LinkedIn profiles indicates Apple has hired at least another seven A123 employees and at least 18 employees from Tesla since 2012.

The former A123 employees have expertise primarily in battery cell design, materials development and manufacturing engineering, according to the LinkedIn profiles and an analysis of patent applications.

A123, which filed for bankruptcy in 2012 but has since reorganized, supplied batteries for Fisker Automotive’s now-discontinued hybrid electric car.

“Looking at the people Apple is hiring from A123 and their backgrounds, it is hard not to assume they’re working on an electric car,” said Tom Gage, Chief Executive of EV Grid and a longtime expert in batteries and battery technology.

Apple is building its own battery division, according to the A123 lawsuit. Apple did not immediately respond to a request for comment.

Source

Cloud Analytics Growth Rate Will Continue

February 20, 2015 by  
Filed under Computing

Comments Off on Cloud Analytics Growth Rate Will Continue

It’s no secret that cloud computing and data analytics are both rapidly expanding areas within information technology. Put them together, and you get a winning combination that’s expected to grow by more than 26 percent annually over the next five years.

That’s according to market-tracking firm Research and Markets, which recently released a new report on the global cloud analytics market.

Increased adoption of data analytics is one of the major drivers in this market, Research and Markets found. More specifically, many organizations are adopting data analytics in order to better understand consumption patterns, customer acquisition and various other factors believed to increase revenue, cut costs and boost customer loyalty.

HP, IBM, Microsoft, Oracle and SAP are among the dominant vendors in this arena, the company said in a press release.

Big Data is one of the particularly significant trends in the market, Research and Markets said.

“Cloud analytics deals with the management of unorganized data, which helps organizations access important data and make timely decisions regarding their business,” the company said.

The rates of growth in this arena might actually be much higher than those suggested by the report, said analyst Ray Wang, founder of Constellation Research.

In fact, Constellation Research predicts an annual growth rate of closer to 46 percent until 2020, he said.

Early-arriving cloud companies like Salesforce “had great reporting, but they didn’t necessarily have great analytics,” Wang said.

It’s for that reason that challengers such as Actuate have popped up, he noted.

“More and more, because of the size and complication, we’re seeing analytics move to the cloud,” Wang said.

Source

ARM Buys Offspark For IoT

February 19, 2015 by  
Filed under Computing

Comments Off on ARM Buys Offspark For IoT

ARM has snaffled up Dutch Internet of Things (IoT) company Offspark.

The move is designed to improve ARM’s security credentials for IoT offerings.

Offspark is the creator of PolarSSL, a widely used protocol for IoT security products, and ARM hopes that the combined companies can offer a one-stop shop for IoT developers.

Krisztian Flautner, ARM’s IoT manager, said: “PolarSSL technology is already deployed by the leading IoT players.

“The fact that those same companies also use ARM Cortex processor and software technologies means we are now able to provide a complete bedrock solution for the industry to innovate from.”

The product will be renamed ARM Mbed TLS, but will remain open source, reports Tech Week Europe.

Paul Bakker, CEO of Offspark, added: “Security is the most fundamental aspect in ensuring people trust IoT technology and that is only possible with a truly tailored solution.

“Together, ARM and Offspark can provide security to the edge of any system and we look forward to working with our partners to help them deliver some exciting new projects.”

Developers will be able to license the technology for commercial use as well as embedding it into future ARM products.

Last week the company released the ARM Cortex-A72 processor, a 64-bit effort offering support for Android 5.x Lollipop and incorporating the big.LITTLE architecture that prioritises jobs to different processor cores based on their computational requirements.

A message on the Offspark website indicates that it has been taken down and redirects to ARM.

Source

Anthem Gets Hacked

February 17, 2015 by  
Filed under Computing

Comments Off on Anthem Gets Hacked

Health insurer Anthem Inc, which has nearly 40 million U.S. customers, has confirmed that hackers had breached one of its IT systems and stolen personal information relating to current and former consumers and employees.

The No. 2 health insurer in the United States said the breach did not appear to involve medical information or financial details such as credit card or bank account numbers.

The information accessed during the “very sophisticated attack” did include names, birthdays, social security numbers, street addresses, email addresses and employment information, including income data, the company said.

Anthem said that it immediately made every effort to close the security vulnerability and reported the attack to the FBI. Cybersecurity firm FireEye Inc FEYE. said it had been hired to help Anthem investigate the attack.

The company did not say how many customers and staff were affected, but the Wall Street Journal earlier reported it was suspected that records of tens of millions of people had been taken, which would likely make it the largest data breach involving a U.S. health insurer.

Anthem had 37.5 million medical members as of the end of December.

