Tag: techeye

Intel’s China plans show mobile agenda

1220aIntel’s recently announced plans to invest shedloads into its Chengdu plant might be revealing much about its cunning plan for the future.

The move was a little unusual, as it did not come with the huge tax breaks and other sweeteners that Intel has required from Israeli governments and the US. This indicates that Intel needed a plant in China.

The move followed another similar-sized investment aimed at consolidating China’s wireless chip sector. The smart money suggests the two moves are linked Intel wants China to become a major centre for the company’s belated push into wireless chips.

Intel could be positioning both of these plants to manufacture smartphone chips. Intel failed to recognise the importance of mobile devices earlier, with the result that most of the market is now dominated by companies like sector leader Qualcomm, and mid-sized players like MediaTek, which mostly use chips based on an architecture supplied by European chip giant ARM.

Beijing wants to create a homegrown player to take down Qualcomm but its domestic chip sector consists of mostly small design houses that lack the resources to become major global players.

Unigroup, which is based out at the Tsinghua University, merged two of the biggest domestic players, Spreadtrum and RDA Microelectronics, into a single company. Intel joined that initiative in September, when it purchased 20 per cent of the new company for $1.5 billion. This makes it bigger than China’s largest chipmaker SMIC.

What Intel appears to be doing is getting itself onside with the Chinese and helping their domestic chip making plans with the idea of getting a foot in the door behind the bamboo curtain. Antitrust watchdogs are less likely to snap at its heels, or treat it as a problem, like they do Qualcomm and in the long term, it will have its fingers in the pies of a growing Chinese chip industry.

US tech snooping is a trade barrier

 shoe phoneThe US government’s mass surveillance of the whole world has become a trade barrier for European Internet companies trying to provide services in the United States, a top EU official claims.

Paul Nemitz, a director in the European Commission’s justice department said that US citizens are deterred from using European e-mail providers because they do not get the same protection as they would by using US providers, said

Laws which empower the NSA to basically grab everything which comes from outside the United States, is a real trade barrier to a European digital company to provide services to Americans inside America.

Nemitz, who is overseeing an overhaul of the EU’s 20-year-old data protection rules, told a conference on data protection in Paris that an American in the United States using a European service does not have the same level of protection as he would if he used an American service.

Using a European service, his communication is transmitted outside the United States, so it is subject to interception.

The comments underscore the widespread unease within Europe about access to people’s data by both security services and companies. They also come at a time when Brussels and Washington are renegotiating a data-sharing agreement – called Safe Harbour – used by over 3,000 companies.

The Safe Harbour agreement makes it easier for US companies to do business in Europe by certifying that their handling of user data meets EU data-protection laws.

The EU wants Washington to guarantee that it will only access Europeans’ personal data for national security reasons when it is strictly necessary, as it does with US citizens’ data.

Meanwhile the EU is also negotiating a new pan-European data- protection law which would impose stiff fines on companies mishandling personal data in Europe.

Companies in both the United States and the EU have lobbied against some parts of the new rules, arguing that they will impose too much red tape on businesses.

Cyber criminals steal a quarter of digital adverts

the-great-train-robbery-movie-poster-1903-1020549358Almost a quarter of video ads and 11 percent of display ads are viewed by fake consumers created by cybercrime networks to steal the billions of dollars spent on digital advertising.

A study, by digital security firm White Ops and the Association of National Advertisers, is one of the most comprehensive looks to date at the persistent criminal activity involving online advertising. It looks at the problem of “bots” or automated entities that mimic the behaviour of humans by clicking on ads and watching videos.

The bots siphon money away from brands by setting up fake websites or delivering fake audiences to websites that make use of third-party traffic. Advertisers will lose $6.3 billion to bots next year, the report said.

Bob Liodice, the president and chief executive of the ANA, an organization that represents thousands of brands said that it had been suspected there was fraud in the industry, but it was not known how much was being taken or the reasons it was happening.

White Ops monitored 181 online advertising campaigns by the brands from August to October to determine fraud activity.

Bot fraud has long been part of the ecosystem of low-price ads that cost a few dollars or less. This study revealed, however, that many premium websites and publishers, which charge roughly 10 times more for an ad, are just as vulnerable.

In one instance, 98 percent of video ads at a premium lifestyle site were viewed by bots. The bots are extremely effective of looking like a high value consumer.”

Liodice said the report will help the industry develop an action plan to combat fraud.

