Subscribe to:

Subscribe to :: TheGuruReview.net ::

Yahoo Unveils Livetext Mobile Messaging App

July 31, 2015 by mphillips  
Filed under Mobile

Yahoo unveiled a mobile messaging app that combines texting with live one-on-one video.

The app, named Livetext, is video calling with a twist: there’s no audio. To communicate, users type texts and emojis that are overlaid onto the screen during the call.

The app’s format might sound restricting, but Yahoo says Livetext will help users to communicate more freely. The lack of audio, the company says, removes inhibitions that people might feel when they otherwise receive video calls in public.

“We wanted to bridge the gap between the simplicity and ease of texting, with the live feeling of calling,” said Adam Cahan, senior vice president of video, design and emerging products at Yahoo, during the app’s unveiling at an event in New York on Wednesday that was webcast.

Livetext was developed from scratch at Yahoo. Its development was aided by Yahoo’s acquisition last year of mobile messaging app MessageMe, the company said Wednesday. It’s yet another messaging app in a sea of competitors like Snapchat, WhatsApp and Facebook Messenger.

Still, Livetext is the latest attempt by Yahoo to provide a messaging app that resonates with users. It became available to download for free on Thursday for iOS and Android, in the U.S., U.K, Canada, Ireland, Germany, France, Hong Kong and Taiwan. Users will be able to text in English, French, German and Chinese using the app.

The app streams video only when two people are connected through the app at the same time. Users can search for friends in the app through their Livetext user name, or through the contacts list on their phone.

There is no time limit on calls placed through the app, and no way to save or archive the sessions. The video quality will depend on the strength of the data connection, although connections at 3G and above should suffice, Yahoo said.

It’s available on Android and the desktop, but not on iOS.

 

 

 

 

Samsung Plans Price Cut For Galaxy S6 Phones

July 31, 2015 by mphillips  
Filed under Mobile

Lukewarm demand for its flagship Galaxy S6 smartphone and higher marketing costs led Samsung Electronics to another quarter of declining sales and profits in the April to June period.

In the key smartphone market, an area led by Samsung until recently, the popularity of Apple’s iPhone 6 and 6 Plus handsets and the rise of lower-cost phones from Chinese vendors squeezed Samsung at both the high and low end of the market.

The company said Galaxy S6 and S6 Edge sales were lower than expected.

It still managed to make money but not nearly as much as the same time last year. Operating profit for the quarter was 2.8 trillion won, down about 38 percent on the same period of 2014.

The results come against a backdrop of continuing record quarterly results at smartphone rival Apple. It sold 47.5 million phones in the quarter and recorded sales of $49.6 billion and a quarterly net profit of $10.7 billion — both squarely ahead of sales and profits at Samsung.

For the rest of this year, Samsung said it will attempt to boost smartphone sales by reducing the price of the Galaxy S6 and introducing new large-screen models. This time more than ever before, the company is under intense pressure to score a hit with a new phone to help turn around its declining business.

 

 

Is Wafer Output Headed Down?

July 31, 2015 by Michael  
Filed under Computing

United Microelectronics (UMC) expects to post an up to 5 per cent decrease in wafer shipments for the third quarter of 2015.

The outfit’s capacity rate will fall below 90 per cent for the first time after being flat out for ages.

UMC CEO Po-Wen Yen said the third quarter, would suffer from the inventory correction problems that were first noticed in the first quarter.

Current weakness in overall demand, partly due to the uncertainties in economic outlook, will prolong the inventory adjustment through the second half of 2015,” he said.

UMC used 94 per cent of its overall capacity in the second quarter of 2015, when the company shipped a record 1.54 million 8-inch equivalent wafers.

Shipments during the quarter were driven mainly by 28nm products, the foundry noted.

UMC reported consolidated revenues of $1.23 billion for the second quarter, down 6 per cent on last year. Gross margin came to 22.9 per cent compared with 24.3 per cent in the first quarter and 22.9 per cent in second.

UMC created net profits of $1.45 billion in the second quarter of 2015 – the highest level in nine quarters.

Looking into the third quarter, UMC expects to use 87-89 per cent of its overall capacity in the third quarter. Wafer shipments and ASPs will fall up to 5 per cent and about 3 per cent, respectively, on quarter.

