Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Office 365 Subscription Slows Signficantly 

August 1, 2016 by  
Filed under Around The Net

Comments Off on Office 365 Subscription Slows Signficantly 

Microsoft said that consumer subscriptions to Office 365 topped 23 million, signaling that the segment’s once quite large year-over-year growth had slowed significantly.

The Redmond, Wash. company regularly talks up the latest subscription numbers for the consumer-grade Office 365 plans — the $100 a year Home and the $70 Personal — and did so again this week during an earnings call with Wall Street analysts.

“We also see momentum amongst consumers, with now more than 23 million Office 365 subscribers,” CEO Satya Nadella said Tuesday.

But analysis of Microsoft’s consumer Office 365 numbers showed that the rate of growth — or as Nadella put it, “momentum” — has slowed.

For the June quarter, the 23.1 million cited by Microsoft in its filing with the U.S. Securities & Exchange Commission (SEC) represented a 52% increase over the same period the year prior. Although most companies would give their eye teeth — or maybe a few executives — to boast of a rate of increase that size, it was the smallest since Microsoft began providing subscription data in early 2013.

A year before, the June 2015 quarter sported a consumer Office 365 subscription growth rate of 171% over the same three-month span in 2014.

The subscription increase also was small in absolute terms: Microsoft added approximately 900,000 to the rolls during the June quarter, down from 2.8 million the year before and also less than the 1.6 million accumulated in 2016′s March quarter.

The 900,000 additional subscribers added in the June quarter were the smallest number in more than two years.

While Microsoft did not directly address the slowing of growth in the consumer Office 365 market, it did attribute a similar trend among corporate subscriptions to the difficulty of maintaining huge year-over-year percentage gains as the raw numbers of subscriptions increased.

Courtesy-http://www.thegurureview.net/aroundnet-category/microsofts-office-365-subscription-slows-signficantly.html

IBM’s Watson To Power Self-Driving Cars

June 29, 2016 by  
Filed under Computing

Comments Off on IBM’s Watson To Power Self-Driving Cars

Olli, a self-driving passenger shuttle running IBM Watson Internet of Things technology, made its debut in a shopping area of the Washington,D.C. suburbs.

While some “fine-tuning” of the self-driving features are needed, passengers, by this fall, should be able to ride around and speak directions to Olli on the private roads at the National Harbor shopping and entertainment area on the Maryland side of the Potomac River, according to a spokeswoman for Local Motors, the designer of Olli.

The vision is that Olli will be used in all kinds of venues, such as crowded urban areas, college and corporate campuses and theme parks. It could also become the “last mile” connection from a subway or bus stop to a job site. Miami-Dade County has ordered two of the vehicles for a pilot project there, said the Local Motors spokeswoman, Jacqueline Keidel.

Olli didn’t give any rides to reporters and bystanders at its Thursday debut, but the vehicle dropped off Local Motors CEO John Rogers with engineers standing by to offer assistance if needed.

“Olli offers a smart, safe and sustainable transportation solution that is long overdue,” Rogers said in a statement, adding that Olli with Watson “acts as our entry into the world of self-driving vehicles.”

Olli is the first vehicle to use cloud-based cognitive computing from IBM Watson Internet of Things to analyze and learn from 30 sensors embedded in the vehicle. Four Watson developer APIs were used that allow Olli to interact with passengers: speech to text, natural language classifier, entity extraction and text to speech.

Since Watson is web-enabled, Olli will also be able to answer questions about popular nearby restaurants or historical sites, at least according to how Local Motors and IBM have described the vehicle’s capabilities.

Green said IBM will expand its Watson IBM research by helping develop and create additional Ollis at Local Motors headquarters near Phoenix and at IBM Watson IoT’s AutoLab, an incubator for cognitive mobility applications. “We have a long term vision with Watson,” Keidel added.

Courtesy-http://www.thegurureview.net/aroundnet-category/ibms-watson-powers-self-driving-shuttle-olli-debuts-in-d-c.html

Hospitals Should Brace For Surge In Ransomware Attacks

April 18, 2016 by  
Filed under Security

Comments Off on Hospitals Should Brace For Surge In Ransomware Attacks

U.S. hospitals should brace for a surge in “ransomware” attacks by cyber criminals who take computer networks hostage, then demand payment in return for unlocking them, a non-profit healthcare group warned on Friday.

