Tag: techeye

Move your datacentres to Scandinavia!

datacenterWhile many multinational and pan-European businesses have their co-location centres in Amsterdam, Frankfurt, London or Paris, IT managers should think about moving their datacentres to Norway or Sweden.

That’s according to analysts at the Gartner Group and there’s a number of reasons why Sweden and Norway are attractive.

Tiny Haynes, a research director at Gartner, said that power costs in Norway and Sweden have fallen by five percent since 2010. That contrasts with the EU average power costs that have risen 13 percent in the same period.

Also it’s cold in Norway and Sweden and that can give datacentres efficiencies by using outside air cooling.

Gartner believes that managers can save up to 50 percent by moving their infrastructure lock, stock and barrel.

Haynes said: “It’s likely that most organisations will find some workloads that can be moved to a lower cost location without impacting performance.”

Chromebooks put pressure on Microsoft

winbookThe success of Chromebooks has forced Microsoft to drop its licensing fees on Windows 8.1 notebooks, in a move that is forcing down prices on the products and is good news for buyers.

According to financial analysts at Seeking Alpha, Samsung has decided to use an X86 processor for its Chromebook 2 – a win for Intel in the X86 stakes.

HP and Acer are already selling Windows 8.1 notebooks for less than $200 and that is likely to create something of a frenzy in the run up to the holiday period.

Seeking Alpha points out that Intel’s mobile chip unit posted an $1.04 billion operating loss for its financial third quarter, despite selling chips for 15 million tablets during that quarter.

Intel is attempting to make “significant reductions in contra revenues next year”, but the financial analysts say X86 mobile chips will carry on losing money.

Samsung has dropped using ARM based processors for its Chromebook in favour of Intel, but the bad news is that most market research shows that sales of tablets are slowing, particularly in mature markets.

Seeking Alpha said: “Intel is losing big money in its quest to sell 40 million tablet chips this year.”

Microsoft bricks Scottish FTDI clones

kirkhillyard2Hardware hackers building interactive gadgets based on Arduino microcontrollers are finding that a recent driver update that Microsoft deployed over Windows Update has bricked fake FTDI chips.

The Scottish outfit FTDI makes USB-to-serial chips.  They are very popular and every microcontroller and embedded device out there that can communicate over a serial port uses one. As a result there’s a vast number of knock-off chips in the wild that appear to be made by FTDI, but in fact aren’t.

FTDI develops drivers for its chips which are obtained directly from FTDI, or they can be downloaded by Windows automatically, through Windows Update. But the latest version of FTDI’s driver, released in August, contains some new language in its EULA reprograms counterfeit chips rendering them largely unusable. According to its license:

Use of the Software as a driver for, or installation of the Software onto, a component that is not a Genuine FTDI Component, including without limitation counterfeit components, may irretrievably damage that component.

Of course no one reads the licence, which is stored inside the driver files, but at least the owners of cloned chips were warned.

What is also happening though is that developers who thought that they had bought legitimate FTDI parts are suddenly discovering that their supplier has been ignoring design specs and using knock-offs.

The new driver reprograms the PID of counterfeit chips to 0000 which means that necause this PID does not match any real FTDI part, the FTDI drivers no longer recognise the chips, and block access. This PID is stored in persistent memory, so once a chip has been reprogrammed it will continue to show this 0000 PID even when used with older drivers, or even when used with Linux.

FTDI has recovery software that enables chips to be reprogrammed, and when used with some older drivers, it appears to be possible to reinstate the “correct” PID. If the chips are ever used with the recent drivers, however, their PID will once again be set to 0000.

While there is some amount of sympathy for a hardware company that is having its products so widely cloned, there is a great sense that FTDI has gone too far by rendering them inoperable.

More here http://www.eevblog.com/forum/reviews/ftdi-driver-kills-fake-ftdi-ft232/.

 

Microsoft soothsayers say “beware of zero day”

soothsayer-resized-600Software giant Microsoft is warning its users about a new zero-day vulnerability in Windows that is being actively exploited in the wild.

The vulnerability is a risk to users on servers and workstations that open documents with embedded OLE objects.

It is currently being exploited via PowerPoint files as some companies are still trying to use these in meetings to bore staff to death without actually helping the company develop.

Apparently these specially crafted files contain a malicious OLE (Object Linking and Embedding) object which can be exploited by cybercriminals. What makes this nasty is that the vulnerability affects the latest fully patched versions of Windows.

Microsoft points out that users have to be involved in the email attack scenario.

For this attack to be successful, the user must be convinced to open the specially crafted file containing the malicious OLE object. All Microsoft Office file types as well as many other third-party file types could contain a malicious OLE object.

The attacker would have to host a website that contains a specially crafted Microsoft Office file, such as a PowerPoint file, that is used in an attempt to exploit this vulnerability.

