Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Is China Mobile Good For Apple?

January 29, 2014 by  
Filed under Smartphones

Comments Off on Is China Mobile Good For Apple?

The tame Apple Press has enthusiastically been running storied about how well Apple is doing in China. Reuters for example has been saying that the one million pre-orders that Jobs’ Mob has just collected is a triumph for Tim Cook’s negotiating ability. Getting a deal out of China Mobile was something the sainted Steve Jobs could not manage.

However saner heads are urging caution, While it is true that launching its iPhone on China Mobile vast network on Friday, opening the door to the world’s largest carrier’s 763 million subscribers and giving its China sales a short-term jolt, it is not likely to last. For a start the deal could start a war which China Mobile would not want. Some analysts predicting a costly subsidy war as rival carriers compete to lure customers. If China Mobile does not make its targets on sales for these phones, they are going to increase the subsidies.

China Mobile’s iPhone sales are expected to reach 12 million in its 2014 fiscal year, but its subsidies will leap 57 percent to $7 billion. In addition, the prices are still really high for the Chinese market. For the basic 16GB iPhone 5S, with no subscriber contract, China Mobile is charging $870.

China Unicom and China Telecom slashed their iPhone prices by as much as $210 following the announcement that a deal had been struck between Apple and China Mobile. The pair have also offered a range of cut-price deals on contracts. But there are also some problems with the pre-orders. Reuters checks showed that there were multiple registrations using fake ID numbers which means that people are buying up hoping to make a swift buck on resales.

All this is the least of Apple’s Chinese worries. The outfit has fallen out of favour with consumers who are increasingly opting for domestic products. Those who want an iPhone do not need to pay excessively to get one through China mobile either. In China, you can buy handsets typically smuggled from Hong Kong and then sign up for a China Mobile contract. This is a swings and roundabouts for Apple. If people buy from China Mobile, they will not buy from Hong Kong so it will lose sales there. If they don’t then the China Mobile contract is rubbish.

Source

Tesla Updates Charging Software

January 22, 2014 by  
Filed under Around The Net

Comments Off on Tesla Updates Charging Software

Tesla Motors Inc is making changes to prevent overheating of its charging systems, including giving customers upgraded wall adapters and providing charging-software upgrades, the electric-car company said on Friday.

The moves come after a November garage fire involving a Model S in Irvine, California, which the Orange County Fire Authority said may have been caused by a Tesla charging system or by a connection at the electricity panel on the wall of the garage.

At the time, Tesla disagreed with the fire officials’ findings, denying that the charging electronics were related to the fire. A Tesla spokeswoman did not immediately respond to a question on Friday about whether the upgrades were related to the Irvine fire.

In a Friday press release, Tesla said that its goal was to prevent excessive heating of the adapters used to charge its cars. A variety of factors ranging from corrosion to inappropriate wiring of electrical outlets can cause overheating, the company said.

A December tweak to its charging software tackles the issue through reducing charging by 25 percent if the charging system detects fluctuations in power entering the vehicle, Tesla said.

“Tesla believes that this software update fully addresses any potential risks,” the release said. But as a precaution, it said it would make available an improved wall adapter with a thermal fuse for affected customers, staring in a few weeks.

Separately, three road fires in Model S sedans caused Tesla’s stock to fall sharply in October.

The fires occurred in Washington state, Tennessee and Mexico. In the U.S. incidents, Model S sedans caught fire after running over road debris. In Mexico, a Model S caught fire after striking a concrete wall.

On Friday, Tesla’s stock fell 1.23 percent to $145.72, up from levels under $120 in late November but down from its high of $194.50 in late September.

Source

SalesForce Goes Hacking

November 7, 2013 by  
Filed under Computing

Comments Off on SalesForce Goes Hacking

Salesforce.com really wants to attract lots of developers to its Dreamforce conference next month in San Francisco. As in, really.

Last Friday, the cloud software vendor announced a “hackathon” would be held at the conference, with US$1 million going to the developer or team who creates the top prize-winning mobile application with Salesforce.com technology.

“It’s not going to be easy — $1 million is going to bring out the best of the best,” Salesforce.com said in Friday’s announcement. “So don’t wait until Dreamforce! You’re going to want to get started now. With Force.com, Heroku, ExactTarget Fuel, Mobile Services and more — you’ve got a killer array of platform technology to use.”

Salesforce.com will also be providing some “pretty amazing new technology” for use at the show, the announcement adds.

In order to participate, developers have to either register for a full conference pass or a special $99 hacker pass.

The hackathon reflects Salesforce.com’s long courtship of developers to its development technologies, its AppExchange marketplace and recent efforts to build out more tooling for mobile application development.

Developers taking part in the hackathon will have plenty of competition, with some 20,000 programmers expected to attend Dreamforce overall. A “Hack Central” area will be open around the clock, supporting coders who want to work until the wee hours on their application.

