The app lets users see who’s online for a private or group chat, and lets them decorate messages with pictures and stickers. Users can also share their location, and contacts are automatically added to the app.
For now, some features available on the Android and iOS versions — such as the ability to record messages and send photos privately — are missing on the Windows Phone app. The pop-up chat heads Facebook has implemented on Android are also missing.
The availability of apps on Windows Phone has been a problem for Microsoft when competing with Apple’s iPhones and the Android camp. At an event in conjunction with Mobile World Congress, Joe Belfiore, who runs Microsoft’s Windows Phone platform, highlighted recent additions such as Instagram, Vine, Waze and Mint.
The arrival of these apps is more than a coincidence: It’s a result of Microsoft working with third party app developers and slowly growing phone sales, according to Paolo Pescatore, director of apps and media at market research company CCS Insight.
“They are very much needed. Microsoft has been trying to bridge the gap with iOS and Android, but frankly the rate of development hasn’t been as fast as it should have been,” Pescatore said.
The company still needs to convince or help developers of many local video and entertainment apps to create Windows Phone versions, according to Pescatore. For that to happen, Microsoft and its partners need to sell more phones, he said.
The Mobile World Congress event also detailed the company’s plans to make Windows Phone a better fit for low-end smartphones and presented new hardware partners, including Foxconn, Karbonn, Lenovo, LG Electronics and ZTE. With Microsoft soon closing its acquisition of Nokia’s handset division, Windows Phone is at a critical juncture.
Target Corp announced an overhaul of its information security processes and the departure of its chief information officer as the retailer tries to re-gain customers and investors after a massive data breach late last year.
CIO Beth Jacob is the first high-level executive to leave the company following the breach, which led to the theft of about 40 million credit and debit card records and 70 million other records of customer details.
Jacob, who comes from a sales background and has been CIO since 2008, will be replaced by an external hire, according to sources at Target.
“It’s a decision that should have been made by the CEO on January 1, not through the resignation of an employee that overlooked critical weakness in the operating model,” Belus Capital Advisors CEO Brian Sozzi said.
The breach at Target was the second largest at a U.S. retailer, after the theft of more than 90 million credit cards over about 18 months was uncovered in 2007 at TJX Cos Inc, operator of the T.J. Maxx and Marshalls chains.
Hacking has become a major concern for retailers in the United States. In the latest reported breach, beauty products retailer and distributor Sally Beauty Holdings Inc said on Wednesday its network had been hacked but no card or customer data appeared to have been stolen.
Target Chief Executive Gregg Steinhafel said the company would elevate the role of chief information security officer as part of its plan to tighten its security.
The company will also look externally to fill that position as well as the new position of chief compliance officer.
Steinhafel said Target would be advised by security consultant Promontory Financial Group as it evaluates its technology, structure, processes and talent.
“I believe this is definitely a measure in restoring faith and really showing that they are taking the breach seriously,” Heather Bearfield, who runs the cybersecurity practice for accounting firm Marcum LLP, told Reuters.
Target, the third-largest U.S. retailer, said last week customer traffic had started to improve this year after falling significantly toward the end of the holiday shopping season when news of the cyber attack spooked shoppers.
Analysts speculate that Facebook may want to use the drones to bring Internet connectivity to the two-thirds of the world that are not connected.
The social networking company is reportedly paying $60 million for Titan Aerospace, according to TechCrunch, which cited unnamed sources.
Neither Titan Aerospace nor Facebook responded to requests for confirmation.
The aerospace company builds light-weight, high-flying drones that can take off at 20 mph and remain aloft for five years. The company’s Solara 50 drone, for instance, can fly as high as 65,000 feet above Earth.
“Drones are the latest rage with tech companies these days,” said Dan Olds, an analyst with The Gabriel Consulting Group. “Amazon, Google and Facebook, plus a whole lot more seem to be looking for ways they can shoehorn drones into their business plans. And what young geek didn’t dream of having a remote control flying machine that could do anything they wanted it to do?”
But could Facebook use these drones to bring Internet connectivity to remote areas? Sure, but it’s not the only way they could go about it.
Last June, Google’s research arm, Google X, announced that it was working on affordable Internet connectivity through the use of a fleet of high-altitude balloons. The company tested its plan by launching 30 balloons that flew twice as high as commercial airplanes with 50 users trying to connect to the Internet from below.
