Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Will Apple Go All-In On Car Batteries?

March 6, 2015 by  
Filed under Around The Net

Comments Off on Will Apple Go All-In On Car Batteries?

A year and a half ago, Apple Inc applied for eight patents related to car batteries. Recently, it has added a slew of engineers, just one of whom had already filed for 17 in his former career, according to a Thomson Reuters.

The recent spate of hires and patent filings shows that Apple is fast building its industrial lithium-ion battery capabilities, adding to evidence the iPhone maker may be developing a car.

Quiet, clean electric cars are viewed in Silicon Valley and elsewhere as a promising technology for the future, but high costs and “range anxiety”, the concern that batteries will run out of power and cannot be recharged quickly, remain obstacles. Those challenges could also be seen as opportunities to find solutions to take the technology mainstream.

The number of auto-related patents filed by Apple, Google Inc, Korea’s Samsung, electric carmaker Tesla Motors Inc and ride-sharing startup Uber tripled from 2011 to 2014, according to an analysis by Thomson Reuters IP & Science of public patent filings.

Apple has filed far fewer of these patents than rivals, perhaps adding impetus to its recent hiring binge as it seeks to get up to speed in battery technologies and other car-building related expertise.

As of 18 months ago, Apple had filed for 290 such patents. By contrast, Samsung, which has been providing electric vehicle batteries for some years, had close to 900 filings involving auto battery technology alone.

The U.S. government makes patent applications public only after 18 months, so the figures do not reflect any patents filed in 2014.

Earlier this month, battery maker A123 Systems sued Apple for poaching five top engineers. A search of LinkedIn profiles indicates Apple has hired at least another seven A123 employees and at least 18 employees from Tesla since 2012.

The former A123 employees have expertise primarily in battery cell design, materials development and manufacturing engineering, according to the LinkedIn profiles and an analysis of patent applications.

A123, which filed for bankruptcy in 2012 but has since reorganized, supplied batteries for Fisker Automotive’s now-discontinued hybrid electric car.

“Looking at the people Apple is hiring from A123 and their backgrounds, it is hard not to assume they’re working on an electric car,” said Tom Gage, Chief Executive of EV Grid and a longtime expert in batteries and battery technology.

Apple is building its own battery division, according to the A123 lawsuit. Apple did not immediately respond to a request for comment.

Source

New Data Suggest IT Hiring Increasing

November 21, 2014 by  
Filed under Around The Net

Comments Off on New Data Suggest IT Hiring Increasing

Whenever IT hiring increases, as it did last month, the default explanation from analysts is this: The economy is improving.

That might be true, and it may well explain the U.S. Department of Labor’s report today that showed the U.S., overall, added 214,000 jobs last month.

Of that total employment gain, IT hiring grew by 7,800 jobs in October, compared with a gain of 6,900 jobs in September, according to TechServe Alliance, an IT industry group.

Another IT labor analyst group, Janco Associates, calculated last month’s IT gains at 9,500 jobs.

Government data can be reported in different ways, depending on which job categories are included in the IT job estimates, and it is why analysts report job numbers differently.

Hiring trends are also affected by Labor Department adjustments, and the government’s adjusted data adds nearly 25,000 telecom jobs over the past two months, according to Janco. Because of this adjustment, Janco termed the recent growth in IT over the past several months “explosive,” while TechServe put last month’s results as “modestly stronger.”

There is no one reason for October’s gain. An improving economy may be at the heart of any answer. Independent of the government numbers, Computer Economics, in a recent report on contingent versus full-time hiring, said it is seeing a drop in the use of contract workers at large companies and more reliance on full-time workers, which is a sign of an improving economy.

Source

Google Continues A.I. Expansion

November 4, 2014 by  
Filed under Computing

Comments Off on Google Continues A.I. Expansion

Google Inc is growing its artificial intelligence area, hiring more than half a dozen leading academics and experts in the field and announcing a partnership with Oxford University to “accelerate” its efforts.

Google will make a “substantial contribution” to establish a research partnership with Oxford’s computer science and engineering departments, the company said on Thursday regarding its work to develop the intelligence of machines and software, often to emulate human-like intelligence.

Google did not provide any financial details about the partnership, saying only in a post on its blog that it will include a program of student internships and a series of joint lectures and workshops “to share knowledge and expertise.”

Google, which is based in Mountain View, California, is building up its artificial intelligence capabilities as it strives to maintain its dominance in the Internet search market and to develop new products such as robotics and self-driving cars. In January Google acquired artificial intelligence company Deep Mind for $400 million according to media reports.