Microsoft releases the hounds on subscription activators

White Puppy-02In a new move against software pirates, the software king of the world has unleashed its legal hounds on those offering subscription activating software.

Microsoft has filed a complaint at a federal court in Washington accusing a person behind an AT&T subscription of activating various pirated copies of Windows 7 and Office 10. The account was identified by Microsoft’s in-house cyberforensics team based on suspicious “activation patterns.”

Microsoft doesn’t have a long track record of cracking down on individual pirates so this move is new.

Microsoft filed a copyright infringement lawsuit against a person who activated pirated copies of Windows 7 and Office 10 from an AT&T Internet connection.

“Microsoft’s cyberforensics have identified a number of product key activations originating from IP address 76.245.7.147, which is presently assigned to ISP AT&T Internet Services..,” the complaint reads.

“These activations have characteristics that on information and belief, establish that Defendants are using the IP address to activate pirated software.”

While many think unauthorised copies are hard for Microsoft to detect, the company explains that its cybercrime team claims to use state-of-the-art technology to detect software piracy. It looks for activation patterns and characteristics which make it likely that certain IP-addresses are engaged in unauthorised copying.

In this situation, the defendant activated numerous copies of Windows 7 and Office 2010 with suspicious keys, which were nicked from Microsoft’s supply chain, used without permission from the refurbisher channel, and used more often than the license permits.

So, this is not an average user, but someone who sells PCs with pirated software.

Why does Intel need Broadwell H?

12-inch silicon wafer - Wikimedia CommonsThe Dark Satanic Rumour Mill has manufactured a hell on earth yarn which claims that Intel has bumped off its Broadwell H range.

The rumour is based on pure speculation and common sense. Earlier this year Intel told the world that it would be launching its low-power Broadwell processors in “early spring” and Kirk Skaugen, who heads up Intel’s PC Client Group, showed a roadmap to prove it.

Spring was expected to see millions of units in preparation for a very early spring fifth-generation Core launch of our traditional Celeron, Pentium, Core i3, i5, i7 which will be on Broadwell-U and Skylake in the second half of 2015.

But the higher-powered quad-core variants of Broadwell such as the Broadwell-H and Broadwell-M were not mentioned but were expected in “work week 29” and “work week 36” in 2015. That would mean late July to early September.

But if Skylake also appears in the second half of 2015, it seems that Broadwell chips is surplus to requirements. Intel could go traight to Skylake for the higher-performance notebook models  — after all . Skylake has a better CPU core, graphics and media subsystem than Broadwell.

Axing of Broadwell could also be a return to the “tick-tock” method for Intel. Skylake fully ramped in the second half of 2015 means that Intel could conceivably mean that the 10-nanometer Cannonlake product will be ready for deployment for back-to-school in 2016.

Sony gets hacked again

wargames-hackerReports said that Sony has come under a fresh cyber attack following the break in which crippled Sony Pictures two weeks ago.

The Financial Times reported that the PlayStation store was downed earlier today for a couple of hours.

A gang that dubs itself the Lizard Squad has claimed that it is responsible for the hack – and the attack may be nothing to do with the Sony Pictures incident – blamed by some on North Korean hackers.

The Lizard Squad made a similar attack on Microsoft’s Xbox Live service last week, according to the FT.

North Korea said yesterday that it wasn’t responsible for the attack on Sony Pictures, as we reported elsewhere today.

Sony is so far unable to say whether the latest hack attack has resulted in personal or corporate information being stolen.

Ofcom says broadband coverage patchy

parliamentDespite the government maintaining that the UK is on track to deliver broadband just about everywhere in the country, regulator Ofcom said economics mean that’s just not going to happen.

Ofcom said in a report that communication services are used by an average UK adult for over half of their waking hours.

That means, coverage, capacity, and reliability of the digital infrastructure are of fundamental importance to both people and to businesses.

But, said Ofcom: “The economics of networks means there are parts of the UK that will not be fully served by the market.  There are also some services which may not be provided to all by the market.”

Either Ofcom or the government could intervene to make life better for people/

Ofcom said that fixed broadband technology is “almost universally available” – the average download speed is 23Mbit/s. But broadband speeds vary quite a lot, the organisatiion said.

The government aims to provide universal availability of at least 2Mbit/s – only three percent of UK sites fall below this.  But this causes difficulties for those affected.

Fifteen percent of UK households can’t get 10Mbit/s speed/

Ofcom said that the government target to deliver superfast broadband to 95 percent of premises by 2017 “is an aggressive target”.  About 18 percent of households still don’t access the internet, whether fixed or mobile.