Amazon.com had another use for drones, and in December announced plans to use the machines to deliver merchandise to customers. Possibly taking a page from Domino’s old promise of delivering pizzas in 30 minutes or less, Amazon said with drones, some customers could get their purchases within half an hour.
“Could drones be the way to provide net connections in Third World countries?” asked Olds. “Yeah, maybe, but wouldn’t a set of non-sexy, long-range cell towers or low-power, cost-optimized microwave repeaters be a better solution? Sure, there are some drawbacks to physical infrastructure on the ground, but they can be worked around.”
He reiterated that drones simply are the cool new tech tool. How could a tech company with very deep pockets resist?
Verizon Communications is engaged in discussions with content providers to deliver web-based TV services to mobile platforms, chief executive Lowell McAdam, said at an investor conference earlier in the week.
Just recently, Dish Network Corp and Walt Disney Co announced a landmark deal that will allow the No. 2 satellite TV provider to deliver Disney-owned network content online, outside of a traditional TV subscription.
Verizon’s goal “is to work with the content providers,” said
McAdam at the Morgan Stanley Technology, Media & Telecom Conference.
“I have personally had discussions with the CEOs of the large content companies, and we would love to partner with them to see how we can take FiOS contact mobilely across the country.” he said.
McAdam said the company could also look at providing a service delivered over wireless airwaves and not just broadband.
According to PwC’s annual entertainment and media forecast, North American consumers will spend $6 billion in 2014 on entertainment from services such as Netflix that are offered over the top, meaning they are utilized over a network but not offered by the network operator.
“I think you can actually get a virtuous cycle where broadcast viewing goes up and over-the-top viewing goes up, if you time this properly,” McAdam said.
In January, Verizon acquired Intel Corp’s OnCue service for an undisclosed sum to accelerate its push into next-generation video services, including integrating it with Verizon’s FiOS fiber-based Internet and TV service that has more than 5 million video subscribers, about 5 percent of pay TV households. The company said it was open to providing over-the-top content to any device.
McAdam also stressed that Verizon expects Netflix to pay for faster video delivery as part of a so-called interconnect deal, in an arrangement similar to the one the video provider has made with Comcast Corp.
“I have spoken live and via email with (Netflix CEO) Reed Hastings, and I believe that we will get some sort of an arrangement with them as well,” said McAdam.
The change, which will be rolled out gradually according to a Yahoo spokeswoman, will require users to register for a Yahoo ID in order to use any of the Internet portal’s services.
The move marks the latest change to Yahoo by Chief Executive Marissa Mayer, who is striving to spark fresh interest in the company’s Web products and to revive its stagnant revenue.
“Yahoo is continually working on improving the user experience,” the company said in a statement, noting that the new process “will allow us to offer the best personalized experience to everyone”.
The first Yahoo service to require the new sign-in process is Yahoo Sports Tourney Pick’Em, a service focused on the NCAA college basketball tournament which begins later this month. News of the change to Yahoo’s Tourney Pick’Em sign-in process was first reported by the technology blog Betanews.
Since Mayer took the reins in 2012, the company has rolled out new versions of many of its key products, including Yahoo Mail and Yahoo Finance. Last year, Yahoo announced a program to recycle inactive Yahoo user IDs, letting new users claim email addresses that have not been used for more than 12 months.
In eliminating the Facebook and Google sign-in features, Mayer, a former Google executive, is effectively reversing a strategy that Yahoo adopted in 2010 and 2011 under then CEO Carol Bartz.
The change to the Tourney Pick’Em sign-in process began on Monday, the Yahoo spokeswoman said, noting that users could still access other services with Google or Facebook IDs.
The sign-in buttons for Facebook and Google will eventually be removed from all Yahoo properties, the Yahoo spokeswoman, though she declined to provide a timeframe.
Worldwide sales of tablets to end users totaled 195.4 million units, fueled by sales of low-end, smaller screen devices, and purchases by first time buyers, the company reported.
Android has become the biggest tablet operating system with 62% of the market. In 2012, Google’s OS trailed Apple’s iOS by a margin of about 8 million tablets, but by the end of last year had turned that into a 50 million-unit lead.
