Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Banks Join Instant Chat

October 16, 2013 by  
Filed under Around The Net

Comments Off on Banks Join Instant Chat

Goldman Sachs Group Inc, JPMorgan Chase & Co and six other financial institutions have agreed to join a new instant messaging network from Markit and Thomson Reuters Corp to connect disparate messaging systems.

The network, called Markit Collaboration Services, launched on Monday and allows members to chat with one another regardless of the proprietary messaging technology that each firm uses.

This open platform differs Bloomberg LP’s messaging system, which is a closed network only for users of Bloomberg terminals.

Bloomberg messaging is the most popular form of chat on Wall Street, and often cited as one of the reasons banks are willing to pay around $20,000 a year for a subscription to a Bloomberg terminal.

Markit and Thomson Reuters said they hoped their open messaging network will attract banks that want to chat with their clients or other financial institutions but cannot currently do so because they are on different messaging systems.

The other banks that have joined the new network are Deutsche Bank, Bank of America Merrill Lynch, Barclays, Citigroup, Credit Suisse and Morgan Stanley, according to a statement from Markit.

The banks collectively employ more than 1 million people worldwide, though it was not immediately clear how many individuals will use the new Markit service.

David Craig, president of Thomson Reuters’ Financial & Risk division, said one of the challenges facing banks is that their messaging systems do not always talk to one another. “That creates costs and complexity,” he said.

Markit and Thomson Reuters said the messages on the new network are encrypted, and the system does not store them.

Representatives from Bank of America, Deutsche Bank, Goldman Sachs and Morgan Stanley were not immediately available to comment on the new messaging system. Representatives from Barclays, Citi, Credit Suisse and JPMorgan also declined to comment.

Source

Chip Makers Going After Cars

October 14, 2013 by  
Filed under Around The Net

Comments Off on Chip Makers Going After Cars

Chip makers including Broadcom and Renesas Electronics are putting more focus on in-car entertainment with faster processors and networks for wireless HD movies and navigation, aiming to keep drivers informed and passengers entertained.

With PC sales slipping and the mobile device market proving highly competitive, chip makers are looking for greener pastures in other sectors like in-car entertainment and information.

From Renesas comes the R-Car M2 automotive SoC (System-on-a-Chip), which has enough power to handle simultaneous high-definition navigation, video and voice-controlled browsing.

The SoC is meant for use in mid-range systems. It features two ARM Cortex A-15 cores running at up to 1.5GHz and Renesas’ own SH-4A processor plus the PowerVR SGX544MP2 from Imagination Technologies for 3D graphics. This combination helps the M2 exceed the previous R-Car H1 with more than three times the CPU capacity and approximately six times better graphics performance.

Car makers that want to put a more advanced entertainment system in their upcoming models should go for the eight core R-Car H2 SoC, which was announced earlier this year. It is based on ARM’s big.LITTLE architecture, and uses four Cortex-A15 cores and another four Cortex-A7 cores.

The H2 will be able to handle four streams of 1080p video, including Blu-Ray at 60 frames per second, according to Renesas. Mass production is scheduled for the middle of next year, while the M2 won’t arrive in larger volumes until June 2015.

Broadcom on the other hand is seeking to drive better networking on the road. The company’s latest line of wireless chipsets for in-car connectivity uses the fast 802.11ac Wi-Fi wireless standard, which offers enough bandwidth for multiple displays and screen resolution of up to 1080p. Use of the 5GHz band for video allows it to coexist with Bluetooth hands-free calls on 2.4GHz, according Broadcom.

Broadcom has also implemented Wi-Fi Direct and Miracast. Wi-Fi Direct lets products such as smartphones, cameras and in this case in-car computers connect to one another without joining a traditional hotspot network, while Miracast lets users stream videos and share photos between smartphones, tablets and displays.

The BCM89335 Wi-Fi and Bluetooth Smart Ready combo chip and the BCM89071 Bluetooth and Bluetooth Smart Ready chip are now shipping in small volumes.

Source

Inventor Predicts Future Of 3D

October 1, 2013 by  
Filed under Around The Net

Comments Off on Inventor Predicts Future Of 3D

Pablos Holman predicts that in the not too distant future our diets will be tailored to our metabolisms, adding a few bits of broccoli, a smattering of beets and some meat — all extruded from a 3D printer in an appetizing form to please our palates.

Holman is a futurist and inventor at the Intellectual Ventures Laboratory in Bellevue, Wash., where he and others work on futuristic projects like printable food. He was not alone in speaking on the topic at the Inside 3D Printing Conference last week.

