Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Is Nintendo Going Into Film

May 30, 2016 by  
Filed under Around The Net

Movies like “Mario Kart” and “The Legend of Zelda” may possibly be making it to the big screen soon.

Nintendo Co Ltd is holding discussions with several global production companies about expanding its video content business, including making movies, said Tatsumi Kimishima, president of the Japanese videogame maker.

The move is aimed at strengthening Nintendo’s character business and expanding the global gaming population, he told the Asahi newspaper in an interview published Monday.

“We’re talking with various partners. I think we’ll be able to decide something in the not-too-distant future,” Kimishima told the Japanese daily.

Kimishima declined to say when any projects would be announced but said it would not be as far off as five years. He would not say which of Nintendo’s popular characters were being considered for use.

A Nintendo spokesman told Reuters that Kimishima’s comments referred to “video content” but did not deny the possibility of making movies.

Nintendo is diversifying its operations to counter a shrinking console business. It has entered the fast-growing mobile game segment and reached a deal with NBCUniversal to develop theme-park attractions.

In fact, Nintendo already allows film companies to use its characters through licensing agreements, such as for the “Pokemon” franchise. There was also a Hollywood live-action movie based on “Super Mario” in 1993 but it was a box office and critical bomb.

But Kimishima told the Asahi that this time, Nintendo would like to do things itself as much as possible, rather than just licensing out its content, and said it was unlikely to be live-action.

In 2014, “Super Mario” creator Shigeru Miyamoto screened a 3D short-animation film based on Nintendo’s Pikmin characters at the Tokyo International Film Festival, and in an interview with Reuters left the door open to future film projects.

Source- http://www.thegurureview.net/aroundnet-category/nintendo-mulls-entering-the-film-business.html

May 27, 2016 by  
Filed under Computing

The U.S. military is funding research for a mind-controlled prosthetic arm that is surgically implanted into the user’s body.

“This is the most advanced arm in the world,” Johnny Matheny, who lost his left arm to cancer in 2008 and demonstrated the robotic arm for DARPA, said in a statement. “This one can do anything your natural arm can do, with the exception of the Vulcan V. But unless I meet a Vulcan, I won’t need it.”

Matheny showed the arm during Demo Day for the Defense Advanced Research Projects Agency, the military’s research unit, which was held Wednesday at the Pentagon. The device was developed at the Research and Exploratory Development Department at Johns Hopkins Applied Physics Laboratory.

The robotic arm is attached to a piece of metal that is surgically implanted into the bone of the user’s arm in technique called osseointegration. Matheny is the first person in the U.S. to have undergone the procedure, according to the U.S. Army.

The Army called the system a “true man/machine interface.”

The mind-controlled aspect of the arm comes into play via the nerves and muscles in what remains of the user’s arm. Those tissues send signals to the robotic arm, which responds to them as a real arm would.

“This is part of the Revolutionizing Prosthetics Program, where we set out to restore near-natural upper extremity control to our military service members who have lost limbs in service of our country,” said Dr. Justin C. Sanchez, director of the Biological Technologies Office at DARPA, in a statement. “The goal is to control the arm as naturally as possible.”

The robotic arm, according to Sanchez, has the same size, weight, shape and grip strength as an adult biological arm.

Source-http://www.thegurureview.net/aroundnet-category/darpa-shows-off-mind-controlled-robotic-arm.html

May 26, 2016 by  
Filed under Smartphones

Apple shares are continuing to fall as more investors realise that the share price is not going to go up any more.

For a while now people have been buying Apple shares with the expectation that they will always go up. This always was largely based on a fantasy created by the Tame Apple Press that assumed the company would keep coming up with new technology ideas which would always be successful.

However lately Apple has not come up with any new ideas and has taken to re-issuing its old phone designs. It has also been floundering in its key Chinese market. The company’s only new idea has been for content creation through its Apple Music streaming brand. The only problem with that is that the software has been killing off user’s iTune libraries.  It has also been banned in China which means that hopes that Apple would make money there are still thwarted.

