Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Will MS Debut A Lumia Business Phone Next Year? 

December 7, 2015 by  
Filed under Smartphones

Comments Off on Will MS Debut A Lumia Business Phone Next Year? 

Microsoft surprised the world when its new phone range failed to contain anything to interest business users – now it seems it is prepared to remedy that.

Microsoft promised that its Lumia range would cover the low end, business and enthusiast segments but while the Lumia 950 and Lumia 950 XL and Lumia 650 should cover the low-end segment as well nothing has turned up for business users.

This was odd, given that business users want phones that play nice with their networks, something that Redmond should do much better than Google or Apple.

Microsoft’s CFO Amy Hood told the UBS Global Technology Conference that business versions of the Lumia were coming. She said:

“We launched a Lumia 950 and a 950 XL. They’re premium products, at the premium end of the market, made for Windows fans. And we’ll have a business phone, as well.”

There were no details, but we have been hearing rumours of a Surface phone being sighted on benchmarks. It was thought that his would be a Microsoft flagship, but with the launch of the Lumia 950/950 XL, it is possible that this Surface phone could be aimed at the business user. The word Surface matches nicely with Microsoft’s Surface Pro branding.

Source-http://www.thegurureview.net/mobile-category/will-microsoft-debut-a-lumia-business-phone-next-year.html

GPU Shipments Appear To Be On The Rise

December 1, 2015 by  
Filed under Computing

Comments Off on GPU Shipments Appear To Be On The Rise

Beancounters at JPR have been adding up the numbers and dividing by their shoe size and worked out that GPU shipments are up for both Nvidia and AMD.

Over the last few months both have been busy with new releases. Nvidia has its GeForce GTX 950 and GTX 980 Ti, while AMD put its first HBM-powered cards in the Radeon R9 Fury X, Fury and the super-small R9 Nano into the shops.

According to JPR, overall GPU shipments are up quarter-over-quarter – with AMD’s overall GPU shipments up 15.8 per cent. But before AMD fanboys get all excited by a surprise return to form from AMD, JPR said that that NVIDIA “had an exceptionally strong quarter”. Nvidia saw an uptick of 21.3 per cent.

The PC market as a whole increased by 7.5 per cent quarter-over-quarter but decreased 9 per cent year-over-year. Nivida’s discrete GPU shipments were up 26.3 per cent according to JPR, while AMD’s discrete GPUs spiked by 33 per cent.

AMD’s mobile GPU shipments for notebooks increased by 17 per cent, while NVIDIA had 14 per cent.

Courtesy-http://www.thegurureview.net/computing-category/gpu-shipments-appear-to-be-on-the-rise.html

Imagination Gives MIPS Warrior A Boost

November 24, 2015 by  
Filed under Computing

Comments Off on Imagination Gives MIPS Warrior A Boost

Imagination Technologies has introduced three new additions to the MIPS Warrior CPU family, updating its embedded 32-bit M-class CPUS with the new M6200 and M6250, as well as the higher performing P-class CPU with the 64-bit P6600.

The MIPS P6600 is touted as “the next evolution” of the P-class family and is intended to “pave the way” to future generations of higher performance 64-bit processors.

The MIPS P6600 builds on the 32-bit P5600 CPU, which was the company’s first CPU core based on the MIPS Series 5 architecture and announced about two years ago. The MIPS Series 5 was designed to accelerate compute-intensive applications and thereby appeal to the embedded and mobile markets.

The P6600 CPU boasts a higher performing 64-bit architecture while other improvements over its predecessor include a deep 16-stage pipeline with multi-issue and Out-of-Order execution to deliver better computational throughput for complex software workloads.

“The P6600 CPU is the most balanced mainstream high-performance CPU choice, enabling powerful multicore 64-bit system of chips with optimal area efficiency for applications in segments including mobile, home entertainment, networking, automotive, HPC or servers, and more,” said the chip firm, adding that customers have already licensed the P6600 for applications including high-performance computing and advanced image and vision systems.

Like the P5600, MIPS P6600 is an OmniShield-ready design that supports full hardware virtualisation and security features. It is said to be able to handle up to 15 guest operating systems running simultaneously in fully isolated and trusted environments, too.

