“All spots in the Explorer Program have been claimed for now, but if you missed it this time, don’t worry,” the Google Glass team wrote on its blog on Wednesday.
“We’ll be trying new ways to expand the Explorer program in the future.”
Google did not respond to a request for more information, but an earlier post about the one-day sale spoke of brisk sales of the $1,500 Internet-enabled headset.
“We’ve sold out of Cotton (white), so things are moving really fast,” the team wrote.
Aside from the white version, Glass was being offered in shades marketed as Charcoal, Tangerine, Shale (grey) and Sky (blue). Buyers had the choice of their favorite shade or frame. Google announced the one-day sale available to all U.S. residents over 18 last week, adding it wasn’t ready to bring the gizmo to other countries. Shoppers who missed it have to sign up for updates at the Glass website.
Only a few thousand early adopters and developers had Glass before the one-day sale, which coincided with a major software update for the heads-up display that put video calling on hold.
An official launch of Google Glass may happen later this year.
The Red Hat Summit kicked off in San Francisco on Tuesday, and continued today with a raft of announcements.
Red Hat launched a new fork of Red Hat Enterprise Linux (RHEL) with the title “Atomic Host”. The new version is stripped down to enable lightweight deployment of software containers. Although the mainline edition also support software containers, this lightweight version improves portability.
This is part of a wider Red Hat initiative, Project Atomic, which also sees virtualisation platform Docker updated as part of the ongoing partnership between the two organisations.
Red Hat also announced a release candidate (RC) for Red Hat Enterprise Linux 7. The beta version has already been downloaded 10,000 times. The Atomic Host fork is included in the RC.
Topping all that is the news that Red Hat’s latest stable release, RHEL 6.5 has been deployed at the Organisation for European Nuclear Research – better known as CERN.
The European laboratory, which houses the Large Hadron Collider (LHC) and was birthplace of the World Wide Web has rolled out the latest versions of Red Hat Enterprise Linux, Red Hat Enterprise Virtualisation and Red Hat Technical Account Management. Although Red Hat has a long history with CERN, this has been a major rollout for the facility.
The logging server of the LHC is one of the areas covered by the rollout, as are the financial and human resources databases.
The infrastructure comprises a series of dual socket servers, virtualised on Dell Poweredge M610 servers with up to 256GB RAM per server and full redundancy to prevent the loss of mission critical data.
Niko Neufeld, deputy project leader at the Large Hadron Collider, said, “Our LHCb experiment requires a powerful, very reliable and highly available IT environment for controlling and monitoring our 70 million CHF detectors. Red Hat Enterprise Virtualization is at the core of our virtualized infrastructure and complies with our stringent requirements.”
Other news from the conference includes the launch of Openshift Marketplace, allowing customers to try solutions for cloud applications, and the release of Red Hat Jboss Fuse 6.1 and Red Hat Jboss A-MQ 6.1, which are standards based integration and messaging products designed to manage everything from cloud computing to the Internet of Things.
“We know you want features that allow you to move as seamlessly as possible between Office Online and the desktop,” wrote Kaberi Chowdhury, an Office Online technical product manager, in a blog post Monday.
Improvements to Excel Online include the ability to insert new comments, edit and delete existing comments, and properly open and edit spreadsheets that contain Visual Basic for Applications (VBA) code.
Meanwhile, Word Online has a new “pane” where users can see all comments in a document, and reply to them or mark them as completed. It also has a refined lists feature that is better able to recognize whether users are continuing a list or starting one. In addition, footnotes and end notes can now be added more conveniently inline.
PowerPoint Online has a revamped text editor that offers a layout view that more closely resembles the look of finished slides, according to Microsoft. It also has improved performance and video functionality, including the ability to play back embedded YouTube videos.
For users of OneNote Online, Microsoft is now adding the ability to print out the notes they’ve created with the application.
Microsoft is also making Word Online, PowerPoint Online and OneNote Online available via Google’s Chrome Web Store so that Chrome browser users can add them to their Chrome App launcher. Excel Online will be added later.
The improvements in Office Online will be rolled out to users this week, starting Monday.
