As in-vehicle electronics become more sophisticated to support autonomous driving, cameras, and infotainment systems, Ethernet has become a top contender for connecting them.
For example, the BMW X5 automobile, released last year, used single-pair twisted wire, 100Mbps Ethernet to connect its driver-assistance cameras.
Paris-based Parrot, which supplies mobile accessories to automakers BMW, Hyundai and others, has developed in-car Ethernet. Its first Ethernet-connected systems could hit the market as soon as 2015, says Eric Riyahi, executive vice president of global operations.
Parrot’s new Ethernet-based Audio Video Bridging (AVB) technology uses Broadcom’s BroadR-Reach automotive Ethernet controller chips.
The AVB technology’s network management capabilities allows automakers to control the timing of data streams between specific network nodes in a vehicle and controls the bandwidth in order to manage competing data traffic.
Ethernet’s greater bandwidth could provide drivers with turn-by-turn navigation while a front-seat passenger streams music from the Internet, and each back-seat passenger watches streaming videos on separate displays.
“In-car Ethernet is seen as a very promising way to provide the needed bandwidth for coming new applications within the fields of connectivity, infotainment and safety,” said Hans Alminger, senior manager for Diagnostics & ECU Platform at Volvo, in a statement.
Ethernet was initially used by automakers only for on-board diagnostics. But as automotive electronics advanced, the technology has found a place in advanced driver assistance systems and infotainment platforms.
Many manufacturers also use Ethernet to connect rear vision cameras to a car’s infotainment or safety system, said Patrick Popp, chief technology officer of Automotive at TE Connectivity, a maker of car antennas and other automobile communications parts.
Currently, however, there are as many as nine proprietary auto networking specifications, including LIN, CAN/CAN-FD, MOST and FlexRay. FlexRay, for example, has a 10Mbps transmission rate. Ethernet could increase that 10 fold or more.
The effort to create a single vehicle Ethernet standard is being lead by Open Alliance and the IEEE 802.3 working group. The groups are working to establish 100Mbps and 1Gbps Ethernet as de facto standards.
The first automotive Ethernet standard draft is expected this year.
The Open Alliance claims more than 200 members, including General Motors, Ford, Daimler, Honda, Hyundai, BMW, Toyota, Volkswagen. Jaguar Land Rover, Renault, Volvo, Bosch, Freescale and Harman.
Broadcom, which makes electronic control unit chips for automobiles, is a member of the Open Alliance and is working on the effort to standardize automotive Ethernet.
China’s anti-monopoly regulator on Wednesday said Qualcomm Inc. is under suspicion for overcharging and abusing its market position, allegations which could see the U.S. chip giant slapped with record fines of more than $1 billion.
The National Development and Reform Commission (NDRC) also said it was in talks with another U.S. technology firm, InterDigital Inc, about a possible settlement to a separate anti-monopoly probe as the regulator focuses on the rapidly evolving information technology market.
Foreign firms from drugmaker GlaxoSmithKline to Apple Inc are facing tougher scrutiny in the world’s second-biggest economy as China targets key industries to protect consumers from bloated prices and second-rate products.
In its first public statements about the Qualcomm investigation, the watchdog said it began making inquiries after receiving complaints that the San Diego-based company was charging higher prices in China than it does in other countries.
“We received reports from relevant associations and companies that Qualcomm abuses its dominant position in the market and charges discriminatory fees,” Xu Kunlin, who heads the NDRC’s anti-monopoly and price supervision bureau, told a press conference in Beijing.
The NDRC dual investigations are part of a focus on information technology providers, especially companies that license patent technology for mobile devices and networks.
Industry experts say the NDRC, which is also the government’s main economic planning body, is trying to lower domestic costs as China rolls out its faster 4G mobile networks this year.
Earlier this month, the China Mobile Communications Industry Association said it had filed a complaint against Qualcomm for overcharging for use of its patents.
Under the anti-monopoly law, the NDRC can impose fines of between 1 and 10 percent of a company’s revenues for the previous year. Qualcomm earned $12.3 billion in China for its fiscal year ended September 29, or nearly half of its global sales.
