Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Will The Google Vs Oracle Kill Open Source Development

April 6, 2018 by  
Filed under Around The Net

A US Judge who clearly didn’t understand the full repercussions of what they were doing, has ruled that Google’s use of Java APIs in the original Android code did not constitute fair use, and that reparations are due.

Some analysts believe that Google could be $8bn to $9bn poorer as a result of the ruling, the latest chapter in a long-running dispute.

The story runs thus: Google used the Java code, formally owned by Sun Microsystems to create large swaths of the Android code.

That’s fine because the code is open-source. However, the Java APIs, now owned by Oracle, are not, and Oracle has long since argued that it deserves a piece of the billions made by Google through the Android platform.

Despite a ruling in Google’s favour citing fair use, Oracle persisted and the latest appeal has seen that decision overturned by the Federal Circuit, remanding the matter to California state judges to set damages.

The issue here is, as it always has been, a direct part of the future of open source itself – because if APIs are seen as a chargeable copyrightable asset, separate from the language itself, then back bedroom developers and smaller companies will find it impossible to afford to develop this way.

Additionally, the precedent could result in Oracle being able to pursue thousands of other companies in the same way.

Oracle has claimed that Android ‘destroyed’ the Java mobile market and is willing to fight for that, even if it brings down the entire IT playhouse down.

“The Court pointed out that it was not holding that “a fair use defense could never be sustained in an action involving the copying of computer code”. That may be right, but this Court had no qualms about assessing and reassessing evidence and arguments that were made to the jury.  It’s a decision that needs to be carefully and thoughtfully considered in any case involving fair use, particularly in the context of software,” said J Michael Keyes, a partner at Dorsey and Whitney who has been following the case.

He added that the ruling states that API packets are not to be considered ‘transformative’ and that even the slightest bit of proprietary code could be seen as enough to infringe copyright.

“This is a hugely important development in the law of copyright and fair use,” said Keyes.

It’s thought that the matter could now be escalated to the Supreme Court for yet another appeal.

Courtesy-TheInq

December 13, 2016 by  
Filed under Around The Net

Since October, millions of internet users have been exposed to malicious code embedded in the pixels from tainted banner ads designed to install Trojans and spyware, according to security firm ESET.

The attack campaign, called Stegano, has been spreading from malicious ads in a “number of reputable news websites,” ESET said in a Tuesday blog post. It’s been preying on Internet Explorer users by scanning for vulnerabilities in Adobe Flash and then exploiting them.

The attack is designed to infect victims with malware that can steal email password credentials through its keylogging and screenshot grabbing features, among others.

The attack is also hard to detect. To infect their victims, the hackers were essentially poisoning the pixels used in the tainted banner ads, ESET said in a separate post.

The hackers concealed their malicious coding in the parameters controlling the pixels’ transparency on the banner ad. This allowed their attack to go unnoticed by the legitimate advertising networks.

Victims will typically see a banner ad for a product called “Browser Defense” or “Broxu.” But in reality, the ad is also designed to run Javascript that will secretly open a new browser window to a malicious website designed to exploit vulnerabilities in Flash that will help carry out the rest of the attack.

Hackers have used similar so-called malvertising tactics to secretly serve malicious coding over legitimate online advertising networks. It’s an attack method that has proven to be a successful at quickly spreading malware to potentially millions.

The makers behind the Stegano attack were also careful to create safeguards to prevent detection, ESET said. For instance, the banner ads will alternate between serving a malicious version or a clean version, depending on the settings run on the victim’s computer. It will also check for any security products or virtualization software on the machine before proceeding with the attack.

ESET declined to name the news websites that were found unknowingly displaying the malicious ads, but cautioned that the attack was widespread, and could have been hosted through other popular sites as well.

Source-http://www.thegurureview.net/aroundnet-category/stegano-malvertising-ads-expose-millions-of-online-users-to-hacking.html

December 12, 2016 by  
Filed under Around The Net

The word on the information street is that Google wants to buy Facebook. It is entirely speculative, but could have legs.

Information leaked suggests that talks are well advanced between the two companies.

Anecdotal evidence from many Facebook users suggests that talks are well advanced and the companies are already sharing experimental data, between themselves, of user data. Other sources suggest that Microsoft (Vole) is also interested in Facebook and, conversely, that Facebook is interested in buying Microsoft.

None of the companies cared enough to comment to Fudzilla at press time.

Courtesy-Fud

December 9, 2016 by  
Filed under Around The Net

Researchers have worked out a way to push Wi-Fi speeds to 34 Gbps using the TeraHertz band.

While greater bandwidth in the 300GHz and above band has been known for a while it is pointless because the range makes it a chocolate teapot.

Some researchers have managed to hit 100 Gbps but when it only works for a few centimeters it is not commercially viable.