Office Online, which used to be called Office Web Apps, competes directly against Google Docs and other browser-based office productivity suites. It’s meant to offer users a free, lightweight, Web-based version of these four applications if they don’t have the desktop editions on the device they’re using at that moment.
The revisions more explicitly spell out the manner in which Google software scans users’ emails, both when messages are stored on Google’s servers and when they are in transit, a controversial practice that has been at the heart of litigation.
Last month, a U.S. judge decided not to combine several lawsuits that accused Google of violating the privacy rights of hundreds of millions of email users into a single class action.
Users of Google’s Gmail email service have accused the company of violating federal and state privacy and wiretapping laws by scanning their messages so it could compile secret profiles and target advertising. Google has argued that users implicitly consented to its activity, recognizing it as part of the email delivery process.
Google spokesman Matt Kallman said in a statement that the changes “will give people even greater clarity and are based on feedback we’ve received over the last few months.”
Google’s updated terms of service added a paragraph stating that “our automated systems analyze your content (including emails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.
Mark Karpeles, the founder of Mt. Gox, has refused to come to the United States to answer questions about the Japanese bitcoin exchange’s U.S. bankruptcy case, Mt. Gox lawyers told a federal judge on Monday.
In the court filing, Mt. Gox lawyers cited a subpoena from the U.S. Department of Treasury’s Financial Crimes Enforcement Network, which has closely monitored virtualcurrencies like bitcoin.
“Mr. Karpeles is now in the process of obtaining counsel to represent him with respect to the FinCEN Subpoena. Until such time as counsel is retained and has an opportunity to ‘get up to speed’ and advise Mr. Karpeles, he is not willing to travel to the U.S.”, the filing said.
The subpoena requires Karpeles to appear and provide testimony in Washington, D.C., on Friday.
The court papers also said a Japanese court had been informed of the issue and that a hearing was scheduled on Tuesday in Japan.
Bitcoin is a digital currency that, unlike conventional money, is bought and sold on a peer-to-peer network independent of central control. Its value has soared in the last year, and the total worth of bit coins minted is now about $7 billion.
Mt. Gox, once the world’s biggest bitcoin exchange, filed for bankruptcy protection in Japan last month, saying it may have lost nearly half a billion dollars worth of the virtual coins due to hacking into its computer system.
According to Monday’s court filings, the subpoena did not specify topics for discussion.
In the court filings, Karpelès’ lawyers asked the court to delay the bankruptcy deposition to May 5, 2014 but said that Mt. Gox could not guarantee that Karpeles would attend that either.
Microsoft terminated Windows XP support on Tuesday when it shipped the final public patches for the nearly-13-year-old operating system. Without patches for vulnerabilities discovered in the future, XP systems will be at risk from cyber criminals who hijack the machines and plant malware on them.
During an IRS budget hearing Monday before the House Financial Services and General Government subcommittee, the chairman, Rep. Ander Crenshaw (R-Fla.) wondered why the agency had not wrapped up its Windows XP-to-Windows 7 move.
“Now we find out that you’ve been struggling to come up with $30 million to finish migrating to Windows 7, even though Microsoft announced in 2008 that it would stop supporting Windows XP past 2014,” Crenshaw said at the hearing. “I know you probably wish you’d already done that.”
According to the IRS, it has approximately 110,000 Windows-powered desktops and notebooks. Of those, 52,000, or about 47%, have been upgraded to Windows 7. The remainder continue to run the aged, now retired, XP.
John Koskinen, the commissioner of the IRS, defended the unfinished migration, saying that his agency had $300 million worth of IT improvements on hold because of budget issues. One of those was the XP-to-7 migration.
“You’re exactly right,” Koskinen said of Crenshaw’s point that everyone had fair warning of XP’s retirement. “It’s been some time where people knew Windows XP was going to disappear.”
But he stressed that the migration had to continue. “Windows XP will no longer be serviced, so we are very concerned if we don’t complete that work we’re going to have an unstable environment in terms of security,” Koskinen said.
According to Crenshaw, the IRS had previously said it would take $30 million out of its enforcement budget to finish the migration.
Part of that $30 million will be payment to Microsoft for what the Redmond, Wash. developer calls “Custom Support,” the label for a program that provides patches for critical vulnerabilities in a retired operating system.
