Tag: techeye

McAfee dabbles in democracy

McAfee HQ in Satan ClaraSecurity company McAfee, which is a subsidiary of the Intel Corporation, has given us its thoughts about how we could vote online or e-vote in the future.

Online voting isn’t particularly new – Baltic country Estonia held national elections using an e-voting system.  Other countries including India, France, Brazil and Australia have introduced electronic voting machines.

Yet Michael DeCare, president of McAfee said that wasn’t quite enough.  He said: “A greater emphasis on security could empower a new era in digital democracy.  People need to have trust and confidence in the process. Pilot programmes could be the route to earning public trust on a small scale.”

He claims obstacles to online and e-voting are largely hard to overcome and has little public acceptance.

People, he said, are worried about hacking and “lost votes cannot be regained”.

He doesn’t seem to have an answer to this question of public trust. But as people are wary following the thousands of security breaches that take place every year, it’s down to vendors like McAfee not to pose such questions but to provide the answers.

Berners-Lee speaks up for people

Sir Tim Berners-LeeThe inventor of the world wide web said today that data should belong to each of us.

Sir Tim Berners-Lee was speaking at a keynote speech at IPExpo Europe in London.

He hit out at the notion that data belongs to corporations like Facebook and Google who collect it and then use it to make money out of everyone.

He said that using big data for advertising purposes gave him a queasy sensation and rather than big data we should be interested in rich data.

He told the conference that big companies are, essentially, spying on us all and this is a real threat.

Collecting your own data from different gizmos you use and different transactions you make gives you a perspective on yourself that is much more valuable than feeding that data to large corporations.

Berners-Lee described what would become known as the world wide web 25 years ago.

We’re all running out of juice!

alkaline batteryAs we’re soon going to be swamped by even more smartphones, tablets, wearable devices and notebooks there’s an urgent need for better battery technologies real soon now.

That’s according to ABI Research which said that by 2019 there will be eight billion devices on the planet – a billion more than there are people right now.

If you’ve got a smartphone, you probably realise that the smarter they get the more electricity they take and that trend is going nowhere but upwards over the next few years.

ABI Research points out that the holy grail doesn’t lie with lithium and graphite batteries, nor with micro USB chargers.  But it claims that silicon anode batteries from the likes of Leyden Energy and Amprius, as well as germanium based devices may hold out hope for the charging nightmare we even now face, in 2014.

“The opportunity is enormous,” said Nick Spencer, a senior director at ABI Research. “The average advanced market home has over 10 untethered devices with rechargeable batteries today.” Spencer reckons that if wearables take off, along with electric cars and the internet of things, the demand will be even greater.

But, thinks TechEye, we’ve been promised better battery technology for years and thus far no-one has picked up that particular baton. So let’s see how it all pans out.

Google to gobble up smartphone market

smartphones-genericWant an Android smartphone for around 100 bucks?  Go to India, because that’s where the action is.

Market analysts at IDC said Google has introduced what it describes as the “first wave” of Android One devices in India in collaboration with local gizmo makers Spice, Karbonn and Micromax.

Google – now it’s a hardware company – has produced a reference design that makes it nice and easy to create devices using Mediatek MT6582 system on a chip (SoC) devices.

And Google isn’t letting it end there because it’s already teamed up major mobile firms Airtel and Reliance and pulled in Amazon too to give added value to the reference designs.

According to IDC, it won’t end there, because after capturing the Indian smartphone market it will also launch similar products in Indonesia and then Brazil.

IDC thinks Google is set to sell heaps of phones and “redefine”  cheap smartphones with “good enough” specs.

OK – Samsung and Apple can battle it out at the high end and while there are plenty of Indian folk who can afford to lash out on these, there are an awful lot more folks who, quite simply, can’t.

Google hasn’t got a presence in the Chinese market, said IDC, but can make gazillions out of other major markets.

Brown Dog snuffles the 99 percent

cover-image-530x360A team of boffins is developing a search engine which can find all the data on the world wide web which cannot be seen by search bots.