3D nanostructures mean low cost

nanoScientists at North Carolina State University (NCSU) said they created a new lithography technique that uses nanoscale spjeres to create 3D structures.

The structures will be of use in electronics, biomedics, and photonics, the researchers said.

Dr Chih-Hao Chang, a professor of mechanical and aerospace engineering at NCSU claimed the approach will reduce the cost of nanolithography “to the point where it could be done in your garage”.

While conventional lithography focues light on a photosensitive film to create 2D patterns, those methods need expensive specialised electron beams, lasers or special lenses. The researchers at NCSU said they put nanoscalte polystyrene spheres on the surface of the photosensitive film

The nanospheres are transpart but bend and scatter light in predictable ways.

Chang said: “We are using the nanosphere to shape the pattern of light, which gives us the ability to shape the resulting nanostructure in three dimensions without using the expensive equipment required by conventional techniques.  It allows us to create 3D structures all at once, without having to make layer after layer of 2D patterns.

Applications could include nanoscale “inkjet printers” to create electronics, biological cells, antennae or photonic components.

Storage revenues continue to grow

storageThe generation of vast amounts of data continues to fuel the disk storage systems revenue in the third quarter.

With revenues of $8.8 billion, up 5.1 percent from the same period last year, 25 exabytes shipped in the quarter, said IDC.  Capacity shipments soared by 42 percent during the quarter, compared to Q3 2013.

IDC said sub $100K external array revenues grew by over six percent during the quarter, but shipments ODMs (original design manufacturers) directly to hyperscale datacentres showed positive growth.

EMC remains at the top spot for the quarter, followed by HP, Dell, IBM and Netapp.

ODM direct sales accounted for 24 percent of the market however, outstripping the traditional vendors.  And this trend is continuing, as we’ve reported previously, with ODMs also shipping more and more servers directly and bypassing the brand names,

Smartphones will win the day

smartphone-shoppingA report predicted that by 2018 over 50 percent of people will use either a smartphone or a tablet for all online activities.

Gartner said people will gradually move away from the PC as people use smartphnes and tablets more more.

Voice, gesture and other ways of communicating with devices online will be the rule of thumb, while 40 percent of enterprises will use wi-fi as the default connection and Ethernet will go away.

Security built into wi-fi appears to be adequate to the task, said Gartner, after the introduction of Advanced Encryption Standard (AES) into the equation.

And there’s more good news.  Gartner thinks by 2020 we’ll all be paying less than $100 for smartphone and other devices.  Subsidies or sponsorships will also reduce the cost of devices while by 2018 over half of business to enterprise (B2E) mobile apps will be used by business analysts using codeless tools.

Cisco sues Arista

ciscologoNetwork equipment maker Cisco Systems has sued Arista Networks for copying its networking technologies.

The lawsuits, filed in a federal court in California, accuses Arista of infringing on 14 patents on networks and also on related copyrights.

Cisco General Counsel Mark Chandler wrote in his bog that rather than building its products and services based on new technologies developed by Arista, however, and providing legitimate competition to Cisco, Arista took a shortcut by blatantly and extensively copying the innovative networking technologies designed and developed by Cisco.

Arista was formed by former Cisco employees, including Chief Development Officer Andreas Bechtolsheim, Chief Technology Officer Kenneth Duda, and Chief Executive Officer Jayshree Ullal.

Arista said it had not yet been able to evaluate the lawsuits.

“While we have respect for Cisco as a fierce competitor and the dominant player in the market, we are disappointed that they have to resort to litigation rather than simply compete with us in products,” Arista said in a statement.

 

IPod DRM court case could collapse on technicality

novità-apple-2013After ten years trying to get an antitrust case against Apple to court, the case might collapse because the plaintiffs can’t prove they ever bought an iPod.

The antitrust case was messy and would have bought a fair few skeletons out of the closet proving that Jobs’ Mob had done its best to kill off rivals with some dirty deeds ordered by its Messiah Steve Jobs.

The case is so old that Jobs even recorded a video testimony defending his actions. The lawsuit covers iPods purchased between September 2006 and March 2009. Lawyers representing both consumers and businesses claim that the restrictions meant Apple could inflate the prices of iPod in an anti-competitive manner. They are seeking $350m in damages, which could be tripled under US competition laws.