Analysts noted earlier this year that Microsoft had dramatically raised prices for Custom Support, which previously had been capped at $200,000 per customer for the first year. Instead, Microsoft negotiates each contract separately, asking for an average of $200 per PC for the first year of Custom Support.
Using that average — and the number of PCs the IRS admitted were still running XP — the IRS would pay Microsoft $11.6 million for one year of Custom Support.
The remaining $18.4 million would presumably be used to purchase new PCs to replace the oldest ones running XP. If all 58,000 remaining PCs were swapped for newer devices, the IRS would be spending an average of $317 per system.
Facebook released its second government requests report covering the second half of 2013, and it expands its scope from the first one in two ways. First, it includes requests to restrict or remove users’ content from the site, whereas the first report was limited to requests for account information. And second, the report now includes data on Instagram, the photo sharing site owned by Facebook.
Facebook is not breaking out the number of Instagram requests; they’re included in the overall tallies. But Instagram’s inclusion speaks to the popularity of the service, which Facebook acquired in 2012 but didn’t include in its government requests report for the first half of 2013.
The report includes data on government requests to receive data about Instagram accounts and to restrict access to its content.
Facebook receives requests to restrict or remove content based on countries’ laws over what can be shared online. When the request is legally sound, Facebook restricts access to content in the specific country whose government objected to it. If Facebook also determines that the flagged content violates its own standards, it removes the content globally. Separately, Facebook also receives requests for account information and data, many of which relate to criminal cases such as robberies or kidnappings.
Facebook does not hand over data every time it receives a government request — sometimes the requests are overly broad or vague, or do not comply with legal standards, the company says.
In the U.S., Facebook received about 12,600 law enforcement requests in the second half of 2013, up from the range of 11,000-12,000 it tallied in its first report. For the second half of 2013, Facebook said it produced data for about 81 percent of the requests.
Regarding U.S. government requests about national security matters, Facebook reported it may have received none or as many as 999, saying it couldn’t be more specific due to U.S. legal restrictions.
Governments in other countries across the world are also interested in Facebook users’ data. India ranked second behind the U.S. with about 3,600 requests targeting more than 4,700 accounts. Facebook produced data for roughly half of those requests.
More than 1,900 requests came from the U.K., while the governments of France, Germany and Italy each served Facebook with more than 1,600 data requests.
Besides Facebook, other companies like Yahoo, Google and Microsoft periodically release their own government request reports, as part of an effort to be more transparent to users. The tallies have taken on increased significance following leaks about U.S. government surveillance made by former contractor Edward Snowden.
BlackBerry Ltd would think about abandoning its handset business if it remains unprofitable, its chief executive officer said on Wednesday, as the technology company looks to expand its corporate reach with investments, acquisitions and partnerships.
“If I cannot make money on handsets, I will not be in the handset business,” John Chen said in an interview, adding that the time frame for such a decision was short. He would not be more specific, but said it should be possible to make money off shipments of as few as 10 million a year.
At its peak, BlackBerry shipped 52.3 million devices in fiscal 2011, while it recorded revenue on less than 2 million last quarter.
Chen, who took the helm of the struggling company in November, said BlackBerry was also looking to invest in or team up with other companies in regulated industries such as healthcare, and financial and legal services, all of which require highly secure communications.
The chief executive said small acquisitions to strengthen BlackBerry’s network security offerings were also possible.
“We are building an engineering team on the service side that is focused on security. We are building an engineering team on the device side that is focused on security. We will do some partnerships and we will probably, potentially do an M&A on security.”
He said security had become more important to businesses and government since the revelations about U.S. surveillance made by former National Security Agency contractor Edward Snowden.
In a wide-ranging interview in New York, Chen acknowledged past management mistakes and said he had a long-term strategy to complement the short-term goals of staying afloat and stemming customer defections.
“You have to live short term. Maybe the prior management had the luxury to bet the world would come to it. I don’t have the luxury at all. I’m losing money and burning cash.”
In March, the embattled smartphone maker reported a quarterly net loss of $423 million and a 64 percent drop in its revenues, underscoring the magnitude of the challenge Chen faces in turning around the company.