Robocoin announced on Tuesday that later this month it will install the first automated teller machines in the United States that will allow users to buy and sell bitcoin, the latest step into the mainstream for the digital currency.
The kiosks, to be installed in Seattle, and Austin, Texas, are similar to ATMs but have scanners to read government-issued identification such as a driver’s license or a passport to confirm users’ identities.
The ATMs will allow people to swap bitcoin for cash, or deposit cash to buy more bitcoin by transferring funds to or from a virtual wallet on their smartphones.
Bitcoin was launched in 2008 and is traded within a global network of computers. It is not backed by a single company or government and has no assets behind it, but its release is tightly controlled, mimicking a central banking system’s control over the minting of money.
Robocoin, based in Las Vegas, installed its first bitcoin ATM in Vancouver last fall and will also start operating one in Calgary, Alberta, later this month. Robocoin also is planning to install ATMs in Asia and Europe.
A bitcoin is currently worth about $636, but its value has fluctuated widely as the currency’s visibility has increased. Last September, a bitcoin was worth around $150. By late December the value was near the $1,000 mark.
Users can buy products and services online on sites including Overstock.com or in a handful of stores.
The currency’s reputation took a hit last week when two of its best known exchanges suspended withdrawals. One of them, Slovenia-based Bitstamp, said Friday it planned to allow redemptions to resume.
Sprint Corp promised to gradually bump up wireless data speeds far in excess of those offered by bigger rivals like Verizon, as it hopes to use recently acquired wireless airwaves to regain market share.
At its research labs on the outskirts of San Francisco, Sprint on Wednesday outlined plans to expand Spark, a service it is now building with speeds of 50-60 megabits per second, which is being rolled out initially in five cities: Los Angeles, Tampa, Miami, Chicago and New York.
In comparison, Verizon Wireless says it provides customers data speeds of 5-12 megabits per second but its high-speed network covers 303 million people.
After losing subscribers for years, No. 3 U.S. mobile service provider Sprint is looking to distinguish itself from rivals AT&T Inc, Verizon Wireless and T-Mobile US, which are ahead of it in high-speed upgrades.
“Sprint has a much broader set of spectrum in more markets than their competitors,” said Andy Castonguay, principal analyst at Machina Research. “Their spectrum holdings give them a unique advantage.”
But he cautioned a lot of Sprint’s plans seemed theoretical for the moment and the industry has to see the technology in action to understand the impact on the consumer. With rapidly increasing bandwidth, other issues such as power consumption, battery life and heat will come to the fore.
“It’s going to push the boundaries of power consumption and antenna design. It’s going to be very interesting to watch the next generation of devices,” he said.
Sprint demonstrated to reporters at its Burlingame labs ultra-fast wireless data speeds of 1 gigabits per second, about 16 times faster than its current peak speeds and rivaling the fastest wireline speeds.
It also showed off potential applications of ultra high-speed wireless, from online multiplayer gaming to simultaneous streams of video based on next-generation “4K” TV technology.
AT&T shrugged off Sprint’s claims but declined to comment on its own speeds.
“A demo counts as much as making a touchdown with no other players on the field,” AT&T spokesman Mark Siegel said.
Last Friday, the cloud software vendor announced a “hackathon” would be held at the conference, with US$1 million going to the developer or team who creates the top prize-winning mobile application with Salesforce.com technology.
“It’s not going to be easy — $1 million is going to bring out the best of the best,” Salesforce.com said in Friday’s announcement. “So don’t wait until Dreamforce! You’re going to want to get started now. With Force.com, Heroku, ExactTarget Fuel, Mobile Services and more — you’ve got a killer array of platform technology to use.”
Salesforce.com will also be providing some “pretty amazing new technology” for use at the show, the announcement adds.
In order to participate, developers have to either register for a full conference pass or a special $99 hacker pass.
The hackathon reflects Salesforce.com’s long courtship of developers to its development technologies, its AppExchange marketplace and recent efforts to build out more tooling for mobile application development.
