Author: Nick Farrell

Bohr lays law on Moore

moores-920x460-mooreIntel is working out a way of using Moore’s law beyond the 10  nanometre (nm) node.

Mark Bohr, senior fellow for logic technology development at Intel, told hacks he will take part in a panel discussion on the move beyond 10nm and the many challenges it poses soon.

Per the existing roadmap, the company expects to move to 10nm in 2016 and to 7nm in 2018.

“I still believe we can do 7nm without EUV [Extreme Ultraviolet Lithography] and deliver improved cost per transistor. I’m not going to say exactly how, because our competitors watch what we do closely,” Bohr said.

Intel has published papers on III-V [three-five] devices and that is one of the new materials that CHipzilla is looking at to move to 7nm.  As always Intel is worried about balancing performance against manufacturability .

However all this flags the fact that EUV, for long considered the best bet to replace current 193-nm lithography and extend Moore’s law beyond 10nm, isn’t ready.  In fact it has been half-backed for nearly a decade.

“Scaling does continue to provide lower cost per transistor, and it is Intel’s view that cost reduction is needed to justify new generations of process technology,” he said.

“Going forward, heterogeneous integration will become increasingly important, but we may not be able to do it all on one chip, so you will see more use of SoC solutions such as 2.5D integration, where two are mounted side by side on a substrate, or full 3D integration, stacking chips on top of each other, each one tuned for a different [manufacturing] process to perform different functions, Bohr said.

Stevenson made a rocket for Intel’s bottom line

lal303543Digging among the rubble of Intel’s financial results you can’t help be struck by the ability of CIO Kim Stevenson whose department managed to make the company an absolute fortune in 2014.

Stevenson’s global IT budget was just over $1 billion to provide IT for more than 106,000 denizens – which would be expected to be a black hole on Intel’s balance sheet.   However she managed to generate over $351 million in revenue for the semiconductor maker.

What she did was explain to the accounts department, how her department saved the company money by using the technology that it did.  Speaking to CIO Journal she said that it was important to let the company see behind the curtain and understand how value is generated.

Last year, Intel cut IT spending to 2.3% of revenue from 2.5% in 2012. The company also reduced the number of data centres globally down to 61 in 2014 from 87 in 2011.

Stevenson built several analytics projects which were designed to make the company more efficient, for example the first one involved helping salespeople become more efficient in outbound calls to resellers. The IT team got input about what a sales win looked like and created a probability model based on machine learning. It told the salespeople which resellers to call, in which order.

In 2013, Intel moved a few salespeople over to the new system and after the first quarter, they discovered that those people were five times more productive than their peers, she said.

Then her team helped the sales people change the conversation to tailor specific discussions to the reseller’s interest. In 2014, this initiative accounted for $76.2 million in revenue for Intel.

The company also used analytics to help business management teams make critical decisions related to pricing, such as when to raise or lower product prices and when to use rebates. The IT organization worked for two years to create a data model to help the company better manage prices and inventory. Part of that included a recommendation engine that helped salespeople bundle and cross sell products. Intel has set a $1 billion goal over four to five years to increase revenue.

It all paid off. In 2014, the first year, Intel increased revenue by $264 million. “We did a little better than we thought,” said Stevenson.

British and US spooks stole SIM card keys

james_bond_movie_poster_006Spies from the US and the UK hacked into the internal computer network of the largest manufacturer of SIM cards in the world and stole encryption keys used to protect the privacy of mobile phones.

According to the latest release from the Edward Snowden cache, the hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ.

It all happened in 2010 when GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s mobiles, including both voice and data.

Gemalto, a multinational firm incorporated in the Netherlands, makes chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world.

It makes two billion SIM cards a year and with the stolen encryption keys, intelligence agencies could monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments.

British spies mined the private communications of unwitting engineers and other company employees in multiple countries.

Apparently, Gemalto did not notice and still cannot work out how it was done.

According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ access.

Open saucy Microsoft puts Azure on Ubuntu

Every silver has a cloudy liningMicrosoft has released its Azure hosted service so that it can run Linux.