Courtesy-Fud

 

Twitter Woes Continue, User Growth Rate Slows

July 30, 2015 by mphillips  
Filed under Around The Net

Twitter Inc’s shares continued to drop after the microblogging company said its number of monthly average users grew at the slowest pace since it went public in 2013.

“This is unacceptable and we’re not happy about it,” Jack Dorsey, who stepped in as interim chief executive on July 1, said on a call with analysts.

Twitter said it had 304 million core users in the second quarter, up from 302 million in the prior quarter.

Twitter’s struggles to increase its audience worries investors, who are focused on the company’s growth potential, and the latest figures did little to reassure them.

The data on users overshadowed the company’s second-quarter earnings and revenue, which exceeded expectations, and its bullish projections for future revenue.

Executives also made clear it would be a long process, and were candid about problems with the service.

“We do not expect to see sustained meaningful growth (in monthly active users) until we start to reach the mass market,” Chief Financial Officer Anthony Noto said on the call.

“We have not clearly communicated Twitter’s unique value. And as a result non-users continue to ask, ‘Why should I use Twitter?’ “Simply said, the product remains too difficult to use.”

Twitter recognizes “there is an issue that needs to be worked on,” Evercore ISI analyst Ken Sena said. “They were giving investors a sense of the challenge and I think the stock sell-off that you saw just reflected that.”

 

 

 

Is Intel Trying To Divide To Conquer?

July 30, 2015 by Michael  
Filed under Computing

Intel is trying to boost promotion of its desktop CPU platforms by dividing the market into six pieces.

According to Digitimes which has its paws on the cunning plan said that Intel is talking about something called an Enthusiast Tower.

An Enthusiast Tower, is not a ride at Disneyland, it is the gaming, video/audio content and high performance sector. What Intel defines as “mainstream” has high performance-price ratios.  “All-in-one (AIO) PCs”, “Mini PCs (NUC)”, “Portable AIO PCs” and “Compute Sticks” make up the remaining pieces of Intel’s marketing pie.

The Enthusiast Tower part of Intel’s business is doing well.  It is seeing growing sales, while demand for NUC products and Compute Sticks is also gradually picking up.

Intel said that its MiniPCs will support both Windows and Chrome OS, and the other five only Windows 8.1/10.

In early August, Intel will announce several K-series processors including Core i7-6700K, and Z170 chipsets and will unveil Skylake-S and Skylake-U series processors and H170/B150 chipsets in early September.

Intel will start mass shipping Skylake processors in October and November. Its top-end six-core and eight-core Broadwell-E processors will be in the shops in the first quarter of 2016. They will use LGA 2011-3 and supporting the X99 chipsets and DDR4 memory.

Courtesy-Fud

The NSA Plans To Stop Snooping Bulk Data

July 30, 2015 by Michael  
Filed under Around The Net

The National Security Agency has said that it will end its access to most bulk data collected under a controversial surveillance program in November, but keep records for litigation purposes.

The office of the Director of National Intelligence said in a statement that the bulk telephony data — the subject of leaks by former intelligence contractor Edward Snowden which shocked many in the US and abroad — would be destroyed “as soon as possible” to comply with a law passed by Congress in early June.

The statement said that during the 180-day transition period required under the USA Freedom Act, “analytic access to that historical metadata… will cease on November 29, 2015.”

But it added that “for data integrity purposes,” NSA will allow technical personnel to continue to have access to the metadata for an additional three months.

The NSA must preserve bulk telephony metadata collection “until civil litigation about the program is resolved, or the relevant courts relieve NSA of such duties.”

The data kept for litigation “will not be used or accessed for any other purpose, and, as soon as possible, NSA will destroy the Section 215 bulk telephony metadata on expiration of its litigation preservation duties.”

Courtesy-Fud

Will HTML5 Hide Web Exploits?

July 29, 2015 by Michael  
Filed under Computing

Some of the features introduced in HTML5 can be used to hide web-based exploits and help them evade security.

Researchers from the University of Salerno and the Sapienza University of Rome in Italy have used three different techniques to obfuscate exploits like the ones usually used in drive-by download attacks.

Functionality provided by HTML5 can be efficient for malware obfuscation, the Italians have proved.