Developers taking part in the hackathon will have plenty of competition, with some 20,000 programmers expected to attend Dreamforce overall. A “Hack Central” area will be open around the clock, supporting coders who want to work until the wee hours on their application.
In order to qualify, an application can’t have been previously released. The entries will be judged on four criteria counting 25 percent each: innovation, business value, user experience and use of Salesforce.com’s platform.
The second-place finisher will receive $50,000, with $25,000 going to the third-place winner. Fourth and fifth place will get $10,000 and $5,000, respectively.
Some 120,000 people are expected to register for Dreamforce this year. While some of that total will be watching online rather than in person, Dreamforce is now operating at a scale rivaling Oracle’s OpenWorld event, which happened last month.
Verizon’s 2013 Data Breach Investigation Report has been released and has the staggering statistic that 96 per cent of all espionage data-breach incidents originated in China. The information is gleaned by its own forensics team and data breach info from 19 partner organisations worldwide. The report covers about 621 confirmed breaches and about 47,000 security incidents that occurred in 2012.
Verizon’s Dave Hylender wrote that money-minded miscreants continued to cash in on low-hanging fruit from any tree within reach. Bolder bandits took aim at better-defended targets in hopes of bigger hauls. Activist groups DoS’d and hacked under the very different – and sometimes blurred – banners of personal ideology and just-for-the-fun-of-it lulz. And, as a growing list of victims shared their stories, clandestine activity attributed to state-affiliated actors stirred international intrigue, he said.
China was involved in 96 per cent of all espionage data-breach incidents, most often targeting manufacturing, professional and transportation industries. Hylender said that the assets China targeted within those industries included laptop/desktop, file server, mail server and directory server, in order to steal credentials, internal organization data, trade secrets and system info.
More than 95 per cent of the attacks started with phishing which had become much more sophisticated, often targeting specific individuals and using tactics that are harder for IT to control. Phishers are using phone calls and social networking, too, the report said.
HP’s CEO Meg Whitman warned that organisations need to prepare for a lobal cyber-attack that could have large-scale repercussions.
Whitman believes a “cyber-attack of 9/11 scale” is likely to take place in the near future. Customers need to be aware of the “threat of global terrorism” and promised that HP would be on hand to help when such an attack does occur.
Channeling Margaret Thatcher she threatened to “darken the skies with our agenda to help organizations.” We are not sure what use a dark agenda would be, but hell it probably sounded better during the rehearsals. Needless to say HP is trying to position itself as a leader in the security market where it thinks there is a market for dark agendas.
F-secure’s chief security researcher, Mikko Hypponen, has warned that we are entering into a cyber warfare revolution, and that governments will soon attempt to outdo each other based on their computer weapons’ prowess.
The internet security expert said-any future crisis between technically advanced nations will involve cyber elements.
His comments came after hearing last week that China and the US have been engaging in “war games” simulations.
“I wasn’t expecting [war games] so soon,” Hypponen said.
“I’m surprised and I think it is a good move because everybody is worried about escalation. The way to fight unnecessary escalations is that you know more about how the perceived enemy would act if there would be an escalation. War games are exactly that.”
It was Hypponen’s observations on the war games which led him to remark that we must look at “the bigger picture”.
“We’ve seen a revolution in defence technology and in technology generally over the past 60 to 70 years and I believe we are right now seeing the beginning of the next revolution: a cyber warfare revolution, which is going to as big as the revolutions we’ve seen so far in technology becoming part of defence, and part of wars,” he added.
Hypponen also predicted that it won’t be long before the world sees its first cyber arms race, including cyber war rehearsals to prove how strong countries are and boasting about their cyber skills to make other countries pay attention.
“Like nuclear in the sixties, cyber attacks are a deterrent and deterrents only work if your perceived enemies know that you have it,” he said.
When asked if he thinks we are on the brink of a cyber cold war, Hypponen replied, “something like that”.
“What we should be doing is cyber arm negotiations, rules for using cyber arms, and so on,” he said.
“I think what we are seeing here with cyber war games between the US and China is the first steps into that…they are a good thing”.
