Dell has merged its SonicPoints with Dell SonicWALL next-generation firewalls to create what it claims are secure wireless networks. According to the company, the Dell SonicWALL firewalls automatically detects and provision SonicPoints, while it pushes appropriate security updates as well as policies to ensure enterprise-class security.
Of course, it also claims to simplify management, deliver a lower TCO and protect you from badgers at the same time. But it is a pretty interesting product. The SonicPoint AC Series of wireless access points would be able to support the high-performance IEEE 802.11ac wireless standard in order to offer close to three times that of the last wireless standard (802.11n).
SonicPoints will offer deep packet inspection security from Dell SonicWALL next-generation firewalls. This opens the door for small- and mid-sized organizations to leverage enterprise-class wireless performance and security, all the while simplifying wireless network setup and management.
With enterprise-level performance, WiFi-ready devices are able to hook up from greater distances, while making use of bandwidth-intensive mobile apps, including video and voice, working in higher-density environments with virtually no signal degradation.
“While the Internet of Things (IoT) conjures a vision of ‘anytime, any place’ connectivity for all things, the realization is complex given the need to work across interconnected and heterogeneous systems, and the special considerations needed for security, privacy, and safety,” co-wrote Google chief Internet evangelist Vint Cerf, in a blog post announcing the research program.
The ”Internet of Things” is technical shorthand describing what is expected to be a mass wave of portable devices and sensors that will gather information and send it over the Internet for purposes of analysis and monitoring. Over 50 billion things will be connected to the Internet by 2020, Cisco has estimated.
Google plans to issue two sets of awards, both meant to fuel work to be carried out over a year.
One set of grants will be for larger team projects that Google will pay between $500,000 and $800,000 to see completed. Google expects that the work could be undertaken either by an academician leading a team of researchers or by a graduate student “willing to dedicate a substantial portion of their research time to this expedition,” according to Google’s request for proposals document.
A smaller set of grants, ranging from $50,000 to $150,000, will also be given out. For these grants, Google is looking for “new and unorthodox solutions” in user interface and application development, in privacy and security, and in systems and protocols research, according to the blog post.
Instagram, which launched in 2010, edged past 8-year-old Twitter and its reported 284 million monthly active users.
Facebook, which bought Instagram in 2012 for $1 billion, has nothing to worry about. In September, the social network reported that its own active monthly user base had hit 1.35 billion.
“Over the past four years, what began as two friends with a dream has grown into a global community that shares more than 70 million photos and videos each day,” wrote Instagram CEO Kevin Systrom in a blog post. “We’re thrilled to watch this community thrive and witness the amazing connections people make over shared passions and journeys.”
Zeus Kerravala, an analyst with ZK Research, said Instagram’s impressive growth stems from its popularity with millennials, who have a strong connection with social networking, selfies and images.
“The younger generation, in particular, is a very visually oriented group that loves selfies,” Kerravala said. “Pictures just say more — they’re fast and easy. Instead of saying, ‘What a great view of the Grand Canyon,’ snap a photo and upload it.”
He noted that Twitter users can upload photos and short videos to the micro-blogging site, but the site is mainly used for its 140-character or less messages.
“I think Twitter is more for information dissemination, where Instagram is more about sharing content,” Kerravala said.
Chief Operating Officer Kevin Turner told Japanese news service Nikkei on Wednesday that the new system would be released “early next fall.”
Microsoft has not publicly set a firm timetable for the release of Windows 10, but only last week suggested the possibility of an earlier release.
“By next late summer and early fall we’ll be able to bring out this particular OS (operating system). That’s the current plan of record,” Turner told the Credit Suisse Technology Conference last Thursday.
An autumn release would put Windows 10 on track for launch three years after Windows 8, which got a mixed reception as it confused many traditional PC users with a design more suited to tablets.
Microsoft unveiled the name Windows 10 in late September, saying the jump in numbers from 8 to 10 marked a leap as it looks to unify the way people work on tablets, phones and traditional computers.
An early test version of Windows 10 – which blends the traditional look and much-loved start menu with newer features – has been available for download from Microsoft’s website for more than two months.
Windows is still a core part of Microsoft’s business and dominates the desktop computing market with 1.5 billion users. But the growth of smartphones and tablets means Windows now runs on only about 14 percent of computing devices worldwide, according to tech research firm Gartner.