In order to qualify, an application can’t have been previously released. The entries will be judged on four criteria counting 25 percent each: innovation, business value, user experience and use of Salesforce.com’s platform.

The second-place finisher will receive $50,000, with $25,000 going to the third-place winner. Fourth and fifth place will get $10,000 and $5,000, respectively.

Some 120,000 people are expected to register for Dreamforce this year. While some of that total will be watching online rather than in person, Dreamforce is now operating at a scale rivaling Oracle’s OpenWorld event, which happened last month.

Source

Does Intel Need Help?

October 7, 2013 by  
Filed under Computing

Comments Off on Does Intel Need Help?

As time runs out for Intel to bring its Internet-based TV service by the end of the year, the outfit has approached Samsung and Amazon to ask them to lend a hand. Intel has asked about providing funding and distribution for the service. It looks like the set-top box project could be scrapped if a strategic partner isn’t found soon.

OnCue was supposed to allow users to watch live TV, on demand, and other offerings. Intel said it would provide the hardware and services directly to consumers and that the box would come with a camera that can detect who is in front of the TV. More than 300 engineers are working on the project under Erik Huggers, the head of Intel Media. A version of the service running on Intel hardware is testing with 3,000 Intel employees. Goodness knows what content they are running. Intel is having difficulty getting content deals.

Intel has yet to announce any TV programming partners, and Time Warner Cable and other cable TV providers have been pressuring channel owners to shun pacts with Intel and other Internet-based TV providers. Samsung, which ships millions of smart TVs, could distribute the service as a bundle, while Amazon could provide access to its growing library of movies and TV shows.

Source

Is Apple Doomed?

August 22, 2013 by  
Filed under Consumer Electronics

Comments Off on Is Apple Doomed?

The necromancy department of Apple has been summoning the spirit of Steve Jobs in the hope of turning around its current dismal growth figures. For a while now, even amongst Apple fanboys, there has been a belief that Jobs’ Mob has gone done the tubes since Jobs croaked.

It is a myth of course, Jobs’ specialty was not innovation but to market a working ideas as if it were his own. But either way Apple is attempting to try and convince everyone that the new iPhone was personally designed by its former CEO. Even after being dead for a while now, and having no impact over the disasters the company has since suffered, Jobs apparently was on board for the iPhone 5S.

According to Apple’s government liaison Michael Foulkes, Jobs oversaw the design of two models of iPhone to go on sale after his death. We suspect that it will take full resurrection before anyone takes this particular spin seriously. If Jobs could really see into the future and predict where his toys would be three years after he died, we would have thought he would have also seen that was a stupid idea not to accept conventional medical treatment for his cancer until it was too late.

Source

Adobe Reader Security Issue Found

May 8, 2013 by  
Filed under Security

Comments Off on Adobe Reader Security Issue Found

McAfee has discovered a vulnerability in Adobe’s Reader program that allows people to track the usage of a PDF file.

“Recently, we detected some unusual PDF samples,” McAfee’s Haifei Li said in a blog post. “After some investigation, we successfully identified that the samples are exploiting an unpatched security issue in every version of Adobe Reader.”

The affected versions of Adobe Reader also include the latest “sandboxed” Reader XI (11.0.2).

McAfee said that the issue is not a “serious problem” because it doesn’t enable code execution, however it does permit the sender to see when and where a PDF file has been opened.

This vulnerability could only be dangerous if hackers exploited it to collect sensitive information such as IP address, internet service provider (ISP), or even the victim’s computing routine to eventually launch an advanced persistent threat (APT).

McAfee said that it is unsure who is exploiting this issue or why, but have found the PDFs to be delivered by an “email tracking service” provider.

The vulnerability works when a specific PDF JavaScript API is called with the first parameter having a UNC-located resource.

“Adobe Reader will access that UNC resource. However, this action is normally blocked and creates a warning dialog,” Li said. “The danger is that if the second parameter is provided with a special value, it changes the API’s behavior. In this situation, if the UNC resource exists, we see the warning dialog.

“However, if the UNC resource does not exist, the warning dialog will not appear even though the TCP traffic has already gone.”

McAfee said that it has reported the issue to Adobe and is waiting for their confirmation and a future patch. Adobe wasn’t immediately available for comment at the time of writing.

“In addition, our analysis suggests that more information could be collected by calling various PDF Javascript APIs. For example, the document’s location on the system could be obtained by calling the Javascript “this.path” value,” Li added.

Source

Apple Squashes Rumors

February 21, 2013 by  
Filed under Around The Net

Comments Off on Apple Squashes Rumors

Apple will not develop a new, inexpensive iPhone just for the sake of offering a cheaper alternative, Apple CEO Tim Cook said in a speech on Tuesday.

The company’s focus is on creating great products, and it will not make a smartphone that does not past the quality test, Cook said during a webcast from the Goldman Sachs Technology and Internet conference, which is being held in San Francisco.