Shares of Apple dropped below $90 on Thursday for the first time since 2014 as Wall Street worried about slow demand ahead of the anticipated launch of a new iPhone later this year. Some more reasonable analysts even think that the iPhone 7 is going to be a disaster because it lacks any new tech and has the same design as the poor performing iPhone 6S

Component suppliers in Taiwan have confirmed that they have received fewer orders from Apple in the second half of 2016 than in the same period last year.

Rosenblatt Securities analyst Jun Zhang saidt that investors were getting negative data points about component orders and production forecasts, and the features on the new iPhone do not seem to be a big change from the 6S.

Apple briefly relinquished its position as the world’s largest company by market capitalisation to Alphabet – oh the horror.

At the close, Apple and Google each had market values of about $495 billion, according to Thomson Reuters data. In the past year, Apple’s market capitalization has fallen by more than $200 billion. Which just goes to show this whole value thing was an illusion.

Suppliers of iPhone components also fell, with Skyworks Solutions off 4.54 percent, Broadcom down 1.95 percent and Qorvo declining 1.76 percent.

Revenue from China slumped 26 percent during the March quarter. Apple faces increasing competition from Chinese manufacturers like Xiaomi and Huawei selling phones priced below $200, Rosenblatt’s Zhang said.

Last week, Dialog Semiconductor, which sells chips used in iPhones and other smartphones, cut its revenue outlook due to ongoing softness in the smartphone market.

The Tame Apple press is trying to do its best to find analysts who recommend buying the stock claiming it is too cheap.However how much should you pay for an outfit which has milked its cash cow and has nothing new on the horizon.

Courtesy-Fud

May 25, 2016 by  
Filed under Around The Net

Shortly after cancelling two generations of Atom mobile chips, Intel putting its weight behind future low-power mobile technologies with a new research collaboration with a French atomic energy lab.

Fundamental research leading towards faster wireless networks, secure low-power technologies for the Internet of Things, and even 3D displays will be the focus of Intel’s collaboration with the French Alternative Energies and Atomic Energy Commission (CEA).

Intel and the CEA already work together in the field of high-performance computing, and a new agreement signed Thursday will see Intel fund work at the CEA’s Laboratory for Electronics and Information Technology (LETI) over the next five years, according to Rajeeb Hazra, vice president of Intel’s data center group.

The CEA was founded in 1945 to develop civil and military uses of nuclear power. Its work with Intel began soon after it ceased its atmospheric and underground nuclear weapons test programs, as it turned to computer modeling to continue its weapons research, CEA managing director Daniel Verwaerde said Thursday.

That effort continues, but the organization’s research interests today are more wide-ranging, encompassing materials science, climate, health, renewable energy, security and electronics.

These last two areas will be at the heart of the new research collaboration, which will see scientists at LETI exchanging information with those at Intel.

Both parties dodged questions about who will have the commercial rights to the fruits of their research, but each said it had protected its rights. The deal took a year to negotiate.

“It’s a balanced agreement,” said Stéphane Siebert, director of CEA Technology, the division of which LETI is a part.

Who owns what from the five-year research collaboration may become a thorny issue, for French taxpayers and Intel shareholders alike, as it will be many years before it becomes clear which technologies or patents are important.

Hazra emphasized the extent to which Intel is dependent on researchers outside the U.S. The company has over 50 laboratories in Europe, four of them specifically pursuing so-called exa-scale computing, systems capable of billions of billions of calculations per second.

Source-http://www.thegurureview.net/mobile-category/intel-look-to-atomic-energy-for-mobile-technologys-future.html

May 24, 2016 by  
Filed under Around The Net

The IT department of the U.S. House of Representatives is prohibiting access to Yahoo Mail and the Google App Engine platform due to malware threats.

On April 30, the House’s Technology Service Desk informed users about an increase in ransomware-related emails on third-party email services like Yahoo Mail and Gmail.

“The House Information Security Office is taking a number of steps to address this specific attack,” the Technology Service Desk said in an email obtained and published by Gizmodo. “As part of that effort, we will be blocking access to Yahoo Mail on the House Network until further notice.”