The Health Information Trust Alliance conducted a study of some 30 mid-sized U.S. hospitals late last year and found that 52 percent of them were infected with malicious software, HITRUST Chief Executive Daniel Nutkis told Reuters.

The most common type of malware was ransomware, Nutkis said, which was present in 35 percent of the hospitals included in the study of network traffic conducted by security software maker Trend Micro Inc.

Ransomware is malicious software that locks up data in computers and leaves messages demanding payment to recover the data. Last month, Hollywood Presbyterian Hospital in Los Angeles paid a ransom of $17,000 to regain access to its systems.

This week, an attack on MedStar Health forced the largest healthcare provider in Washington, D.C., to shut down much of its computer network. The Baltimore Sun reported a ransom of $18,500 was sought. MedStar declined to comment.

HITRUST said it expects such attacks to become more frequent because ransomware has turned into a profitable business for cyber criminals.

The results of the study, which HITRUST has yet to share with the public, demonstrate that hackers have moved away from focusing on stealing patient data, Nutkis said.

“If stuff isn’t working, they move on. If stuff is working, they keep doing it,” said Nutkis. “Organizations that are paying have considered their options, and unfortunately they don’t have a lot of options.”

Extortion has become more popular with cyber criminals because it is seen as a way to generate fast money, said Larry Whiteside, a healthcare expert with cyber security firm Optiv.

Stealing healthcare data is far more labor intensive, requiring attackers to keep their presence in a victim’s network undetected for months as they steal data, then they need to find buyers, he added.

“With ransomware I’m going to get paid immediately,” Whiteside said.

Courtesy- http://www.thegurureview.net/aroundnet-category/hospitals-should-brace-for-surge-in-ransomware-attacks.html

Malware Turns Computers Into Cellular Antenna

August 19, 2015 by  
Filed under Security

Comments Off on Malware Turns Computers Into Cellular Antenna

A team of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.

They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.

While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.

Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.

“If somebody wanted to get access to somebody’s computer at home — let’s say the computer at home wasn’t per se connected to the Internet — you could possibly receive the signal from outside the person’s house,” said Yisroel Mirsky, a doctoral student at Ben-Gurion University and study co-author.

The air-gapped computer that is targeted does need to have a malware program developed by the researchers installed. That could be accomplished by creating a type of worm that infects a machine when a removable drive is connected. It’s believed this method was used to deliver Stuxnet, the malware that sabotaged Iran’s uranium centrifuges.

The malware, called GSMem, acts as a transmitter on an infected computer. It creates specific, memory-related instructions that are transmitted between a computer’s CPU and memory, generating radio waves at GSM, UMTS and LTE frequencies that can be picked up by a nearby mobile device.

The GSMem component that runs on a computer is tiny. “Because our malware has such a small footprint in the memory, it would be very difficult and can easily evade detection,” said Mordechai Guri, also a doctoral student at Ben-Gurion.

Source

Microsoft To Open Source Radio Code

August 3, 2015 by  
Filed under Computing

Comments Off on Microsoft To Open Source Radio Code

Microsoft has begun to open source some more of its code, this time for the Microsoft Research Software Radio (Sora).

“We believe that a fully open source Sora will better support the research community for more scientific innovation,” said Kun Tan, a senior researcher on the Sora project team.

Sora was created to combat the problem of creating software radio that could keep up with the hardware developments going on around it.

The idea behind it is to run the radio off software on a multi-core PC running a basic operating system. In the example, it uses Windows. But then it would.

A PCIe radio control board is added to the machine with signals processed by the software for transmission and reception, while the RF front-end, with its own memory, interfaces with other devices.

The architecture also supports parallel processing by distributing processing pipelines to multiple cores exclusively for real-time SDR tasks.

Sora has already won a number of awards, and the Sora SDK and API were released in 2011 for academic users. More than 50 institutions now use it for research or courses.

As such, and in line with the groovy open Microsoft ethos, the software has now been completely open sourced, with customizable RF front-ends, customizable RCB with timing control and synchronization, processing accelerators and support for new communication models such as duplex radios.

The Sora source code is now up on GitHub. Use cases already in place include TV whitespace, large scale MIMO and distributed MIMO systems.