Microsoft showed off a preview of Azure HDInsight running on Ubuntu and the makers of the open saucy gear Canonical claims that it is a recognition that Ubuntu is great for running Big Data solutions.

For those who came in late, Azure HDInsight, is Microsoft’s Apache Hadoop-based service in the Azure cloud. It is designed to make it easy for customers to evaluate petabytes of all types of data with fast, cost-effective scale on demand, as well as programming extensions so developers can use their favourite languages.

The big idea is that people that already use Hadoop on Linux on-premises like on Hortonworks Data Platform, because they can use common Linux tools, documentation, and templates and and now they can extend their deployment to Azure with hybrid cloud connections.

It is not all one way traffic.  Canonical has Juju which  is a Cloud Orchestration tool. This is the result of years of effort to optimize Big Data workloads on Ubuntu. This will mean that Azure will effectively gain access to this.

Apple might troll its way into VR control

apple-disney-dreams-snow-white-Favim.com-142405Famous for operating its reality distortion shield, Apple might have taken control of the Virtual Reality market with an ancient patent application.

Apple was granted a patent for a Gear VR-like mobile headset which would use a portable device (like a smartphone) as the primary display. However the patent is similar to Samsung’s Gear VR and a swath of VR smartphone adapters out there like Google Cardboard.

According to patent attorney, Eric Greenbaum the patent could kill off all competition for mobile VR headsets and patent troll the market to oblivion.

In 2008  Apple filed a patent for a “Head-mounted display apparatus for retaining a portable electronic device with display.”

The patent describes a device which sounds an awful lot like Gear VR and other VR smartphone adapters. Eric Greenbaum, told Road to VR  that the Apple patent may have broad ramifications for mobile-device based head mounted displays.” Which I take to mean, Apple could have a case on their hands if they wanted to challenge Gear VR or similar devices in court.

He thinks that Jobs’ Mob may have pressed to get the patent through the system after Gear VR was announced.

Greenbaum  warned that Apple has not yet announced a plan to build any VR products. However their patent filings indicate a strong interest in the field and I would expect them to be planning something.

This Apple HMD patent is significant. I would say it introduces potential litigation risks for companies that have or are planning to release a mobile device HMD.

There is no duty for Apple to make or sell an HMD. They can sit on this patent and use it strategically either by enforcing it against potential infringers, licensing it, or using it in forming strategic partnerships.

In other words, Apple without actually inventing anything could take control of the entire market.  It could cherry pick the best technology out there and then release its own product.

 

New chips put Qualcomm on top for now

qualcomm-snapdragonQualcomm has released four Snapdragons 415, 425, 618, and 620 which tighten its grip on the mobile chip maket.

All the SoCs support 64-bit, they all connect to 4G LTE networks—the 425, 618, and 620 and can support super-fast 300 megabit per second networks. The last two chips are based around ARM’s new Cortex A72, instead of a more in-house chip design.

The Snapdragon 618 supports a “next generation Adreno GPU,” an integrated category 7 LTE-Advanced modem (300 Mbps download/100 Mbps upload) and dual image signal processors which support 21 megapixel cameras. It also supports HEVC/H.265 video encode and decode.

The Snapdragon 620 is more of the same but with four Cortex A72 cores instead of two word on the street is that it has a better GPU too.

All the chips should be in the shops in the second half of 2015 where they might rule the mid-range market.

Qualcomm has been snuggling up to ARM lately so that it can focus on the other components of the chip, particularly graphics and the various wireless radios. This has meant that it can churn out chips just as the world wants faster, next generation LTE-Advanced networks.

It is clearly in the lead for now, but that is set to change. Samsung’s upcoming Galaxy S6 will have its own designed and manufactured chip under the bonnet. This is because it said it did not like what Qualcomm was doing. Sony and HTC are also dissatisfied and are flirting with chips from MediaTek.
LG’s already working on its own “NUCLUN” chip and there is mutterings that even Intel might have something better.

 

Intel is open source king

Intel Q4_14_ResultsThe once famous proprietary chipmaker Intel is set to become the largest contributor to the open sauce Linux.

A report from the Linux Foundation said Intel was the largest corporate sponsor of new contributions to the Linux computer operating system.