The engine, dubbed Brown Dog, searches the web for uncurated data and makes it accessible to scientists.

Kenton McHenry, who along with Jong Lee lead the Image and Spatial Data Analysis division at the National Center for Supercomputing Application (NCSA) said that the information age has made it easy for anyone to create and share vast amounts of digital data, including unstructured collections of images, video and audio as well as documents and spreadsheets.

But the ability to search and use the contents of digital data has become exponentially more difficult because digital data is often trapped in outdated, difficult-to-read file formats and because metadata–the critical data about the data, such as when and how and by whom it was produced–is nonexistent.

McHenry and his team at NCSA have been given a $10 million, five year award from the National Science Foundation (NSF) to manage and make sense of vast amounts of digital scientific data that is currently trapped in outdated file formats.

So far they have come up with a Data Access Proxy (DAP) which transforms unreadable files into readable ones by linking together a series of computing and translational operations behind the scenes.

Similar to an internet gateway, the configuration of the Data Access Proxy would be entered into a user’s machine settings and then forgotten. Data requests over HTTP would first be examined by the proxy to determine if the native file format is readable on the client device. If not, the DAP would be called in the background to convert the file into the best possible format readable by the client machine.

The second tool, the Data Tilling Service (DTS), lets individuals search collections of data, possibly using an existing file to discover other similar files in the data.

Once the machine and browser settings are configured, a search field will be appended to the browser where example files can be dropped in by the user. Doing so triggers the DTS to search the contents of all the files on a given site that are similar to the one provided by the user.

While browsing an online image collection, a user could drop an image of three people into the search field, and the DTS would return images in the collection that also contain three people. If the DTS encounters a file format it is unable to parse, it will use the Data Access Proxy to make the file accessible.

The Data Tilling Service will also perform general indexing of the data and extract and append metadata to files to give users a sense of the type of data they are encountering.

McHenry said the two services are like the Domain Name Service (DNS) in that they can translate inaccessible uncurated data into information.

According to IDC, a research firm, up to 90 percent of big data is “dark,” meaning the contents of such files cannot be easily accessed.

Brown Dog is not only useful for searching the Deep Web, it could one day be used to help individuals manage their ever-growing collections of photos, videos and unstructured/uncurated data on the Web.

Infosys accused of being anti-American

Ashoka's Queen - Wikimedia CommonsA US court will hear how the Indian outsourcing outfit Infosys is alleged to have adopted racist policies against Americans.

The case, filed in a federal court in Wisconsin, is from four IT workers around the country who are suing the company for “ongoing national origin and race discrimination”.

The court documents include an account by Samuel Marrero, who worked as a recruiter in Infosys’s talent acquisition unit from 2011 until May 2013.

According to him recruiters were encouraged to focus their efforts on Indian candidates and “stick to the talent we’re used to”,

Marrero asked if the company only wanted Indian talent and was told by managers “Yes. They know our style and culture”.

The Infosys officials are identified in the lawsuit, one with the title of “senior vice president and global head,” the other as a “global enterprise officer lead.”

Marrero said that he “frequently complained” to higher-ups at Infosys during these weekly calls that many of the highly qualified American candidates they had presented were being rejected in favour of Indians.

As a result 90 percent of Infosys’ workforce is South Asian, and the high percentage is intentional.

In about October 2012, in response to one of these complaints, Infosys’ global enterprise lead allegedly said, “Americans don’t know shit”.

Adobe spies on Epub users

indians-010aAdobe has been spying on users  of Digital Editions 4, the newest version of its Epub app.

For some reason Adobe’s Epub app, seemed to be sending an lot of data to Adobe’s servers and hacker mates of the Digital Reader  have confirmed that Adobe is tracking users in the app and uploading the data to their servers.

Benjamin Daniel Mussler, the security researcher who found the security hole on Amazon.com, has also confirmed it to be true.

Adobe is gathering data on the ebooks that have been opened, which pages users read, and in what order. However, it gets worse. All of the data, including the title, publisher, and other metadata for the book is being sent to Adobe’s server in clear text to allow any spook, Chinese hacker, private eye, to hack into the stream and read it.