“This unprecedented level of scalability for virtualisation and security gives the MIPS Warrior family another unique advantage in the battle for supremacy in the processor space,” added the firm.

The P6600 packs a faster SIMD engine for accelerating multimedia processing as well as branch prediction and a load/store instruction bonding mechanism: two technologies that Imagination said will provide a boost in real-world workloads while keeping silicon area and power consumption in check.

As for the MIPS M6200 and M6250 chips, these are the latest additions to Imagination’s less powerful M-class family processors for MCUs/MPUs, further broadening the M-class roadmap for high-performance deeply embedded designs in segments requiring higher performance and larger address space.

Imagination said this could include things like wired/wireless modems, GPU supervisor processors, flash and SSD controllers, industrial and motor control, and advanced audio voice processing.

Source-http://www.thegurureview.net/computing-category/imagination-gives-mips-warrior-a-boost.html

xCodeGhost To Wreak Havoc On IOS Devices

November 23, 2015 by  
Filed under Computing

Comments Off on xCodeGhost To Wreak Havoc On IOS Devices

A security firm has released a list of ongoing and incoming threats that cover a range of things from Apple’s iOS to the Internet of Things (IoT).

In its third report this year, Quick Heal warns that Apple users in particular better brace themselves for impact as more and more malware writers who’ve earned their stripes targeting Android users turn their attention to iOS.

“As the number of iPhone owners rises across the world, iOS has become a new potential target for Android malware authors and hackers. It is expected that Android malware will soon be altered to attack iOS users as well, and jailbroken iOS devices will be the first wave of targets for these attacks,” explained the firm (PDF).

“Recently, the ‘XcodeGhost’ malware was found on the Apple App Store and this is just the beginning of such attacks.”

In a section on wearables, Quick Heal predicts hackers will increasingly target fitness trackers, something that other security researchers have already warned about.

A lot of space in the report is reserved for Android-flavoured threats, and users are offered advice on protecting themselves such as if there is an option to use a password over a touch sign-in, then you ought to take it.

“A group of researchers have discovered a serious security flaw in the Android Lollipop version running on devices right now. This flaw allows attackers to bypass the lockscreen of an Android smartphone by using a massive password and thereby exposing the homescreen,” it explains.

“The attack essentially works by opening the in-built camera application and afflicts people using a password to protect their Android device and lock their screen.”

The most significant Android threat is a rascal called Android.Airpush.G, which claims 30 percent of the bug pool and is the kind of adware thing that makes you want to take a hammer to your phone screen. The second most prominent issue is Android.Reaper.A, which can haul in a large data harvest when in place.

Quick Heal is not the only security company in town, and a post on the Symantec website also seems set to put the fear into the Apple user community. That post, read it here – if you dare, says that the Mabouia ransomware is capable of causing a problem for Mac and PC users alike.

Fortunately, Mabouia is a proof-of-concept attack that a researcher shared with both Apple and Symantec. Symantec says that the PoC effort achieves at least one first.

“Mabouia is the first case of file-based crypto ransomware for OS X, albeit a proof-of-concept. Macs have nevertheless already been targeted by ransomware in the form of browser-based threats,” it explained.

“For example, in 2013, researchers at Malwarebytes discovered browser-based ransomware that targeted Safari for Mac users through a malicious website. The website directed Windows users to a drive-by download, while Mac users were served JavaScript that caused Safari to display persistent pop-ups informing the user their browser had been “locked” by the FBI for viewing illegal content.”

Source-http://www.thegurureview.net/computing-category/will-the-xcodeghost-malware-wreak-havoc-on-ios-devices.html

Microsoft To Block SHA-1 Hashing

November 19, 2015 by  
Filed under Computing

Comments Off on Microsoft To Block SHA-1 Hashing

Software Giant Microsoft has joined Mozilla and will consider blocking the SHA-1 hashing algorithm on Windows to keep the US spooks from using it to spy on users computers.

Redmond had earlier said that Windows would block SHA-1 signed TLS (Transport Layer Security) certificates from January 1, 2017, but is now mulling moving up the date to June.

There have been concerns about the algorithm’s security as researchers have proven that a forged digital certificate that has the same SHA-1 hash as a legitimate one can be created. Users can then be tricked into interacting with a spoofed site in what is called a hash collision.

