Tag: newstrack

Intel’s China plans show mobile agenda

1220aIntel’s recently announced plans to invest shedloads into its Chengdu plant might be revealing much about its cunning plan for the future.

The move was a little unusual, as it did not come with the huge tax breaks and other sweeteners that Intel has required from Israeli governments and the US. This indicates that Intel needed a plant in China.

The move followed another similar-sized investment aimed at consolidating China’s wireless chip sector. The smart money suggests the two moves are linked Intel wants China to become a major centre for the company’s belated push into wireless chips.

Intel could be positioning both of these plants to manufacture smartphone chips. Intel failed to recognise the importance of mobile devices earlier, with the result that most of the market is now dominated by companies like sector leader Qualcomm, and mid-sized players like MediaTek, which mostly use chips based on an architecture supplied by European chip giant ARM.

Beijing wants to create a homegrown player to take down Qualcomm but its domestic chip sector consists of mostly small design houses that lack the resources to become major global players.

Unigroup, which is based out at the Tsinghua University, merged two of the biggest domestic players, Spreadtrum and RDA Microelectronics, into a single company. Intel joined that initiative in September, when it purchased 20 per cent of the new company for $1.5 billion. This makes it bigger than China’s largest chipmaker SMIC.

What Intel appears to be doing is getting itself onside with the Chinese and helping their domestic chip making plans with the idea of getting a foot in the door behind the bamboo curtain. Antitrust watchdogs are less likely to snap at its heels, or treat it as a problem, like they do Qualcomm and in the long term, it will have its fingers in the pies of a growing Chinese chip industry.

US tech snooping is a trade barrier

 shoe phoneThe US government’s mass surveillance of the whole world has become a trade barrier for European Internet companies trying to provide services in the United States, a top EU official claims.

Paul Nemitz, a director in the European Commission’s justice department said that US citizens are deterred from using European e-mail providers because they do not get the same protection as they would by using US providers, said

Laws which empower the NSA to basically grab everything which comes from outside the United States, is a real trade barrier to a European digital company to provide services to Americans inside America.

Nemitz, who is overseeing an overhaul of the EU’s 20-year-old data protection rules, told a conference on data protection in Paris that an American in the United States using a European service does not have the same level of protection as he would if he used an American service.

Using a European service, his communication is transmitted outside the United States, so it is subject to interception.

The comments underscore the widespread unease within Europe about access to people’s data by both security services and companies. They also come at a time when Brussels and Washington are renegotiating a data-sharing agreement – called Safe Harbour – used by over 3,000 companies.

The Safe Harbour agreement makes it easier for US companies to do business in Europe by certifying that their handling of user data meets EU data-protection laws.

The EU wants Washington to guarantee that it will only access Europeans’ personal data for national security reasons when it is strictly necessary, as it does with US citizens’ data.

Meanwhile the EU is also negotiating a new pan-European data- protection law which would impose stiff fines on companies mishandling personal data in Europe.

Companies in both the United States and the EU have lobbied against some parts of the new rules, arguing that they will impose too much red tape on businesses.

Cyber criminals steal a quarter of digital adverts

the-great-train-robbery-movie-poster-1903-1020549358Almost a quarter of video ads and 11 percent of display ads are viewed by fake consumers created by cybercrime networks to steal the billions of dollars spent on digital advertising.

A study, by digital security firm White Ops and the Association of National Advertisers, is one of the most comprehensive looks to date at the persistent criminal activity involving online advertising. It looks at the problem of “bots” or automated entities that mimic the behaviour of humans by clicking on ads and watching videos.

The bots siphon money away from brands by setting up fake websites or delivering fake audiences to websites that make use of third-party traffic. Advertisers will lose $6.3 billion to bots next year, the report said.

Bob Liodice, the president and chief executive of the ANA, an organization that represents thousands of brands said that it had been suspected there was fraud in the industry, but it was not known how much was being taken or the reasons it was happening.

White Ops monitored 181 online advertising campaigns by the brands from August to October to determine fraud activity.

Bot fraud has long been part of the ecosystem of low-price ads that cost a few dollars or less. This study revealed, however, that many premium websites and publishers, which charge roughly 10 times more for an ad, are just as vulnerable.

In one instance, 98 percent of video ads at a premium lifestyle site were viewed by bots. The bots are extremely effective of looking like a high value consumer.”

Liodice said the report will help the industry develop an action plan to combat fraud.

