BlackBerry Ltd announced on Monday it has to plans to roll out a cloud-based version of its device management platform BES12, a move that will make the service more accessible to small- and medium-sized businesses that need to secure devices on their own networks.
Waterloo, Ontario-based BlackBerry has built a reputation around its device management and security capabilities, catering mainly to the needs of large government agencies and corporations. With data security needs becoming more critical, and a number of new entrants in the field nipping at its heels, BlackBerry said it is now broadening its offerings.
BlackBerry’s new BES12 platform manages and secures not only BlackBerry devices, but also those powered by operating systems such as Google Inc’s Android, Apple’s iOS and Microsoft Corp’s Windows platform. It can also manage and secure medical diagnostic equipment, industrial machinery and even cars.
By offering a less costly cloud-based version of the system, BlackBerry hopes to attract a wider range of small- and medium-sized businesses that need these capabilities, but do not have the capacity to install and manage expensive servers of their own.
“We are trying to broaden the enterprise mobility management space,” said BlackBerry Chief Operation Officer Marty Beard on a conference call with media. “And a cloud version really enables us to broaden our footprint.”
The new cloud-based offering, unveiled at the Mobile World Congress in Barcelona on Monday, will be offered to customers later this month.
India’s Essar Group, a conglomerate with more than 60,000 employees spread across over two dozen countries, has signed up for a trial of the cloud-based version.
Beard said BlackBerry is seeing growing demand from smaller companies for cloud-based device management offerings, but is also getting demand from larger companies that have certain divisions or groups that need cloud-based capabilities.
Spotted by GforGames site, in a GeekBench test results and running inside an unknown smartphone, MediaTek’s MT6795 managed to score 886 points in the single-core test and 4536 points in the multi-core test. These results were enough to put it neck to neck with the mighty Qualcomm Snapdragon 810 SoC tested in the LG G Flex 2, which scored 1144 points in the single-core and 4345 in the multi-core test. While it did outrun the MT6795 in the single-core test, the multi-core test was clearly not kind on the Snapdragon 810.
The unknown device was running on Android Lollipop OS and packed 3GB of RAM, which might gave the MT6795 an edge over the LG G Flex 2.
MediaTek’s octa-core MT6795 was announced last year and while we are yet to see some of the first design wins, recent rumors suggested that it could be powering Meizu’s MX5, HTC’s Desire A55 and some other high-end smartphones. The MediaTek MT6795 is a 64-bit octa-core SoC clocked at up to 2.2GHz, with four Cortex-A57 cores and four Cortex-A53 cores. It packs PowerVR G6200 graphics, supports LPDDR3 memory and can handle 2K displays at up to 120Hz.
As we are just a few days from Mobile World Congress (MWC) 2015 which will kick off in Barcelona on March 2nd, we are quite sure that we will see more info as well as more benchmarks as a single benchmark running on an unknown smartphone might not be the best representation of performance, it does show that MediaTek certainly has a good chip and can compete with Qualcomm and Samsung.
China has removed some of the world’s most popular technology brands from its approved state purchase lists, while approving thousands more home grown products, in what some say is a response to revelations of widespread Western cybersurveillance.
Others put the shift down to a protectionist impulse to shield China’s domestic technology industry from competition.
Chief casualty is U.S. network equipment maker Cisco Systems Inc, which in 2012 counted 60 products on the Central Government Procurement Center’s (CGPC) list, but by late 2014 had none, a Reuters analysis of official data shows.
Smartphone and PC maker Apple Inc has also been dropped over the period, along with Intel Corp’s security software firm McAfee and network and server software firm Citrix Systems .
The number of products on the list, which covers regular spending by central ministries, jumped by more than 2,000 in two years to just under 5,000, but the increase is almost entirely due to local makers.
The number of approved foreign tech brands fell by a third, while less than half of those with security-related products survived the cull.
An official at the procurement agency said there were many reasons why local makers might be preferred, including sheer weight of numbers and the fact that domestic security technology firms offered more product guarantees than overseas rivals.
China’s change of tack coincided with leaks by former U.S. National Security Agency (NSA) contractor Edward Snowden in mid-2013 that exposed several global surveillance programs, many of them run by the NSA with the cooperation of telecom companies and European governments.