In October, a team of cryptoanalysts warned that the SHA-1 standard should be withdrawn as the cost of breaking the encryption had dropped faster than expected to US$75,000 to $120,000 in 2015 using freely available cloud computing.

Programme manager for Microsoft Edge Kyle Pflug wrote in his blog that Redmond will coordinate with other browser vendors to evaluate the impact of this timeline based on telemetry and current projections for feasibility of SHA-1 collisions.

Mozilla said in October that in view of recent attacks it was considering a cut-off of July 1, 2016 to start rejecting all SHA-1 SSL certificates, regardless of when they were issued, ahead of an earlier scheduled date of January 1, 2017.

Courtesy- http://www.thegurureview.net/computing-category/microsoft-to-block-sha-1-hashing.html

Sprint Confirms Jobs To Be Cut 

November 17, 2015 by  
Filed under Around The Net

Comments Off on Sprint Confirms Jobs To Be Cut 

Sprint Chairman and SoftBank CEO Masayoshi Son has confirmed that job cuts at Sprint will be “in the thousands” as part of a restructuring plan.

His comments came as SoftBank, which owns more than 70% of Sprint, reported its quarterly earnings.

“Sprint is now in the position to increase the pace of user acquisition while cutting costs,” Son said, according to Bloomberg and other news sources. “We will also cut staff. The cuts will be in the thousands.”

Son’s comments are not out of line with things Sprint CEO Marcelo Claure has been telling Sprint workers for months.

On Tuesday, Sprint’s stock price sagged downward after an earnings report included a statement saying that the carrier plans to cut $2 billion or more in operating expenses for its 2016 fiscal year, which begins in April.

Son also said the $2 billion is a “minimum target” and should be the amount slashed annually, according to a report by The Wall Street Journal. The company now has more than $25 billion in annual costs.

Sprint has been investing in attracting new customers — an effort that has been costly but effective. On Tuesday, Sprint reported it gained 237,000 postpaid phone customers in its second fiscal quarter, which ended Sept. 30. It was the first time the company had showed gains on that measure in two years. It also reported its lowest customer cancellation rate in company history.

In November 2014, Sprint had said it would cut 2,000 jobs as part of $1.5 billion in cost reductions. That announcement came after Sprint had cut 5,000 jobs from January through September 2014. The company had 31,000 workers at the start of its current fiscal year on April 1.

Source- http://www.thegurureview.net/mobile-category/sprint-confirms-thousands-of-jobs-to-be-cut.html

Britain’s New Surveillance Plans Raises Privacy Concerns

November 16, 2015 by  
Filed under Around The Net

Comments Off on Britain’s New Surveillance Plans Raises Privacy Concerns

Britain has announced plans for sweeping new surveillance powers, including the right to find out which websites people visit, measures ministers say are vital to keep the country safe but which critics denounce as an assault on freedoms.

Across the West, debate about how to protect privacy while helping agencies operate in the digital age has raged since former U.S. intelligence contractor Edward Snowden leaked details of mass surveillance by British and U.S. spies in 2013.

Experts say part of the new British bill goes beyond the powers available to security services in the United States.

The draft was watered down from an earlier version dubbed a “snoopers’ charter” by critics who prevented it reaching parliament. Home Secretary Theresa May told lawmakers the new document was unprecedented in detailing what spies could do and how they would be monitored.

“It will provide the strongest safeguards and world-leading oversight arrangements,” she said. “And it will give the men and women of our security and intelligence agencies and our law enforcement agencies … the powers they need to protect our country.”

They would be able to require communication service providers (CSPs) to hold their customers’ web browsing data for a year, which experts say is not available to their U.S. counterparts.

“What the British are attempting to do, and what the French have already done post Charlie Hebdo, would never have seen the light of day in the American political system,” Michael Hayden, former director of the U.S. National Security Agency and Central Intelligence Agency, told Reuters.

May said that many of the new bill’s measures merely updated existing powers or spelled them out.

Police and spies’ access to web use would be limited to “Internet connection records” – which websites people had visited but not the particular pages – and not their full browsing history, she said.