Intel’s platform is like a set of building blocks based on the chipmaker’s components and software for companies to create smart, connected devices, Doug Davis, head of Intel’s Internet of Things business, said at a launch event in San Francisco.
It also aims to make it easier to connect to data centers in order analyze data collected from devices’ sensors.
“We’re creating compute capability in end-point devices that scale from our highest performance Xeon processor to the Quark family of products,” Davis said, referring to Intel’s chips.
After moving slowly in recent years to adapt its personal computer chips for smartphones and tablets, Intel is determined to make sure it is on the leading edge of future computing trends, industry experts and company executives have said.
Adding processors, sensors and web connectivity to devices from soccer balls to industrial machinery, an emerging trend dubbed the Internet of Things, has become a new battleground for Intel, rival Qualcomm and other technology companies.
The install base of wireless gadgets will more than double by the end of the decade, with most of the growth coming from smart devices other than PCs and smartphones, according to market research firm ABI Research.
Intel’s Internet of Things Group had $530 million in revenue in the September quarter. That accounted for just 4 percent of Intel’s total revenue in the quarter, but it grew 14 percent over the previous year, which was faster than the company’s PC business.
Dell, SAP, Tata Consultancy, Accenture and other companies are working with the new reference model, Davis said.
Michael Fey has left Intel Security Group to become chief operating officer at Blue Coat. Blue Coat is apparently not the traditional garb of a British Holiday Camp entertainer, but apparently a privately owned network security company.
Fey was one of the few top McAfee managers to stay with the company after it was bought by Intel in 2011. McAfee is now part of Intel Security Group, where Fey had been chief technology officer. Fey said that his role at Blue Coat would be “very similar” to his old job but he was allowed to focus on the cloud and the advanced threats space more.
“Blue Coat had tremendous growth behind the scenes and now I get to focus on taking that growth and trying to get it to the billion-dollar revenue mark,” he told Reuters.
Since the $7.7 billion acquisition by Intel, McAfee has lost senior managers and key talent in technology development, research and sales. At Blue Coat, Fey will replace David Murphy, who will stay on as a strategic adviser to the board.
Dell got back to us about the Dell Venue 8 7000 tablet following our recent article, in which we pointed up that it has yet to ship. The company said the tablet will officially launch at CES 2015.
This is the tablet that Michael Dell held in his hand at IDF 2014 in September and later Jim Parsons promoted the sleek device in a commercial that aired less than two weeks ago.
“The Venue 8 7000 – the world’s thinnest at 6mm, with the world’s best display (2560 x 1600 OLED) and the first RealSense depth camera integrated into such a small form factor – is going to be officially announced with pricing and availability at CES.”
It cannot be clearer than that, but we would be a tad happier to know what sort of SoC Intel uses in this tablet is and it would be great to know the price. There is still a chance that this will be the thinnest tablet by the time it actually launches, although we don’t think that Dell will be the only brand launching new products at CES.
The competition never sleeps and after a lot of digging around the most serious candidate for the SoC inside the ultrathin tablet is the Intel Atom Z3580, a 22nm processor previously codenamed Moorefield. This SoC is a quad-core clocked at up to 2.33GHz and based on the Silvermont architecture. The prototype that Dell showed back at IDF 2014 and Dell World was running Android 4.4 and Morefield Atom Z35xx has been confirmed as the SoC of choice.
Moorefield is ready for 64-bit Android 5.0 and this might be the reason behind the slight delay. Let’s face it, Lollipop is the biggest Android refresh in years and it’s a big selling point.
There is no doubt that Airmont, the 14nm follow up architecture for mobile Atom has been delayed. In September 2013, Intel’s Hermann Eul, VP GM mobile communication group announced that Airmont 14nm Atom is coming in 2014. Well it didn’t show up and it won’t as 2014 is coming to an end.
The 14nm Airmont based Cherry Trail product has been pushed to 2015, so if all goes well Dell might be launching an updated Venue tablet later in 2015, powered with a new and improved Atom processor.
More than a week after a massive cyber attack on Sony Pictures Entertainment, the Hollywood studio isstill struggling to restore some systems as investigators searched for evidence to identify the culprit.