The ban on Yahoo Mail access suggests that some House of Representatives workers accessed Yahoo mailboxes from their work computers. This raises questions: Are House workers using Yahoo Mail for official business, and, if they’re not, are they allowed to check their private email accounts on work devices?

If they use the same devices for both personal and work activities, one would hope that there are access controls in place to separate the work and personal data. Otherwise, if they are allowed to take those devices outside of the House’s network, they could just as easily become infected there, where the ban is not in effect.

“The recent attacks have focused on using .js files attached as ZIP files to e-mail that appear to come from known senders,” the House’s Technology Service Desk said. “The primary focus appears to be through Yahoo Mail at this time.”

The increase in ZIP and RAR attachments that contain malicious JavaScript (JS) files has been observed by multiple security companies in recent months. Microsoft offers several recommendations, like using the Windows AppLocker group policy to restrict the execution of .JS files.

The House Information Security Office also banned access to appspot.com, the domain name used by applications hosted on the Google App Engine platform, Reuters reported.

Source- http://www.thegurureview.net/aroundnet-category/u-s-house-of-representatives-block-yahoo-and-google-apps.html

May 23, 2016 by  
Filed under Computing

IBM Security has announced a new year-long research project through which it will partner with eight universities to help train its Watson artificial intelligence system to tackle cybercrime.

Knowledge about threats is often hidden in unstructured sources such as blogs, research reports and documentation, said Kevin Skapinetz, director of strategy for IBM Security.

“Let’s say tomorrow there’s an article about a new type of malware, then a bunch of follow-up blogs,” Skapinetz explained. “Essentially what we’re doing is training Watson not just to understand that those documents exist, but to add context and make connections between them.”

Over the past year, IBM Security’s own experts have been working to teach Watson the “language of cybersecurity,” he said. That’s been accomplished largely by feeding it thousands of documents annotated to help the system understand what a threat is, what it does and what indicators are related, for example.

“You go through the process of annotating documents not just for nouns and verbs, but also what it all means together,” Skapinetz said. “Then Watson can start making associations.”

Now IBM aims to accelerate the training process. This fall, it will begin working with students at universities including California State Polytechnic University at Pomona, Penn State, MIT, New York University and the University of Maryland at Baltimore County along with Canada’s universities of New Brunswick, Ottawa and Waterloo.

Over the course of a year, the program aims to feed up to 15,000 new documents into Watson every month, including threat intelligence reports, cybercrime strategies, threat databases and materials from IBM’s own X-Force research library. X-Force represents 20 years of security research, including details on 8 million spam and phishing attacks and more than 100,000 documented vulnerabilities.

Watson’s natural language processing capabilities will help it make sense of those reams of unstructured data. Its data-mining techniques will help detect outliers, and its graphical presentation tools will help find connections among related data points in different documents, IBM said.

Ultimately, the result will be a cloud service called Watson for Cyber Security that’s designed to provide insights into emerging threats as well as recommendations on how to stop them.

Source-http://www.thegurureview.net/computing-category/ibms-watson-to-get-schooled-on-cybersecurity.html

May 20, 2016 by  
Filed under Computing

Apple’s partner in crime, TSMC has begun to tape out the design for Apple’s A11 processor built on a 10nm FinFET process.

Digitimes’ deep throats claimed TSMC is expected to achieve certification on its 10nm process in the fourth quarter of 2016, and deliver product samples to the customer for validation in the first quarter of 2017.

This means that TSMC could begin small-volume production for Apple’s A11 chips as early as the second quarter of 2017 and building the chips will likely start to generate revenues at TSMC in the third quarter. The A11-series processor will power the iPhone models slated for launch in the second half of 2017.

TSMC is expected to get two-thirds of the overall A11 chip orders from Apple.

The company is officially refusing to comment on Digitimes’ story, but it does fit into what we have already been told about Jobs’ Mob’s plans for next year.