Chen said BlackBerry remained on track to be cash-flow positive by the end of the current fiscal year, which runs to the end of February 2015, and to return to profit some time in the fiscal year after that.
Chen said his long-term plans for BlackBerry included competing in the burgeoning business of connecting all manner of devices, from kitchen appliances to automotive consoles to smartphones.
Chen said he was not sure how long it would take for the “machine-to-machine” or “M2M” world to become a mainstream business, but he said he was sure that was coming.
“We are not only interested in managing BlackBerry devices. We are interested in managing all devices that you would like to speak to each other,” he said. “To achieve our dream of being a major player in M2M requires more partnerships with others,” including telecom companies eager to participate.
Based on the firm’s Kabini system on chip (SoC), the APU is named the “AM1 Platform”, combining most system functions into one chip, with the motherboard and APU together costing around between $39 and $59.
Launched at the beginning of March and released today in North America, AMD’s AM1 Platform is aimed at markets where entry-level PCs are competing against other low-cost devices.
“We’re seeing that the market for these lower-cost PCs is increasing,” said AMD desktop product marketing manager Adam Kozak. “We’re also seeing other devices out there trying to fill that gap, but there’s really a big difference between what these devices can do versus what a Windows PC can do.”
The AM1 Platform combines an Athlon or Sempron processor with a motherboard based on the FS1b upgradable socket design. These motherboards have no chipset, as all functions are integrated into the APU, and only require additional memory modules to make a working system.
The AM1 SoC has up to four Jaguar CPU cores and an AMD Graphics Core Next (GCN) GPU, an on-chip memory controller supporting up to 16GB of DDR3-1600 RAM, plus all the typical system input and output functions, including SATA ports for storage, USB 2.0 and USB 3.0 ports, as well as VGA and HDMI graphics outputs.
AMD’s Jaguar core is best known for powering both Microsoft’s Xbox One and Sony’s Playstation 4 (PS4) games consoles. The AM1 Platform supports Windows XP, Windows 7 and Windows 8.1 in 32-bit or 64-bit architectures.
AMD said that it is going after Intel’s Bay Trail with the AM1 Platform, and expects to see it in small form factor desktop PCs such as netbooks and media-streaming boxes.
“We see it being used for basic computing, some light productivity and basic gaming, and really going after the Windows 8.1 environment with its four cores, which we’ll be able to offer for less,” Kozak added.
AMD benchmarked the AM1 Platform against an Intel Pentium J2850 with PC Mark 8 v2 and claimed it produced double the performance of the Intel processor. See the table below.
The FS1b upgradable socket means that users will be able to upgrade the system at a later date, while in Bay Trail and other low-cost platforms the processor is mounted directly to the motherboard.
AMD lifted the lid on its Kabini APU for tablets and mainstream laptops last May. AMD’s A series branded Kabini chips are quad-core processors, with the 15W A4-5000 and 25W A6-5200 clocked at 1.5GHz and 2GHz, respectively.
A surge in cybercrime is forcing security vendors to release security updates every 40 minutes, according to security firm Symantec.
Senior manager for Symantec Security Response, Orla Cox, reported the development during a briefing attended by The INQUIRER.
“We’re seeing more sophisticated attacks than ever before and people want security,” she said. “Nowadays we are rolling out virus signature upgrades around every 40-50 minutes. They are rapid response upgrades that go through partial vetting. We then follow them up with three upgrades per day that are fully certified.”
Cox said Symantec began rolling out the rapid updates to help mitigate the growing number of malware variants and active cyber campaigns targeting its customers.
“It’s been about shaving off minutes for the last couple of years. If you came to us a few years ago it was one [update] and before that it would have taken hours. The rapid updates are for people that need a rapid response, like those suffering an infection.”
She said Symantec blocked 568,700 web attacks on its customers and detected a massive 1.6 million malware variants per day in 2013. But despite helping customers, Cox said the company’s rapid update cycle has increased the risk of pushing out an update with a false positive signature.
“The biggest quality issue we face is the danger of false positive definitions. There’s a risk of detecting something clean as malicious, that’s the big no no in our industry, so it’s as much about building definitions libraries about legit files as malicious,” she said.