The new hires will be joining Google’s Deep Mind team, including three artificial intelligence experts whose work has focused on improving computer visual recognition systems. Among that team is Oxford Professor Andrew Zisserman, a three-time winner of the Marr Prize for computer vision.

The four founders of Dark Blue Labs will also be joining Google where they will be will be leading efforts to help machines “better understand what users are saying to them.”

Google said that three of the professors will hold joint appointments at Oxford, continuing to work part time at the university.

Source

Google Goes To The Supreme Court

October 20, 2014 by  
Filed under Computing

Comments Off on Google Goes To The Supreme Court

Google has asked the U.S. Supreme Court to rule on contentious litigation against Oracle arguing that the high court must act to protect innovation in high tech.

Google’s request seeks to overturn an appeals court ruling that found Oracle could copyright APIs of its Java programming language, which Google used to design its Android smartphone operating system.

Oracle sued Google in 2010, claiming that Google had improperly incorporated parts of Java into Android. Oracle wants $1 billion on its copyright claims. Oracle claimed Google’s Android trampled on its rights to the structure of 37 Java APIs. A San Francisco federal judge had decided that Oracle could not claim copyright protection on parts of Java, but earlier this year the U.S. Court of Appeals for the Federal Circuit in Washington disagreed.

In its filing this week, Google said the company would never been able to innovate had the Federal Circuit’s reasoning been in place when the company was formed.

“Early computer companies could have blocked vast amounts of technological development by claiming 95-year copyright monopolies over the basic building blocks of computer design and programming,” Google wrote.

Source

Will Mark Hurd Call The Shots At Oracle?

October 2, 2014 by  
Filed under Computing

Comments Off on Will Mark Hurd Call The Shots At Oracle?

Analysts have started to wonder which of the two heads that Larry Ellison left in charge of Oracle will be calling the shots — Safra Catz or Mark Hurd.

Wall Street thinks that dealmaker and finance guru Safra Catz will be in charge even though she, and not Hurd who would be the real boss. Of course Ellison will remain around for a while, so it is a little moot, neither Catz or Hurd got to the top by crossing Ellison. But Ellison could actually go, particularly if his mysterious exit was because he was sick and this has made some analysts wonder who will be in charge.

Of 12 analysts who replied to an anonymous poll, five said Catz would likely run Oracle, while only one voted for Hurd, 57. Four said both would continue to run the company, one said neither, and one plumped for dark-horse internal candidate Thomas Kurian.

Catz has more status because the 52-year old former Wall Street banker orchestrated Oracle’s multibillion dollar acquisitions and has been Ellison’s de facto deputy for the last few years. Hurd, who only joined Oracle in 2010 after leaving HP under the cloud of a business ethics breach, has a larger public presence but is still seen as a newcomer.

Only one analyst said Hurd was the more likely to lead the company, chiefly because he is the one with experience of being the CEO of a large technology company. In fact some of the Oracle board does not trust him because of the experience that HP had with him.

Source

HTC To Make the Next Google Nexus Tablet

October 1, 2014 by  
Filed under Consumer Electronics

Comments Off on HTC To Make the Next Google Nexus Tablet

Google Inc has chosen HTC Corp to develop and deliver its upcoming 9-inch Nexus tablet, the Wall Street Journal reported, citing people familiar with the matter.

Google had been mulling HTC as a potential Nexus tablet partner since last year and HTC engineers have been flying to the Googleplex in Mountain View in recent months to work on the project, the report said.

Google’s decision to pick HTC reflects its long-term strategy of building a broad base of partners from device to device to prevent any one manufacturer from gaining a monopoly, the report said.

That may also be one of the reasons why Google chose HTC over bigger rivals Samsung Electronics Co Ltd, maker of the Nexus 10 tablet.

Google and HTC declined to comment on the report.

Source

Is Epic Turla Exploiting Windows XP?

August 22, 2014 by  
Filed under Security

Comments Off on Is Epic Turla Exploiting Windows XP?

Kaspersky Lab has discovered an espionage network that successfully attacked government institutions, intelligence agencies and European companies.

The firm has dubbed the spy operation Epic Turla, and said that it is in no doubt about its capabilities.

“Over the last 10 months, Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call ‘Epic Turla’,” it said.

“The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including government institutions, embassies, military, education, research and pharmaceutical companies.”

Kaspersky said that Epic Turla used two zero-day exploits that affected Adobe and Microsoft software, along with some backdoor and social engineering tricks.