Some employees at the Sony Corp entertainment unit were given new computers to replace ones that had been attacked with the rare data-wiping virus, which had made their machines unable to operate, according to a person with knowledge of Sony’s operations.
In a memo to staff seen by Reuters, studio co-chiefs Michael Lynton and Amy Pascal acknowledged that “a large amount of confidential Sony Pictures Entertainment data has been stolen by the cyber attackers, including personnel information and business documents.”
They are “not yet sure of the full scope of information that the attackers have or might release,” according to the memo first reported by Variety, and encouraged employees to take advantage of identity protection services being offered.
Their concern underscores the severity of the breach, which experts say is the first major attack on a U.S. company to use a highly destructive class of malicious software that is designed to make computer networks unable to operate.
Government investigators led by the FBI are considering multiple suspects in the attack, including North Korea, according to a U.S. national security official with knowledge of the investigation.
The FBI said Tuesday that it is working with its counterparts in Sony’s home country of Japan in the investigation.
That comes after it warned U.S. businesses on Monday about hackers’ use of malicioussoftware and suggested ways to defend themselves. The warning said some of the software used by the hackers had been compiled in Korean, but it did not discuss any possible connection to North Korea.
“Our goal is to deliver fantastic cross-platform apps that support the variety of email services people use today and help them accomplish more,” wrote Rajesh Jha, Microsoft corporate vice president for Outlook and Office 365, in a blog post announcing the purchase.
Over the past year, Microsoft has been extending its Office set of office productivity software and services so they can be accessed on non-Windows devices. The company has released Office apps for the iPad and iPhone, and is working on a version of Office for Android.
Founded in 2013, Acompli offers an iPhone and Android mobile e-mail client that streamlines many of the basic tasks around managing e-mail so they can be completed on the device itself, rather than by using a desktop client. Users have reported that the software works particularly well with Microsoft’s Exchange e-mail servers. Microsoft offers a basic version of Outlook for iPhones, though thus far it has seemingly garnered only a lukewarm response from users.
The free Acompli app offers advanced features such as the ability to view both calendar items and email side by side on the same screen. The calendar lets users email available times for proposed meetings and send a message when they are running late.
Microsoft plans to pair the Acompli development team with the team for its own Outlook e-mail client.
Terms of the deal were not disclosed, though tech website Re/Code reported that the acquisition was worth more than $200 million.
Intel is offering a safebox technology to internet users suffering from the arduous burden of password fatigue.
The firm has done this by spending money, which is as good a way as any, and has acquired Canadian company PasswordBox which, in case you haven’t guessed, makes a password repository.
Intel did not disclose any financial details about the deal, but said that PasswordBox will be rolled into the firm’s security unit.
“Everyone can relate to password fatigue. The PasswordBox service has already brought relief to millions of consumers who now enjoy simple, instant log-in,” said Chris Young, senior vice president and general manager of Intel Security.
“Intel Security and PasswordBox share the same goal of improving digital identity protection across all devices and platforms. We believe we have the technology, expertise and reach to bring simple, secure access to consumers worldwide.”
Intel research has found that people are lumbered with over 26 password-needing accounts and rely on a hardcore of five, which is probably a low estimate.
We constantly hear that passwords should not be shared across sites, and barely a week goes by without one provider or another telling its users to change their chosen passkey. Password management, then, is something of a nightmare for some.
Not so for PasswordBox – and now Intel – users, though, as they can rely on what is pitched as a secure vault that is better and more reliable than you are at staying on top of your security.
It offers a form-filling option that punters can effectively put in their pocket and swan around with.
PasswordBox is positive about its prospects. “PasswordBox has spent the last two years building a product that people love, trust and use around the world every day,” said Daniel Robichaud, CEO and co-founder of the firm.
“We share Intel Security’s vision of simple, secure access and identity protection across all platforms and devices.
“Together, we believe we can offer our customers world-class technology, expertise and support to bring such access anywhere – all backed by Intel.”
A McAfee security product that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week.
“Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again,” Skaugen said.
Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.
An average user has about 18 passwords and biometric authentication will make PCs easier to use, Skaugen said.
Biometric authentication isn’t new. It’s being used in Apple Pay, where fingerprint authentication helps authorize credit card payments through the iPhone or iPad. Intel has been working on multiple forms of biometric authentication through fingerprint, gesture, face and voice recognition.
