Tag: newstrack

Nanomagnets improve supercomputers

magnet-manNanomagnet computer chips appear to make supercomputers run more efficiently, according to  researchers at the Technical University of Munich in Germany.

Irina Eichwald and her team of boffins have been using microchips made from tiny magnets rather than conventional power-hungry transistors may enable intensive number-crunching tasks.

On traditional silicon the bits of information, 0s and 1s, are represented by voltages across a transistor, each of which needs its own wire. Magnets can do the same job by switching their pole orientation: pointing north-south represents 1, say, and south-north is 0.

Eichwald found that flipping poles takes less energy than running current through a wire, so they need less power to run.

Nanomagnets have already been seen on microchips  but have been placed only on a single layer because they need extra space to work properly.

Now Eichwald has worked out a way to rival the density of transistor-based designs and grown a chip which is 100 nanomagnets deep.

Her team made a logic gate from stacked arrays of nanomagnets. Instead of wires, a handful of magnets above the chip induced magnetic fields. The magnets then flip their orientation one after the other, like dominoes, to the magnet performing the actual operation. In a test, the magnetic chip used 1/35th of the power a transistor used.

“A huge number of computing processes can now be done simultaneously with very low power consumption as you don’t need the connecting wires transistors need. You only need to generate a magnetic field across the chip,” says Eichwald.

New Scientist http://www.newscientist.com/article/mg22329812.800-magnets-join-race-to-replace-transistors-in-computers.html#.U-RmOPmSyUY  says that the technology is one of a few which is in the race to replace silicon.

Questions posed about mega-hack

wargames-hackerQuestions have been raised among the security community about a huge attack on US systems which is alleged to have stolen 1.2 billion user name and password combinations and more than 500 million email addresses.

The hack was discovered by an outfit called Hold Security and was claimed to include confidential material gathered from 420,000 websites, including household names, and small Internet sites.

Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems, so it should have been seen as a reliable source.

The company said the attack was found after more than seven months of research and was being carried out by a Russian cyber gang which is currently in possession of the largest cache of stolen data. While the gang did not have a name, we dubbed it “CyberVor”.

All cool stuff, but many of the comments about the hack online centre on the fact that Hold Security happens to offer a $120/month breach notification service so that people can find out if the hackers have their passwords on file.

Others have focused on the fact that Hold Security timed the announcement to fit with the Black Hat Security conference to spark a debate on password security.

PC World  said there were unanswered questions about the hack.

Hold Security said the hacking group started out buying stolen credentials on the black market, then used those credentials to launch other attacks. However, it is unclear how many credentials they bought and how many of the 1.2 billion they culled themselves. In other words, this database, if it exists, could be full of ancient data.

It is also not clear if the passwords that are alleged to be stolen came from important financial sites or less important ones. It is also questionable what the hackers would do with those details.

If they are fresh credentials for important services like online banking, they are ripe to be used to siphon money from online accounts. If they are older or from little-used services, they might be used to send spam by email or post it in online forums.

 

 

Microsoft kills support for old IE

firing-squadSoftware giant Microsoft has decided to pull the support plug on old versions of Internet Explorer.

Of course that is not what Microsoft said on its blog. It tells you that it is “prioritising helping users stay up-to-date with the latest version of Internet Explorer.”

Vole said that outdated browsers represent a major challenge in keeping the Web “egosystem” safer and more secure, as modern Web browsers have better security protection.

Internet Explorer 11 includes features like Enhanced Protected Mode to help keep customers safer. It should come as no surprise that the most recent, fully-patched version of Internet Explorer is more secure than older versions, Vole wrote.

To force the hand of users, from January 12, 2016, the following operating systems and browser version combinations will be supported:

Windows Platform Internet Explorer Version
Windows Vista SP2 Internet Explorer 9
Windows Server 2008 SP2 Internet Explorer 9
Windows 7 SP1 Internet Explorer 11
Windows Server 2008 R2 SP1 Internet Explorer 11
Windows 8.1 Internet Explorer 11
Windows Server 2012 Internet Explorer 10
Windows Server 2012 R2 Internet Explorer 11

After January 12, 2016, only the most recent version of Internet Explorer available for a supported operating system will receive technical support and security updates.