The Android camp led by Samsung sold almost 121 million tablets, for a 61.9% share, compared to 53.3 million units and a 45.8% share in 2012. Apple’s tablet sales increased from 61.5 to 70.4 million units, but because the overall market grew faster, the company’s share dropped from 52.8% to 36%.
Microsoft’s Windows tablet sales improved but the share remained small at 2.1%, with shipments growing from 1.2 million to 4 million units. To compete, Microsoft needs to create a more compelling ecosystem for consumers as well as developers across all mobile devices, Gartner said.
Apple’s strong fourth quarter helped it maintain the top position among the manufacturers. Samsung, ranked in second place, had the biggest growth of the worldwide tablet vendors, at 336 %. The expansion and improvement of its Galaxy tablet portfolio, together with a lot of marketing, helped Samsung shrink the gap with Apple.
Samsung sold 37.4 million tablets for a 19.1% slice of the market.
The rest of the top 5 was made up of Asus, Amazon.com and Lenovo. Of those three companies, Lenovo did particularly well with tablet sales growing by 198% to 6.5 million units, or a 3.3% market share. The company’s success was due to a combination of new tablet models launched during the second half of last year, and sales of its Yoga model and its Windows tablets doing particularly well, Gartner said.
However, Lenovo is still behind Asus, with 11 million units sold, and Amazon, with 9.4 million. Asus’ market share grew from 5.4% to 5.6%, while Amazon’s share declined from 6.6% to 4.8%.
As the tablet market becomes even more competitive, this year it will be critical for vendors to improve user experience, technology and ecosystem value beyond just hardware and cost, Gartner said.
The site, which enables strangers to meet for shared-interest activities ranging from parents’ groups to software development, was back online but still being attacked , Meetup CEO Scott Heiferman told Reuters.
Meetup has refused to pay the small ransom as it believes doing so would make the perpetrators of the attacks demand more money.
“It’s a cat and mouse game,” Heiferman said, adding he was not yet sure how long it would take to keep the site reliably online.
A Meetup blog had earlier said the company was a victim of a distributed denial of service (DDoS) campaign, a type of attack that knocks websites offline by overwhelming them with incoming traffic. It said that no personal data, including credit card information, had been accessed.
Heiferman said he was open to the possibility of some financial relief for members who pay between $12 and $17 a month to organize Meetup groups in their geographic and thematic areas of interest. He said his first priority was to resume the service of creating communities wholly via an Internet connection.
“we’re going to come out of this much stronger. And I don’t mean that as just a trite euphemism, I mean it literally. Like, we are going to be much more secure,” he said.
The Federal Bureau of Investigation has been investigating the attack since late last week when the assumed criminal group first offered to withhold it if Meetup paid $300.
The attack was the first in the site’s 12-year history, and Heiferman defended the move not to pay the paltry ransom.
“We made a decision not to negotiate with criminals,” he said in the post. “Payment could make us (and all well-meaning organizations like us) a target for further extortion demands as word spread in the criminal world.”
Meetup has almost 17 million members and, when online, was signing up between 15,000 and 20,000 people every day.
The site represents a soft target for online criminals, who often attempt to extort companies in return for calling off DDoS attacks, said Kevin Johnson, chief executive of cybersecurity consultancy Secure Ideas.
“It’s very common for this sort of attack to start off with a small demand,” Johnson said. “It’s not like Meetup can write a check for a million dollars.”
Heiferman’s blog post said the site should be able to protect itself over time, even though it has struggled to stay online since the attacks began on Thursday morning. He said Meetup spent millions of dollars a year to secure its systems.
The Meetup site and related mobile apps have been intermittently unavailable since Thursday.
The U.S. company’s CarPlay makes its debut in Ferrari, Mercedes-Benz and Volvo vehicles at the show, demonstrating the software system that allows drivers to control their iPhones via touch and voice, Apple revealed on Monday.
Carmakers have already enabled some access to smartphones via Bluetooth technology, but Apple’s latest offering aims to integrate iPhone functionality more seamlessly with dashboard-mounted display and speaker systems.
CarPlay enables drivers to access to contacts stored on the iPhone, make calls, return missed calls or listen to voicemails without taking their hands from the steering wheel.
Drivers can also use maps, listen to music and access messages “with just a word or a touch”, Apple said. Drivers will also be able to read messages and dictate responses via Apple’s voice-activated Siri software.