Avi Reichentall, CEO of 3D Systems, one of the largest consumer printer companies, has already been able to configure his machines to create a variety of sugary goods, including cakes and candy. The sweets were on display with ornate designs.

Reichentall said consumers can expect his company to build a machine that will take a place next to the coffee maker on a kitchen counter, but instead of a caffeine shot, it will offer a sugar rush.

“We are working on a chocolate printer. I want a chocolate printer in my kitchen. I want it to be as cool as a Keurig coffee maker,” Reichentall said. “We now have 3D printed sugar. We’re going to bring to pastry chefs and confectionaries and bakers a whole range of new sugar printing capabilities.

“This is coming to a marketplace near you very soon,” he said.

While Reichentall focuses on desserts, Holman is busy with main courses, creating machines that can take freeze-dried food and hydrate it as it is being extruded through nozzles to create an eye-pleasing meal.

Source

HP To Support The iPad

September 30, 2013 by  
Filed under Consumer Electronics

Comments Off on HP To Support The iPad

Is your iPad out of warranty? Hewlett-Packard to the rescue.

HP updated its SmartFriend support service and will now troubleshoot problems with Windows, Android, Chrome OS, OS X and iOS products, according to a fact sheet describing the service.

“HP is expanding its HP SmartFriend service to provide 1:1 expert support for any brand of PC or tablet,” the company said. The plan previously supported PCs from HP and other vendors, as well as Macs.

Users can avail of the service to address general hardware, software and malware issues. HP says its agents can “remove viruses, improve PC performance, solve software errors, and connect devices to a wireless network with enhanced security.” The support is provided by phone or over the Internet, so don’t expect a technician to trot in and fix your iPad in person. But HP notes it can save you from driving to a store.

Unlike Best Buy’s Geek Squad service, HP’s service does not include hardware repairs. It can be tricky to change the battery or storage in tablets, so for iPads, the Genius Bars at Apple Stores may still be the best option for some repairs.

HP didn’t immediately comment on exactly what support it will provide for the iPad. HP printers offer wireless printing from iPads and iPhones. HP sells primarily Windows PCs and Android tablets, though on last Thursday it announced the Pavilion 14 laptop with Google’s Chrome OS.

While SmartFriend includes support for iOS devices, the service seems focused mainly on Windows products. Its technicians include “Microsoft Application Trainers, Microsoft Product Specialists, A+/MCP/MCSE Certified Professionals, Network Administrators and HTML Developers,” according to the fact sheet.

The service starts at US$9.99 per month and users can sign up for a pre-paid, monthly or yearly support plan. A “Complete Plan” supports two devices, while a “Family Plan” supports up to four devices.

Source

IBM Goes Linux

September 27, 2013 by  
Filed under Computing

Comments Off on IBM Goes Linux

IBM reportedly will invest $1bn in Linux and other open source technologies for its Power system servers.

The firm is expected to announce the news at the Linuxcon 2013 conference in New Orleans, pledging to spend $1bn over five years on Linux and related open source technologies.

The software technology will be used on IBM’s Power line of servers, which are based on the chip technology of the same name and used for running large scale systems in data centres.

Previously IBM Power systems have mostly run IBM’s proprietary AIX version of Unix, though some used in high performance computing (HPC) configurations have run Linux.

If true, this will make the second time IBM coughs up a $1bn investment in Linux. IBM gave the open source OS the same vote of confidence around 13 years ago.

According to the Wall Street Journal, IBM isn’t investing in Linux to convert its existing AIX customers, but instead Linux will help support data centre applications driving big data, cloud computing and analytics.

“We continue to take share in Unix, but it’s just not growing as fast as Linux,” said IBM VP of Power development Brad McCredie.

The $1bn is expected to go mainly for facilities and staffing to help Power system users move to Linux, with a new centre being opened in France especially to help manage that transition.

Full details are planned to be announced at Linuxcon later today.

Last month, IBM swallowed Israeli security firm Trusteer to boost its customers’ cyber defences with the company’s anti-hacking technology.

Announcing that it had signed a definitive agreement with Trusteer to create a security lab in Israel, IBM said it planned to focus on mobile and application security, counter-fraud and malware detection staffed by 200 Trusteer and IBM researchers.

Source

Does The Cloud Need To Standardize?

September 20, 2013 by  
Filed under Computing

Comments Off on Does The Cloud Need To Standardize?