Modern security software can detect a big chunk of threats, but if they use some HTML5 features to hide the exploits served in drive-by download attacks, they could evade static and dynamic detection systems.

HTML5 has a series of scripting application programming interfaces (APIs) that can be used with JavaScript.

Experts say some of these APIs can be used to deliver and assemble the exploit in the web browser without being detected.

One method dubbed “delegated preparation” involves delegating the preparation of the malware to system APIs.

Another called “distributed preparation,” shares the code over concurrent and independent processes running within the browser.

A third involves triggering the code preparation based on the user’s actions on the malicious webpage or website.
VirusTotal detection rates for these sorts of obscured attacks remains low.

The paper published by researchers, with the catchy title of “Using HTML5 to Prevent Detection of Drive-by-Download Web Malware,” contains recommendations about some of the steps that can be taken to counter these obfuscation techniques.

Courtesy-Fud

 

Will Intel’s Skylake Come To NUCs?

July 29, 2015 by Michael  
Filed under Computing

Intel is expected to upgrade its Compute Stick and NUC solutions to Skylake processors starting October.

ECS, Gigabyte, Asustek and ASRock are expected to launch related products.

Sales for the Compute Stick and NUC have been rising and it appears that Intel sees gold in the mini PC segment’s potential. NUC s are seeing stable demand in Japan, China, Southeast Asia, Latin America and Europe.

Intel is set to release solutions with its new Core m5/m3 processors codenamed Cedar City in the fourth quarter for the Compute Stick.

The new Compute Stick will feature 4GB of memory, 64GB of storage space and support Ultra HD. It will be based around the Core m3-6Y30 processor, which is set to release in October. It will also have Windows 10.

The version with the  Core m5-6Y57 vPro processor, will not come with a pre-installed operating system. In the first quarter of 2016, Intel is planning to launch inexpensive Atom x5 processors.

In November, Intel will launch two Skylake-based processors codenamed Swift Canyon, specifically for the NUC segment and will release high-end Core i7 processors at the end of the first quarter 2016 to improve the product line’s specifications and functions.

Courtesy-Fud

Car And Pedestrian Collision App Coming Soon

July 29, 2015 by mphillips  
Filed under Mobile

A safety system that links vehicles and smartphones to stop those heart-stopping near misses between cars and pedestrians could be standardized by the end of this year.

The technology involves smartphones broadcasting data over a short-range radio channel to nearby cars, so the cars can determine if a collision is likely. Unlike today’s radar-based systems, this has the ability to warn around blind corners and can alert both the driver and pedestrian.

It’s being developed by engineers at Honda and was demonstrated last week at the company’s new research and development center in Mountain View, Calif., the heart of Silicon Valley.

In the demonstration that took place in a parking lot, a car was slowly cruising a row looking for a space. Ahead, and unseen to the driver, a pedestrian was walking between a car and SUV while listening to music, and was about to step into the path of the oncoming vehicle.

Seconds before the pedestrian could emerge and the two come close to collision, an alert sounded in the car: “Distracted pedestrian” and a warning appeared on the car’s LCD screen to brake. The pedestrian too got a similar alert, telling him to watch out. If the driver hadn’t hit the brakes, the car would have automatically come to a halt.

Honda has been working on the technology for three years and the first iteration is expected to be submitted for standardization around the end of this year, said Sue Bai, a principal engineer at Honda R&D, who has been developing it.

he communication takes place over a channel in the 5.9GHz band that is dedicated for intelligent transportation systems. That’s a frequency not used in current smartphones, but close enough that Qualcomm engineers were able to come up with a firmware modification so that it works on an off-the-shelf handset. No custom hardware is required in the phone.

 

 

Samsung To Sell Monitor That Can Wirelessly Charge Smartphones

July 28, 2015 by mphillips  
Filed under Consumer Electronics

Samsung Electronics wants to unclutter your home with a monitor that can wirelessly charge smartphones and other mobile devices.

The SE370 monitor will come in 23.6-inch and 27-inch formats and is the industry’s first to have an integrated wireless charging station, the South Korean manufacturer said Monday.

But your phone will have to support the Qi wireless charging standard, which was developed by the Wireless Power Consortium (WPC) and is supported by makers such as Samsung, Sony, LG, HTC and Huawei.