At the beginning of this year, a report put out by the World Economic Forum rated cyber attacks as the fourth most likely risk to occur over the next 10 years. Detailing 50 risks across five categories based on a survey of 469 experts, the annual study ranked a technological threat in the top five for the first time since 2007.
The FCC, in a 3-0 vote Wednesday, agreed to open a notice of proposed rulemaking, or NPRM, asking what to do with the so-called S band of the mobile satellite services spectrum. In an NPRM, the agency seeks public comment on proposed rules, and the FCC’s new notice asks whether to allow current licensee Dish Network to offer mobile service or to auction the spectrum.
Dish Network purchased the spectrum from TerreStar and DBSD in a US$3 billion-plus deal that closed this month. The company has not detailed how it plans to use the spectrum, although it has said it is committed to helping the FCC solve a predicted mobile spectrum shortage and will explore a “market entry.”
More mobile broadband spectrum is needed because of the skyrocketing use of mobile data services in the U.S., members of the FCC and the mobile industry have said.
The commission’s action Wednesday was a “small but important step” toward bringing more spectrum to market, said Commissioner Robert McDowell.
AT&T and CTIA, a trade group representing mobile carriers, both praised the FCC for moving forward on the spectrum. The FCC’s 2-year-old broadband plan sets a goal of opening up 500 MHz of spectrum for mobile broadband within 10 years.
Also on Wednesday, the FCC voted to launch an NPRM focused on ensuring that smartphones and other mobile devices used in the lower 700MHz band of spectrum are interoperable across spectrum owned by different carriers. Regional mobile carriers have complained that Verizon and AT&T, the two biggest winners in the 700MHz spectrum auctions in early 2008, have been asking device manufacturers for equipment that will only work in their spectrum blocks.
A report at the Washington Post says that the FDA turned its eyes inward after some scientists and doctors warned the US Congress that it was approving medical devices that could harm patients.
Snooping took place over a two year period, according to a complaint filed against the FDA, and saw spooks reading personal emails sent through Google’s Gmail service. This information was then used to harass or dismiss workers.
Documents released in the lawsuit show that the FDA began reading emails sent by its staff to the US Congress, snooped on draft versions of whistle-blower complaints and looked at documents saved on computers.
The doctors and scientists say that their constitutional rights have been violated because, although they accept that their work communications are open to inspection, their private ones should not be.
“Who would have thought that they would have the nerve to be monitoring my communications to Congress?” said one plaintiff. “How dare they?”
The six scientists and doctors filed their lawsuit against the FDA in the US District Court for the District of Columbia in Washington, DC last week.
Google+, which is less than two months old, announced Thursday afternoon that it has begun to roll out a games button at the top of users’ streams. The highly popular Angry Birds is one of the first games to be added to the site, along with Zombie Lane and Edgeworld.
Vic Gundotra, senior vice president of engineering at Google, announced the gaming news in a blog post. Gundotra noted that users will be able to click on a Games button that will be located above their streams. The button re-directs them to a games page, allowing games to be available when users want them and hidden when they don’t.
“The experiences we have together are just as important to our relationships,” wrote Gundotra. “We want to make playing games online just as fun, and just as meaningful, as playing in real life. That means giving you control over when you see games, how you play them and with whom you share your experiences.”
And that’s going to be an important feature for Google+, which has grown quickly since its launch, according to Ezra Gottheil, an analyst with Technology Business Research.
“Games are a real complement to social networking,” said Gottheil. “When people play games with other people, it is often more about being with other people than about the game itself. It actually fits the Circles model well. If you’re a serious gamer, you want to talk about the game with other players, but that bores the rest of us silly.”
And Gottheil also noted that adding games to the site, while not surprising, is a smart move. If people are able to access great games and engage with Circles of gamers, it easily could draw more users to the fledgling network.
“I think Facebook has to be nervous about Google+ taking away some of its time-on-site more than taking away users,” he added.
Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.
Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers. The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software.