However, now it seems that he case might get chucked out on a technicality. Lawyers for Apple have raised a last-minute challenge saying new evidence suggested that the two women named as plaintiffs may not have bought iPod models covered by the lawsuit.

Apple lawyers checked the serial number on the lead plaintiff’s iPod Touch and found it was bought in July 2009. The other main plaintiff, Melanie Wilson, also bought iPods outside the relevant timeframe, they indicated.

Judge Yvonne Gonzalez Rogers said at the end of the trial’s third day of testimony in Oakland, California said she was concerned that she did not have a plaintiff.

Lawyer Bonny Sweeny said that her team was checking for other receipts. She conceded that while Ms Wilson’s iPod may not be covered, an estimated eight million consumers are believed to have purchased the affected devices.

It is a pity as so far it has emerged in the trail that between 2007 and 2009, if an iPod owner tried to sync their device with iTunes and had music from another digital store on the device, they would receive an error message telling them to restore their iPod to factory settings. This effectively wiped all non-iTunes music from the device.

Apple maintained at the trial that the software and restrictions were necessary to protect users from malicious content and hackers.

Cameron’s porn filter deletes other sites too

stupid cameronBritish Prime Minister David “One is an Ordinary Bloke” Cameron’s porn filter is being used to purge the internet of a few sites that he does not want British people to see.

The alarm call was sounded by the German hacker site the Chaos Computer Club over the weekend which noticed that its site had been blocked in the UK.

Vodafone customers were also being stopped from accessing the ticket sales to this year’s Chaos Communication Congress.

The group claims that its sites were on a list which censors the open internet. These internet filters, authorised by Prime Minister David Cameron, are implemented by UK’s major internet service providers (ISPs) were supposed to stop porn from falling into the hands of children. But it appears that the list has been extended to include material deemed “extremist”.

Users can opt-out of censorship, or bypass it by technical means, but only a minority of users know how to bypass those filters.

Chaos points out that accessing its server directly via http://213.73.89.123/ appears to work quite well, thereby rendering the censorship efforts useless.

CCC-spokesperson Dirk Engling said that he saw this as proof that censorship infrastructure – no matter for which reasons it was set up, and no matter which country you are in – will always be abused for political reasons

North Korea not involved in “righteous hacking”

Kim Jong Un, courtesy of North Korea news agencyNorth Korea has denied it was involved in the hacking of Sony, but indicated it considered it a “righteous deed” and owed the hackers a drink.

North Korea was jolly cross that Sony Pictures was producing a film that depicts an assassination plot against Pyongyang’s supreme leader Kim Jong Un.

While denying responsibility for an attack last week that disrupted Sony’s computer system and spewed confidential information onto the Internet, an unidentified spokesman for the North’s powerful National Defence Commission acknowledged that it “might be a righteous deed of the supporters and sympathisers” of the North’s call for the world to turn out in a “just struggle” against US imperialism.

The statement claimed that North Korea did not know where in America the Sony Pictures is situated and for what wrongdoings it became the target of the attack.

“But what we clearly know is that the Sony Pictures is the very one which was going to produce a film abetting a terrorist act while hurting the dignity of the supreme leadership of North Korea.”

The Kim family has ruled for three generations, and sees any outside criticism or mockery of its leader as an attack on its sovereignty.

The movie “The Interview,” is a comedy starring Seth Rogen and James Franco, and its plot concerns an attempt on the life of leader Kim Jong Un and Pyongyang does not find the idea funny.

“The United States should know that there are a great number of supporters and sympathisers with North Korea all over the world as well as the `champions of peace’ who attacked the Sony Pictures,” the statement said.

“The righteous reaction will get stronger to smash the evil doings.”

SAP rejects Microsoft merger

sapbeerThe German outfit  which makes expensive esoteric business software and no-one really knows what it does, has decided that it will not allow itself to become part of the glorious Microsoft Empire.

Rumours were flying that SAP was to merge with Microsoft as both of them try to corner the business software market.

However it looks like the German software maker SAP will remain an independent company in the long term, its chief executive told a German newspaper.

Bill McDermott told weekly Euro am Sonntag that it would be best for the company to stay independent is to grow and to have a good market capitalisation.

With a market capitalisation of $86.6 billion, SAP is the fifth-largest company in Germany’s large cap DAX index.

Apparently, SAP had held talks about a potential merger with software giant Microsoft but discussions were scrapped because of the complexity of any deal and the subsequent integration of the companies. All this happened in 2004, so it appears that this rumour was a bit like us – rather elderly but for some reason will not go away.