“This attack is another reminder of the persistent threats we face, and the need for Congress to take aggressive action to remove legal barriers for sharing cyber threat information,” U.S. Rep. Michael McCaul, a Republican from Texas and chairman of the Committee on Homeland Security, said in a statement late Wednesday.

Source

ARM Develops IoT For Students

February 3, 2015 by  
Filed under Computing

Comments Off on ARM Develops IoT For Students

ARM has created a course to teach IoT skills to students at University College London (UCL)

The course is designed to encourage graduates in science, technology, engineering and maths (Stem) to seek careers in IT.

The IoT Education Kit will teach students how to use the Mbed IoT operating system to create smartphone apps that control mini-robots or wearable devices.

Students are expected to be interested in building their own IoT business, or joining IoT-focused enterprises like ARM. The course will also try to limit the number of Stem graduates pursuing non-technology careers.

ARM reported statistics from a 2012 study by Oxford Policy and Research revealing how many engineering graduates (36 percent of males, 51 percent of females), technology graduates (44 percent, 53 percent) and computer scientists (64 percent, 66 percent) end up with non-Stem jobs.

The IoT Education Kit will be rolled out by UCL’s Department of Electronics from September 2015, with a week-long module for full-time and continuing professional development students.

The Kit comprises a complete set of teaching materials, Mbed-enabled hardware boards made by Nordic Semiconductor, and software licensed from ARM. A second teaching module for engineering graduates is being developed for 2016.

“Students with strong science and mathematical skills are in demand and we need to make sure they stay in engineering,” said ARM CTO Mike Muller.

“The growth of the IoT gives us a great opportunity to prove to students why our profession is more exciting and sustainable than others.”

UCL professor Izzat Darwazeh also highlighted the importance of Stem skills, saying that “many students are not following through to an engineering career and that is a real risk to our long-term success as a nation of innovators”.

Source

U.S. And Britain Ramping Up Cyber Defense

January 30, 2015 by  
Filed under Security

Comments Off on U.S. And Britain Ramping Up Cyber Defense

The U.S. and Britain are increasing their collaboration to thwart digital threats. They are planning to launch more attacks against each other to test their defenses and scare away possible enemies.

The U.S. and the U.K. have been working together to prevent cyber attacks for some time, but are going to increase the collaboration. They will combine their expertise to set up “cyber cells” on both sides of the Atlantic to increase sharing information about threats and to work out how to best protect themselves and create a system that lets hostile states and organization know they shouldn’t attack, said U.K. prime minister David Cameron in an interview published by the BBC.

Cyber attacks “are one of the biggest modern threats that we face,” according to Cameron who is visiting Washington for talks with U.S. president Barack Obama. One of the topics high on the agenda is digital security.

The countries will increase the “war games” launched at each other to test defenses. “It is happening already but it needs to be stepped up,” Cameron said, adding that British intelligence service GCHQ and the U.S. equivalent NSA have know-how that should be shared more.

“It is not just about protecting companies, it is also about protecting people’s data, about protecting people’s finances. These attacks can have real consequences to people’s prosperity,” he said.

However, in order to protect companies and citizens better, increased snooping powers to track terrorists on social networks are necessary, said Cameron. He is planning to discuss this issue with Obama and U.S. companies including Google and Facebook.

The increased cooperation between the countries comes in the wake of the Sony hack and the apparent hacking of the U.S. Central Command’s Twitter account by ISIS (Islamic State of Iraq and Syria), which posted tweets threatening families of U.S. soldiers and claiming to have hacked into military PCs.

Source

Verizon Fixes Serious Securty Flaw In FiOS

January 29, 2015 by  
Filed under Security

Comments Off on Verizon Fixes Serious Securty Flaw In FiOS

Verizon corrected a serious vulnerability in its My FiOS mobile application that granted unfettered access to email accounts, according to a developer who found the problem.

Randy Westergren, a senior software developer with XDA Developers, looked at the Android version of My FiOS, which is used for account management, email and scheduling video recordings.

“Since Verizon has a good amount of my information, I thought it would be a good candidate for research,” Westergren wrote on his personal blog. “I was right, and the results were astonishing.”

The flaw, contained in the application’s API, could have allowed an attacker to read individual messages from a person’s Verizon inbox and even send emails from an account, he wrote.

Westergren looked at the traffic sent back and forth between My FiOS and Verizon’s servers. He found My FiOS would return the content of someone else’s email inbox by simply substituting a different user ID in a request.

He contacted Verizony, which later acknowledged the problem. Verizon issued a fix last Friday, Westergren wrote.

“Verizon’s security group seemed to immediately realize the impact of this vulnerability and took it very seriously,” Westergren wrote. “They were very responsive during this process and even arranged for a free year of FiOS Internet service as a token of their gratitude.”

Source

« Previous PageNext Page »