A recent Chinese-language Economic Daily News report claims that Mediatek wants the spun off business to drive VR sales. It all sounds pretty good but MediaTek have sort of denied the rerport.
Well we say sort of denied it. What it has told the Taiwan Stock Exchange that it was not the report’s source, which is not quite the same thing.The spin off could go ahead, but MediaTek is denying that it told the EDN its cunning plans. But then again the EDN did not name its source either. Without a denial from the company we are none the wiser.
MediaTek’s VR unit was set up between end-2015 and early-2016 to focus on the development of the company’s VR solutions for handsets, the EDN thought.
The SWIFT secure messaging service that underpins international banking announced that it will launch a new security program as it fights to rebuild its reputation in the wake of the Bangladesh Bank heist.
The Society for Worldwide Interbank Financial Telecommunication (SWIFT)’s chief executive, Gottfried Leibbrandt, told a financial services conference in Brussels that SWIFT will launch a five-point plan later this week.
Banks send payment instructions to one another via SWIFT messages. In February, thieves hacked into the SWIFT system of the Bangladesh central bank, sending messages to the Federal Reserve Bank of New York allowing them to steal $81 million.
The attack follows a similar but little-noticed theft from Banco del Austro in Ecuador last year that netted thieves more than $12 million, and a previously undisclosed attack on Vietnam’s Tien Phong Bank that was not successful.
The crimes have dented the banking industry’s faith in SWIFT, a Belgium-based co-operative owned by its users.
The Bangladesh Bank hack was a “watershed event for the banking industry”, Leibbrandt said.
“There will be a before and an after Bangladesh. The Bangladesh fraud is not an isolated incident … this is a big deal. And it gets to the heart of banking.”
SWIFT wants banks to “drastically” improve information sharing, to toughen up security procedures around SWIFT and to increase their use of software that could spot fraudulent payments.
SWIFT will also provide tighter guidelines that auditors and regulators can use to assess whether banks’ SWIFT security procedures are good enough.
Leibbrandt again defended SWIFT’s role, saying the hacks happened primarily because of failures at users. “Many of the less protected banks are in countries were skills are really scarce,” he said, pointing the finger at providers of services to banks.
“We will have to create an ecosystem of providers and partners, for example by introducing certification requirements for third-party providers,” he said.
Facebook Inc said that it had made some tweaks to the procedures for its “Trending Topics” section after a news report alleging it suppressed conservative news prompted a U.S. Congressional demand for more transparency.
The company said an internal probe showed no evidence of political bias in the selection of news stories for Trending Topics, a feature that is separate from the main “news feed” where most Facebook users get their news.
But the world’s largest social network said in a blogpost that it was introducing several changes, including elimination of a top-ten list of approved websites, more training and clearer guidelines to help human editors avoid ideological or political bias, and more robust review procedures.
Earlier this month, a former Facebook contractor had accused the company’s editors of deliberately suppressing conservative news. The allegations were reported by technology news website Gizmodo, which did not identify the ex-contractor.
The report led Republican Sen. John Thune to write a letter demanding that the company explain how it selects news articles for its Trending Topics list.
Two days after Thune’s letter, Facebook published a lengthy blogpost detailing how Trending Topics works even though it rarely discloses such practices. Previously, it had never discussed the inner workings of the feature, which displays topics and news articles in the top right hand corner of the desktop homepage for its more than 1.6 billion users.
Facebook said its investigation showed that conservative and liberal topics were approved as trending topics at nearly identical rates. It said it was unable to substantiate any allegations of politically motivated suppression of particular subjects or sources.
But it did not rule out human error in selecting topics.
“Our investigation could not fully exclude the possibility of isolated improper actions or unintentional bias in the implementation of our guidelines or policies,” Colin Stretch, Facebook’s General Counsel, wrote in a company blogpost.
Facebook Chief Executive Mark Zuckerberg met last week with more than a dozen conservative politicians and media personalities to discuss issues of trust in the social network.
Almost every sci-fi telivision program has tablets and monitors which are transparent and it seems that Samsung has finally build them. The only problem is that they are not that great to use.