Microsoft has made a number of moves towards open sourcing itself over the past year. Most notably, The .NET Framework at the heart of most Windows programs was offered up to the newly created .NET Foundation.

It was announced yesterday that Google is releasing its Kubernetes code to the Linux Foundation to set up a standardized format for containerization.

Source

IBM Partners With BOX

July 6, 2015 by  
Filed under Computing

Comments Off on IBM Partners With BOX

IBM and BOX have signed a global agreement to combine their strengths into a cloud powerhouse.

The star-crossed ones said in a joint statement: “The integration of IBM and Box technologies, combined with our global cloud capabilities and the ability to enrich content with analytics, will help unlock actionable insights for use across the enterprise.”

Box will bring its collaboration and productivity tools to the party, while IBM brings social, analytic, infrastructure and security services.

The move is described as a strategic alliance and will see the two companies jointly market products under a co-banner.

IBM will enable the use of Box APIs in enterprise apps and web services to make a whole new playground for developers.

The deal will see Box integrate IBM’s content management, including content capture, extraction, analytics, case management and governance. Also aboard will be Watson Analytics to study in depth the content being stored in Box.

Box will also be integrated into IBM Verse and IBM Connections to allow full integration for email and social.

IBM’s security and consulting services will be part of the deal, and the companies will work together to create mobile apps for industries under the IBM MobileFirst programme.

Finally, the APIs for Box will be enabled in Bluemix meaning that anyone working on rich apps in the cloud can make Box a part of their creation.

Box seems to be the Nick Clegg to IBM’s ham-faced posh-boy robot in this relationship, but is in fact bringing more than you’d think to the party with innovations delivered by its acquisition of 3D modelling company Verold.

What’s more, the results of these collaborations should allow another major player to join Microsoft and Google in the wars over productivity platforms.

It was announced today that Red Hat and Samsung are forming their own coalition to bring enterprise mobile out of the hands of the likes of IBM and Apple which already have a cool thing going on with MobileFirst.

Source

Microsoft Unveils Hologram Visor

February 4, 2015 by  
Filed under Around The Net

Comments Off on Microsoft Unveils Hologram Visor

Microsoft Corp surprised the tech world with the unveiling of a prototype hologram visor that can bring the Minecraft video game, Skype calls and even the landscape of Mars to three-dimensional life.

The veteran tech pioneer, which long ago lost the mantle of the world’s most inventive company, is making a bold play to regain that title in the face of stiff competition from Google Inc and Apple Inc.

Virtual or enhanced reality is the next frontier in computing interaction, with Facebook Inc focusing on its Oculus virtual reality headset and Google working on its Glass project.

Microsoft said its wire-free Microsoft HoloLens device will be available around the same time as Windows 10 this autumn. Industry analysts were broadly excited at the prospect, but skeptical that it could produce a working model at a mass-market price that soon.

“That was kind of a ‘Oh wow!’ moment,” said Mike Silver, an analyst at Gartner who tried out the prototype on Wednesday. “You would expect to see a relatively high-priced model this year or next year, then maybe it’ll take another couple of years to bring it down to a more affordable level.”

Microsoft does not have a stellar record of bringing ground-breaking technology to life. Its Kinect motion-sensing game device caused an initial stir but never gripped the popular imagination.

The company showed off a crude test version of the visor – essentially jerry-rigged wires and cameras pulled over the head – to reporters and industry analysts at a gathering at its headquarters near Seattle.

It did not allow any photographs or video of the experience, but put some images on its website.

Source

U.S. And Britain Ramping Up Cyber Defense

January 30, 2015 by  
Filed under Security

Comments Off on U.S. And Britain Ramping Up Cyber Defense

The U.S. and Britain are increasing their collaboration to thwart digital threats. They are planning to launch more attacks against each other to test their defenses and scare away possible enemies.

The U.S. and the U.K. have been working together to prevent cyber attacks for some time, but are going to increase the collaboration. They will combine their expertise to set up “cyber cells” on both sides of the Atlantic to increase sharing information about threats and to work out how to best protect themselves and create a system that lets hostile states and organization know they shouldn’t attack, said U.K. prime minister David Cameron in an interview published by the BBC.

Cyber attacks “are one of the biggest modern threats that we face,” according to Cameron who is visiting Washington for talks with U.S. president Barack Obama. One of the topics high on the agenda is digital security.