Microsoft releases the hounds on subscription activators

White Puppy-02In a new move against software pirates, the software king of the world has unleashed its legal hounds on those offering subscription activating software.

Microsoft has filed a complaint at a federal court in Washington accusing a person behind an AT&T subscription of activating various pirated copies of Windows 7 and Office 10. The account was identified by Microsoft’s in-house cyberforensics team based on suspicious “activation patterns.”

Microsoft doesn’t have a long track record of cracking down on individual pirates so this move is new.

Microsoft filed a copyright infringement lawsuit against a person who activated pirated copies of Windows 7 and Office 10 from an AT&T Internet connection.

“Microsoft’s cyberforensics have identified a number of product key activations originating from IP address 76.245.7.147, which is presently assigned to ISP AT&T Internet Services..,” the complaint reads.

“These activations have characteristics that on information and belief, establish that Defendants are using the IP address to activate pirated software.”

While many think unauthorised copies are hard for Microsoft to detect, the company explains that its cybercrime team claims to use state-of-the-art technology to detect software piracy. It looks for activation patterns and characteristics which make it likely that certain IP-addresses are engaged in unauthorised copying.

In this situation, the defendant activated numerous copies of Windows 7 and Office 2010 with suspicious keys, which were nicked from Microsoft’s supply chain, used without permission from the refurbisher channel, and used more often than the license permits.

So, this is not an average user, but someone who sells PCs with pirated software.

Why does Intel need Broadwell H?

12-inch silicon wafer - Wikimedia CommonsThe Dark Satanic Rumour Mill has manufactured a hell on earth yarn which claims that Intel has bumped off its Broadwell H range.

The rumour is based on pure speculation and common sense. Earlier this year Intel told the world that it would be launching its low-power Broadwell processors in “early spring” and Kirk Skaugen, who heads up Intel’s PC Client Group, showed a roadmap to prove it.

Spring was expected to see millions of units in preparation for a very early spring fifth-generation Core launch of our traditional Celeron, Pentium, Core i3, i5, i7 which will be on Broadwell-U and Skylake in the second half of 2015.

But the higher-powered quad-core variants of Broadwell such as the Broadwell-H and Broadwell-M were not mentioned but were expected in “work week 29” and “work week 36” in 2015. That would mean late July to early September.

But if Skylake also appears in the second half of 2015, it seems that Broadwell chips is surplus to requirements. Intel could go traight to Skylake for the higher-performance notebook models  — after all . Skylake has a better CPU core, graphics and media subsystem than Broadwell.

Axing of Broadwell could also be a return to the “tick-tock” method for Intel. Skylake fully ramped in the second half of 2015 means that Intel could conceivably mean that the 10-nanometer Cannonlake product will be ready for deployment for back-to-school in 2016.

Cisco sues Arista

ciscologoNetwork equipment maker Cisco Systems has sued Arista Networks for copying its networking technologies.

The lawsuits, filed in a federal court in California, accuses Arista of infringing on 14 patents on networks and also on related copyrights.

Cisco General Counsel Mark Chandler wrote in his bog that rather than building its products and services based on new technologies developed by Arista, however, and providing legitimate competition to Cisco, Arista took a shortcut by blatantly and extensively copying the innovative networking technologies designed and developed by Cisco.

Arista was formed by former Cisco employees, including Chief Development Officer Andreas Bechtolsheim, Chief Technology Officer Kenneth Duda, and Chief Executive Officer Jayshree Ullal.

Arista said it had not yet been able to evaluate the lawsuits.

“While we have respect for Cisco as a fierce competitor and the dominant player in the market, we are disappointed that they have to resort to litigation rather than simply compete with us in products,” Arista said in a statement.

 

IPod DRM court case could collapse on technicality

novità-apple-2013After ten years trying to get an antitrust case against Apple to court, the case might collapse because the plaintiffs can’t prove they ever bought an iPod.

The antitrust case was messy and would have bought a fair few skeletons out of the closet proving that Jobs’ Mob had done its best to kill off rivals with some dirty deeds ordered by its Messiah Steve Jobs.

The case is so old that Jobs even recorded a video testimony defending his actions. The lawsuit covers iPods purchased between September 2006 and March 2009. Lawyers representing both consumers and businesses claim that the restrictions meant Apple could inflate the prices of iPod in an anti-competitive manner. They are seeking $350m in damages, which could be tripled under US competition laws.

However, now it seems that he case might get chucked out on a technicality. Lawyers for Apple have raised a last-minute challenge saying new evidence suggested that the two women named as plaintiffs may not have bought iPod models covered by the lawsuit.