Apple said that CarPlay will also be available in cars from manufacturers including BMW,Ford, General Motors, Honda, Hyundai, PSA Peugeot Citroën, Subaru, Suzuki and Toyota Motor Corp.
The company’s PalmSecure scanners use near-infrared light to scan points in veins that lie beneath the surface of a user’s palm. There has to be blood flowing through a user’s hand for the sensor to work.
Every person’s palm pattern is unique, and scans of vein points are matched against previously registered scans to authenticate users and unlock whatever device or service they’re linked to.
“We have been reducing the size of our palm vein authentication units since their initial development,” a Fujitsu spokesman said. “In the future, we hope to eventually have these units embedded into smartphones.”
Fujitsu claims the biometric technology has a false acceptance rate of only 0.00008% and a false rejection rate of 0.01%.
The company first commercialized the technology in 2004 when palm-sized scanners were embedded in ATMs at Japan’s Bank of Tokyo-Mitsubishi to help authenticate customer identity and prevent fraud. In-store scanners at Suruga Bank also appeared in 2004.
Fujitsu later shrank the scanners and embedded them in laptops.
It recently showed off a stamp-sized version of the scanner that is the smallest yet. It’s been embedded in tablets for the first time and will be included in about 2,000 tablets provided to Fukuoka Financial Group, which includes the Bank of Fukuoka, Kumamoto Bank and Shinwa Bank.
“No one has this technology, and it’s significantly more secure than fingerprint,” the Fujitsu spokesman said, adding that some banks have shown interest in palm-vein scanners as a means of verifying identity in natural disasters in which ID or bank cards are lost or destroyed.
The customized 12.5-inch Fujitsu Arrows Q704/H tablets have Intel Core i5 processors and run Windows, acting as virtual desktops. Bank employees meeting customers off-site will be able to securely access their bank’s internal system by using the palm-vein authentication scanners.
Only users whose biometric info has been registered beforehand will be able to operate the tablets.
At CES in January, U.S.-based biometric payments company PulseWallet demonstrated a cardless point-of-sale terminal incorporating Fujitsu’s vein-imaging technology. It said registered users could leave their credit and debit cards at home and make payments simply by having their palms scanned.
Sears Holdings Corp acknowledged it has launched an investigation to determine whether it was the victim of a security breach, following Target Corp’s revelation at the end of last year that it had suffered an unprecedented cyber attack.
“There have been rumors and reports throughout the retail industry of security incidents at various retailers and we are actively reviewing our systems to determine if we have been a victim of a breach,” Sears spokesman Howard Riefs said in a statement on Friday.
“We have found no information based on our review of our systems to date indicating a breach,” he added.
He did not say when the operator of Sears department stores and Kmart discount stores had begun the investigation or provide other information about the probe.
Sears Holdings Corp operates nearly 2,500 retail stores in the United States and Canada.
Bloomberg News reported on Friday that the U.S. Secret Service was investigating a possible secret breach at Sears, citing a person familiar with the investigation. The report did not identify that source by name.
The Bloomberg report said that its source did not disclose details about the scope or timing of the suspected breach.
A spokesman for the U.S. Secret Service declined comment when Reuters asked if the agency was investigating a possible breach at Sears.
The Secret Service is leading the U.S. government’s investigation into last year’s attack on Target, which the company has said led to the theft of some 40 million payment card numbers as well as another 70 million pieces of personal data.
As in-vehicle electronics become more sophisticated to support autonomous driving, cameras, and infotainment systems, Ethernet has become a top contender for connecting them.
For example, the BMW X5 automobile, released last year, used single-pair twisted wire, 100Mbps Ethernet to connect its driver-assistance cameras.
Paris-based Parrot, which supplies mobile accessories to automakers BMW, Hyundai and others, has developed in-car Ethernet. Its first Ethernet-connected systems could hit the market as soon as 2015, says Eric Riyahi, executive vice president of global operations.
Parrot’s new Ethernet-based Audio Video Bridging (AVB) technology uses Broadcom’s BroadR-Reach automotive Ethernet controller chips.
The AVB technology’s network management capabilities allows automakers to control the timing of data streams between specific network nodes in a vehicle and controls the bandwidth in order to manage competing data traffic.