“An Internet connection record is a record of the communications service that a person has used – not a record of every web page they have accessed,” May said. “It is simply the modern equivalent of an itemised phone bill.”

Source-http://www.thegurureview.net/aroundnet-category/britains-new-surveillance-plans-raise-ire-of-privacy-advocates.html

Oracle’s M7 Processor Has Security On Silicon

November 10, 2015 by  
Filed under Computing

Comments Off on Oracle’s M7 Processor Has Security On Silicon

Oracle started shipping systems based on its latest Sparc M7 processor, which the firm said will go a long way to solving the world’s online security problems by building protection into the silicon.

The Sparc M7 chip was originally unveiled at last year’s Openworld show in San Francisco, and was touted at the time as a Heartbleed-prevention tool.

A year on, and Oracle announced the Oracle SuperCluster M7, along with Sparc T7 and M7 servers, at the show. The servers are all based on the 32-core, 256-thread M7 microprocessor, which offers Security in Silicon for better intrusion protection and encryption, and SQL in Silicon for improved database efficiency.

Along with built-in security, the SuperCluster M7 packs compute, networking and storage hardware with virtualisation, operating system and management software into one giant cloud infrastructure box.

Oracle CTO Larry Ellison was on hand at Openworld on Tuesday to explain why the notion of building security into the silicon is so important.

“We are not winning a lot of these cyber battles. We haven’t lost the war but we’re losing a lot of the battles. We have to rethink how we deliver technology especially as we deliver vast amounts of data to the cloud,” he told delegates.

Ellison said that Oracle’s approach to this cyber war is to take security as low down in the stack as possible.

“Database security is better than application security. You should always push security as low in the stack as possible. At the bottom of the stack is silicon. If all of your data in the database is encrypted, that’s better than having an application code that encrypts your data. If it’s in the database, every application that uses that database inherits that security,” he explained.

“Silicon security is better than OS security. Then every operating system that runs on that silicon inherits that security. And the last time I checked, even the best hackers have not figured out a way to download changes to your microprocessor. You can’t alter the silicon, that’s really tricky.”

Ellison’s big idea is to take software security features out of operating systems, VMs and even databases in some cases – because software can be changed – and instead push them into the silicon, which can’t be. He is also urging for security to be switched on as default, without an option to turn it back off again.

“The security features should always be on. We provide encryption in our databases but it can be switched off. That is a bad idea. There should be no way to turn off encryption. The idea of being able to turn on and off security features makes no sense,” he said.

Ellison referred back to a debate that took place at Oracle when it first came up with its backup system – should the firm have only encrypted backups. “We did a customer survey and customers said no, we don’t want to pay the performance penalty in some cases,” he recalled. “In that case customer choice is a bad idea. Maybe someone will forget to turn on encryption when it should have been turned on and you lose 10 million credit cards.”

The Sparc M7 is basically Oracle’s answer to this dire security situation. Ellison said that while the M7 has lots of software features built into the silicon, the most “charismatic” of these is Silicon Secured Memory, which is “deceptively simple” in how it works.

“Every time a computer program asks for memory, say you ask for 8MB of memory, we compute a key and assign this large number to that 8MB of memory,” he explained. “We take those bits and we lock that memory. We also assign that same number to the program. Every time the program accesses memory, we check that number to make sure it’s the memory you allocated earlier. That compare is done by the hardware.”

If a program tries to access memory belonging to another program, the hardware detects a mismatch and raises a signal, flagging up a possible breach or bug.

“We put always-on memory intrusion detection into the silicon. We’re always looking for Heartbleed and Venom-like violations. You cannot turn it off,” the CTO warned.

“We’ve also speeded up encryption and decompression, which is kind of related to encryption. It runs at memory speed there’s zero cost in doing that. We turn it on, you can’t turn it off, it’s on all the time. It’s all built into the M7.”

Ellison claimed that running M7-based systems will stop threats like Heartbleed and Venom in their tracks.

“The way Venom worked, the floppy disc driver concealed this code. It’s the worst kind of situation, you’re writing into memory you’re not supposed to. You’re writing computer instructions into the memory and you’ve just taken over the whole computer,” he explained. “You can steal and change data. M7 – the second we tried to write that code into memory that didn’t belong to that program, where the keys didn’t match, that would have been detected real-time and that access would have been foiled.