Apple lawyers checked the serial number on the lead plaintiff’s iPod Touch and found it was bought in July 2009. The other main plaintiff, Melanie Wilson, also bought iPods outside the relevant timeframe, they indicated.

Judge Yvonne Gonzalez Rogers said at the end of the trial’s third day of testimony in Oakland, California said she was concerned that she did not have a plaintiff.

Lawyer Bonny Sweeny said that her team was checking for other receipts. She conceded that while Ms Wilson’s iPod may not be covered, an estimated eight million consumers are believed to have purchased the affected devices.

It is a pity as so far it has emerged in the trail that between 2007 and 2009, if an iPod owner tried to sync their device with iTunes and had music from another digital store on the device, they would receive an error message telling them to restore their iPod to factory settings. This effectively wiped all non-iTunes music from the device.

Apple maintained at the trial that the software and restrictions were necessary to protect users from malicious content and hackers.

Cameron’s porn filter deletes other sites too

stupid cameronBritish Prime Minister David “One is an Ordinary Bloke” Cameron’s porn filter is being used to purge the internet of a few sites that he does not want British people to see.

The alarm call was sounded by the German hacker site the Chaos Computer Club over the weekend which noticed that its site had been blocked in the UK.

Vodafone customers were also being stopped from accessing the ticket sales to this year’s Chaos Communication Congress.

The group claims that its sites were on a list which censors the open internet. These internet filters, authorised by Prime Minister David Cameron, are implemented by UK’s major internet service providers (ISPs) were supposed to stop porn from falling into the hands of children. But it appears that the list has been extended to include material deemed “extremist”.

Users can opt-out of censorship, or bypass it by technical means, but only a minority of users know how to bypass those filters.

Chaos points out that accessing its server directly via http://213.73.89.123/ appears to work quite well, thereby rendering the censorship efforts useless.

CCC-spokesperson Dirk Engling said that he saw this as proof that censorship infrastructure – no matter for which reasons it was set up, and no matter which country you are in – will always be abused for political reasons

North Korea not involved in “righteous hacking”

Kim Jong Un, courtesy of North Korea news agencyNorth Korea has denied it was involved in the hacking of Sony, but indicated it considered it a “righteous deed” and owed the hackers a drink.

North Korea was jolly cross that Sony Pictures was producing a film that depicts an assassination plot against Pyongyang’s supreme leader Kim Jong Un.

While denying responsibility for an attack last week that disrupted Sony’s computer system and spewed confidential information onto the Internet, an unidentified spokesman for the North’s powerful National Defence Commission acknowledged that it “might be a righteous deed of the supporters and sympathisers” of the North’s call for the world to turn out in a “just struggle” against US imperialism.

The statement claimed that North Korea did not know where in America the Sony Pictures is situated and for what wrongdoings it became the target of the attack.

“But what we clearly know is that the Sony Pictures is the very one which was going to produce a film abetting a terrorist act while hurting the dignity of the supreme leadership of North Korea.”

The Kim family has ruled for three generations, and sees any outside criticism or mockery of its leader as an attack on its sovereignty.

The movie “The Interview,” is a comedy starring Seth Rogen and James Franco, and its plot concerns an attempt on the life of leader Kim Jong Un and Pyongyang does not find the idea funny.

“The United States should know that there are a great number of supporters and sympathisers with North Korea all over the world as well as the `champions of peace’ who attacked the Sony Pictures,” the statement said.

“The righteous reaction will get stronger to smash the evil doings.”

SAP rejects Microsoft merger

sapbeerThe German outfit  which makes expensive esoteric business software and no-one really knows what it does, has decided that it will not allow itself to become part of the glorious Microsoft Empire.

Rumours were flying that SAP was to merge with Microsoft as both of them try to corner the business software market.

However it looks like the German software maker SAP will remain an independent company in the long term, its chief executive told a German newspaper.

Bill McDermott told weekly Euro am Sonntag that it would be best for the company to stay independent is to grow and to have a good market capitalisation.

With a market capitalisation of $86.6 billion, SAP is the fifth-largest company in Germany’s large cap DAX index.

Apparently, SAP had held talks about a potential merger with software giant Microsoft but discussions were scrapped because of the complexity of any deal and the subsequent integration of the companies. All this happened in 2004, so it appears that this rumour was a bit like us – rather elderly but for some reason will not go away.

