Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Intel Looking Into Atomic Energy

May 25, 2016 by  
Filed under Around The Net

Comments Off on Intel Looking Into Atomic Energy

Shortly after cancelling two generations of Atom mobile chips, Intel putting its weight behind future low-power mobile technologies with a new research collaboration with a French atomic energy lab.

Fundamental research leading towards faster wireless networks, secure low-power technologies for the Internet of Things, and even 3D displays will be the focus of Intel’s collaboration with the French Alternative Energies and Atomic Energy Commission (CEA).

Intel and the CEA already work together in the field of high-performance computing, and a new agreement signed Thursday will see Intel fund work at the CEA’s Laboratory for Electronics and Information Technology (LETI) over the next five years, according to Rajeeb Hazra, vice president of Intel’s data center group.

The CEA was founded in 1945 to develop civil and military uses of nuclear power. Its work with Intel began soon after it ceased its atmospheric and underground nuclear weapons test programs, as it turned to computer modeling to continue its weapons research, CEA managing director Daniel Verwaerde said Thursday.

That effort continues, but the organization’s research interests today are more wide-ranging, encompassing materials science, climate, health, renewable energy, security and electronics.

These last two areas will be at the heart of the new research collaboration, which will see scientists at LETI exchanging information with those at Intel.

Both parties dodged questions about who will have the commercial rights to the fruits of their research, but each said it had protected its rights. The deal took a year to negotiate.

“It’s a balanced agreement,” said Stéphane Siebert, director of CEA Technology, the division of which LETI is a part.

Who owns what from the five-year research collaboration may become a thorny issue, for French taxpayers and Intel shareholders alike, as it will be many years before it becomes clear which technologies or patents are important.

Hazra emphasized the extent to which Intel is dependent on researchers outside the U.S. The company has over 50 laboratories in Europe, four of them specifically pursuing so-called exa-scale computing, systems capable of billions of billions of calculations per second.

Source-http://www.thegurureview.net/mobile-category/intel-look-to-atomic-energy-for-mobile-technologys-future.html

IBM’s Watson Goes Cybersecurity

May 23, 2016 by  
Filed under Computing

Comments Off on IBM’s Watson Goes Cybersecurity

IBM Security has announced a new year-long research project through which it will partner with eight universities to help train its Watson artificial intelligence system to tackle cybercrime.

Knowledge about threats is often hidden in unstructured sources such as blogs, research reports and documentation, said Kevin Skapinetz, director of strategy for IBM Security.

“Let’s say tomorrow there’s an article about a new type of malware, then a bunch of follow-up blogs,” Skapinetz explained. “Essentially what we’re doing is training Watson not just to understand that those documents exist, but to add context and make connections between them.”

Over the past year, IBM Security’s own experts have been working to teach Watson the “language of cybersecurity,” he said. That’s been accomplished largely by feeding it thousands of documents annotated to help the system understand what a threat is, what it does and what indicators are related, for example.

“You go through the process of annotating documents not just for nouns and verbs, but also what it all means together,” Skapinetz said. “Then Watson can start making associations.”

Now IBM aims to accelerate the training process. This fall, it will begin working with students at universities including California State Polytechnic University at Pomona, Penn State, MIT, New York University and the University of Maryland at Baltimore County along with Canada’s universities of New Brunswick, Ottawa and Waterloo.

Over the course of a year, the program aims to feed up to 15,000 new documents into Watson every month, including threat intelligence reports, cybercrime strategies, threat databases and materials from IBM’s own X-Force research library. X-Force represents 20 years of security research, including details on 8 million spam and phishing attacks and more than 100,000 documented vulnerabilities.

Watson’s natural language processing capabilities will help it make sense of those reams of unstructured data. Its data-mining techniques will help detect outliers, and its graphical presentation tools will help find connections among related data points in different documents, IBM said.

Ultimately, the result will be a cloud service called Watson for Cyber Security that’s designed to provide insights into emerging threats as well as recommendations on how to stop them.