Google said on its official blog that its Android for Work program will provide improved security and management features for corporations that want to give their employees Android smartphones. Smartphones supported by the new initiative will be able to keep an employee’s work and personal apps separate, and a special Android for Work app will allow businesses to oversee key tools such as email, calendar and contacts.
Google said it is partnering with more than two dozen companies including Blackberry Ltd, Citrix Systems Inc, Box Inc.
Google’s Android software is the world’s most popular mobile operating system, but many corporations, which have significant security and device management requirements, give their employees smartphones made by Blackberry or Apple Inc.
Ezchip is planning to put 100 ARM-based 64-bit cores into a processor which it thinks will fill a hole in the networking market.
Dubbed the Tile-Mx, the multi-core processors are in development, but won’t be sampling until the second half of 2016.
Company officials said the chips high core count, mesh connectivity and hardware accelerators will fix the demands on data centre and carrier networks brought on by such trends as mobility, big data, social media, the Internet of things (IoT) and the cloud.
Ezchip thinks that it will all work well with software-defined networking (SDN) and network-functions virtualization (NFV) and open switches and white boxes.
The Tile-Mx chip family is EZchip’s first go with ARM architecture and means it is moving away from the proprietary designs Tilera used in building out its multi-core portfolio.
Tile-Mx will be based around Cortex-A53 cores and will be targeted at white-box networking vendors, servers that run high-performance networking applications and software vendors.
The new chip family also will include smaller versions of the chip armed with 36 and 64 ARM cores, officials said.
The new chips also will include a mesh core interconnect architecture to provide a lot of bandwidth, low latency and high linear scalability.
The chips will offer 200G-bit throughput and will be able to take advantage of the growing ARM ecosystem of open-source software vendors, officials said.
The Anthem data breach may have exposed 78.8 million records, according to deeper analysis provided in an estimate by the health insurance company, but Anthem is still investigating exactly how many records hackers captured from a database.
Hackers accessed a database at Anthem that contained customer and employee records with names, birth dates, Social Security numbers, addresses, phone numbers, email addresses and member IDs, the health insurance company said on Feb. 4. Some records included employment information and income levels, but no financial information was compromised, it said.
It marked one of the largest data breaches to affect the health care industry, adding to a string of recent attacks that have shaken large companies, including retailers Home Depot, Target and Michaels.
Anthem, formerly known as Wellpoint, runs health-care plans under the Blue Cross Blue Shield, Empire Blue Cross, Amerigroup, Caremore, Unicare, Healthlink, DeCare, HealthKeepers and Golden West brands.
Between 60 million and 70 million of the 78.8 million records belong to current or former Anthem members, the company said in a statement.
The remainder — between 8.8 million and 18.8 million — belong to non-Anthem members who used their insurance in a state where Anthem has operated over the last decade.
Anthem is still trying to identify those people who may have been affected. Part of the problem is that Anthem has found 14 million incomplete records that can’t be linked to a product or line of business. Those records lack data fields that could be used to identify members, though they probably are not active Anthem members.
No information has been formally released on who may have compromised the database. Security firm CrowdStrike, which is not involved in the investigation, said the attackers used infrastructure linked to a suspected China-based state-sponsored group known as Deep Panda.
It would appear that the world is rushing to Nvidia to buy its latest GPU at the expense of AMD.
According to the data, NVIDIA and AMD each took dramatic swings from Q4 of 2013 to Q4 of 2014 with Nvidia increasing its market share over AMD by 20 per cent and AMD’s market share has dropped from 35 per cent at the end of 2013 to just 24 per cent at the end of 2014.
Meanwhile, Nvidia has gonr from 64.9 per cent at the end of 2013 to 76 per cent at the end of 2014.
The report JPR’s AIB Report looks at computer add-in graphics boards, which carry discrete graphics for desktop PCs, workstations, servers, and other devices such as scientific instruments.
In all cases, AIBs represent the higher end of the graphics industry using discrete chips and private high-speed memory, as compared to the integrated GPUs in CPUs that share slower system memory.
On a year-to-year basis, total AIB shipments during the quarter fell by 17.52 per cent , which is more than desktop PCs, which fell by 0.72 percent .
However, in spite of the overall decline, somewhat due to tablets and embedded graphics, the PC gaming momentum continues to build and is the bright spot in the AIB market.
The overall PC desktop market increased quarter-to-quarter including double-attach-the adding of a second (or third) AIB to a system with integrated processor graphics-and to a lesser extent, dual AIBs in performance desktop machines using either AMD’s Crossfire or Nvidia’s SLI technology.