“In addition, compromised websites (and websites that accept or host user-provided content) could contain specially crafted content that could exploit this vulnerability. An attacker would have no method to force users to visit a malicious website. Instead, an attacker would have to persuade the targeted user to visit the website, typically by getting them to click a hyperlink that directs a web browser to the attacker-controlled website.”

A successful exploitation could lead to the attacker gaining same user rights as the current user, and if that means administrative user rights, the attacker can install programs; access, modify, or delete data; or create new accounts with full user rights.

The vulnerability affects all supported Windows versions, and there is currently no patch for it. Microsoft is still investigating the matter and deciding whether they will issue an out-of-band patch or wait for the next Patch Tuesday to plug the hole.

Otherwise, do not open Microsoft PowerPoint files, Office files, or any other files received or downloaded from untrusted sources.

 

Lufthansa sells IT infrastructure to Big Blue

lufthansa-history-1German airline Lufthansa is about to sell its IT infrastructure unit to IBM as part of an outsourcing agreement for the services.

Europe’s largest airline by revenue is undergoing restructuring and cost-cutting efforts to better position itself to compete with low-cost carriers and Arabic rivals

It earlier this year said it was seeking a buyer for the unit, which provides data centres, networks and telephony. Apparently, it is worried that it requires a high level of investment and economies of scale, which the airline could not afford.

Under the deal, Lufthansa will outsource all of its IT infrastructure services to IBM for seven years. The US firm will take over the airline’s IT infrastructure division, currently part of Lufthansa Systems.

The deal will result in a one-off pre-tax charge of 240 million euro for Lufthansa. It will allow Lufthansa to reduce its annual IT costs by around 70 million euro a year. It is not clear how much this will all cost in the end as this is still being ironed out.

Oracle, Microsoft and Ask.com accused of copying Apple’s cartel ways

1159_tnOracle, Microsoft and Ask.com have been accused of treating their staff in exactly the same way as the fruity cargo cult Apple.

The suit against Microsoft filed by former employees Deserae Ryan and Trent Rau charges, among other things, that Microsoft and other companies entered into anti-solicitation and restricted hiring agreements without the consent or knowledge of its workers.

Oracle, Microsoft and Ask.com are facing suits alleging that they conspired to restrict hiring of staff. The suits are connected to a memo which names a large number of companies that allegedly had special arrangements with Google to prevent poaching of staff.

The document was filed as an exhibit in another class action suit in the US District Court for the Northern District of California, San Jose division over hiring practices. The tech workers who filed that suit alleged that Google, Apple, Intel, Adobe, Intuit, Lucasfilm and Pixar put each other’s employees off-limits to other companies by introducing measures such as “do-not-cold-call” lists.

Those seven tech companies had earlier settled similar charges in 2010 with the U.S. Department of Justice while admitting no wrongdoing, but agreed not to ban cold calling and enter into any agreements that prevent competition for employees.

Google, Apple, Adobe and Intel appealed in September District Judge Lucy Koh’s rejection of a proposed settlement of US$324.5 million with the tech workers, which she found was too low. Intuit, Lucasfilm and Pixar had previously settled for about $20 million.

Now it seems that former employees filing lawsuits against Microsoft, Ask.com and Oracle have asked that the cases be assigned to Judge Koh as there were similarities with the case against Google, Apple and others.

The companies might try to say that since the DOJ did not see it fit to prosecute them before 2010 they must have been legal.

Oracle said that it was excluded from all prior litigation filed in this matter because all the parties investigating the issue concluded there was absolutely no evidence that Oracle was involved.

Microsoft said the employees omit the fact that the DOJ looked into the same claims in 2009 and decided there was no reason to pursue a case against the company.

 

American gamers tell Aussie women to get back to the kitchen

aussie minersCorrection: Sarkeesian cancelled a planned speech at Utah State University (USU), which is in Logan, Utah and is a different university than the University of Utah in Salt Lake City. Apologies.

Women video game developers and critics in Australia are being threatened with rape and murder by American and Canadian gamers as the dispute that has gripped the global gaming community  goes global.

Sydney-based independent video game developer and critic ‘Sarah’ said she had received threats as a part of the movement after she voiced her opinion on an online gaming forum.  They were pretty blunt about what they were going to do to her for daring to make games that did not depict women as whores or sex objects.

“They were saying that they were going to rape me, they were going to kill me… They ran to friends of theirs, got them together … and started tweeting threats at me,” he said.

Sarah believed the perpetrators had set up a system that sent multiple threats to her account automatically.

Fortunately, they were not that clever. One posted a picture that allowed Sarah to figure out their name because they would screen capped it with their Facebook account in the background so I was able to find out the attackers name, and get a sense of who the other guys were.