“There are other companies that do that, that’s not who we are,” Cook said. “Our North Star is great products.”

Instead, the company is now dropping prices on the older iPhone models. That has been successful, and the demand for iPhone 4 models in December was greater than supply, Cook said.

“It surprised us as to the level of demand we have for it,” Cook said.

Lowering the price on older models is just one of the approaches Apple is taking to reach out to price-sensitive buyers. It’s not easy to balance quality and price, and that’s when innovation comes into play and new products could be created to meet consumer demand, Cook said.

“Sometimes you can take the issue … and you can solve it in different ways,” Cook said.

For example, the first iPod that shipped in 2001 was priced at $399, and now users can buy an iPod Shuffle for $49. There was also a big demand in the past to drop the price of Macs to under $500, and Apple tried and couldn’t do it, so it created the iPad tablet.

Source

Rambus Makes Cuts

August 30, 2012 by  
Filed under Computing

Comments Off on Rambus Makes Cuts

Technology licensing firm Rambus Inc said it has reorganized its businesses into three divisions and will slash its workforce by 15 percent as part of its efforts to cut costs.

The company, which has posted a loss for the last three consecutive quarters, appointed a new Chief Executive in June.

Rambus expects to save between $30 million and $35 million in cash annually, most of it from cuts in its general and administrative expenses.

The Sunnyvale, California-based company said the reductions in expense and related workforce will begin in the coming weeks and are expected to be completed during the fourth quarter.

It will take a related charge of $6 million over the next two quarters.

As of December 2011, the company had 456 employees.

Rambus said it now operates three business units — Memory and Interfaces, Cryptography Research Inc and Lighting and Display Technologies. It also named Martin Scott as the new role of chief technology officer.

Source…

Good Technology Updates Security

July 25, 2012 by  
Filed under Uncategorized

Comments Off on Good Technology Updates Security

Good Technology today announced two updates to its mobile security software products across IOS, Android and Windows Phone devices.

Powering mobile security for major enterprises such as Barclays, Sainsbury’s and LOCOG, Good Technology claims the releases are the first of a kind for the industry and address security threats linked to the bring your own device (BYOD) procedures being used in most big companies.

The first update announced by the firm is the addition of what it calls “Appkinetics” to its Good Dynamics line, which aims to solve the problem of secure private corporate data leakage.

“Good’s patented AppKinetics technology builds on the company’s proven ‘containerization’ security model to enable business apps from Good, its Good Dynamics partner independent software vendors (ISV), and internal enterprise developers,” the firm said in a statement.

“This is to securely exchange information within and between applications and create seamless multi-app workflows without compromising security or employees’ privacy and personal experience.”

The firm’s second update is the addition of eight new partnered apps to its Good Dynamics ecosystem covering the areas of business intelligence, collaboration, document editing, document printing, file storage/content management, remote desktop management and mobile application development platforms (MADPs).

This update allows developers to integrate the Good Dynamics technology into apps so that companies can create secure end-to-end workflows of protected, mobile applications to drive business processes.

Good Technology’s EMEA GM Andy Jacques explained, “If you download the standard consumer document editing application you can copy and paste from that from that app into another app.”

He continued, “If you were to open a piece of corporate mission critical data you can copy and paste that and put it onto Hotmail for example.”

Source…

Is Twitter Selling Your Tweets?

March 9, 2012 by  
Filed under Around The Net

Comments Off on Is Twitter Selling Your Tweets?

Twitter users are about to become major marketing meat, as two research companies prepare to release information to clients who will pay for the rights to mine that data.

Boulder, Colorado-based Gnip Inc and DataSift Inc, based in the U.K. and San Francisco, are licensed by Twitter to analyze archived tweets and basic information about users, like geographic location. DataSift announced this week that it will release Twitter data in packages that will encompass the last two years of activity for its customers to mine, while Gnip can go back only 30 days.

“Harvesting what someone said a year or more ago is game-changing,” said Paul Stephens, director of policy and advocacy for the Privacy Rights Clearinghouse in San Diego. As details emerge on the kind of information being mined, he and other privacy rights experts are concerned about the implications of user information being released to businesses waiting to pore through it with a fine-tooth comb.

“As we see Twitter grow and social media evolve, this will become a bigger and bigger issue,” said Graham Cluley, senior technology consultant for British-based Internet security company Sophos Ltd. “Online companies know which websites we click on, which adverts catch our eye, and what we buy … increasingly, they’re also learning what we’re thinking. And that’s quite a spooky thought.”

Twitter opted not to comment on the sale and deferred questions to DataSift. In 2010, Twitter agreed to share all of its tweets with the U.S. Library of Congress. Details of how that information will be shared publicly are still in development, but there are some stated restrictions, including a six-month delay and a prohibition against using the information for commercial purposes.

Source…

« Previous PageNext Page »