In particular, Kaspersky said a vulnerability in Windows XP and Windows 2003 – CVE-2013-5065 – termed a “privilege escalation vulnerability” is being used. “The CVE-2013-5065 exploit allows the backdoor to achieve administrator privileges on the system and run unrestricted. This exploit only works on unpatched Microsoft Windows XP systems.”

The use of this Windows XP flaw underlines the risk that the unsupported Windows XP OS poses. Kaspersky went on to explain that, once inside, attackers install their own rootkits and other malware tools and begin their surveillance.

“Once the attackers obtain the necessary credentials without the victim noticing, they deploy the rootkit and other extreme persistence mechanisms,” it said. “The attacks are still ongoing as of July 2014, actively targeting users in Europe and the Middle East.”

The attacks are just the latest in a long line of incidents that businesses need to be aware of as cyber attacks continue at an alarming rate.

In June the security firm Crowdstrike alerted the industry to Putter Panda, a cute-sounding but nasty piece of malware. That firm pointed an accusatory finger at China and charged it with espionage on the US and Europe.

Crowdstrike CEO George Kurtz said at the time, “China’s decade-long economic espionage campaign is massive and unrelenting. Through widespread espionage campaigns, Chinese threat actors are targeting companies and governments in every part of the globe.” Chinese authorities disputed this.

The report comes in the same week Hold Security reported uncovering a huge trove of 1.2 billion web passwords and login details that have been gathered by Russian cyber criminals.

Source

Is Malware Wreaking Havoc On XP?

July 14, 2014 by  
Filed under Computing

Comments Off on Is Malware Wreaking Havoc On XP?

One of the top three malware programs affecting businesses in the second quarter is a worm that takes advantage of the large number of companies still using Windows XP, Trend Micro has warned.

The worm, dubbed DOWNAD, also known as Conficker, can infect an entire network via a malicious URL, spam email, or removable drive. Windows XP is particularly susceptible to this threat because it is known to exploit the MS08-067 Server service vulnerability in order to execute arbitrary code.

DOWNAD also has its own domain generation algorithm (DGA) that allows it to create randomly-generated URLs. It then connects to these created URLs to download files to the system. Trend Micro said that around 175 IP addresses are found to be related to the DOWNAD worm and that these IP addresses use various ports and are randomly generated via the DGA capability of DOWNAD.

“During our monitoring of the spam landscape, we observed that in Q2, more than 40 percent of malware related spam mails are delivered by machines infected by DOWNAD worm,” said Trend Micro anti-spam research engineer Maria Manly in a blog post.

“A number of machines are still infected by this threat and leveraged to send the spammed messages to further increase the number of infected systems. And with Microsoft ending the support for Windows XP this year, we can expect that systems with this OS can be infected by threats like DOWNAD.”

The security company warned that spam campaigns delivering FAREIT, MYTOB, and LOVGATE payloads in email attachments are attributed to DOWNAD infected machines. FAREIT is a malware family of information stealers that download variants of the Zeus Trojan, while MYTOB is an old family of worms known for sending a copy of itself in spam attachments.

The other top sources of spam with malware are the CUTWAIL botnet, together with Gameover ZeuS (GoZ). Manly said CUTWAIL was actually previously used to download GoZ malware but now a malware called UPATRE employs GoZ malware or variants of ZBOT which have peer-to-peer functionality.

“In the last few weeks we have reported various spam runs that abused Dropbox links to host malware like UPATRE,” Manly said. “We also spotted a spammed message in the guise of voice mail that contains a Cryptolocker variant. The latest we have seen is a spam campaign with links that leveraged CUBBY, a file storage service, this time carrying a banking malware detected as TSPY_BANKER.WSTA.”

According to Manly, cybercriminals and threat actors are probably abusing file storage platforms to mask their malicious activities and go undetected in the system and network.

“As spam with malware attachment continues to proliferate, so is spam with links carrying malicious files. The continuous abuse of file hosting services to spread malware appears to have become a favoured infection vector of cyber criminals most likely because this makes it more effective given that the URLs are legitimate thereby increasing the chance of bypassing anti-spam filters,” she added.

Source

Can Malwarebytes Protect XP?

June 26, 2014 by  
Filed under Security

Comments Off on Can Malwarebytes Protect XP?

Malwarebytes has launched anti-exploit services to protect Windows users from hacking attacks on vulnerabilities in popular targets including Microsoft Office, Adobe software products and Java, a service which even offers protection for Windows XP users.

Consumer, Premium and Corporate versions of the service are available, and are designed to pre-emptively stop hackers from infecting Windows machines with malware.

“An exploit will typically first corrupt the memory of an application process, take control, then execute code,” said Malwarebytes director of special projects Pedro Bustamante.