They are all young, and they are all from the US and Canada and are all keen to spread their backward brand of misogyny to countries where women are treated a little more equally.

“That was almost a bit more terrifying – that they were this loose group of people that one of them could call up the others and they would attack.”

Unfortunately, because they were not Aussie misogynists they could not be arrested and charged with threatening behaviour.

The movement originated from a debate about whether video game journalists were too close to the industry, but then took a more threatening turn.

Earlier this month American feminist critic Anita Sarkeesian was attacked by people claiming to be from the gamergate movement shortly after posting an online video about the portrayal of women in games.

She was forced to cancel a speech at the University of Utah, after an anonymous threat from somebody who said they were planning to carry out a mass shooting at the event.

Moore’s Law offered glimmer of hope

Intel-logoResearchers at the US National Institute of Standards and Technology (NIST) have thrown Intel a lifeline in the shape of self assembling molecules.

Alexander Liddle, a materials scientist at NIST pointed out that Intel has just gone into production on a 14 nanometre generation of chips.

Liddle explained that at these sizes the problem is creating multiple masking layers and optical lithography “is simply not capable of reliably reproducing the extremely small extremely densie patterns. There are tricks you can use such as creating multiple, overlapping masks, but they are very expensive,” he said.

He said two pieces of research by NIST, by IBM and by MIT show a way to deposit thin films of a polymer on a template so that it self-assembles into precise even rows 10 nanometres wide.

“The problem in semiconductor lithography is not really making small features – you can do that but you can’t pack them together,” he said.  “Block co-polymers take advantage of the fact that if you make small features relatively far apart, you can put the block co-polymer on those guiding patterns and fill in the small details,” he said.

He’s optimistic that the NIST model will give him accurate results.

Microsoft waves goodbye to Nokia

nokia-lumiaThe Nokia brand name can’t be worth very much because Microsoft is going to ditch it from its line of phones.

It originally planned to use the Nokia name for as long as 10 years but freshly fledged CEO Satya Nadella is obviously revisiting just about everything ex-CEO Steve Ballmer had committed to.

Microsoft bought Nokia for a rather expensive $4.6 billion but the former Finnish mobile phone unit had already seen its fortunes wane.

Microsoft already had a mobile phone division so plenty of people scratched their heads and wondered why it even bothered to pay that much money for a firm that had seen its day.

Microsoft is currently going through a gigantic culling exercise which will see over 12,000 people lose its jobs.

Microsoft, like its long time partner Intel, has never really hit it big in the mobile phone market.

Future phones will be sold under the name of Microsoft Lumia, it appears.

Outsourcing is a fail

depressionWhile the services market grew in 2013, revenues failed to shine.

That’s according to a report from market research company IDC, which said the whole service market grew from 12.3 percent in 2012 to 13.4 percent last year.

But, as IBM and SAP results showed earlier this week, the gloss appears to have faded on the services industry.

Vendors, said IDC, attributed the small increase in income to cutting jobs, making people work harder for less money, and finind new places where labour is cheaper.

IT outsourcing appears to be on he wane, said IDC. It was the least profitable service line last year and in 2012.

But support and training services are still profitable, while the second and third most profitable lines were “business consulting” and IT project based services, said IDC.

Chad Huston, a senior analyst at IDC, said the lacklustre revenue growth hasn’t stopped what he described as “an upward trajectory”.

But, he added, that’s because vendors are cutting their costs.

The supply chain is the weakest IT link

Rusty chain - Wikimedia CommonsThe University of Maryland (UMD) said it has created counter measures to prevent the supply chain being targeted by hackers.

A research team at the university’s School of Business said that hackers are targeting vendors and suppliers that have access to enterprises’ IT systems, software and networks.

The researchers point to the Target breach last year, when a criminal cracked into a refrigeration system supplier that was connected to an enterprise IT system.

But UMD has a counter measure which it developed after looking at 200 different companies across various industries.

Sandor Boyson, a research professor at UMD, said the research showed that the cyber supply chain is fragmented and companies fail to respond to real time risks.  “Just half of our subjects used an executive advisory committee such as a risk board to govern their IT system risks,” said Boyson.

You can test UMD’s counter measure, at no charge, here.  Boyson said that will let companies map their IT supply chains and measure themselves against their peers and competitors.  The scalable portal has already been used by companies in aerospace, telecomms, real estate, medical, and professional services.

Boyson’s team funding comes from US quango the National Institute of Standards and Technology (NIST).

Medical gear hacked

hacking-medical-devicesThe US Department of Homeland Security is investigating two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment.

Under investigation is an infusion pump from Hospira , implantable heart devices from Medtronic and St Jude Medica.

There is no indication that hackers have been attacking patients through these devices, but the agency is concerned that malicious people may try to gain control of the devices remotely and create problems, such as instructing an infusion pump to overdose a patient with drugs, or forcing a heart implant to deliver a deadly jolt of electricity.