Now boffins at the Tokyo Institute of Technology have got the technology to provide a great 34 Gbps speed with a decent range.

Naoto Oshimo, one of the scientists behind this latest test, said that “device performance is almost sufficient for short-distance wireless communication such as KIOSK downloads, which might be its first application”. By that they mean that they have managed 10 metres, almost OK for home use.

Oshimo believes that this technology will scale hugely in terms of the speed as well, and we could eventually be looking at topping the 1Tbps mark.

Courtesy-Fud

December 7, 2016 by  
Filed under Around The Net

Two researchers report that they have discovered a way to bypass the activation lock feature in iOS that’s supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner.

The first report came Sunday from an Indian security researcher named Hemanth Joseph, who started investigating possible bypasses after being confronted with a locked iPad he acquired from eBay.

The activation lock gets enabled automatically when users turn on the Find My iPhone feature via iCloud. It links the device to their Apple IDs and prevents anyone else from accessing the device without entering the associated password.

One of the few things allowed from the activation lock screen is connecting the device to a Wi-Fi network, including manually configuring one. Hemanth had the idea of trying to crash the service that enforces the lock screen by entering very long strings of characters in the WPA2-Enterprise username and password fields.

The researcher claims that, after awhile, the screen froze, and he used the iPad smart cover sold by Apple to put the tablet to sleep and then reopen it. This is supposed to restore the state of the tablet from where it was left off, in this case, loading the WPA2 screen again with the long strings of characters filled in.

“After 20-25 seconds the Add Wifi Connection screen crashed to the iPad home screen, thereby bypassing the so-called Find My iPhone Activation Lock,” he said in a blog post.

Hemanth said he reported the issue to Apple on Nov. 4, and the company is investigating it. He tested the bypass on iOS 10.1, which was released on Oct. 24.

Last week, a researcher named Benjamin Kunz Mejri, from German outfit Vulnerability Lab, posted a video showing the same bypass, but on the newer iOS 10.1.1 version.

Kunz Mejri’s method is similar and also involves overflowing the Add Wi-Fi form fields with long strings of characters but also requires rotating the tablet’s screen in order to trigger the crash after the smart cover trick.

Apple has not yet confirmed that issue and did not immediately respond to a request for comment.

Source- http://www.thegurureview.net/mobile-category/researcher-prove-ios-activation-lock-can-be-bypassed.html

December 6, 2016 by  
Filed under Around The Net

Facebook Inc is developing a way to automatically flag offensive material in live video streams, building on a growing effort to use artificial intelligence to monitor content, said Joaquin Candela, the company’s director of applied machine learning.

The social media company has been embroiled in a number of content moderation controversies this year, from facing international outcry after removing an iconic Vietnam War photo due to nudity, to allowing the spread of fake news on its site.

Facebook has historically relied mostly on users to report offensive posts, which are then checked by Facebook employees against company “community standards.” Decisions on especially thorny content issues that might require policy changes are made by top executives at the company.

Candela told reporters that Facebook increasingly was using artificial intelligence to find offensive material. It is “an algorithm that detects nudity, violence, or any of the things that are not according to our policies,” he said.

The company already had been working on using automation to flag extremist video content, as Reuters reported in June.

Now the automated system also is being tested on Facebook Live, the streaming video service for users to broadcast live video.

Using artificial intelligence to flag live video is still at the research stage, and has two challenges, Candela said. “One, your computer vision algorithm has to be fast, and I think we can push there, and the other one is you need to prioritize things in the right way so that a human looks at it, an expert who understands our policies, and takes it down.”

Facebook said it also uses automation to process the tens of millions of reports it gets each week, to recognize duplicate reports and route the flagged content to reviewers with the appropriate subject matter expertise.

Chief Executive Officer Mark Zuckerberg in November said Facebook would turn to automation as part of a plan to identify fake news. Ahead of the Nov. 8 U.S. election, Facebook users saw fake news reports erroneously alleging that Pope Francis endorsed Donald Trump and that a federal agent who had been investigating Democratic candidate Hillary Clinton was found dead.

However, determining whether a particular comment is hateful or bullying, for example, requires context, the company said.

Source-http://www.thegurureview.net/aroundnet-category/facebook-developing-artificial-intelligence-to-patrol-live-videos.html

August 29, 2016 by  
Filed under Around The Net

MIT researchers have uncovered a way to transfer wireless data using a smartphone at a speed about three times faster and twice as far as existing technology.

The researchers developed a technique to coordinate multiple wireless transmitters by synchronizing their wave phases, according to a statement from MIT on Tuesday. Multiple independent transmitters will be able to send data over the same wireless channel to multiple independent receivers without interfering with each other.