Source-http://www.thegurureview.net/computing-category/ibms-watson-to-get-schooled-on-cybersecurity.html

TSMC Working On Apple’s A11 Processor

May 20, 2016 by  
Filed under Computing

Comments Off on TSMC Working On Apple’s A11 Processor

Apple’s partner in crime, TSMC has begun to tape out the design for Apple’s A11 processor built on a 10nm FinFET process.

Digitimes’ deep throats claimed TSMC is expected to achieve certification on its 10nm process in the fourth quarter of 2016, and deliver product samples to the customer for validation in the first quarter of 2017.

This means that TSMC could begin small-volume production for Apple’s A11 chips as early as the second quarter of 2017 and building the chips will likely start to generate revenues at TSMC in the third quarter. The A11-series processor will power the iPhone models slated for launch in the second half of 2017.

TSMC is expected to get two-thirds of the overall A11 chip orders from Apple.

The company is officially refusing to comment on Digitimes’ story, but it does fit into what we have already been told about Jobs’ Mob’s plans for next year.

Courtesy-Fud

Is Qualcomm Facing Another Security Flaw?

May 19, 2016 by  
Filed under Computing

Comments Off on Is Qualcomm Facing Another Security Flaw?

FireEye has found a vulnerability in Qualcomm software packages which are under the bonnet of hundreds of Android phone models.

Google announced this week that it released an Android update to patch shedloads of vulnerabilities, but the advisory mentioned an information disclosure vulnerability in the Qualcomm tethering controller (CVE-2016-2060) that allows a malicious application to access user information.

FireEye said that this vulnerablity is “high severity,” but Google noted that it does not affect Nexus devices. The patch for the issue is not in the Android Open Source Project (AOSP) repository but might make it in the  latest driver updates for affected devices.

The security outfit said that researchers informed Qualcomm about the vulnerability in January and the vendor developed a fix by early March, when it started reaching out to OEMs to let them know about the issue. Now it’s up to the device manufacturers to push out the patch to customers. So probably a long time then.

The flaw exists in an open source software package maintained by Qualcomm and is related to the Android network daemon (netd).

“The vulnerability was introduced when Qualcomm provided new APIs as part of the ‘network_manager’ system service, and subsequently the ‘netd’ daemon, that allow additional tethering capabilities, possibly among other things,” FireEye said.

The flaw has been confirmed to affect devices running Android 5.0 Lollipop and earlier, which currently account for roughly three-quarters of Android devices. Researchers noted that the affected Qualcomm software package is used in a variety of projects, including the popular CyanogenMod, and the vulnerable APIs appear to have been around since at least 2011.

The vulnerability can be exploited to escalate privileges to the built-in “radio” user, which has permissions that are normally not available to a third-party app. The most efficient way to exploit CVE-2016-2060 is via a malicious application that is granted the “ACCESS_NETWORK_STATE” permission.

Courtesy-Fud

Twitter Blocks Intelligence Agencies

May 17, 2016 by  
Filed under Around The Net

Comments Off on Twitter Blocks Intelligence Agencies

Twitter has prohibited a data-mining firm from providing analytics of real-time tweets to U.S. intelligence agencies, according to a Wall Street Journal report, quoting a person familiar with the matter.

Twitter, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.

Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies.

Twitter’s move appears to be in line with its policy on the use of its tweet data by external companies.

“Dataminr uses public Tweets to sell breaking news alerts to companies such as Wall Street Journal parent Dow Jones and government agencies such as the World Health Organization, for non-surveillance purposes,” Twitter said in a statement Sunday. “We have never authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes.”

U.S. intelligence agencies gained access to Dataminr’s service after In-Q-Tel, aventure capital organization backed by U.S. intelligence agencies, put money in the firm, the WSJ said, quoting a person familiar with the matter. Twitter is said to have conveyed to Dataminr that it didn’t want to continue the relationship with intelligence agencies at the end of a pilot by the data analysis firm arranged by In-Q-Tel. Dataminr does not figure in the list of In-Q-Tel portfolio companies on its website.