This means that Intel has replaced some top notch software companies, having made more than 10,000 more changes to Linux Kernel.

It makes sense, Linux plays a significant role in computers integrated inside communications networks and industrial equipment, which are vital segments for Intel.

Doug Fisher, who heads Intel’s software group, is also on the board of the Linux Foundation he said that Intel wants to explore new markets through its chips by integrating it in wearable computing, connected appliances and mobile technologies. Intel has hired several thousand software developers to assist in developing new features for Linux.

Intel has made $350 million in revenue during 2014 by using a component of the IT infrastructure it supplies, according to the company’s annual IT business review.

The report suggested Intel is exploiting IT services in a better way like data analytics and collaboration tools for “optimized business workflows and [to] unlock new insights” to generate millions of dollars of new revenue.

US banks finally adopt mark of the beast

Card-fraudUS banks have finally twigged that the reason they keep losing money to credit card theft is because they insist on being the last bastion of low tech cards.

Given the fact that the free market is supposed to decide the best form of technology to defend its transactions, the US banks have been dragging their collective trotters adopting the EMV standard.

Meanwhile in Europe, the birthplace of Europay, MasterCard and Visa (EMV) standard there is a low amount of credit card fraud while in the US it is incredibly high.

Now the US is finally making the transition to secure cards based on the European EMV standard, mostly because the liability shift imposed by the three big credit card brands — Visa, MasterCard and American Express — will start on October.

If the merchant is EMV compliant and has a POS system equipped to read EMV cards, and the card is not, because the financial institution has not started issuing them yet — effectively forcing the merchant to run your card on the magnetic stripe reader — then the bank or credit card issuer has to pay for the misuse of the card.

If the issuer has upgraded to EMV by sending chip cards to its cardholders, but the merchant has not upgraded their point of sale to accept them, the retailer bears the cost for counterfeit fraud.

While all this is a pain for the banks and retailers, it is widely accepted in the US that something has to be done. A wave of data breaches that has hit major retailers such as Target and Home Depot, among others, has convinced many card issuers that the expense of sending new cards fades in comparison to the consequences of new data breaches. It will probably take another three years for full adoption.

Some analysts expect fraud to increase this year, as thieves will step up their efforts to capture more credit card details before the EMV conversion starts to take a grip on their bottom line.

It is unclear why the US has been so slow in adopting the chips, one reason might be the fact that their parts of the US which may refuse to use them because of religious reasons.  Parts of the bible belt believe that the move to such technology is a sign of the “end times” and that any electronic transactions are the same as the “mark of the beast” of revelation.

French spooks behind latest malware

peter_sellers_3918It seems that the French are not going to stand idly by while other nations spies get all the attention for creating spyware.

Cyphort Labs found a cyber-espionage tool of the kind a nation state would be behind which invades Windows desktop machines and aims at extracting almost anything of value: it steals data from instant messengers, softphones, browsers and office applications.

Dubbed ‘Babar64’  the malware is believed to have been written by French intelligence.

It is a natty bit of code. It logs keystrokes, taking screenshots, steams audio from softphone applications, nicks clipboard data and can steal the names of desktop windows.

The malware creates an invisible window, with no other purpose than to receive window messages. By processing the window message queue it filters out input events and dispatches them to a raw input device object. Said object is configured to grab keyboard events through GetRawInputData.

Babar has two hard coded C&C server addresses included in its configuration data — http://www.horizons-tourisme.com/_vti_bin/_vti_msc/bb/index.php and http://www.gezelimmi.com/wp-includes/misc/bb/index.php

The domain horizons-tourisme.com is a legitimate website, operated by an Algerian travel agency, located in Algiers. The website is in French and still online today. Gezelimmi.com is a Turkish domain, currently responding with an HTTP error message 403, access not permitted. Both domains appear to be of legitimate use, but compromised and abused to host Babar’s server side infrastructure.

Apple poaches staff to get new tech

How-to-Poach-Eggs_725x408After years of enforcing an illegal cartel which forced staff to stay with it, Apple is now going the other way and poaching staff in a way to get new technology, a court was told.