Frank Baitman, the CIO of the U.S. Department of Health and Human Services (HHS), was at the Amazon Web Services conference  praising the company’s services. Baitman’s lecture was on the verge of becoming a long infomercial, when he stepped back and changed direction.

Baitman has reason to speak well of Amazon. As the big government system integrators slept, Amazon rushed in with its cloud model and began selling its services to federal agencies. HHS and Amazon worked together in a real sense.

The agency helped Amazon get an all-important security certification best known by its acronym, FedRAMP, while Amazon moved its health data to the cloud. It was the first large cloud vendor to get this security certification.

“[Amazon] gives us the scalability that we need for health data,” said Baitman.

But then he said that while it would “make things simpler and nicer” to work with Amazon, since they did the groundwork to get Amazon federal authorizations, “we also believe that there are different reasons to go with different vendors.”

Baitman said that HHS will be working with other vendors as it has with Amazon.

“We recognize different solutions are needed for different problems,” said Baitman. “Ultimately we would love to have a competitive environment that brings best value to the taxpayer and keeps vendors innovating.”

To accomplish this, HHS plans to implement a cloud broker model, an intermediary process that can help government entities identify the best cloud approach for a particular workload. That means being able to compare different price points, terms of service and service-level agreements.

To make comparisons possible, Baitman said the vendors will have to “standardize in those areas that we evaluate cloud on.”

The Amazon conference had about 2,500 registered to attend, and judging from the size of the crowd it certainly appeared to have that many at the Washington Convention Center. It was a leap in attendance. In 2012, attendance at Amazon’s government conference was about 900; in 2011, 300 attended; and in 2010, just 50, Teresa Carlson, vice president of worldwide public sector at Amazon, said in an interview.

Source

Dell Bets On Windows 8

September 16, 2013 by  
Filed under Computing

Comments Off on Dell Bets On Windows 8

Demand for Windows 8 may be still somewhat lukewarm, but Dell is maintaining its stance that it is the best operating system for business tablets and plans to roll out more Windows 8-based products later this year, according to a senior executive at the computer maker.

“Our Windows tablets are more secure and easier to manage than Android-based products and iOS-based products [because Windows is] on our tablets,” said Jeff Clarke, vice chairman and president of global operations at Dell. “And we are not going to change that.”

Windows-based devices accounted for just 4.5% of tablet sales in this year’s second quarter, according to research firm IDC. In comparison, Android-based devices had 62.6% of the tablet market and Apple’s iPad had 32.5%.

The slow adoption of Windows 8 tablets is partly due to their high prices, and to the operating system’s lack of mobile apps, analysts say. Windows 8 has also received mixed reviews, with some people citing its lack of a Start button in the desktop mode as a major problem.

But Dell expects demand for Windows 8 devices to pick up with the availability of Windows 8.1, which Microsoft will release in October.

Source

Is The Tesla Hackable?

September 9, 2013 by  
Filed under Security

Comments Off on Is The Tesla Hackable?

It’s the curse of the connected car once it’s linked to the Internet, it’s, well, on the Internet. In the case of the Tesla Model S, this means that mischievous hackers could, in theory, control some functions of the vehicle and even snoop without the owner’s knowledge.

Tesla offers Android and iPhone apps for Model S owners, which can be used to check the vehicle’s battery, track its location and status, and tweak several other settings, like climate control and the sunroof. It can also be used to unlock the doors on the Model S.

Dell senior engineer George Reese says the REST API used by Tesla to provide access for Android and iPhone apps has several fairly serious security flaws, which could offer a way in for unscrupulous hackers.

According to an article written by Reese for O’Reilly, Tesla appears to have broken from accepted best practice when designing the API for the Model S.

“It’s flawed in a way that makes no sense. Tesla ignored most conventions around API authentication and wrote their own. As much as I talk about the downsides to OAuth (a standard for authenticating consumers of REST APIs–Twitter uses it), this scenario is one that screams for its use,” he wrote.

However, Reese notes, this is merely a potential attack vector, not one that could be immediately exploited. That said, a compromised website particularly one designed to provide “value-added services” via the API to Tesla drivers could prove highly damaging.

“I can … honk their horns, flash their lights, and open and close the sunroof. While none of this is catastrophic, it can certainly be surprising and distracting while someone is driving,” Reese wrote.

Automotive hacking has been posited by experts for some time, and several presentations at this year’s Defcon detailed fairly comprehensive methods of compromising some models.