Samsung unveiled the first commercial installation of its cutting-edge mirror display at an upscale hair salon in Seoul, South Korea. The 55-inch display units act as a mirror while playing media over the mirrored image.
The display represents a (90%) transparent layer over an underlying mirror, and is a genuinely transparent display. The Planar LookThru OLED Series offered something similar but cost too much for the great unwashed to use.
Using Intel 3-D camera technology, Samsung’s displays can also show customers in different hair styles, colors and trends, allowing the hairdressers at the Leekaja Hairbis’ Jamsil salon to provide customized, interactive consultations with their clients. Samsung expects mirror displays to be used in retail, interior design, furniture and fashion markets in the future. Similar 55-inch Samsung mirror displays will be available for purchase worldwide in fall 2016.
The Samsung mirror display ML55E provides 90 per cent transparency and 55 per cent reflectivity, designed to minimize visual distraction and provide clarity, both in the reflective mirror surface and in the media content overlays. It has been suggested that the technology could be a money spinner – one study shows the market for plastic and flexible OLED displays is expected to rise to $16 billion by 2020, with TV and industrial/professional use to make up half of the market share.
But the tech is still pretty expensive. One unbranded transparent OLED screen will set you back $1190.00. But there is another problem. Transparent OLED displays might work in sci-fi movie directors, but that is because they allow the camera to interact better with actors in a hard to film situation. Practically though see-through displays which have no touch capability are all really only useful in the exhibition sector.
The changes will be aimed at enterprises, the only customer group Microsoft recommends running IE11 in the new operating system.
“We recognize that some enterprise customers have line-of-business applications built specifically for older web technologies, which require Internet Explorer 11,” the company said in a blog post.
Previously, Microsoft included “Enterprise Mode” in Windows 10, a feature that lets an IT staff limit IE11′s operation to specific legacy websites or web apps.
Starting with the Anniversary Update — Microsoft’s name for the one major upgrade it will deliver for 10 this year — the “interstitial” page, one that pops up between running Edge and IE11 when Enterprise Mode kicks in, will vanish.
Currently, a switch from Edge to IE11 opens a page that states, “This website needs Internet Explorer 11″ before IE11 fires up. With the Anniversary Update, the interstitial will no longer appear: IE11 will simply open atop Edge when the user steers to a site or app on the Enterprise Mode whitelist.
The same no-interstitial-page behavior will take place when a worker running IE11 types in an URL that is not on the list: Edge will open without a pause.
Microsoft will also introduce a new group policy for IE11 that will limit the browser’s use to only those sites on the whitelist, barring users from running IE11 for the bulk of their browsing. “Enabling this setting automatically opens all sites that are not included in the Enterprise Mode Site List in Microsoft Edge,” Microsoft said.
IE and Edge have a rapidly-shrinking share of the browser market, but the former will remain important to businesses with older apps and customized internal sites, which unless rewritten will require the older browser. Together, IE and Edge were run by 41.3% of the world’s users in April, a new low that dropped Microsoft into second place behind Google’s Chrome browser.
The SWIFT network itself is still secure, it insisted in a letter to banks and financial institutions. However, some of its customers have suffered security breaches in their own infrastructure, allowing attackers to fraudulently authorize transactions and send them over the SWIFT network, it said.
That’s the best explanation so far for how authenticated instructions were sent from Bangladesh Bank to the U.S. Federal Reserve Bank of New York over the SWIFT network, ordering the transfer of almost $1 billion. The Fed transferred around $101 million of that before identifying an anomaly in one of the instructions. Only $20 million of that has so far been recovered.
“While customers are responsible for the security of their own environment, security is our top priority and as an industry-owned cooperative we are committed to helping our customers fight against cyber-attacks,” SWIFT said in the letter.
SWIFT wants its customers to come forward with information about other fraudulent transfers made using their SWIFT credentials, to help it build a picture of how the attackers are working.
It’s making more than a polite request: It reminded its customers that they have an obligation to provide such information under the terms of their contract, and also to help SWIFT identify, investigate and resolve problems, including by providing diagnostic information following an incident.