 

Apple’s garage beginning was a myth

Steve WozniakApple co-founder Steve Wozniak has scotched a long running myth that Apple started in Steve Job’s parents’ garage.

For a while now Apple has peddled an HP style myth that Apple started from the garage. However Woz said the garage thing was a bit of a myth.

“We did no designs there, no breadboarding, no prototyping, no planning of products. We did no manufacturing there. The garage didn’t serve much purpose, except it was something for us to feel was our home. We had no money. You have to work out of your home when you have no money,” he told Bloomberg.

He did a lot of his work at his cubicle at HP. He said that was an incredible time. It let him do a lot of side projects, and it was five years to the summer of ’75, when he built the Apple computer, the first one. The next summer he built the Apple II computer.

He also added that the goal of Apple was not the much touted “Steve Jobs wanted to change the world” idea beloved of so many.

Woz said that Jobs always spoke about wanting to be a person that moves the world forward, the only problem was that he could not create anything.

“Steve wanted a company real badly. His thinking was not necessarily about what computers would do for the average Joe in the average home. Steve only found the words that explained what these computers would do for people and how important it was a little later in life,”Woz said.

Woz said that Jobs did have the best brain in the outfit. He usually had a little, tiny suggestion, but usually he was right.

Woz said he was aware that he was in the middle of a revolution and that pretty soon we were going to have computers that were affordable.

“Every computer before the Apple I looked like—you have to imagine the most awful, not understandable computer you’ve ever seen in a museum or in a new movie. The Apple I was the first one to have a keyboard and a video display. A television. You would type on the keyboard and see your words on the television, or the computer could type its own words on the television and play games with you and ask questions and give answers. That was a turning point in history,” he said.

SSDs are now more reliable

 ssdiconsetAn investigation into the shelf life of SSDs has concluded that in a year the technology has improved dramatically.

Techreport carried out a test to see how many writes an SSD could survive before burning out. IT also tracked how each one’s performance characteristics and health statistics changed as the writes accumulated.

The Corsair Neutron Series GTX, Intel 335 Series, Kingston HyperX 3K, and Samsung 840 Series died absorbing far more damage than its official endurance specification promised—and far more than the vast majority of users are likely to inflict.

The 840 Pro and a second HyperX 3K have so far reached two petabytes of writes. Most people’s  SSDs would be pushed to have more than terabytes of writes in a couple of years.

Intel’s 335 Series is designed to go out on its own terms, after a pre-determined volume of writes. It died after 750TB but at least warned everyone it was about to croak.

The HyperX 3K only made it to 728TB. Unlike the 335 Series, which was almost entirely free of failed flash, the HyperX reallocated nearly a thousand sectors before it died.

The Samsung 840 Series started reporting reallocated sectors after just 100TB. The 840 Series went on to log thousands of reallocated sectors before going to disk heaven.

Corsair’s Neutron GTX was the picture of health up to 1.1PB, it suffered a rash of flash failures over the next 100TB.  It reached 1.2PB but refused to power up after a reboot. The 840 Pro and second HyperX 3K managed 2PB.

What this means is that SSDs are now reaching a point where they are pretty reliable over a long period of time.  For your average user, a person would have to be using any one of these drives for more than 500 years before they died.

 

Tories blame ISPs for Sony hack

Mike_WeatherleyEver willing to blame ISPs for any problems in the world, the UK’s Tory government say ISPs are behind the Sony hack.

The Tories are trying to get ISPs to act as unpaid censors to stop anything that someone with a blue rinse might not want to see on the internet.  The ISPs have told them that they can’t be responsible for everything that appears on the internet, so the Tories are trying to convince the world that they really are.

Last week Prime Minster David Cameron claimed that the ISPs were responsible for terrorism because websites from terror groups could be found online.  Before that he claimed they were responsible for child porn, for similar reasons.

Now as the fallout from the Sony hack continues, the UK Prime Minister’s former IP advisor, as “facilitators” web-hosts and ISPs must step up and take some blame.

You would think that someone who advises a Prime Minister about the internet might actually know a little bit about it, but clearly Mike Weatherley MP does not have a clue.

He claims that the ISPs are encouraging internet piracy by allowing stolen films to go down their tubes.

“Piracy is a huge international problem. The recent cyber-attack on Sony and subsequent release of films to illegal websites is just one high-profile example of how criminals exploit others’ Intellectual Property,” Weatherley wrote.