Ethernet’s greater bandwidth could provide drivers with turn-by-turn navigation while a front-seat passenger streams music from the Internet, and each back-seat passenger watches streaming videos on separate displays.
“In-car Ethernet is seen as a very promising way to provide the needed bandwidth for coming new applications within the fields of connectivity, infotainment and safety,” said Hans Alminger, senior manager for Diagnostics & ECU Platform at Volvo, in a statement.
Ethernet was initially used by automakers only for on-board diagnostics. But as automotive electronics advanced, the technology has found a place in advanced driver assistance systems and infotainment platforms.
Many manufacturers also use Ethernet to connect rear vision cameras to a car’s infotainment or safety system, said Patrick Popp, chief technology officer of Automotive at TE Connectivity, a maker of car antennas and other automobile communications parts.
Currently, however, there are as many as nine proprietary auto networking specifications, including LIN, CAN/CAN-FD, MOST and FlexRay. FlexRay, for example, has a 10Mbps transmission rate. Ethernet could increase that 10 fold or more.
The effort to create a single vehicle Ethernet standard is being lead by Open Alliance and the IEEE 802.3 working group. The groups are working to establish 100Mbps and 1Gbps Ethernet as de facto standards.
The first automotive Ethernet standard draft is expected this year.
The Open Alliance claims more than 200 members, including General Motors, Ford, Daimler, Honda, Hyundai, BMW, Toyota, Volkswagen. Jaguar Land Rover, Renault, Volvo, Bosch, Freescale and Harman.
Broadcom, which makes electronic control unit chips for automobiles, is a member of the Open Alliance and is working on the effort to standardize automotive Ethernet.
The company has produced the Kinetis KLO3 MCU, a 32-bit ARM system that is 15% smaller than its previous iteration but with a 10% power improvement.
Internet of Things is a buzzword for the trend toward network-connected sensors incorporated into devices that in the past were standalone appliances. These devices use sensors to capture things like temperatures in thermostats, pressure, accelerometers, gyroscopes and other types of MEMS sensors. A microcontroller unit gives intelligence and limited computational capability to these devices, but is not a general purpose processor. One of the roles of the microcontroller is to connect the data with more sophisticated computational power.
The Kinetis KLO3 runs a lightweight embedded operating system to connect the data to other devices, such as an app that uses a more general purpose processor.
Kathleen Jachimiak, product launch manager at Freescale, said the new microcontroller will “enable further miniaturization” in connected devices. This MCU is capable of having up to 32 KB of flash memory and 2 KB of RAM.
Consumers want devices that are light, small and smart. They also want to be able to store their information and send it to an application that’s either on a phone or a PC, Jachimiak said.
This microcontroller, at 1.6 x 2.0 mm, is smaller than the dimple on a golf ball, and uses a relatively new process in its manufacturing, called wafer level chip scale packaging. The process involves building the integrated package while the die is still part of a wafer. It’s a more efficient process and produces the smallest possible package, for a given die size.
Mt. Gox, once the world’s largest bitcoin exchange, has been hit with a lawsuit by a customer in what may be the first of many U.S. lawsuits seeking to recover millions of dollars of losses linked to a hacking attack that led to the exchange’s bankruptcy.
In a complaint filed on Thursday in U.S. District Court in Chicago, plaintiff Gregory Greene said Mt. Gox and its chief executive, Mark Karpeles, were negligent and committed fraud for having failed to protect the Tokyo-based exchange from theft.
Greene said bitcoin prices plummeted after Mt. Gox found the security breach, but said he and other investors in the virtual currency could not cut their losses because the exchange had halted trading. Mt. Gox took down its website on Tuesday.
“Mt. Gox intentionally and knowingly failed to provide its users with the level of security protection for which they paid,” said Greene, who estimated his bitcoin stake at $25,000.
The lawsuit seeks class action status on behalf of Mt. Gox users, restitution, monetary damages and other remedies.
It was not immediately clear which law firm would defend Mt. Gox against the lawsuit. Baker & McKenzie, a Chicago-based firm that represents the exchange in Japan, did not immediately respond on Friday to requests for comment.
At a news conference on Friday at the Tokyo District Court, Karpeles said he was “very sorry” and blamed Mt. Gox’s collapse on a “weakness in our system,” but predicted that the bitcoin market would continue to grow.