SWIFT promised its customers it would share new information about malware or other indicators of compromised systems. It said it would add such information to a restricted section of its website, tacking it onto knowledge base tip number 5020928, “Modus Operandi related to breaches in customer’s environment.”
Nvidia has been talking about its Tesla M10 GPU designed to run on the latest version of the company’s GRID technology.
For those who came in late, GRID technology is supposed to give servers a kick in the graphics back-end. It powers virtual desktops and support cloud-powered gaming.
Nvidia says the Tesla M10 GPU can support up to 64 desktops per board and 128 per server with two boards. This means shedloads of virtual machines which are potentially dead and alive.
The new graphics card ccan support Citrix’s XenApp and virtual PCs running Windows, or power virtual workstations that need the performance for professional graphics work.
The M10 is a bit like the M6 and M60 as a GPU accelerator – unlike the M10 motorway which is a disappointingly short road connected the M1 to the A414 just south of St Albans.
Companies making use of virtual machines or looking to substitute hardware for more efficient virtual systems can access the GRID and Tesla tech for less than $2 per month per user for use with virtual apps and remote desktop sessions, and the firm will provide virtual PCs for less than $6 per month per user.
The company was rumored to have been designing its own chip, based partly on job ads it posted in recent years. But until today it had kept the effort largely under wraps.
It calls the chip a Tensor Processing Unit, or TPU, named after the TensorFlow software it uses for its machine learning programs. In a blog post, Google engineer Norm Jouppi refers to it as an accelerator chip, which means it speeds up a specific task.
At its I/O conference Wednesday, CEO Sundar Pichai said the TPU provides an order of magnitude better performance per watt than existing chips for machine learning tasks. It’s not going to replace CPUs and GPUs but it can speed up machine learning processes without consuming a lot more more energy.
As machine learning becomes more widely used in all types of applications, from voice recognition to language translation and and data analytics, having a chip that speeds those workloads is essential to maintaining the pace of advancements.
The TPU is in production use across Google’s cloud, including powering the RankBrain search result sorting system and Google’s voice recognition services. When developers pay to use the Google Voice Recognition Service, they’re using its TPUs.
Urs Hölzle, Google’s senior vice president for technical infrastructure, said during a press conference at I/O that the TPU can augment machine learning processes but that there are still functions that require CPUs and GPUs.
Google started developing the TPU about two years ago, he said.
Right now, Google has thousands of the chips in use. They’re able to fit in the same slots used for hard drives in Google’s data center racks, which means the company can easily deploy more of them if it needs to.
Figures from Mercury Research show that AMD appears to be clawing back some market share.
Of course market share does not mean profits, but it is the sort of news that AMD needs. Particularly, it does not appear that AMD is doing that much.
Mercury Research’s latest GPU market report, show that in the first quarter overall graphics unit volumes declined by 10.2 per cent in comparison to last year. However AMD gained discrete GPU market share.
This surge was on the back of AMD’s Radeon R9 Series GPUs as well as AMD’s revitalised driver development strategy. It clawed back 1.8 share points in desktop discrete graphics (that is 22.7 per cent) and 7.3 share point jump in notebook discrete, moving to 38.7 per cent share. Better than a poke in the eye with a short stick and could provide a bit of momentum when AMD’s next generation Polaris Architecture-based 14nm discrete graphics products are released this quarter.
The findings confirm what Wells Fargo analyst David Wong said earlier this week. He added that AMD has modeled for sequential growth, but Nvidia has guided for a 10 per cent sequential decline in sales for the quarter ended April 2016.
This suggests that what Nvidia has lost has been gained by AMD. If AMD manages to build momentum, it could pose a serious threat to Nvidia and expose the green goblin’s lack of GPU variety in the mid-tier. In order to retain its market share, Nvidia needs to come up with tactics to re-establish its dominance via product differentiation and feature incorporation.
The announcement was posted on a dark market website called TheRealDeal by a user who wants 5 bitcoins, or around $2,200, for the data set that supposedly contains user IDs, email addresses and SHA1 password hashes for 167,370,940 users.