Since wireless spectrum is scarce, and network congestion is only expected to grow, the technology could have important implications.

The researchers called the approach MegaMIMO 2.0 (Multiple Input, Multiple Output) .

For their experiments, the researchers set up four laptops in a conference room setting, allowing signals to roam over 802.11 a/g/n Wi-Fi. The speed and distance improvement is expected to also apply to cellular networks. A video describes the technology as well as a technical paper (registration required), which was presented this week to the Association for Computing Machinery’s Special Interest Group on Data Communications (SIGCOMM 16).

The researchers, from MIT’s Computer Science and Artificial Intelligence Lab, are: Ezzeldin Hamed, Hariharan Rahul, Mohammed Abdelghany and Dina Katabi.

Courtesy-http://www.thegurureview.net/mobile-category/mit-researchers-develop-technique-to-triple-wireless-speeds.html

Courtesy-http://www.thegurureview.net/mobile-category/mit-researchers-develop-technique-to-triple-wireless-speeds.html

August 26, 2016 by  
Filed under Around The Net

Apple is trying to convince the world it is “coming up with something new” by talking a lot about Artificial Reality.

It is a fairly logical development, the company has operated a reality distortion field to create an alternative universe where its products are new and revolutionary and light years ahead of everyone else’s. It will be curious to see how Apple integrates its reality with the real world, given that it is having a problem with that.

Apple CEO Tim Cook has been doing his best to convince the world that Apple really is working on something. He needs to do this as the iPhone cash cow starts to dry up and Jobs Mob appears to have no products to replace it.

In an interview with The Washington Post published Sunday, Cook said Apple is “doing a lot of things” with augmented reality (AR), the technology that puts digital images on top of the real world.
He said:

“I think AR is extremely interesting and sort of a core technology. So, yes, it’s something we’re doing a lot of things on behind that curtain we talked about.”

However Apple is light years behind working being done by Microsoft with its Microsoft’s HoloLens headset and the startup Magic Leap’s so-called cinematic reality that’s being developed now.

Cook appears to retreat to AR whenever he is under pressure. But so far he has never actually said that the company is developing any.

Appple has also snapped up several companies and experts in the AR space. And in January, the Financial Times claimed that the company has a division of hundreds of people researching the technology.
But AR would be a hard fit to get a product out which fits Apple’s ethos and certainly not one for years. Meanwhile it is unlikely we will see anything new before Microsoft and Google get their products out.

Courtesy-Fud

 

August 24, 2016 by  
Filed under Around The Net

CVS has rolled out its CVS Pay program that exists inside its mobile app. It allows customers to pay in store for prescriptions by scanning a barcode at the register.

Payments will be backed by a customer’s credit or debit card, the company said.

CVS Pay is currently available in New York, New Jersey, Pennsylvania and Delaware; a nationwide rollout at all 9,600 stores is expected to kick off later this year.

CVS doesn’t support Apple Pay or other NFC-based payment technologies, and its use of barcodes for payments is reminiscent of the way Starbucks customers pay for coffee. Working with the barcode technology was a faster way for CVS to bring forward technology for more convenient in-store payments, analysts said.

Other retailers have created in-store payments through their own apps. Walmart created Walmart Pay in December to allow payments through mobile device QR codes that can be read at checkout registers.

“There’s nothing really innovative here with CVS Pay,” said Gartner analyst Avivah Litan on Friday. “They are pretty much following the trend. It’s just mobile commerce with a credit card attached. It’s no big deal to put a credit card in a wallet.”

At one point, CVS was working with Walmart and dozens of other major retailers in the Merchant Customer Exchange, which was designed to process mobile payments electronically through bank accounts and not credit cards to cut out the card processing cost that merchants paid to banks. But MCX ended its pilot of its mobile app, CurrentC, in June. Analysts have predicted the concept will not continue.

Source-http://www.thegurureview.net/mobile-category/cvs-debuts-cvs-pay.html

August 5, 2016 by  
Filed under Around The Net

Amazon.com Inc announced that it has entered into a partnership with the British government to hasten the process for allowing small drones to makes deliveries.

The world’s biggest online retailer, which has laid out plans to start using drones for deliveries by 2017, said a cross-government team supported by the UK Civil Aviation Authority had provided it with the permissions necessary to explore the process.

Amazon unveiled a video last year showcasing how an unmanned drone could deliver packages, narrated by former Top Gear TV host Jeremy Clarkson.

The U.S. Federal Aviation Administration said last month the use of drones for deliveries will require separate regulation from their general use.

Wal-Mart Stores Inc said last month it was six to nine months from beginning to use drones to check warehouse inventories in the United States.

Source-http://www.thegurureview.net/aroundnet-category/u-k-regulators-give-amazon-permission-to-explore-drone-deliveries.html

Comments