The senior DHS official said the agency is working with manufacturers to identify and repair software coding bugs and other vulnerabilities that hackers can potentially use to expose confidential data or attack hospital equipment.

Hospira, Medtronic and St Jude Medical declined to comment on the DHS investigations. All three companies said they take cybersecurity seriously and have made changes to improve product safety, but declined to give details.

The agency started examining healthcare equipment about two years ago, when cybersecurity researchers were becoming more interested in medical devices that increasingly contained computer chips, software, wireless technology and Internet connectivity, making them more susceptible to hacking.

The US Food and Drug Administration, which regulates the sale of medical devices, recently issued  guidelines for manufacturers and healthcare providers telling them to better secure medical gear.

The DHS review does not imply the government thinks a company has done anything wrong – it means the agency is looking into a suspected vulnerability to fix it.

This is not the first time that medical gear has fallen under the security microscope. In 2007, then US Vice President Dick Cheney ordered some of the wireless features to be disabled on his defibrillator due to security concerns. Unfortunately, this was done and Cheney was not bumped off by hackers sabotaging his defibrillator.

Chromebooks start to shine brightly

google-ICNotebooks using the conventional Wintel model seem to be past history, but Chromebooks are selling like there’s no tomorrow.

That’s the conclusion of research by ABI Research, which said that shipments of Chromebooks soared by 67 percent in a quarter.

Acer is the top dog in the sector, followed by Samsung and HP – those three accounted for 74 percent of shipment share during the first half of this year.  That isn’t going to change in the second half of this year, said ABI.

So-called vertical markets like schools are a driving force, and Chromebooks also sell well in emerging markets. But ABI said that North America will account for 78 percent of the Chromebook market and other regions such as Asia Pacific and Western Europe are set to grow shipment market share over the next five years.

Stephanie Van Vactor, an analyst at ABI, said that while Chromebooks might be a temporary fad like the netbook, but the price and design mean that it’s attractive to the world+dog.

“People are hungry for a product that is cost effective but also provide the versatility and functionality of a laptop,” she said.

Xerox Alto source code made public

altoThe code that inspired generations of computer nerds has been made public by the Computer History Museum in Mountain View.

The Xerox Alto computer was important because it was the first attempt and a making a machine that was visual rather than text based. It used a mouse and a WYSIWYG word processor. It was this beastie which was ripped off by Steve Jobs

Conservationists behind making the code available to the public had to archive it to nine-inch tape, before being transferred to eight-millimetre cartridges and then put on CDs.  Then they had to get permission to release the code.

The file includes the Bravo word processor, Markup, Draw and Sil drawing programs, and the Laurel e-mail program. There’s also the BCPL, Mesa, Smalltalk, and Lisp programming environments along with various utilities and the Alto’s Ethernet implementation.

Ethernet was developed for the Alto system using networking software, called Pup (for PARC Universal Packet).  This anticipated the Internet by allowing multiple Ethernet local area networks to be interconnected by leased phone lines, radio links, and the ARPANET (which at this time connected a handful of computers at ARPA research centres).

You can look at the software here 

 

Eat your heart out Dan Brown! Vatican puts archive online

vatican_library3The Vatican Apostolic Library has announced that more than 4,000 ancient manuscripts will now be available online as part of a digital archive.

Global IT service provider NTT DATA has developed the service, which displays high definition digital reproductions of the texts at the library’s website.

A special viewer built by the firm’s digital archive solution technology, AMLAD, enables manuscripts to be examined across a variety of devices, including tablets.

The release is part of a four-year project launched in March. NTT DATA had to establish the infrastructure for the long-term storage, safekeeping and viewing of digital specimens. The company also hopes to provide an efficient search function for the library’s digital artefacts by the end of the year.

Toshio Iwamoto, president and CEO of NTT, said that the firm was extremely excited to bring the collection to a wider audience.

Prefect of the Vatican Apostolic Library, Monsignor Cesare Pasini added that the Vatican gladly adopts the use of innovative technologies in order to make “these treasures of humankind more widely known, in a profound spirit of universality”.

The digital archives can also be accessed via a portal site managed by Digita Vaticana, a foundation raising funds for the library’s preservation projects.

The Vatican Library is one of the oldest in the world and currently contains 75,000 codices, 1.1 million printed books and an estimated 8,500 incunabula. It was formally established in 1475,

In the 17th century, the Vatican Secret Archives were separated from the library at the start of the 17th century and are believed to contain an additional 150,000 items and it was these that Dan Brown made a big thing about in his books. Unfortunately, for conspiracy theorists, the “secret archives” is a mistranslation – it is actually a private library for private papers and it is allowed to be viewed by more than 1000 scholars.  No word as to when these will be made public.