According to the sale ad, the dump does not cover LinkedIn’s complete database. Indeed, LinkedIn claims on its website to have more than 433 million registered members.
Troy Hunt, the creator of Have I been pwned?, a website that lets users check if they were affected by known data breaches, said it’s highly likely for the leak to be legitimate. He had access to around 1 million records from the data set.
“I’ve seen a subset of the data and verified that it’s legit,” Hunt said.
LinkedIn suffered a data breach back in 2012, which resulted in 6.5 million user records and password hashes being posted online. It’s highly possible that the 2012 breach was actually larger than previously thought and that the rest of the stolen data is surfacing now.
LinkedIn did not immediately respond to a request for comment.
Attempts to contact the seller failed, but the administrators of LeakedSource, a data leak indexing website, claim to also have a copy of the data set and they believe that the records originate from the 2012 LinkedIn breach.
When the 6.5 million LinkedIn password hashes were leaked in 2012, hackers managed to crack over 60 percent of them. The same thing is likely true for the new 117 million hashes, so they cannot be considered safe.
Worse still, it’s very likely that many LinkedIn users that were affected by this leak haven’t changed their passwords since 2012. Hunt was able to verify that for at least one HIBP subscriber whose email address and password hash was in the new data set that is now up for sale.
Many people affected by this breach are also likely to have reused their passwords in multiple places on the Web, Hunt said via email.
Alphabet’s Google Inc introduced us to its answer to Amazon’s Alexa virtual assistant along with new messaging and virtual reality products at its annual I/O developer conference on Wednesday, doubling down on artificial intelligence and machine learning as the keys to its future.
Google Chief Executive Sundar Pichai introduced Google Assistant, a virtual personal assistant, along with the tabletop speaker appliance Google Home.
He also unveiled Allo, a new messaging service that will compete with Facebook’s WhatsApp and Messenger products and feature a chatbot powered by the Google Assistant. Allo, like WhatsApp, will also have end-to-end encryption when it is rolled out this summer.
Amazon’s Echo, a surprise hit that has other tech giants racing to match it, uses a virtual assistant called Alexa, a cloud-based system that controls the Echo speaker and responds to voice-controlled commands by users.
Like Alexa, Google Assistant can search the internet and adjust your schedule. However, Pichai said Google Assistant can use images and other information to provide more intuitive results.
“You can be in front of this structure in Chicago and ask Google who designed this and it will understand in this context that the name of that designer is Anish Kapoor,” said Pichai, pointing toward a photo of Chicago’s Cloud Gate sculpture.
For Google Home, the Google Assistant merges with Chromecast and smart home devices to control televisions, thermostats and other products. Google did not offer a specific release date or pricing for Google Home, saying only that it will be available later this year.
The ever shrinking Biggish Blue is working on a cheaper alternative to DRAM by making it denser.
Dubbed phase-change memory (PCM) the technology could give enterprises and consumers faster access to data at lower cost. IBM says it’s achieved a density rating of three bits on each cell, which is 50 percent more than the company showed off in 2011 with a two-bit form of PCM. The denser the RAM is the more capacity can be squeezed out of the pricey tech.
PCM works by changing a glass-like substance from an amorphous to a crystalline form using an electrical charge. Like NAND flash, it keeps storing data when a device is turned off. PCM responds to data requests faster than flash: In less than one microsecond, compared with 70 microseconds.
It also lasts longer than flash, to at least 10 million write cycles versus about 3,000 cycles for an average flash USB stick.
Three-bit PCM could find its niche as a faster tier of storage within arrays, including all-flash arrays, so the most-used data gets to applications faster. It could also take the place of a lot of the DRAM in systems, cutting the cost of technologies like in-memory databases.
IBM said that a customer who stores their OS on three-bit PCM would have their phone up and running a few seconds.
Three-bit PCM needs the backing of a chip maker. IBM wants it for its Power architecture, but that will make it less popular.
Biggish Blue isn’t predicting when three-bit PCM will be in mass-market systems, partly because the company doesn’t make memory and will have to find a partner. It might take two to three years for large-scale availability, the company said.