Customers using Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 on Windows 7 SP1 should migrate to Internet Explorer 11 to continue receiving security updates and technical support. For more details regarding support timelines on Windows and Windows Embedded, see the Microsoft Support Lifecycle site.

Vole said that it is introducing new features and resources to help customers upgrade and stay current on the latest browser.

 

Nvidia does rather well

nvidia-gangnam-style-330pxNvidia posted higher second-quarter earnings and gave a forecast for current-quarter revenues that exceeded what the cocaine nose jobs of Wall Street predicted.

This was surprising given that some analysts were worried that PC shipments were flat in the June quarter.

Nvidia’s graphics chips for PCs make up most of its business but what appears to have saved the company’s bottom line was that it has been selling to car makers and data centres.

In the second quarter, revenue from Tegra chips for automobiles and mobile devices jumped 200 percent to $159 million.

After struggling to compete against larger chipmakers like Qualcomm in smartphones and tablets, Nvidia has increased its focus on using its Tegra chips to power entertainment and navigation systems in cars made by companies including Volkswagen’s Audi, BMW and Tesla.

Nvidia in July launched its own tablet aimed at game enthusiasts, called Shield, with Tegra chips and other high-end components. This went against the industry trend toward commoditized, inexpensive devices.

Nvidia has been doing well in the cloud by flogging its chips to IBM, Dell and HP as part of their datacentre product range.

Predictions are that Nvidia’s GRID graphics technology for data centres will also do well after it has been tested by other potential enterprise customers.

Nvidia reported second-quarter revenue of $1.1 billion, up 13 percent from the year-ago quarter as it expanded its focus on cars and cloud-computing.

For the current quarter, Nvidia said it expects revenue of $1.2 billion, plus or minus 2 percent. Analysts on average expected second-quarter revenue of $1.1 billion and third-quarter revenue of $1.16 billion.

Nvidia’s net income in the second quarter, which ended on July 27, added up to $128 million or compared with $96 million in the year-ago quarter.

Homeland Security Contractor hacked

invisible-agent-movie-poster-1942-1020531953A company that performs background checks for the US Department of Homeland Security has been the victim of a “state-sponsored attack” on its systems.

US Investigations Services (USIS) had all the personal information about DHS employees so it merited a foreign spy agency’s attention.

DHS said it had suspended all work with the company and a “multi-agency cyber response team is working with the company to identify the scope of the intrusion.

DHS spokesman Peter Boogaard said Homeland Security forensic experts had concluded that some DHS personnel may have been affected. DHS has notified its entire workforce, mostly to be cautious to advise them to monitor their financial accounts for suspicious activity. Although if it was a state sponsored attack the hackers are not going to be raiding bank accounts.

Experts who have reviewed the facts gathered to-date believe it has all the markings of a state-sponsored attack.

USIS says it is the biggest commercial provider of background investigations to the federal government, has over 5,700 employees and provides its services all over the world.

Apple and Intel: sheesh!

rejection-2One of the dafter silly season stories to cross our desk has been the bizarre claim that Apple will eventually drop Intel and use its own ARM based chips.

The source of this is a former Apple executive Jean-Louis Gassee who wrote in his bog that the end is nigh for Intel on the Mac.

To be fair Gassee did not come up with this theory on his own.  He was quoting Matt Richman in a 2011 blog post titled “Apple and ARM, Sitting in a Tree” where he said that  after a complicated but ultimately successful switch from PowerPC chips to Intel processors in 2005, Apple will make a similar switch, this time to ARM-based descendants of the A4  chip designed by Apple and manufactured by Samsung.

Of course that was a long time ago and Apple and Samsung are no longer friends. The reasons both blogs give for a switch are low power usage and price.

“Dumping Intel for ARM would therefore allow Apple to offer ultra-affordable Macs while at the same time preserving their precious margins. In this scenario, Apple would be able to steal away even more market share from Microsoft while generating boatloads of cash in the process,” Gassee claims.

The other advantage is that Apple is a complete control freak and loves to control as much of the underlying technology in its products as possible.

If Apple moved to ARM, it would not have to suffer the expected humiliation of having to delay its new Macbooks because Intel has not made its Broadwell chip on time. While Intel CEO Brian Krazanich initially claimed that Intel’s next-gen processor would launch in time for the 2014 holiday season, it now looks as if Apple will have to wait until 2015 for that.