False positives are updates from security providers that list legitimate files as malware and block them from running. In the past the faulty updates have caused damage to many companies. In 2013, Malwarebytes crippled thousands of its customers’ machines when it issued a false positive update.
Cox said the influx of new threats has also forced Symantec to expand its analysis procedures in recent years. “We’ve had to evolve how we work, it’s not just about providing protection and moving on any more. Threats and the landscape have changed and to address this we’ve begun doing intelligence work,” she said.
“We do bespoke research on occasion, with both customers and law enforcement. These situations are ones where we have the skills they don’t – that’s the benefit of us being here every day, reverse-engineering malware.
“Doing this over the years we’ve had to develop a number of systems and now we’re trying to understand the individual attacks in the context of who did them and why.”
Symantec is one of many technology firms to begin adopting an intelligence-based approach to cyber defence. Facebook unveiled a new automated ThreatData security service designed to detect and catalogue new malware families earlier in March.
The new Tab A-series tablets, which will ship next month, have screen sizes ranging from 7-10 inches and are designed for Web surfing and home entertainment, Lenovo said. Other than screen sizes and weight, the tablets have mostly identical features.
The cheapest tablet in the lineup is the Tab A7-50, which weighs 320 grams and starts at $129. The TAB A8 weighs 360 grams and is priced starting at $179. The Tab A10 is much heftier at 560 grams, but has a larger battery that offers a Wi-Fi browsing time of eight hours, Lenovo said in a specification sheet.
All the tablets have screens that can display images at a resolution of 1280 x 800 pixels. The tablets have Android 4.2, code-named Jelly Bean, which will be upgradeable to version 4.4, code-named KitKat.
Common features also include Wi-Fi b/g/n, 1GB of RAM, 16GB of storage, and an SD card slot for up to 32GB of expandable storage. The tablets have a 2-megapixel front-facing camera and a 5-megapixel rear camera. Another feature is integrated 3G mobile broadband, though Lenovo did not say whether it was included in the price or is optional.
The tablets will ship in the U.S. Lenovo did not immediately provide information about shipment plans for other countries.
Lenovo offers a range of tablets for Android and Windows 8.1, with models starting at $99. The company is trying to create brands around Android-based Yoga tablets, which are being promoted by actor Ashton Kutcher, and ThinkPad tablets, which run on Windows.
Dubbed Heartbleed, the bug was discoverd in a software library used in servers, operating systems and email and instant messaging systems and allows anyone to read the memory of systems using vulnerable versions of OpenSSL software.
OpenSSL is an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols by which email, instant messaging, and some VPNs are kept secure.
The vulnerability is called Heartbleed because it’s in the OpenSSL implementation of the TLS/DTLS heartbeat extension described in RFC6520, and when it is exploited it can lead to leaks of memory contents from the server to the client and from the client to the server.
The researchers from defense security firm Codenomicon said that attackers could take advantage of the bug to eavesdrop on communications, steal data directly from server or client systems, and impersonate users and servers.
“This compromises the secret keys used to identify service providers and to encrypt the traffic, the names and passwords of the users and the actual content,” the researchers wrote on a website dedicated to the bug.
“Without using any privileged information or credentials, we were able to steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication.”
Because such attacks are not traceable, it’s not clear how widespread the bug is or was, but it is thought that at least two-thirds of websites could be affected, as the most notable software using OpenSSL are the open source webservers Apache and nginx.
The researchers pointed out that the combined market share of those two webservers was over 66 percent of the active websites on the internet, according to Netcraft’s Web Server Survey released this month.
“You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS implementation used to encrypt traffic on the Internet,” the researchers added.
“Your popular social site, your company’s site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL. Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services.”
Although an updated version of OpenSSL has been released to patch this security vulnerability, it might take time before some operating system developers and software distributions deploy it.
“Recovery from this leak requires patching the vulnerability, revocation of the compromised keys and reissuing and redistributing new keys,” the researchers said. “Even doing all this will still leave any traffic intercepted by the attacker in the past vulnerable to decryption.”