Nokia has demonstrated the feasibility of 10Gbps symmetrical data speeds over traditional hybrid fibre-coaxial (HFC) cable networks, such as those operated by Virgin Media in the UK.
Trumping BT’s 5Gbps XG.fast trials, Nokia’s prototype technology, called XG-Cable, is still at the proof-of-concept stage, but should easily integrate into the DOCSIS 3.1 suite of specifications focused on providing cable operators with technology innovations to transform the industry.
DOCSIS is the set of standards governing data access over cable TV networks, and DOCSIS 3.1 was designed to enable capacities of 10Gbps downstream, but only 1Gbps upstream. Nokia has taken this a step further by demonstrating that symmetrical speeds of 10Gbps are possible.
The technology is still at an early stage of development and no in-service date has been even floated by Nokia, but the test by Nokia Bell Labs has apparently demonstrated that the technology is viable using existing HFC cable networks, where fibre-optic cable is used to connect to cabinets on the street and coaxial copper cable lines are used for last-leg distribution to the customer premises.
XG-Cable means that cable operators will at some point in the future be able to use existing HFC cables in the last 200 meters to provide upstream speeds never before achievable owing to the limited spectrum available, according to Nokia.
This will enable the provision of ultra-fast broadband services to consumer locations that were not physically or economically viable unless fiber was brought all the way to the premises.
“The XG-Cable proof-of-concept is a great example of our ongoing effort and commitment to provide the cable industry with the latest innovations and technology needed to effectively address the growing demand for gigabit services,” said Federico Guillén, president of fixed networks at Nokia.
“The proof-of-concept demonstrates that providing 10Gbps symmetrical services over HFC networks is a real possibility for operators. It is an important achievement that will define the future capabilities and ultra-broadband services cable providers are able to deliver.”
This tiny robot would be swallowed inside a capsule and then, once inside the patient’s stomach, it would unfold itself and then crawl across the stomach to repair a wound or remove a swallowed button battery, for instance.
“It’s really exciting to see our small origami robots doing something with potential important applications to health care,” said Daniela Rus, an MIT professor who also directs the university’s Computer Science and Artificial Intelligence Laboratory, in a statement. “For applications inside the body, we need a small, controllable, untethered robot system. It’s really difficult to control and place a robot inside the body if the robot is attached to a tether.”
So far, the robot has been tested on a synthetic stomach, made of silicone rubber and based on the mechanics of the stomach and esophagus of a pig.
For several years now, robots have been used in operating rooms to assist with surgeries.
This is the first time researchers have closed in on building a robot that could work from the inside of the body.
The research is being done by a group of scientists from MIT, the University of Sheffield, in England, and the Tokyo Institute of Technology.
MIT reported that the robot moves itself over the surface of the stomach by what they call a “stick-slip” motion.
That means the robot’s appendages are made to stick to the surface using friction, but then slips free when its body flexes to make another move.
But that’s not the only way the robot moves around.
MIT noted that since the human stomach is filled with fluids, 20% of the robot’s forward motion is by propelling water or thrust.
Once in the stomach, the robot doesn’t have to work its way out of the capsule it was swallowed in. The capsule itself is designed to dissolve, automatically freeing the robot.
The robot, rectangular in shape, is designed with accordion-like folds with a magnet on one of the folds that responds to magnetic fields outside the body. Using that magnet, doctors could manipulate the motion of the robot, moving it to where it needs to go.
So what is this robot made of?
It’s built of the same dried pig intestine that is used in sausage casings, according to MIT.
Twitter Inc users will soon have more flexibility in posting tweets because the company plans to discontinue including photos and links as part of its 140-character limit, according to a Bloomberg report.
The social media platform has faced stagnant user growth. Months earlier, Twitter Chief Executive Jack Dorsey said the company would simplify its product in an effort to attract new users.
“We think there’s a lot of opportunity in our product to fix some broken windows that we know are inhibiting growth,” Dorsey said during a February earnings call.
Links currently take up to 23 characters of a tweet, limiting the amount of commentary that users can offer when sharing articles or other content.
Twitter has faced stagnant user growth, and shares have fallen more than 70 percent over the past year.
Twitter declined to comment on the report.