Mt. Gox said it may have 750,000 of its customers’ bitcoins and 100,000 of its own, equal to about 7 percent of bitcoins worldwide, for a total loss of about $480 million.
The exchange reported having 127,000 creditors, liabilities of 6.5 billion yen ($64 million) and assets of 3.84 billion yen ($38 million).
It is common for alleged frauds that generate significant losses or attention to result in a slew of U.S. lawsuits seeking class action status, even if the alleged wrongful activity occurs outside the country.
“This is a case of serial mismanagement, if not outright fraud, by Karpeles and Mt. Gox,” said Steven Woodrow, a partner at the Edelson law firm in Denver, who filed Greene’s lawsuit. “Users of the exchange are collectively out millions while Mt. Gox holds onto their bitcoins. We intend to get to the bottom of this in an American court.”
Gartner claims that the with all this big data swimming around, companies are headed for a huge crisis. No doubt the answer of course is to hire analysts to help out, and Gartner happens to know at least one firm that could do the job for a fee.
In a report issued this morning Gartner predicts that, by 2017, 33 percent of Fortune 100 organizations will experience an information crisis, due to their inability to effectively value, govern and trust their enterprise information. Andrew White, research vice president at Gartner said that there is an overall lack of maturity when it comes to governing information as an enterprise asset. Organisations, unable to organize themselves effectively for 2020 are unwilling to focus on capabilities rather than tools, and not ready to revise their information strategy, will suffer the consequences, he said.
Business leaders need to manage information, rather than just maintain it. “When we say ‘manage,’ we mean ‘manage information for business advantage,’ as opposed to just maintaining data and its physical or virtual storage needs,” said White.
“In a digital economy, information is becoming the competitive asset to drive business advantage, and it is the critical connection that links the value chain of organisations.”
The discipline of exploiting the various types of information created and managed inside and outside organizations is called enterprise information management (EIM). IT leaders must design EIM initiatives so that sharing and reusing information creates business value, and the value created must contribute to enterprise goals.
Ultimately, an EIM program must help an organization identify which information is important to its success — not all information is. It must evaluate a great deal of information and determine what qualifies as enterprise information. Gartner analysts said that, at present, over three-quarters of individual information management initiatives are isolated from each other within the same organisation. This leads to EIM not being realized, sustained or fully exploited.
“We recommend that IT leaders identify the crucial business outcomes that need improvement or that are being held by poor information management,” White said.
Companies need to determine the business processes and leaders most impacted by those outcomes, and use their findings to start setting priorities for a new EIM program. Finally, they need to adopt a program management approach for EIM, to identify work efforts, resource commitments, stakeholder expectations and metrics for success.
The U.S. government has requested a secret surveillance court to allow it to retain telephone metadata for a period beyond the current five-year limit, for use as potential evidence in civil lawsuits regarding the collection of the data.
In June last year, former National Security Agency contractor, Edward Snowden, revealed that the agency was collecting bulk phone records of Verizon customers in the U.S.
The government subsequently confirmed that it had a program for the bulk collection of phone metadata, which triggered a number of privacy law suits in various courts challenging the legality of the NSA program under section 215 of the Patriot Act.
When litigation is pending against a party, or is reasonably anticipated, the party has a duty to preserve relevant information that may be evidence in the case, the Department of Justice stated in a filing Tuesday before the Foreign Intelligence Surveillance Court that was made public Wednesday.
“A party may be exposed to a range of sanctions not only for violating a preservation order, but also for failing to produce relevant evidence when ordered to do so because it destroyed information that it had a duty to preserve,” it wrote, while pointing out that it hasn’t received a specific preservation order so far in any of the civil lawsuits.
The American Civil Liberties Union, U.S. Sen. Rand Paul and the First Unitarian Church of Los Angeles are among those who have filed lawsuits challenging the phone records program.
The telephony metadata retained beyond five years for the purpose of the civil litigation will be kept in a format that prevents access or use of it by NSA staff for any purpose including queries for gathering foreign intelligence information, according to the filing.
The federal government, meanwhile, is exploring alternatives to the NSA’s holding the phone data. It has asked industry for information on whether commercially available services can provide a viable alternative to the government holding the bulk data.
In a review of NSA surveillance last month, President Obama called for a new approach on telephony metadata that will “establish a mechanism that preserves the capabilities we need without the government holding this bulk metadata.”