Just when you think Adobe could not be dumber, the outfit is not just tracking what users are doing in its own app; it is also scanning your computer and gathering the metadata from all of the ebooks sitting on your hard drive too. Once it has read every ebook it uploads that data to Adobe’s servers too.

Nate Hoffelder  the hack who found the breach described it as a “privacy and security breach so big that [he is] still trying to wrap my head around the technical aspects, much less the legal aspects.”

To be fair this kind of mistake is common as lots have been caught sending data in clear text, and others have been caught scraping data without permission. LG was caught in a very similar privacy violation last November when one of their Smart TVs was shown to be uploading metadata from a user’s private files to LG’s servers in clear text.

It is probably not deliberate, just what security experts technically call “bloody stupid”.

The  software has violated so many privacy laws in the US, goodness knows how many it will have broken in a civilised country like Germany where privacy is taken more seriously. The Frankfurt Book Fair is coming up later this week. Adobe will be exhibiting at the trade show so we guess that the Germans will be interrogating a few executive – that ways to make you talk, apparently.

 

Apple’s bendy turkey now faces hair-gate

appleIt looks like Apple’s reputation for design success is hair today, gone tomorrow.

Already the iPhone 6 range has had to deal with the fact that its aluminium frame can be bent but now has to deal with the fact that its design pulls out the hair on your head and beard.

Twitter users have made #hairgate a rising social media trend.

The problem happens where the aluminium meets the glass which has a space which is ideal for catching hair and pulling it out.  If only there was a company which was famous for its design which did not make such basic mistakes.

Apparently Apple fanboys are divided as to whether treat #beardgate as a separate trend, or simply as a subset of #hairgate. Other Applefans cannot grow a beard and don’t care.

Apple has been refusing to comment about it. However, if its press office had been required to handle the Black Death it would have waited six months before claiming that it only affected a small number of people.

Apple’s silence is fuelling a range of gags. The Twitter account of the Atlanta International Fashion Week speculating that it may be an elaborate plot against hipsters for whom facial hair has become de rigeur. Another user tweeted: “Congrats, Apple, for finally getting hipsters to shave”.

Gillette posted: “Your phone may be smarter than ever, but leave the shaving to the experts.”

The tame Apple press is rushing to quote the standard Apple fanboys in denial posts instead.

“I have iPhone 6. Doesn’t bend and doesn’t snag hair. Who thinks up these things? Apple haters? Competitors?” tweeted John Wooten.

After all, who wants to be the idiot who spent a fortune on a phone so poorly designed it bends and rips your hair out. Only a complete moron would do that – so it is better to pretend you bought a great product, claim it is perfect and people will not laugh at you.

Apple’s design for an iWatch was also mocked by Swiss Watch Makers which said that it looked like it had been designed by a first year design student.

Samsung, Microsoft argue over the best city in the world

Times_Square,_New_York_City_(HDR)Microsoft and Samsung cannot agree on the best city in the world to hatch out peace. Samsung thinks that Hong Kong is the best while Microsoft believes that it should be New York.

Samsung has started an arbitration proceeding in Hong Kong against Microsoft as the Seattle behemoth attempts to give it a Chinese burn over smartphone patent royalties.

The arbitration was disclosed in a court filing as part of a federal lawsuit Microsoft filed in August in New York accusing Samsung of refusing to make royalty payments to Microsoft after the software company announced its intention to acquire Nokia’s handset business.

Samsung specifically wanted the Hong Kong office of the International Court of Arbitration of the International Chamber of Commerce. It is not clear why Hong Kong was chosen – perhaps it was the good shopping, better access to Dim Sung, pork in a bun and the students revolting.

The arbitration was started under the terms of a business collaboration agreement “to resolve a dispute concerning the calculation of success credits under that agreement,” Samsung said.

Jennifer Crider, a spokeswoman for Microsoft, said the companies’ contract provided that the “appropriate venue to interpret the business collaboration agreement is New York”. After all, if they could make an arbitration there, they could make it anywhere and they could go all through the night because the city never sleeps.