Electric-car battery maker A123 Systems has sued Apple for poaching top engineers to build a large-scale battery division.

The Tame Apple Press does not question the legality of the move, but just has become all moist about the fact that the iPhone maker may be developing a car.

The court heart how around June 2014, Apple began aggressively poaching A123 engineers tasked with leading some of the company’s most critical projects, the lawsuit said. The engineers jumped ship to pursue similar programs at Apple, in violation of their employment agreements.

These agreements are in place to stop big companies like Apple from gaining access to technology they have not developed.

“Apple is currently developing a large-scale battery division to compete in the very same field as A123,” the lawsuit read.

A123 Systems has not been doing very well. It filed for bankruptcy in 2012 and has been selling off assets.

The engineers who left were of such calibre that the projects they had been working on had to be abandoned. One of the five defendants, Mujeeb Ijaz, of helping Apple recruit among its ranks.

“It appears that Apple, with the assistance of defendant Ijaz, is systematically hiring away A123’s high-tech PhD and engineering employees, thereby effectively shutting down various projects/programs at A123,” according to the lawsuit.

They are doing so in an effort to support Apple’s apparent plans to establish a battery division that is similar if not identical to A123’s, in competition with A123.”

Apple has been carrying out similar programmes at LG Chem, Samsung SDI, Panasonic, Toshiba  and Johnson Controls Inc.

A123 presented evidence from one of its partners SiNode Systems that “confirms that his work on behalf of Apple is at least substantially similar (if not identical) to his work at A123.”

 

 

Samsung starts mobile payments

Samsung advertising in TaipeiSamsung has bought US mobile wallet startup LoopPay, which is seen as an  intention to launch a smartphone payments service.

Mobile payments have been slow to catch on in the United States and elsewhere, despite strong backing. Apple, Google, and eBay PayPal have all launched services to allow users to pay in stores via smartphones and the stores themselves are expected to release a new standard of their own.

Most of the problem is that retailers have been reluctant to adopt the hardware and software infrastructure required for these new mobile payment options to work before a standard is sorted out.  There was no point in investing in BetaMax when VHS kills it.

LoopPay’s technology differs because it works off existing magnetic stripe card readers at checkout, changing them into contactless receivers, they said. About 90 percent of checkout counters already support magnetic swiping.

“If you can’t solve the problem of merchant acceptance…, of being able to use the vast majority of your cards, then it can’t really be your wallet,” said David Eun, head of Samsung’s Global Innovation Center.

Injong Rhee, who is leading Samsung’s as-yet-unannounced payments project, said the Asian giant will soon reveal more details of its envisioned service. He would not be drawn on speculation the company may do so during the Mobile World Congress in Barcelona.

He said new phones such as the new Galaxy would support the service.

Samsung had invested in LoopPay, along with Visa and Synchrony Financial, before its acquisition.

Rhee said in an interview that the company intends to roll out accompanying services that go beyond merely turning the smartphone into a wallet, such as by allowing users access to information such as spending.

Lockheed Martin jets into cyber security

DF-SC-82-10542US defence contractor Lockheed Martin sees cyber security as its number one growth area over the next three to five years.

Although it is better known for its jet aircraft, Lockheed Martin is the main provider of IT technology to the US government, said expects double-digit growth in its overall cybersecurity business over the next three to five years.

Lockheed said it was making strong inroads in the commercial market by using its experience and intelligence gathered while guarding its own networks and those of government agencies.
Chief Executive Officer Marillyn Hewson said Lockheed was providing cyber security services for more than 200 customers around the world in the energy, oil and gas, chemical, financial services and pharmaceuticals business.

Hewson told the company’s annual media day that Lockheed had faced 50 “coordinated, sophisticated campaign” attacks by hackers in 2014 alone, and she expected those threats to continue growing.

Lockheed now represented a large number of companies on the Fortune 500 list, including 79 percent of utilities, 35 percent of oil and gas companies, 46 percent of chemical firms, and 46 percent of financial firms.

It has been helped by the fact that other weapons makers, including Boeing and Harris have largely exited the cyber security business after finding it difficult to generate any real cash.