The Raspberry Pi Foundation is readying an industrial compute module that will go on sale in early summer.
James Adams, director of hardware at the Raspberry Pi Foundation, said that the upcoming Raspberry Pi Compute Module is a complete Raspberry Pi system that fits it on a 67.6x30mm board.
It is a computer within a computer that is aimed at the Raspberry Pi hobbyist market of people that want to build their own PCB. Less able designers will be treated to a separate Compute Module IO board.
The module board includes 512MB of RAM, a BCM2835 processor and a 4GB eMMC Flash device.
“The Flash memory is connected directly to the processor on the board, but the remaining processor interfaces are available to the user via the connector pins. You get the full flexibility of the BCM2835 SoC (which means that many more GPIOs and interfaces are available as compared to the Raspberry Pi), and designing the module into a custom system should be relatively straightforward as we’ve put all the tricky bits onto the module itself,” said Adams.
“So what you are seeing here is a Raspberry Pi shrunk down to fit on a SODIMM with onboard memory, whose connectors you can customise for your own needs.”
The kits and cards will go online from resellers RS Components and Element14 this June, he added. Bulk orders of 100 will have a unit cost of $30. Individual orders will also be accepted, but they will incur a higher charge.
Adams said that all profits will be plowed back into charity, which is the foundation’s way. Last week it announced a “you raise it and we’ll match it” $1.7 million investment fund for educational projects.
The U.S. Supreme Court has decided not to review a lawsuit challenging the U.S. National Security Agency’s collection of U.S. phone records filed by a conservative activist, despite a lower court’s ruling that the program may be illegal.
The court, without comment, denied the request by activist and former federal prosecutor Larry Klayman, along with Charles and Mary Strange, to immediately hear their case against U.S. President Barack Obama, U.S. Attorney General Eric Holder, NSA Director Keith Alexander, Verizon Communications and Roger Vinson, the judge who signed the order allowing the surveillance.
Klayman had appealed the case directly to the Supreme Court after Judge Richard Leon of the U.S. District Court for the District of Columbia stayed his decision suspending the NSA program, pending appeal by the government.
The case has generated significant attention, with Leon ruling in December that the NSA’s large-scale telephone records collection program likely violates the U.S. Constitution.
Leon wrote that the plaintiffs’ reasonable expectation of privacy may be violated when the government “indiscriminately collects their telephone metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains all of that metadata for five years, and then queries, analyzes, and investigates that data without prior judicial approval of the investigative targets.”
Obama has since talked about ending the phone-records collection program, and several lawmakers have backed legislation that would end the program, but it remains in effect.
The DOJ declined to comment on the Supreme Court’s decision.
Klayman, founder of Judicial Watch, did not immediately respond to a request for comments on the Supreme Court’s decision. The Stranges are parents of Michael Strange, a Navy SEAL who was killed when his helicopter was shot down by Taliban fighters.
A U.S. court has ruled that the Federal Trade Commission can proceed with a lawsuit against hotel group Wyndham Worldwide Corp for allegedly failing to properly secure consumers’ personal information.
Wyndham had argued that the commission did not have jurisdiction to sue over what it saw as lax security leading to data breaches, It had asked for the lawsuit to be dismissed.
Judge Esther Salas, of the U.S. District Court for the District of New Jersey, disagreed and ruled that the FTC should be allowed to proceed with its case.
Wyndham said in a statement that it planned to continue its fight.
“We continue to believe the FTC lacks the authority to pursue this type of case against American businesses, and has failed to publish any regulations that would give such businesses fair notice of any proposed standards for data security,” the company said. “We intend to defend our position vigorously.”
The FTC has accused Wyndham of failing to provide adequate security for its computer system, leading to three data breaches between April 2008 and January 2010. It says the breaches led to fraud worth $10.6 million.
FTC Chairwoman Edith Ramirez said she was “pleased that the court has recognized the FTC’s authority to hold companies accountable for safeguarding consumer data.
“We look forward to trying this case on the merits,” she said.
Wyndham operates several hotel brands, including the value-oriented Days Inn and Super 8. It is one of many organizations to acknowledge in recent years that it had been hacked by people seeking either financial gain or intellectual property.