The charging area is on the stand for the monitor, and an LED lights up when it’s in use. The monitor has a 1920 x 1080 resolution and is optimized for video games, with richer black hues when it’s in game mode. The screen will not distort graphics with stutter and lag and has a response time of 4 milliseconds, Samsung said.

Compatible with Mac OS X and Windows 10, the SE370 also has an eye-saver mode that reduces blue light, which is believed to cause eye strain and sleep problems.

Samsung did not provide information about pricing or availability for the SE370 monitor and did not immediately respond to a request for more information.

The company’s Galaxy S6 and GS6 edge flagship smartphones support the Qi and rival Power Matters Alliance (PMA) standards for wireless charging. Earlier this year, Samsung released its own branded charging pad to juice them up.

The latest Qi specification, announced last month, will allow manufacturers to provide much faster wireless power charging options than earlier versions.

The platform has also caught on with makers such as Ikea, which launched a collection of furniture in April with built-in Qi-enabled wireless chargers.

Qi had been competing with PMA and the Alliance for Wireless Power (A4WP). Following a decision earlier this year, however, the two organizations announced their merger in June, with a new name yet to be decided.

 

 

Can OSX Make Macs Vulnerable To Rootkits?

July 28, 2015 by Michael  
Filed under Computing

The software genii at Apple have redesigned their OSX software to allow malware makers to make designer micro-software that can infect Macs with rootkits.

Obviously the feature is one that Apple software experts designed specifically for malware writers, perhaps seeing them as an untapped market.

The bug in the latest version of Apple’s OS X allows attackers root user privileges with a micro code which could be packed into a message.

Security researcher Stefan Esser said that this was the security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications.

The OS X privilege-escalation flaw stems from new error-logging features that Apple added to OS X 10.10. Plainly the software genii did not believe that standard safeguards involving additions to the OS X dynamic linker dyld applied to them because they were protected from harm by Steve Job’s ghost.

This means that attackers to open or create files with root privileges that can reside anywhere in the OS X file system.

“This is obviously a problem, because it allows the creation or opening (for writing) of any file in the filesystem. And because the log file is never closed by dyld and the file is not opened with the close on exec flag the opened file descriptor is inherited by child processes of SUID binaries. This can be easily exploited for privilege-escalation,” Esser said.

The vulnerability is present in both the current 10.10.4 (Yosemite) version of OS X and the current beta version of 10.10.5. Importantly, the current beta version of 10.11 is free of the flaw, an indication that Apple developers may already be aware of the vulnerability.

An Apple spokesman said that engineers are aware of Esser’s post of course they did not say they would do anything about it. They will have to go through the extensional crisis involved in realising that their product was not secure or perfect. Then the security team will have to issue orders, signed in triplicate, sent in, sent back, queried, lost, found, subjected to an internal inquiry, lost again, and finally bury it in soft peat for three months and recycled as firelighters.

Courtesy-Fud

Best Buy To Begin Selling Apple Watch In August

July 28, 2015 by mphillips  
Filed under Consumer Electronics

The Apple Watch will go on sale at stores of Best Buy Co Inc, the largest U.S.consumer electronics chain, starting Aug. 7.

The Apple Watch and Apple Watch Sport models will be sold at more than 300 Best Buy stores in time for the holiday shopping season, a spokeswoman for Apple Inc  said.

“Customers love Apple Watch, and we are thrilled to begin offering it at Best Buy,” she said in an email.

Best Buy is the first retailer to sell the watch outside of the Apple retail store.

“The Apple Watch is an important addition to an emerging product category, and we know our customers want it,” Jason Bonfig, senior category officer, said on the Best Buy website.

The company said the product will also be available on its online store BestBuy.com.

The Wall Street Journal first reported that the Apple watch was coming to Best Buy.

Apple Chief Financial Officer Luca Maestri told Reuters earlier this month that sales of the Apple Watch had beat the company’s expectations. He said in the nine weeks since its launch in late April, the device had sold better than either iPhones or iPads over a similar period after their launch.

 

 

Unpatched Vulnerabilities Uncovered In Mobile IE

July 27, 2015 by mphillips  
Filed under Mobile

Security researchers have provided details about four unpatched vulnerabilities in Internet Explorer for Windows Phone because Microsoft has not moved quickly enough to fix them.