That is where the logic in the argument fails completely. The ARM chips are not as good performers as the Intel versions. That is not an insult; they are mobile phone chips which are not designed to do the same thing as a PC.

If Apple were interested in creating low power, “cheap as chips PCs” then it might have a chance at pulling it off, but that has not been Jobs’ Mob’s model ever.

What is bizarre about this rumour is how it has been seized on by the Tame Apple Press keen to show some superiority for Apple even as the shine goes off the company. Having told us for years that the world was moving to mobile, because Steve Jobs said it was, and that the PC was dead, they are now in the uncomfortable position of having to eat their words. They are also finding that their favourite PC maker is not the final solution in some technology fields.

PC chip design is one of them.

What is more likely is that Apple will stick to its Mobile ARM chips and look to Intel to provide its PC chips at least for the foreseeable future. About the only thing that might change Apple’s mind is that if AMD suddenly came up with some super cool chips.  They, at least, would be cheaper – not that Apple really cares that much about price.

Keith Alexander is a programming genius

KeithAlexanderThe former head of the NSA, Keith Alexander, has been getting into trouble for charging companies millions of dollars to tell them how to keep his former employers out of their systems.

The argument is that he is using all the material he gathered at the NSA to make a nice little earner in retirement. If he were a whistle-blower, they would lock him up, but since he is an adviser to corporates and is not giving out military operations details he can do what he likes.

However we think that the security community and the Senate is being a little hard on Keith, after all if a patent application is correct he is clearly a programming genius.

In the six months since he left the NSA, Alexander has come up with brand new anti-hacking concept that will have shedloads of patents. The former NSA chief said that IronNet has already signed contracts with three companies and that he hopes to finish testing the system by the end of September.

Now he could not have come up with that idea when he was at the NSA, because he would have been expected to use it for his job and to help his country, which is more or less what he was paid for.

This means that he had to come up with it after he left office in March. This means he not only wrote the code managed to make it work. This makes him a software genius and an organisational wiz-kid who displays skills we have not seen in a former military man.

In an interview to the Associated Press he said that if he retired from the Army as a brain surgeon, it be OK for him to go into private practice and make money doing brain surgery.

“I’m a cyber-guy. Can’t I go to work and do cyber stuff,” he asked. But he’s not. In the Army, he just managed “cyber guys.”

His system involves “behavioural modelling” as its secret sauce. The technology has been looked at by security experts but so far no one has got it go. Well other than Alexander which shows what sort of genius he must have been.

Tektronix makes security own goal

Barbra_Streisand's_Greatest_HitsIt appears that the Tektronix company has a few problems when it comes to managing the press.

Last week a small site called hackaday ran a yarn which said that Tektronix application modules were designed with laughable security.

The theme of the post was a review of Tektronix modules that unlock the features in an oscilloscope chip. However, Tektronix designed a woefully weak system for unlocking these modules.

Tektronix was not happy about the details of its system being reviewed in the magazine, and even less so that it was described as being “laughable”.

But rather than ignore the review, take the editor out for a quiet chat, or ask nicely to have the thing taken down, Tektronix said the review violated its copyrights.

Its lawyers sent a DMCA Takedown Notice demanding that it remove the post because the story violated its copyright.

To put this in some perspective, if you review a product and you think it is insecure you are allowed to say why. The use of a DMCA though is a nasty tactic because it means that a less understanding ISP can shut your magazine down.

Tektronix said that the posting on the “Hack A Day” website concerning hacking of Tektronix’ copyrighted modules for use in oscilloscopes.

“Hacking those modules permits unauthorised access to and use of Tektronix’ copyrighted software by means of copying of Tektronix’ copyrighted code in those modules,” the company said.

The posting includes instructions for how to hack our modules and thereby violate Tektronix’ copyrights.

However Hack-a-Day said that is the point of its article. The product uses an EEPROM, a connector, and a plain text string of characters which is already published publicly on Tektronix’s  website.

“ If you were selling these keys for $2.99 perhaps this would be adequate, but Tek values these modules at $500 apiece,” the site said.

Now it would appear that Tektronix is suffering from a bad case of Barbara Streisand after all we would never have noticed Hack-a-Day’s story if it had not objected.