“From the shell code it executes a payload that tells the exploit what to do and that in turn usually downloads malware from the internet and executes it. The final stage is usually where antivirus kicks in, when it’s being downloaded from the internet, and starts doing things like behavioural analysis to see if it’s malicious.

“We don’t care about that, what we do comes before then. We just look for exploit-like behaviour and block anything that looks like it at the shellcode or payload stages. We come into play before the malware even appears on the scene.”

The Consumer version of the anti-exploit service is free and offers basic browser and Java protection.

The Premium version costs $37.00  per user and adds Office and Adobe protection services as well as the ability to add custom shields to other internet-facing applications, like Messenger or Netflix.

The Corporate version costs$40.00 person user and offers complete anti-exploit protection and comes with Malwarebytes’ Anti-malware service and a toolkit for IT managers.

Bustamante explained that the technology is designed to help businesses and general web users defend against the new wave of exploit-based cyber attacks.

“Traditional security can’t deal with exploits. Every day we see people getting infected, even if they have the latest up-to-date antivirus readers, because of exploits,” he said. “This is why we care about the applications you run – Firefox, Chrome, Internet Explorer, Java, Acrobat [and Microsoft] Word, Excel [and] Powerpoint.”

Bustamante added that the service is doubly important for Windows XP users since Microsoft officially ceased support for the OS in April.

“We’re still seeing over 25 percent of our users running XP. For them this product is even more important,” he said.

“We see new zero-days if not every week, every month, and for XP users who are not getting any more patches from Microsoft this product will be essential.

“Every month Microsoft will be releasing security patches for newer versions of Windows. Every time Microsoft does this it’ll be a treasure map for hackers to find exploits on Windows XP.

“It’ll show them exactly where the vulnerabilities are, so every month will see an influx of new exploits targeting Windows XP.”

Source

IBM Breaks Big Data Record

February 28, 2014 by  
Filed under Computing

Comments Off on IBM Breaks Big Data Record

IBM Labs claims to have broken a speed record for Big Data, which the company says could help boost internet speeds to 200 to 400Gbps using “extremely low power”.

The scientists achieved the speed record using a prototype device presented at the International Solid-State Circuits Conference (ISSCC) this week in San Francisco.

Apparently the device, which employs analogue-to-digital conversion (ADC) technology, could be used to improve the transfer speed of Big Data between clouds and data centres to four times faster than existing technology.

IBM said its device is fast enough that 160GB – the equivalent of a two-hour 4K ultra-high definition (UHD) movie or 40,000 music tracks – could be downloaded in a few seconds.

The IBM researchers have been developing the technology in collaboration with Swiss research institution Ecole Polytechnique Fédérale de Lausanne (EPFL) to tackle the growing demands of global data traffic.

“As Big Data and internet traffic continues to grow exponentially, future networking standards have to support higher data rates,” the IBM researchers explained, comparing data transfer per day in 1992 of 100GB to today’s two Exabytes per day, a 20 million-fold increase.

“To support the increase in traffic, ultra-fast and energy efficient analogue-to-digital converter (ADC) technology [will] enable complex digital equalisation across long-distance fibre channels.”

An ADC device converts analogue signals to digital, estimating the right combination of zeros and ones to digitally represent the data so it can be stored on computers and analysed for patterns and predictive outcomes.

“For example, scientists will use hundreds of thousands of ADCs to convert the analogue radio signals that originate from the Big Bang 13 billion years ago to digital,” IBM said.

The ADC technology has been developed as part of an international project called Dome, a collaboration between the Netherlands Institute for Radio Astronomy (ASTRON), DOME-South Africa and IBM to build the Square Kilometer Array (SKA), which will be the world’s largest and most sensitive radio telescope when it’s completed.

“The radio data that the SKA collects from deep space is expected to produce 10 times the global internet traffic and the prototype ADC would be an ideal candidate to transport the signals fast and at very low power – a critical requirement considering the thousands of antennas which will be spread over 1,900 miles,” IBM expalined.

IBM Research Systems department manager Dr Martin Schmatz said, “Our ADC supports Institute of Electrical and Electronics Engineers (IEEE) standards for data communication and brings together speed and energy efficiency at 32 nanometers, enabling us to start tackling the largest Big Data applications.”

He said that IBM is developing the technology for its own family of products, ranging from optical and wireline communications to advanced radar systems.

“We are bringing our previous generation of the ADC to market less than 12 months since it was first developed and tested,” Schmatz added, noting that the firm will develop the technology in communications systems such as 400Gbps opticals and advanced radars.

Source

« Previous PageNext Page »