The arbitration came just days after Microsoft filed an amended complaint in its New York lawsuit asking the court to rule that it did not breach a business collaboration agreement with Samsung.

Microsoft in the complaint also wants Samsung to pay $6.9 million interest on more than $1 billion in royalty payments which it delayed in protest of the Nokia deal.

Microsoft claims Google Android mobile system uses some of its technology, and most hardware makers, including Samsung, have agreed to pay patent royalties on Android handsets.

Motorola Google  said no and has been in litigation against Microsoft since 2010.

Infected ATMs discovered

pesetaMalware illegally installed in automatic teller machines (ATMs) is costing millions of dollars with INTERPOL involved in a fight to stem the thefts.

Kaspersky Labs said the Tyupkin malware works when crooks have physical access to the ATMs and use a bootable CD to install it.  The infected ATM runs on an infinite loop waiting for a command and runs only on specific times on Sunday and Monday nights.  Then the crooks strike, taking cash from infected machines without needing to use credit cards.

Kaspersky said the malware – Backdoor.MSIL.Tyupkin – has been detected on ATMs in Europe, Latin America and Asia.

The anti-virus company said that banks need to look at the physical security of ATMs and invest in good quality security systems.

They also need to replace master keys and locks on the top of ATMs and get rid of the default settings.  An alarm should also be installed because Kaspersky discovered the gangsters only infected ATMs with no security alarm.  The default BIOS passwords should be changed and the ATMs need to have up to date antivirus software installed.

Computers help to fight AIDS

HIVScientists at the University of Southern Denmark (SDU) say they have developed a method that uses the power of computers to find new compounds to fight the AIDS virus.

The problem is that drugs that have managed to kill HIV are becoming ineffective because the virus is becoming resistant to them.

The researchers say they have a method to speed up development work in the search for new compounds to fight HIV.  They claim that can increase speed by an order of several hundred percent.

The new mthods use quantum mechanics and molecular mechanics using significantly more powerful computers to hunt for the “needle in the haystack”.

Vasanthanathan Poongavanam and Jacob Kongsted at SDU screened half a million compounds and narrowed down 25 for further investigation.  Of those, 14 inhibit the HIV virus’s ability to reproduce.

* The image illustrates HIV virus – purple balls – entering a host cell.  Once they’ve entered they deliver viral RNA – the purple capsule.  The container carries enzymes needed for viral self replication and the compounds discovered are used to inhibit the enzymes.

Spam drowns business mail

Penny Blacks - Wikimedia CommonsA survey showed that 69 percent of organisations polled report that day to day business operations are severely disrupted by spam related incidents.

GFI Software commissioned the independent report that surveyed 200 IT decision makers.

Thirty six percent of the respondents said they have been affected up to three times in a year, meaning expense if PCs and servers need to be cleaned or re-installed after malware has been opened and executed by people.

Some respondents – 15 percent – said tthey had major spam related IT failures over 10 times in the last year.

The most common types of spam is phishing – 49 percent of respondents said it was the most prevalent type of spam.

Banking spam from real companies is the second biggest problem at 44 percent.

Third was dating site spam. 34 percent of respondents said it was their main worry.

And 56 percent surveyed said they’d notice a rise in spam levels over the past year.

Sergio Galindo, general manager at GFI software said crooks are using spam more and more to throw malware into the workplace for malicious reasons, to hold companies to ransom or to steal information that can be used for fraud.

HP divides but will it conquer?

Meg WhitmanThe decision by HP to split itself into two companies has the whiff of desperation about it.

One wing will sell printer ink and PCs, while the other will position itself selling into the enterprises with services and hardware.

Meg Whitman said that the move is intended to give both wings flexibility in the different marketplaces they represent but the end result is more likely to be confusion than clarity.

And it is worth contrasting Hewlett Packard with Dell. The latter has managed to re-engineer its entire business over the last five years and be successful in selling into services, into software and for the PCs that have brought it smelling of success. It uses its different services and products to leverage its sales. And it doesn’t  panic, Captain Whitman.