Intel plans another “new era”

broadwellChipmaker Intel is has been telling hacks and hackettes that it is going to be lifting the kimono on a “new era” of hardware next month.

It’s unclear what Intel could be announcing at IFA 2014 on September 5, 2014, in Berlin, Germany.  The smart money is on the company applying liberal coats of candle grease to wax lyrical about its next gen CPUs.

For those who came in late, Intel is widely expected to release new 5th-generation processors based on the company’s Broadwell architecture towards the end of this year.

After all Intel has already spilled the beans on its Core M, a super-thin processor that could pave the way for ultra-thin laptops and hybrids. They have also talked about Llama Mountain, a concept device powered by Core M that’s only 7.2mm thick and wears a 12.5-inch display.

Intel’s IFA 2014 presentation could also contain more information about these two devices as well, but that would be old news.

Intel needs to grab a few headlines its Devil’s Canyon CPU was found to offer a modest performance boost over older Intel chips and was greeted by a loud sounding yawn from the press.

US spooks in Snowden panic

spyUS spooks have uncovered what they think is another Edward Snowden who has been secretly leaking classified info to the great unwashed.

The Secret Service is thinking of asking the US Department of Justice to open a criminal investigation into the suspected leak of a classified counter-terrorism document to a news website.

A document which was published in The Intercept provides a statistical breakdown of the types of people whose names and personal information appear on two government data networks listing people with supposed connections to militants.

The Intercept is co-founded by Grenn Greenwald, the reporter who worked with Edward Snowden but the document was dated August 2013, after Snowden left the US.

Since Snowden is not thought to have had access to US networks after May, officials to suspect the drop may have come from a second leaker.

The document talked about the Terrorist Identities Datamart Environment database (TIDE) and the Terrorist Screening Database.

It said 680,000 names were “watchlisted” in the Terrorist Screening Database, an unclassified data network which is used to draw up more selective government watchlists.

The file also showed that 280,000 of the 680,000 people are described by the government as having “no recognised terrorist group affiliation.”

More lists include a “no fly” list totalling 47,000 people who are supposed to be banned from air travel, and a further “selectee list” of 16,000 people who are supposed to get extra screening.

The screening database is taken from TIDE, a larger, ultra-classified database which contains 320,000 more names.

This is not the first time the Intercept has a big scoop that has put the fear of god into the spooks. It has also published a lengthy document setting out the criteria and procedures by which names are placed into terrorist watchlist databases.

Hotel takes Basil Fawlty approach

fawlty2_2790315bA US hotel has been adopting a Basil Fawlty approach to bad reviews on the internet.

The Union Street Guest House in New York has worked out that the best way to keep negative reviews off Yelp and other sites is to fine guests who complain.

The hotel charges couples who book weddings at the venue $500 for every bad review posted online by their guests. The online police reads:

“Please know that despite the fact that wedding couples love Hudson and our inn, your friends and families may not. “If you have booked the inn for a wedding or other type of event . . . and given us a deposit of any kind . . . there will be a $500 fine that will be deducted from your deposit for every negative review . . . placed on any internet site by anyone in your party.”

If you take down the bad review, you will get your money back.

Just in case anyone posts a bad review, the hotel owner has been aggressively posting “mean spirited nonsense,” and “she made all of this up.”

For example in one case a reviewer complained of rude treatment over a bucket of ice, the proprietors shot back: “I know you guys wanted to hang out and get drunk for 2 days and that is fine. I was really really sorry that you showed up in the summer when it was 105 degrees. . . I was so so so sorry that our ice maker and fridge were not working and not accessible.”

As Basil Fawlty once said: “Have you seen the people in room six? They’ve never even sat on chairs before.”

After the outcry the Hotel pulled its policy from the web, but it can be found on Go-Back. You can just remember this rant from Fawlty Towers which is more or less similar.

 

Nomura’s dodgy maths goes Azure

mathsWhen you work on a newspaper you usually get a spanking from a grumpy sub-editor if you use the phrase “the world’s biggest” in a story. Which is why Nomura analyst Rick Sherlund has found himself in hot water by claiming that Microsoft’s Azure is headed to be the largest cloud in the world.