“Unfortunately, the theft of these films – and their subsequent downloads – has been facilitated by web-hosting companies and, ultimately, ISPs who do have to step-up and take some responsibility.”

Of course Cameron’s internet adviser can’t provide detail on precisely why web hosts and ISPs should take responsibility for the work of malicious hackers.  Particularly when these ones appear to be state sponsored.

His theory is that something must be done and it is the ISPs who must do it. Of course he could equally have blamed the Prime Minister’s cat and come up with a more viable reason.

It is also tricky because in the UK almost every major torrent site is already blocked by ISPs.  So in this case it is just Weatherley opening his mouth and letting the wind blow his tongue around.

Apple deleted content from user devices

apple-disney-dreams-snow-white-Favim.com-142405Fruity cargo cult Apple deleted music from its customers’ devices which were not bought through the iTunes Music Store.

The information has come out of the proceedings of Apple’s iPod/iTunes antitrust lawsuit. Plaintiffs’ lawyers claimed Apple surreptitiously deleted songs not purchased through the iTunes Music Store from users’ iPods.

If this is true then the order must have come from Steve Jobs himself.

Attorney Patrick Coughlin, representing a class of individuals and businesses, said Apple intentionally wiped songs downloaded from competing services when users performed a sync with their iTunes library.

Users attempting to synchronise an iPod with an iTunes library containing music from a rival service, such as RealNetworks, would see an ambiguous error message without prompting them to perform a factory reset. After restoring the device, users would find all non-iTunes music had disappeared.

The court was told that that Apple decided to give its users the worst possible experience and blow up,” the iTunes library, Coughlin said.

Coughlin claims that Apple manufactured the error message in a move to stop customers from using their iPod to play back music from stores other than iTunes.

Apple insists that the system was a safety measure installed to protect users. Apple security director Augustin Farrugia said additional detail about the error’s nature was not necessary because, “We don’t need to give users too much information,” and “We don’t want to confuse users.” He went on to say that Apple was “very paranoid” in its protection of iTunes, a sentiment echoed in an executive email penned by Steve Jobs in 2004.

Jobs’ emails and a videotaped deposition revealed Apple was “very scared” of breaking contractual sales agreements with music labels, which in turn prompted an increased interest in digital rights management (DRM). Although iTunes no longer sells DRM-protected content, Jobs said frequent iTunes updates were needed to protect as “hackers” found new workarounds.

The case said that Apple is accused of creating a monopoly locking users into a closed ecosystem with FairPlay digital rights management (DRM), the iPod and the iTunes Music Store. Plaintiffs are seeking $350 million in damages, an amount that could be tripled to over $1 billion under U.S. antitrust laws.

Aside from Jobs’ deposition, current Apple execs Eddy Cue and Phil Schiller are scheduled to testify later this week.

Apple App store safety is a myth

tumblr_mc8zb8BqH31rttlrno1_400If you believe the Tame Apple Press you would think that the Microsoft and Google App stores were a terrible place full of Apps poisoned with malware, while the Apple App store is so rigorously checked, that all is completely safe.

But a study by InfoWorld has poured cold water on that particular myth claiming that the store has just as much malware inside.

Simon Phipps, who is an Open Saucy blogger, wrote that developers who are competing with Apple find that getting their apps into the store nearly impossible and those writing Apps for Apple find that the rules are constantly changing.

“But if you’re a scammer looking to make a fast buck, it appears that Apple process can be defeated and the scale of the problem became apparent in the the Apache OpenOffice community,” Phipps said.

For several months, the user support mailing list has been bothered with apparently random questions from people seeking support for an iPad app. Apache OpenOffice doesn’t even have an iOS version, so people wondered how there could be questions about supporting it.

It turned out that there was a $2.99 app in Apple’s iTunes Store and the developer who posted this app has used all sorts of tricks to populate the entry. He dubbed it Quickoffice Pro, which was the name of a genuine app bought by Google in 2012 and finally discontinued in 2014. Buyers would likely have an instinctive trust for the name, especially because the app uses the icon from the real Quickoffice product.

It simply displays a gray screen with the word Tap. When you tap the screen, the app exits. The developer has pointed angry customers at an innocent open source project whose ethos is to treat all user queries seriously and that doesn’t have the resources to mount a response for lack of volunteers.

It was posted under Lee Elman’s personal Apple developer account without permission or his  knowledge.

But how did this happen if Apple claims to meticulously screen all submissions to the store? InfoWorld found other examples. Again real accounts are being used for fake products.
Apple is not saying anything about the allegations.