The devil is in the HP detail.

The newly spring Hewlett-Packard Enterprise and HP Inc could well end up competing with each other but that isn’t the least of their problems.  The move will mean a big shift in its relationship with its partners – some of which sell the entire range of HP kit and services through distribution. Those details will take quite some disentangling.

HP is in the fourth year of its five year plan but this looks a bit of its plan that wasn’t originally part of its five year plan.

Whitman said that by moving one HP to two HPs it will be in a better position to compete, support its customers and partners and also bring in extra cash for its shareholders.  That’s what she hopes.

HP one and HP two hope to complete the separation by the end of its financial year 2015.  Whitman will serve on the boards of HP one and HP two. That will be jolly interesting when the two companies finally get their infrastructure act together.

The official release doesn’t say how HP one and HP two will share their technology, and employees – who have since big restructures over the last three years – just exactly feel about all or any of this.

Wall Street seems to like it – HP’s share price rose as the news was confirmed yesterday.

US government can post your snaps on Facebook

thumb-mark-zuckerberg-facebook-pro-4566The US government claims it has the right to steal your photos and pretend to be you on social networking sites so that it can trick your friends into admitting illegal acts.

The Justice Department is claiming that a federal agent had the right to impersonate a young woman online by creating a Facebook page in her name without her knowledge. The agent managed to do this by stealing pictures from the woman’s seized mobile and sticking racy pictures of her and even one of her young son and niece to a fake social media account.

The woman, Sondra Arquiett, who then went by the name Sondra Prince, discovered that the spooks had stolen her ID in 2010 when a friend asked about the pictures she was posting on her Facebook page. There were risqué pictures of her posing on the hood of a BMW with her legs spread, and others with her in her underwear.

The account was actually set up by US Drug Enforcement Administration special agent Timothy Sinnigen who had arrested Arquiett, alleging she was part of a drug ring. A judge decided that that the single mom was a bit player who accepted responsibility and sentenced her to probation.

While she was awaiting trial, Sinnigen created the fake Facebook page using Arquiett’s real name, posted photos from her seized cell phone, and communicated with at least one wanted fugitive — all without her knowledge.

Facebook’s “Community Standards” say that “Claiming to be another person, creating a false presence for an organisation, or creating multiple accounts undermines community and violates Facebook’s terms” and there there is no exception for cops and spooks.

The bogus Facebook page is still there though.

The DEA’s actions might never have come to light if Arquiett, now 28, hadn’t sued Sinnigen, accusing him in federal district court in Syracuse, New York, of violating her privacy and placing her in danger.

The government’s response said that: “Defendants admit that Plaintiff did not give express permission for the use of photographs contained on her phone on an undercover Facebook page, but state the Plaintiff implicitly consented by granting access to the information stored in her mobile and by consenting to the use of that information to aid in an ongoing criminal investigations.”

In other words the US government can come into your house take your photographs and post them online if it thinks it can use them to arrest your friends.  When Arquiett gave permission for the FBI to look at her phone she cannot have imagined that she would have consented to her data being used in like that, but apparently the US Justice department thinks it is OK.

One in three jobs replaced by IT by 2025

rewardposterCrystal ball readers at analyst outfit Gartner have seen a future where robots and drones replace  a third of all workers by 2025.

At the start of its major US conference, the Symposium/ITxpo Gartner’s research director Peter Sondergaard predicted a future where a drone may be your eyes and ears.

In five years, drones will be a standard part of operations in many industries, used in agriculture, geographical surveys and oil and gas pipeline inspections, he said.

He also predicted a rise in the a “super class” of technologies that perform a wide variety of work, both the physical and the intellectual kind, said Sondergaard.

Machines, for instance, have been grading multiple choice for years, but now they are grading essays and unstructured text.

This cognitive capability in software will extend to other areas, including financial analysis, medical diagnostics and data analytic jobs of all sorts, Sondergaard said.

Gartner predicts one in three jobs will be converted to software, robots and smart machines by 2025. The new digital businesses require less labour and machines will be make sense of data faster than humans.