Netgear has a nasty bug in the soap

original_bug-soapSome Netgear wireless routers have a vulnerability which turns over all the data a hacker needs to break into the network.

The vulnerability is found in the embedded SOAP service, which is a service that interacts with the Netgear Genie application that allows users to control their routers via their smartphones or computers.

Network engineer Peter Adkins said that at first glance, this service appears to be filtered and authenticated, but an HTTP request “with a blank form and a ‘SOAPAction’ header is sufficient to execute certain requests and query information from the device,” he explained in a post on the Full Disclosure mailing list.

As the SOAP service is implemented by the built-in HTTP / CGI daemon, unauthenticated queries will also be answered over the internet if remote management has been enabled on the device. As a result, affected devices can be interrogated and hijacked with as little as a well placed HTTP query, Adkins said.

If this is true then the vulnerability can be exploited both by attackers that have already gained access to the local network and by remote attackers.

All this applies to Netgear WNDR3700v4 – V1.0.0.4SH, Netgear WNDR3700v4 – V1.0.1.52, Netgear WNR2200 – V1.0.1.88 and Netgear WNR2500 – V1.0.0.24.

Netgear was told of the flaw and it replied that any network should still stay secure due to a number of built-in security features, said Adkins.

“Attempts to clarify the nature of this vulnerability with support were unsuccessful. This ticket has since been auto-closed while waiting for a follow up. A subsequent email sent to the Netgear ‘OpenSource’ contact has also gone unanswered.”

 

Obama blows hot and cold on encryption

thewhitehouseWhile his security spooks are complaining that company moves to use strong encryption is making their life difficult, President Barack Obama said he likes the technology, other than when he doesn’t.

Talking to Recode, Obama appears to have jumped on the side of the big tech corporations against the NSA and when asked if American citizens should be entitled to control their data, just as the president controls his own private conversations through encrypted email, he said yes.

Obama replied that he’s “a strong believer in strong encryption …. I lean probably further on side of strong encryption than some in law enforcement.” He maintained that he is as firm on the topic as he ever has been.

However the matter, claimed Obama was hypothetical. If the FBI had a good case against someone involved in a terrorist plot and wants to know who that person was communicating with? Traditionally, they could get a court order for a wire tap. Today, a company might tell the FBI they can’t technically comply.

He warned that the first time that an attack takes place in which it turns out that we had a lead and we couldn’t follow up on it, because the data was encrypted the public’s going to demand answers.

“Ultimately everybody, and certainly this is true for me and my family, we all want to know that if we’re using a smartphone for transactions, sending messages, having private conversations, that we don’t have a bunch of people compromising that process. There’s no scenario in which we don’t want really strong encryption,” he said.

So, in other words, everyone should have strong encryption which should turn itself off when the security services want to have a look at it.

Top hedge funds trim Apple

hedge

Despite claims by the Tame Apple Press that the fruity cargo cult is at the top of its game after the launch of its new bendy iphone 6, Wall Street hedge funds do not agree.

David Einhorn’s Greenlight Capital and Philippe Laffont’s Coatue Management, have been selling their stakes in Apple during the last few months in a sign that they are predicting a slump.

To be fair, Apple did well in 2014 with its shares rising nearly 38 percent. This year the company’s stock is up more than 16 percent year to date and reached an intraday record high of $129.45 per share.

Yet Wall Street’s cleverest money men do not think it is going to get much better. Although Apple is the biggest position in Coatue Management’s portfolio, the firm sold 1.7 million shares at the end of the quarter, or more than 15 percent of its stake, leaving it with 8.9 million shares.

Greenlight said it cut Apple holdings by 6.2 percent to 8.6 million shares during the quarter.
Eric Mandelblatt’s Soroban Capital Partners sold 4.3 million Apple call options, liquidating the fund’s position. And David Tepper’s Appaloosa Management hedge fund said it had dissolved its stake in Apple, while Leon Cooperman’s Omega Advisors sold 808,000 Apple shares to own 383,790 shares at the end of the fourth quarter.

Last week, billionaire activist investor Carl Icahn tried to talk up his technology company’s shares claiming that they should be trading at $216 apiece.

It seems that few others agree.