Source-http://www.thegurureview.net/uncategorized/twitter-blocks-intelligence-agencies-access-to-tweet-analytics.html

Oracle Goes Deeper Into The Cloud

May 13, 2016 by  
Filed under Computing

Comments Off on Oracle Goes Deeper Into The Cloud

Right on the heels of a similar acquisition last week, Oracle has announced it will pay $532 million to buy Opower, a provider of cloud services to the utilities industry.

Once a die-hard cloud holdout, Oracle has been making up for lost time by buying a foothold in specific industries through acquisitions such as this one. Last week’s Textura buy gave it a leg up in engineering and construction.

“It’s a good move on Oracle’s part, and it definitely strengthens Oracle’s cloud story,” said Frank Scavo, president of Computer Economics.

Opower’s big-data platform helps utilities improve customer service, reduce costs and meet regulatory requirements. It currently stores and analyzes more than 600 billion meter readings from 60 million end customers. Opower claims more than 100 global utilities among its clients, including PG&E, Exelon and National Grid.

Opower will continue to operate independently until the transaction closes, which is expected later this year. The union will create the largest provider of mission-critical cloud services to an industry that’s worth $2.3 trillion, Oracle said.

Oracle’s Utilities business delivers applications and cloud services that automate core operational processes and enable compliance for global electric, gas and water utilities.

“Oracle’s industry organizations maintain unique domain knowledge, specialized expertise and focused product investments,” said Rodger Smith, a senior vice president who leads the Utilities global business unit, in a letter to customers and partners. “This model has proven highly successful across several industries, and we look forward to bringing these same benefits to the customers of Opower.”

Source- http://www.thegurureview.net/aroundnet-category/oracle-pushes-deeper-into-cloud-computing-with-another-acquisition.html

Phishing Apps Plague Google Play

May 12, 2016 by  
Filed under Computing

Comments Off on Phishing Apps Plague Google Play

Google’s attempts to safeguard the Android app store — Google Play — are far from perfect, with malicious apps routinely slipping through its review process. Such was the case for multiple phishing applications this year that posed as client apps for popular online payment services.

Researchers from security firm PhishLabs claim that they’ve found 11 such applications since the beginning of 2016 hosted on Google Play, most of them created by the same group of attackers.

The apps are simple, yet effective. They load Web pages containing log-in forms that look like the target companies’ websites. These pages are loaded from domain names registered by the attackers, but because they are loaded inside the apps, users don’t see their actual location.

In some cases attackers registered domain names that are similar to those of the impersonated online payment services, PhishLab Security Threat Analyst Joshua Shilko said in a blog post.

More recently, attackers used domain names similar to those of cryptocurrency companies, suggesting that the cryptocurrency industry is also targeted.

PhishLabs did not name the exact payment card companies and online payment services whose users were targeted by these fake apps. However, most of those companies provide links to their official mobile applications on their websites and users should always use those links instead of manually searching for them on the Play store.

“In one case, a targeted company explicitly states on their website that no mobile application exists for their company and that users should be wary of any mobile application using their brand,” Shilko said.

The danger is that if phishers manage to routinely bypass Google’s review process and upload such apps to the Google Play store, their attacks might extend to other industries in the future.

Another problem is that even when these apps are detected by third-parties and reported, it can take several days for Google to remove them from the app store, leaving a sufficiently large window of opportunity for attackers. It’s not clear how attackers promote these fake apps or if they rely only on users finding them themselves, but in general phishing attacks are most effective during the first several hours after they’re launched.

Source- http://www.thegurureview.net/mobile-category/phishing-apps-continue-to-play-google-play.html

T-Mobile Revenue Up

May 6, 2016 by  
Filed under Smartphones

Comments Off on T-Mobile Revenue Up

T-Mobile US Inc reported a better-than-expected 10.6 percent rise in quarterly revenue and raised its forecast for customer additions in 2016 as popular discounts aided the No.3 U.S. wireless carrier by subscribers attract more business.

T-Mobile has been offering cheaper leasing plans and free music and video streaming to lure customers away from larger rivals Verizon Communications Inc and AT&T Inc.

T-Mobile, controlled by Deutsche Telekom, said it added 2.2 million customers on a net basis in the first quarter ended March 31.