All well and good, except for the fact that nearly every current computer system doesn’t run off the M7 processor. Ellison claimed that even if only three or four percent of servers in the cloud an organisation is using have this feature, they will be protected as they’ll get the early warning to then deal with the issue across non-M7 systems.

“You don’t have to replace every micro processor, you just have to replace a few so you get the information real-time,” he added.

“You’ll see us making more chips based on security, to secure our cloud and to sell to people who want to secure their clouds or who want to have secure computers in their datacentre. Pushing security down into silicon is a very effective way to do that and get ahead of bad guys.”

SuperCluster M7 and Sparc M7 servers are available now. Pricing has not been disclosed but based on normal Oracle hardware costs, expect to dig deep to afford one.

Source-http://www.thegurureview.net/computing-category/oracles-new-m7-processor-has-security-on-silicon.html

Verizon Goes IoT

November 9, 2015 by  
Filed under Computing

Comments Off on Verizon Goes IoT

Verizon has rolled out ThingSpace, a development platform for companies of all sizes to create Internet of Things applications more efficiently and then later manage those apps.

The carrier also announced it is creating a new dedicated network core for IoT connections that can scale far beyond the ability of its existing networks with the intent to reach billions of sensors and devices.

“Continued innovation in smart cities, connected cars and wearables demonstrates that IoT is the future for how we will live and work,” said Mike Lanman, senior vice president of enterprise products at Verizon during an event held at Verizon’s San Francisco Innovation Center. He said Verizon is taking a “holistic approach” to help expand the IoT market from millions of connections to billions. The event was webcast.

Other major wireless carriers, including AT&T, are developing programs to offer a range of services to industries and cities for connecting IoT sensors to wireless networks and then to cloud services for data analysis.

At Verizon, Lanman said the company is working to lower the cost of connecting billions of existing devices that companies have used for years to Verizon’s network. Holding up a new computer chip made by Sequans Communications, an LTE chip maker, he said the chip will provide a “significant reduction in cost…that changes the game.” It will provide 4G LTE connectivity in modules connected to IoT devices to “make the wide-area network more accessible to developers.”

Also, next year Verizon will launch a new IoT core network within its LTE network to provide a “much lower cost” than with Verizon’s existing wired and wireless networks.

“The cost for an IoT module and the cost to connect will both drop dramatically,” Lanman added. “Whether you are connecting your dog or water meters and any other low-payload devices, we’ll handle it through a new IoT core.”

Source-http://www.thegurureview.net/consumer-category/verizon-launches-thingspace-for-iot-development.html

Sony To Acquire Toshiba’s Sensor Business

November 4, 2015 by  
Filed under Consumer Electronics

Comments Off on Sony To Acquire Toshiba’s Sensor Business

Toshiba Corp is offload its image sensor business to Sony Corp for around 20 billion yen ($164.68 million) as part of a restructuring plan laid out earlier this year, sources with knowledge of the deal said on Saturday.

Toshiba, whose businesses range from laptops to nuclear power, is undergoing a restructuring after revelations this year that it overstated earnings by $1.3 billion going back to fiscal 2008/09.

Image sensors, which are used in digital cameras and smartphones, are part of Toshiba’s system LSI semiconductor business. Toshiba plans to sell its image sensor manufacturing plant in Oita, southern Japan, and pull out of the sensor business altogether, said the sources, who declined to be identified.

The sale is likely to be finalized soon, the sources said.

Toshiba is considering several options for its system LSI semiconductor business and its discrete semiconductor business and that debate is ongoing, a Toshiba official said when contacted.

An official from Sony declined to comment.

Masashi Muromachi, who became Toshiba’s CEO following the accounting scandal, has promised to restructure lower-margin businesses.

The deal for the image sensor business would be the beginning of the restructuring, Nikkei reported earlier on Saturday.

Sony is already a dominant player in the image sensor market, with its products used in phones made by China’s Xiaomi and India’s Micromax Informatix Ltd.

Courtesy-http://www.thegurureview.net/consumer-category/sony-to-acquire-toshibas-sensor-business.html

« Previous PageNext Page »