McAfee is owned by Intel, and the chip maker is building smartphone, tablet and PC technology that takes advantage of the security software. Intel has also worked on biometric technology for wearable devices like SMS Audio’s BioSport In-Ear Headphones, which can measure a person’s heart rate.
Intel also wants to make PCs and tablets easier to use through wireless charging, display, docking and data transfers. Such capabilities would eliminate the need to carry power brick and cables for displays and data transfers. Such capabilities will start appearing in laptops next year with sixth-generation Core chips code-named Skylake, which will be released in the second half.
An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.
The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.
Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.
The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”
Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.
Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”
Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.
Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.
One of the better-known sites, Insecam, appeared to have gone offline after the warnings, but at least one site that publishes similar content was still available.
The websites show footage from security cameras used by businesses and in people’s homes, including CCTV networks that secure buildings and even cameras built into baby monitors.
Last week the U.K.’s data protection watchdog warned of a website based in Russia that accesses thousands of webcams using their default logins and passwords, which it said can be easily found online.
The U.S. Federal Trade Commission also weighed in, warning users to ensure video feeds are encrypted and that wireless routers are protected by passwords.
“Once you’ve bought your IP camera, check its security settings and keep its software up-to-date,” wrote Nicole Vincent Fleming, a consumer education specialist with the FTC in a blog post.
Security experts have long warned that not changing the default credentials on such devices can allow them to be accessed by hackers.
The domain name Insecam.cc was registered through GoDaddy earlier this month, though whoever registered it chose to keep their registration details private in the “whois” domain directory.
The U.K. information commissioner has reportedly urged the Russian authorities to take down the site.
Finland’s Nokia unveiled a new brand-licensed tablet computer which is designed to rival Apple’s iPad Mini, just six months after the company sold its underperforming phones and devices business to Microsoft for over $7 billion.
Nokia, a name which was once synonymous with mobile phones until first Apple and then Samsung Electronics eclipsed the Finnish company with the advent of smart phones, said the manufacturing, distribution and sales of the new N1 tablet, will be handled under license by Taiwan’s Foxconn.
The aluminum-cased N1, which runs on Google’s Android Lollipop operating software but features Nokia’s new Z Launcher intelligent home screen interface, is due to be in stores in China in the first quarter of next year for an estimated price of $249 before taxes, with sales to other markets to follow.
Sebastian Nystrom, the head of products at Nokia’s Technologies unit, said the company was looking to follow up with more devices and will also look into eventually returning to the smartphones business by brand-licensing.
“With the agreement with Microsoft, as is customary, we have this transition and we can’t do smartphones … We have a time limit. In 2016 we can again enter that business,” Nystrom told Reuters.
“It would be crazy not to look at that opportunity. Of course we will look at it.”
Microsoft last week dropped the Nokia name on its latest Lumia 535 smartphone, which runs on its Windows Phone 8 operating system, but still uses the brand for more basic phones.
After the Microsoft sale Nokia was left with its core network equipment and services business plus its smaller HERE mapping and navigation unit and Nokia Technologies, which manages the licensing of its portfolio of patents and develops new products such as the N1 and the Z Launcher.
The tool, which allows former owners to disable iMessage even after they’ve disposed of their iPhones, was the first self-service option Apple has offered.
Because iMessage is enabled by default — and is the standard texting service for iOS-to-iOS communication — iPhone owners who had changed smartphones and kept their numbers were not getting texts from other iPhone owners. Apple, unaware that the user had deserted iOS for a rival smartphone ecosystem, was still routing iOS-originating texts to the recipient’s now-unused Message app.
Some called it “iMessage purgatory,” while others referred to it as the “iMessage black hole.”
The problem had existed since 2011, when Apple introduced iMessage and the companion Message app, and was partly technical: Texts sent between iOS devices via iMessage don’t transit a carrier’s SMS (short message service) network, but instead are sent over the Internet.
iMessage’s inability to reroute texts from iOS users — and since 2012′s OS X Mountain Lion, from Mac owners as well — prompted at least one federal lawsuit.
The new tool aims to solve the purgatory problem by letting former iPhone owners, even if they have disposed of the device, route texts to non-Apple smartphones. After entering the phone number for the Android, BlackBerry or Windows Phone device, the user must enter the confirmation code sent to the smartphone into the Web form.