A team of security experts have been working diligently to find a way to kill off the worm that has infected a massive amount of networked computers. In a report Rodney Joffe, chairman of the Conficker working group and chief technologist of Neustar said that the operation was a complete success, but the patient died. The group was unable to clean up the machines already infected or stop new ones from being infected. The worm is still there.
In its report, the Conficker Working Group concludes that cybersecurity threats are growing faster than the ability to counter them.
Skype estimates that about two-thirds of its users are still not able to log in after an outage caused by problems with its peer-to-peer interconnection system, it said in a blog posting earlier today.
Almost 5 million users are back online, Skype said, but that’s still only around 30 percent of the number it would expect to see at the time of the blog posting.
The number of logged-in users is increasing all the time, but it’s not possible for Skype to predict when all users will be able to sign in and start making calls again, the company said.
Even for Europe users able to log in earlier today, some instant messages and calls went undelivered or unanswered. Skype at one stage also disabled new downloads of its software, according to a Twitter message from a company spokesman.
Skype’s initial description of the problem said many of the “supernodes” that act as directories for Skype users to find one another were taken offline by a problem affecting some versions of the Skype client.
“Our engineers are creating new ‘mega-supernodes’ as fast as they can, which should gradually return things to normal,” the company blog post said.
In a statement, BitDefender says that Trojan.Spy.YEK sniffs for critical data and archives that may hold private information and sends them back to the attacker. BitDefender Malware Researchers Doina Cosovan and Octavian Minea say that because Trojan.Spy.YEK has both spying and backdoor features, it is a serious enemy.
“A spying malware in the local network of a company means danger and unfortunately the number of such threats is constantly increasing,” the researchers said.
“With an encrypted dll in its overlay, this Trojan is easily saved in windows\system32\netconf32.dll and once injected in explorer.exe nothing can stop it from connecting (whenever necessary) to a couple of meeting spots with the attacker,” the researchers said.
“The backdoor component helps it register itself as a service so as to receive and follow instructions from a command and control center, while the spyware component sends away data about files, operating system, while also making screenshots of the ongoing processes.”
Some of the commands Trojan.Spy.YEK is supposed to execute are: sending the collected files using a GET request, sending info regarding the operating system and computer, taking screenshots and sending the results, listing the processes that run on the system and sends them away, finding files with a certain extension.
“Shortly put,” the researchers said, “it uploads all the interesting data on a FTP server without the user’s consent.
“The fact that it looks for all that it is linked to archives, e-mails (.eml, .dbx), address books (.wab), database and documents (.doc, .odt, .pdf etc) makes Trojan.Spy.YEK a prime suspect of corporate espionage as it seems to target the private data of the companies”.
Cosovan and Minea say that the Trojan can run, without problems, on all versions of Windows from Win 95 to 7. “If you haven’t done that already, this should be a good time to try an antivirus,” they said.
Travelers this holiday season will find that they don’t have to worry about being suffering from Internet loss, even for a few hours. The Google Chrome browser team has joined with three airlines to offer free in-flight WiFi on more than 700 planes for approximately 15 million passengers this holiday season.
This is the second year in a row that Google has offered free WiFi, with the program expanding this year to three airlines – AirTran, Delta and Virgin America. According to the Free Holiday WiFi website, the deal with last from November 20, 2010 through January 2, 2011. To connect, simply search for the Gogo Inflight network and connect your device.
If you’re asking yourself “Why?”, just take a look at last year’s program. According to The Next Web, users of the free WiFi were sent to a landing page promoting the Nexus One, just before its launch. This year, we imagine, those 15 million potential customers will see a splash page promoting Google’s ever-growing entry into the browser market, Google Chrome. We have to wonder how much of a push a campaign like this could give to the number three browser out there.
As Google notes in its press release, if flying used to be your excuse to disconnect, it will be no more:
Not too long ago, flying home for the holidays meant disconnecting for several hours until you touched down at your destination. Today, Wi-Fi technologies allow us to stay connected even at 30,000 feet above the ground, so we can read the news, browse the web (to beat the long-haul boredom) and send that last-minute planning email before the family reunion. This holiday season, there will be more connected flyers than ever before.