The countries will increase the “war games” launched at each other to test defenses. “It is happening already but it needs to be stepped up,” Cameron said, adding that British intelligence service GCHQ and the U.S. equivalent NSA have know-how that should be shared more.

“It is not just about protecting companies, it is also about protecting people’s data, about protecting people’s finances. These attacks can have real consequences to people’s prosperity,” he said.

However, in order to protect companies and citizens better, increased snooping powers to track terrorists on social networks are necessary, said Cameron. He is planning to discuss this issue with Obama and U.S. companies including Google and Facebook.

The increased cooperation between the countries comes in the wake of the Sony hack and the apparent hacking of the U.S. Central Command’s Twitter account by ISIS (Islamic State of Iraq and Syria), which posted tweets threatening families of U.S. soldiers and claiming to have hacked into military PCs.

Source

Bitcoin Use Growing

September 8, 2014 by  
Filed under Around The Net

Comments Off on Bitcoin Use Growing

Bitcoin is gaing greater acceptance at U.S. online merchants including Overstock.com and Expedia, as customers use a digital currency that just a few years ago was virtually unknown but is now showing some staying power.

Though sales paid for in bitcoin so far at vendors interviewed for this article have been a fraction of one percent, they expect that as acceptance grows, the online currency will one day be as ubiquitous as the internet.

“Bitcoin isn’t going anywhere; it’s here to stay,” said Michael Gulmann, vice president of global products at Expedia Inc. in Seattle, the largest online travel agent. “We want to be there from the beginning.” Expedia started accepting bitcoin payments for hotel bookings on July 11.

Until recently a niche alternative currency touted by a fervent group of followers, bitcoin has evolved into a software-based payment online system. Bitcoins are stored in a wallet with a unique identification number and companies like Coinbase and Blockchain can hold the currency for the user.

When buying an item from a merchant’s website, a customer simply clicks on the bitcoin option and a pop-in window appears where he can type in his wallet ID number.

Still, broad-based adoption of bitcoin is at least five years away because most consumers still prefer to use credit cards, analysts said.

“Bitcoin is a new way of making payments, but it’s not solving a problem that’s broken,” said George Peabody, payments consultant at Glenbrook Partners in Menlo Park, California. “Retail payments aren’t broken.”

There are also worries about bitcoin’s volatility: its price in U.S. dollars changes every day.

That risk is borne by the consumer and the bitcoin payment processor, such as Coinbase or Bitpay, not the retailer. The vendor doesn’t hold the bitcoin and is paid in U.S. dollars. As soon as a customer pays in bitcoin, the digital currency goes to the payment processor and the processor immediately pays the merchant, for a fee of less than 1 percent.

“We don’t have to deal with the actual holding of the bitcoin: it’s the payment processor that takes the currency risk for us,” said Bernie Han, chief operating officer at Dish Network Corp, in Englewood, Colorado. “That’s what makes it appealing for us and I guess for other merchants as well.”

Source

NSA Software Reengineered

July 8, 2014 by  
Filed under Computing

Comments Off on NSA Software Reengineered

Hackers have found a way to reverse engineer the technology of the United States National Security Agency (NSA) spy gadgets.

Thanks to documents leaked by fugitive former NSA contractor and whistleblower Edward Snowden, the group has built a copycat device able to gather private data from computer systems.

The Advanced Network Technology catalogue, leaked by Snowden, is the Argos book of the NSA showing a range of toys available to agents. One such device known has a “retro reflector” had eluded identification, beyond that it acted as a bug, keylogger and screengrabber.

Michael Ossman and his team from Great Scott Gadgets, a Colorado based hacking group, decided that the best defence against such devices was to create their own to understand what makes them tick.

It transpired that the key technology being used is called software defined radio (SDR), an approach that uses software to generate radio transmissions through signal processing, doing away with a lot of hardware circuitry.

“SDR lets you engineer a radio system of any type you like really quickly so you can research wireless security in any radio format,” Ossmann told New Scientist.

The technique can be used for almost any type of radio signal and therefore the devices are capable of tracking anything, from what you’re listening to through a Bluetooth headset to the binary signals of your internet traffic.

The group, which will demonstrate its work at the Defon hacking conference in Las Vegas, runs a website at NSAplayset.org that is a repository for all of the information it gathered.

Source

Next Page »