The flaws could potentially be exploited to execute malicious code on computers when users visit compromised websites or open specially crafted documents. They were reported through Hewlett-Packard’s Zero Day Initiative (ZDI) program.

HP’s TippingPoint division, which sells network security products, pays researchers for information on unpatched high-risk vulnerabilities in popular software. The company uses the information to create detection signatures, giving it a competitive advantage, but also reports the flaws to the affected vendors so they can be fixed.

The ZDI team gives vendors 120 days to develop fixes before making limited information about the flaws reported to the public. That deadline was apparently reached for the four Internet Explorer vulnerabilities this week.

The ZDI advisories describe the type, impact and general location of the flaws, but intentionally leave out technical details that could help attackers create exploits for them. In other words, they don’t classify as full disclosure.

Three of the new ZDI advisories don’t have sufficient information for other researchers or hackers to easily rediscover the issues, said Carsten Eiram, the chief research officer at vulnerability intelligence firm Risk Based Security, via email. The fourth one, however, is a bit more detailed, he said.

That advisory, tracked as ZDI-15-359, covers a vulnerability that was used by security researcher Nicolas Joly during the Mobile Pwn2Own hacking contest organized by ZDI in November last year. As part of the contest rules, researchers disclose the vulnerabilities they use with ZDI, which then shares them with the affected vendors.

Microsoft said in an emailed statement that it would take “appropriate steps” to protect its customers, but noted that no attacks had been reported so far.

 

 

 

Will Oracle Make Money Off Android?

July 27, 2015 by Michael  
Filed under Computing

Database outfit Oracle’s moves to try and copyright APIs appear to be part of an attempt for Oracle to make money on Android.

Oracle has asked a U.S. judge for permission to update its copyright lawsuit against Google to include the Android which it claims contains its Java APIs.

Oracle sued Google five years ago and is seeking roughly $1 billion in copyright claims if it manages to convince a court that its APIs are in Android it could up the damages by several billions.

Oracle wrote in a letter to Judge William Alsup on Wednesday that the record of the first trial does not reflect any of these developments in the market, including Google’s dramatically enhanced market position in search engine advertising and the overall financial results from its continuing and expanded infringement.

Last month, the US Supreme Court upheld an appeals court’s ruling that allows Oracle to seek licensing fees for the use of some of the Java language. Google had said it should use Java APIs without paying a fee.

Courtesy-Fud

 

Cloud Services Behind Amazon’s Rising Revenue

July 27, 2015 by mphillips  
Filed under Around The Net

Amazon.com Inc’s shares surged more than 20 percent last Friday, adding more than $46 billion to the company’s market value, after strong growth in the e-commerce giant’s cloud business drove a surprise quarterly profit.

The company’s market capitalization soared to more than $270 billion, overtaking that of Wal-Mart Stores, the world’s biggest retailer.

Revenue from Amazon’s cloud operations – Amazon Web Services (AWS) – nearly doubled in the second quarter, indicating that the business was poised to drive sustainable earnings for the online retailer, Wall Street analysts said.

Operating margins at the unit jumped to 21.4 pct from 7.7 percent.

“Product sales are Amazon’s bread, but AWS is its butter,” Wedbush Securities analyst Michael Pachter said in a note, raising his price target on the stock by 21 percent to $700.

“They delivered a pretty large profit, we expected a loss … they exercised discipline and did not invest in new consumer electronic product launches.”

Investors have raised concerns that the company’s aggressive spending may not pay off. But strong growth in AWS and positive commentary on the Amazon Prime service allayed some worries.

Amazon Prime members, who pay $99 a year for speedier delivery and exclusive access to certain movies, music and Kindle books, tend to spend more than regular users of Amazon’s services.

“The scale of their distribution network is starting to generate better incremental margins,” Barclays analyst Paul Vogel said.

“That, coupled with the continued strong growth in both revenue and margins at AWS, moves us from cautious to optimistic on the next year of growth for Amazon.”

Amazon, which last reported a profit in the fourth quarter of 2014, considers AWS its main engine of growth, along with Amazon Prime and Marketplace, where the company acts as a middleman for third-party vendors.