That easily topped the average analyst estimate of 1.72 million, according to research firm FactSet StreetAccount.

The company said it expected to add 3.2 million to 3.6 million postpaid customers on a net basis in 2016, compared with its previous forecast of 2.4 million to 3.4 million.

T-Mobile’s 10.6 percent jump in quarterly revenue to $8.6 billion suggested its strategy to boost revenue was working. Analysts on average had expected revenue of $8.43 billion, according to Thomson Reuters I/B/E/S.

In comparison, market leader Verizon’s operating revenue rose just 0.6 percent to $32.17 billion.

AT&T is scheduled to report results later on Tuesday.

T-Mobile reported net income of $479 million, or 56 cents per share, for the first quarter, compared with a loss of $63 million, or 9 cents per share, a year earlier.

Source-http://www.thegurureview.net/mobile-category/t-mobile-revenue-up-continues-attracting-new-customers.html

Google Says A.I. Is The Next Big Thing

May 3, 2016 by  
Filed under Computing

Comments Off on Google Says A.I. Is The Next Big Thing

Every decade or so, a new era of computing comes along that influences everything we do. Much of the 90s was about client-server and Windows PCs. By the aughts, the Web had taken over and every advertisement carried a URL. Then came the iPhone, and we’re in the midst of a decade defined by people tapping myopically into tiny screens.

So what comes next, when mobile gives way to something else? Mark Zuckerberg thinks it’s VR. There’s likely to be a lot of that, but there’s a more foundational technology that makes VR possible and permeates other areas besides.

“I do think in the long run we will evolve in computing from a mobile-first to an A.I.-first world,” said Sundar Pichai, Google’s CEO, answering an analyst’s question during parent company Alphabet’s quarterly earnings call Thursday.

He’s not predicting that mobile will go away, of course, but that the breakthroughs of tomorrow will come via smarter uses of data rather than clever uses of mobile devices like those that brought us Uber and Instagram.

Forms of artificial intelligence are already being used to sort photographs, fight spam and steer self-driving cars. The latest trend is in bots, which use A.I. services on the back end to complete tasks automatically, like ordering flowers or booking a hotel.

Google believes it has a lead in A.I. and the related field of machine learning, which Alphabet’s Eric Schmidt has already pegged as key to Google’s future.

Machine learning is one of the ways Google hopes to distinguish its emerging cloud computing business from those of rivals like Amazon and Microsoft, Pichai said.

Source-http://www.thegurureview.net/aroundnet-category/google-says-a-i-is-the-next-big-thing-in-computing.html

Will HMB 2.0 GPUs Show Up This Year?

April 29, 2016 by  
Filed under Computing

Comments Off on Will HMB 2.0 GPUs Show Up This Year?

Our well-placed industry sources have told us that we should not expect to see the HMB 2.0 based GPUs shipping anytime soon. Nvidia Pascal and AMD Polaris 10 / 11 will stick with GDDR5 memory for the time being.

The 2nd generation High Bandwidth Memory (HBM 2.0) for high-end GPUs might happen in very late Q4 2016 but realistically it probably won’t ship until 2017 in any volume.

The first card that we expect supporting this feature might be the Greenland, a card that AMD might end up calling Vega. Even according Radeon Technology Group’s official GPU roadmap, Vega / Greenland now look like a 2017 product, or at very best, late 2016 card. Nvidia might make the HBM 2.0 version of the Titan card, but we don’t expect to see a Geforce GTX based on Pascal GPU and HBM 2.0 coming to the market this year.

We managed to talk to some of the memory manufactures and they told us that HBM 2.0 is very limited in supply, and limited supply makes things expensive.

It seems that GPUs of 2016, including the new AMD Polaris and the new Geforce, will be stuck with GDDR5 and in best case scenario with GDDR5X from Micron. The word on the street is that both Geforce GTX based on Pascal and AMD/RTG’s Polaris 10 / Ellesmere and Polaris 11 / Baffin might launch at Computex during last days of May or early June 2016.

Courtesy-Fud

« Previous PageNext Page »