Source

Apple To Acquire Embark

September 3, 2013 by  
Filed under Consumer Electronics

Comments Off on Apple To Acquire Embark

Apple is reportedly purchasing mapping app developer Embark, in a move that could lend more real-time navigation features for public transit to Apple’s own Maps app.

The acquisition, which was first reported by tech journalist Jessica Lessin, follows other recent mapping purchases for Apple: HopStop, another maker of apps for public transit directions; and Locationary, which provides data about local businesses; and WifiSLAM, an indoor location and mapping company.

Apple did not directly confirm its acquisition of Embark, but in an emailed statement said, “Apple buys smaller technology companies from time to time, and we generally do not discuss our purpose or plans.”

Apple declined to comment further on the deal.

Apple has faced some serious challenges over the past year in providing a consistently solid mapping product with its Maps app. Last September Apple CEO Tim Cook was forced to publicly apologize for a series of issues plaguing the company’s Maps app in Apple’s iOS 6 operating system.

Embark is a company based in the San Francisco Bay Area that makes a mobile mapping app designed to help people navigate mass transit systems. The company’s app provides “tailored trips” specific to the user’s region, along with notifications for late-running trains and other advisories and closures.

Embark’s technology, if it does find its way into a future Apple product, could enhance Apple’s mapping products and make the company a stronger competitor to rivals like Google. Google’s Maps app already offers real-time public transit navigation features, as do some smaller players like iTransitBuddy.

Embark’s app is available for free on the iPhone for 10 transit systems including Boston’s MBTA, Chicago’s L, the New York City Subway and San Francisco’s Bart and Caltrain systems, with more on the way, according to Embark’s website.

It is not clear whether Embark’s app will be shut down as part of the acquisition. The app was still available in Apple’s App Store at the time of this article’s posting.

Embark’s team could not be immediately reached to comment on the deal.

Source

Chinese Hackers Go After Dissidents

August 26, 2013 by  
Filed under Around The Net

Comments Off on Chinese Hackers Go After Dissidents

The “Comment Crew,” a group of China-based hackers whose outing earlier this year in major media outlets caused a conflict with the U.S., have resumed their attacks against dissidents.

FireEye, a security vendor that specializes in trying to stop sophisticated attacks, has noticed attackers using a fresh set of tools and evasion techniques against some of its newer clients, which it can’t name. But Rob Rachwald, director of market research for FireEye, said in an interview Monday that those clients include an organization in Taiwan and others involved in dissident activity.

The Comment Crew was known for many years by security analysts, but its attacks on The New York Times, described in an extensive report in February from vendor Mandiant, thrust them into an uncomfortable spotlight, causing tense relations between the U.S. and China.

Rachwald said it is difficult to determine if the organizations being targeted now were targeted by the Comment Crew previously, but FireEye said last month that the group didn’t appear to be hitting organizations they had compromised before.

Organizations opposing Chinese government policies have frequently been targeted by hackers in what are believed to be politically motivated surveillance operations.

The Comment Crew laid low for about four months following the report, but emerging clues indicate they haven’t gone away and in fact have undertaken a major re-engineering effort to continue spying. The media attention “didn’t stop them, but it clearly did something to dramatically alter their operations,” Rachwald said in an interview.

“If you look at it from a chronological perspective, this malware hasn’t been touched for about 18 months or so,” he said. “Suddenly, they took it off the market and started overhauling it fairly dramatically.”

FireEye researchers Ned Moran and Nart Villeneuve described the new techniques on Monday on FireEye’s blog.

Two malware samples, called Aumlib and Ixeshe, had been used by the Comment Crew but not updated since 2011. Both malware programs have now been altered to change the appearance of their network traffic, Rachwald said.

Many vendors use intrusion detection systems to spot how malware sends data back to an attacker, which helps determine if a network has been compromised. Altering the method and format for how the data is sent can trick those systems into thinking everything is fine.

In another improvement, encryption is now employed to mask certain components of the programs’ networking communication, Rachwald said. The malware programs themselves, which are designed to steal data and log keystrokes, are basically the same.

Mandiant’s report traced the hacking activity to a specific Chinese military unit called “61398.” The company alleged that it waged a seven-year hacking spree that compromised 141 organizations.

Rachwald said it is strongly believed the Comment Crew is behind the new attacks given its previous use of Aumlib and Ixeshe. But the group has also re-engineered its attack infrastructure so much over the last few months that it is difficult to say for sure.

Source

« Previous PageNext Page »