Courtesy-Fud

May 19, 2016 by  
Filed under Computing

FireEye has found a vulnerability in Qualcomm software packages which are under the bonnet of hundreds of Android phone models.

Google announced this week that it released an Android update to patch shedloads of vulnerabilities, but the advisory mentioned an information disclosure vulnerability in the Qualcomm tethering controller (CVE-2016-2060) that allows a malicious application to access user information.

FireEye said that this vulnerablity is “high severity,” but Google noted that it does not affect Nexus devices. The patch for the issue is not in the Android Open Source Project (AOSP) repository but might make it in the  latest driver updates for affected devices.

The security outfit said that researchers informed Qualcomm about the vulnerability in January and the vendor developed a fix by early March, when it started reaching out to OEMs to let them know about the issue. Now it’s up to the device manufacturers to push out the patch to customers. So probably a long time then.

The flaw exists in an open source software package maintained by Qualcomm and is related to the Android network daemon (netd).

“The vulnerability was introduced when Qualcomm provided new APIs as part of the ‘network_manager’ system service, and subsequently the ‘netd’ daemon, that allow additional tethering capabilities, possibly among other things,” FireEye said.

The flaw has been confirmed to affect devices running Android 5.0 Lollipop and earlier, which currently account for roughly three-quarters of Android devices. Researchers noted that the affected Qualcomm software package is used in a variety of projects, including the popular CyanogenMod, and the vulnerable APIs appear to have been around since at least 2011.

The vulnerability can be exploited to escalate privileges to the built-in “radio” user, which has permissions that are normally not available to a third-party app. The most efficient way to exploit CVE-2016-2060 is via a malicious application that is granted the “ACCESS_NETWORK_STATE” permission.

Courtesy-Fud

May 18, 2016 by  
Filed under Around The Net

It is looking incredibly unlikely that mobile phone use is giving anyone cancer.  A long term study into the incidence of brain cancer in the Australian population between 1982 to 2013 shows no marked increase.

The study, summarized on the Conversation site looked at the prevalence of mobile phones among the population against brain cancer rates, using data from national cancer registration.

The results showed a very slight increase in brain cancer rates among males, but a stable level among females. There were significant increases in over-70s, but this problem started before 1982.

The figures should have even been higher as Computed tomography (CT), magnetic resonance imaging (MRI) and related techniques, introduced in Australia in the late 1970s can spot brain tumors which could have otherwise remained undiagnosed.

The data matches up with other studies conducted in other countries, but in Australia all diagnosed cases of cancer have to be legally registered and this creates consistent data.

The argument that mobile phones cause cancer has been running ever since the phones first arrived. In fact the radiation levels on phones has dropped significantly over the years, just to be safe rather than sorry. However it looks like phones have had little impact on cancer statistics – at least in Australia.

http://www.thegurureview.net/mobile-category/do-smartphones-cause-cancer.html

May 17, 2016 by  
Filed under Around The Net

Twitter has prohibited a data-mining firm from providing analytics of real-time tweets to U.S. intelligence agencies, according to a Wall Street Journal report, quoting a person familiar with the matter.

Twitter, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.

Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies.

Twitter’s move appears to be in line with its policy on the use of its tweet data by external companies.

“Dataminr uses public Tweets to sell breaking news alerts to companies such as Wall Street Journal parent Dow Jones and government agencies such as the World Health Organization, for non-surveillance purposes,” Twitter said in a statement Sunday. “We have never authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes.”

U.S. intelligence agencies gained access to Dataminr’s service after In-Q-Tel, aventure capital organization backed by U.S. intelligence agencies, put money in the firm, the WSJ said, quoting a person familiar with the matter. Twitter is said to have conveyed to Dataminr that it didn’t want to continue the relationship with intelligence agencies at the end of a pilot by the data analysis firm arranged by In-Q-Tel. Dataminr does not figure in the list of In-Q-Tel portfolio companies on its website.

Source-http://www.thegurureview.net/uncategorized/twitter-blocks-intelligence-agencies-access-to-tweet-analytics.html

Comments