While everyone admits that Azure is doing very well, people were a little surprised when Sherlund claimed that Redmond was on track to make $5.7 billion revenue from Azure.

Apparently his prediction was by adding up some numbers from Microsoft’s last earnings.  Redmond said that cloud revenue grew 147 percent year-over-year. This led Nomura analyst Sherlund to predict Microsoft will hold the crown as top cloud by revenue by the end of 2014.

However there are those who have been questioning Sherlund’s maths InfoWorld  said that all Azure numbers are impressive but they are a long way from being the world’s biggest cloud.

It said that it is not clear that Microsoft’s “cloud revenue” is “Azure” in fact Redmond has been clear to keep the two things apart. It points out that it is not clear how much of Microsoft’s cash comes from Azure.

Amazon is seeing that slowed growth during its last earnings call, but it also revealed that its cloud business climbed 90 percent over the past year.

Given that AWS offered five times the compute capacity of the other 14 cloud providers in the Gartner Magic Quadrant combined as of August 2013, 90 percent growth is huge. So while Azure might grow like crazy, so is the competition.

This means that Redmond will even be close to having the biggest cloud by the end of the year. It will almost certainly continue to build out public cloud services that enterprises buy – just not the world’s biggest.

Apple and Samsung declare truce

soldiers-2The thermonuclear patent war between Apple and Samsung is only going to be fought in the US.

The two sides have negotiated a sort of truce, where the only court battles between the two will be fought in US courts.  It is a bit like Israel and Hamas agreeing to shoot at one another only in one district of Gaza.

Samsung Electronics said that it and Apple would continue to pursue existing cases in US courts. The two companies did not strike any cross-licensing deal.

However it is widely seen as a start and a significant lessening of corporate hostilities after years of bitter patent disputes over the intellectual property rights for mobile designs and technology.  The move will end legal fights in more than 12 countries in Asia, North America and Europe.

In any event, a win in the US will mean bigger awards for damages than other countries.

But some analysts have said that the two companies would eventually bury the hatchet and sign a cross-licensing deal.

 

Child labour plant dogs Samsung

child_laborThe Chinese subsidiary of Shinyang Engineering has started supplying parts to Samsung a month after business ties were cut over child labour allegations.

Samsung halted business with Dongguan Shinyang Electronics after China Labor Watch found at least five child workers without contracts at the plant.

The kids were working on the assembly lines at Dongguan Shinyang and yet a month earlier an independent audit by Samsung found no child labour at the site.

Shinyang said that a third-party firm supplying workers had brought in child labourers around the end of June with forged identification.

There are no child workers at Dongguan Shinyang now and the children working at the plant have been let go.

Samsung suppliers have been under watch since 2012, when China Labor Watch found seven children younger than 16 were working for one of the South Korean firm’s China-based suppliers. Chinese law forbids hiring workers under 16.

Apple had a similar problem with some of its Chinese contacts and people objecting to Foxconn workers throwing themselves off buildings rather than making its shiny toys.

Blackberry crush over

blackberry-juicerThe long and painful restructuring of Canada’s Blackberry mobile phone outfit is officially over.

According to an internal memo, spotted by Reuters. BlackBerry’s Chief Executive John Chen has said that the restructuring notification process and the workforce reduction that began three years ago is now behind the company.

So if your bottom is on a seat and you are reading the memo, then your job is safe for now.

Chen said that “barring any unexpected downturns in the market” Blackberry will be starting to hire staff in some areas such as product development, sales and customer service.

He thanked those who stayed with the company through the process and did not flee like rats from a sinking ship.

To give an idea of the scale of the cuts, over the last three years BlackBerry has lost 60 percent of its staff.

Chen, who took the reins at BlackBerry roughly eight months ago, has moved rapidly to stabilize the company by selling non-core assets, partnering to make the company’s manufacturing and supply chain more efficient, and raising cash through property sales.

In the memo, Chen told employees that he believes BlackBerry is now well on its way to recovery and that he is confident the company will meet its goal of being cash flow positive by the nd of the current fiscal year.

Chen stressed in the memo there was “no margin for error to complete BlackBerry’s turnaround to success,” and he called on employees to remain focused as the company rolls out an upgrade to its device management system and its new Passport and Classic devices later this year.