The attach rate of AIBs to desktop PCs declined from a high of 63 per cent in Q1 2008 to 36 per cent this quarter.
So in other words It is also clear that the Radeon R9 285 release didn’t have the impact AMD had hoped and NVIDIA’s Maxwell GPUs, the GeForce GTX 750 Ti, GTX 970 and GTX 980 have impacted the market even more than expected.
This is ironic because the GTX 970 has been getting a lot of negative press with the memory issue and AMD makes some good gear, has better pricing and a team of PR and marketing folks that are talented and aggressive.
Nearly half of all security breaches come from vulnerabilities that are between two and four years old, according to this year’s HP Cyber Risk Report entitled The Past Is Prologue.
The annual report found that the most prevalent problems came as a result of server misconfiguration, and that the primary causes of commonly exploited software vulnerabilities are defects, bugs and logic flaws.
But perhaps most disturbing of all was the news that Internet of Things (IoT) devices and mobile malware have introduced a significant extra security risk.
The entire top 10 vulnerabilities exposed in 2014 came from code written years, and in some cases decades, previously.
The news comes in the same week that HP took a swipe at rival Lenovo for knowingly putting Superfish adware into its machines.
“Many of the biggest security risks are issues we’ve known about for decades, leaving organisations unnecessarily exposed,” said Art Gilliland, senior vice president and general manager for enterprise security products at HP.
“We can’t lose sight of defending against these known vulnerabilities by entrusting security to the next silver bullet technology. Rather, organisations must employ fundamental security tactics to address known vulnerabilities and, in turn, eliminate significant amounts of risk.”
The main recommendations of report are that network administrators should employ a comprehensive and timely patching strategy, perform regular penetration testing and variation of configurations, keep equipment up to date to mitigate risk, share collaboration and threat intelligence, and use complementary protection strategies.
The threat to security from the IoT is already well documented by HP, which released a study last summer revealing that 90 percent of IoT devices take at least one item of personal data and 60 percent are vulnerable to common security breaches.
The ARM mbed IoT Starter Kit — Ethernet Edition will allow users to make cloud-ready Internet of Things products that could receive or transmit data for analysis or alerts. The development kit will come with ARM’s mbed OS and connect into IBM’s BlueMix cloud, which will help in the development of applications and services.
The kit is for those with little to no experience in embedded or Web development. Prototype designs will guide enthusiasts through the process of making a device and connecting to IBM’s BlueMix cloud service.
The starter kit will get data from “the on board sensors into the IBM cloud within minutes of opening the box,” said the product page on ARM’s website.
ARM and IBM hope to cash in on the mass adoption of IOT, which has led to a mesh of interconnected devices used in smart homes, smart city implementations and enterprises. The devices, which could range from weather sensors to health devices, already number 1.2 billion, and could touch 5.4 billion by 2020, according to a recent study by Verizon.
The IOT market is currently fragmented with a wide variety of hardware, operating systems and communication standards in use. Through the developer kit, ARM and IBM want to bring a level of consistency in hardware and software across IOT devices. Beyond making it easier for devices to talk one another, the developer kit could make it easier to push or pull data out of a larger number of cloud services.
ARM didn’t provide details on the pricing or availability of the starter kit. The first devices resulting from the development kit are expected to be released later this year.
Google announced it has reached a deal with three of the country’s major cellular carriers to acquire “technology and capabilities” from Softcard, a competing mobile wallet app created jointly by the telecom operators. But the deal appears to be less about technology and more about branding.
The biggest immediate change is that Verizon, AT&T and T-Mobile will begin pre-installing Google Wallet on new Android smartphones later this year — something that had been blocked before in preference for the Softcard app.
At their heart, both apps are based on the same contactless payment technology as Apple Pay and a new generation of payment cards from banks and credit unions. They use NFC (near-field communication) to complete a transaction once a payment card or phone is brought within a few centimeters of a terminal.
Apple Pay brought the technology widespread recognition when it launched late last year, but Google Wallet has been around since 2011. However a lack of support from carriers, retailers, card issuers and Google itself had relegated the technology to the sidelines.
While Google Wallet and Apple Pay share a technology base, there are key differences in how they work. Perhaps the biggest is that in Google Wallet, all transactions are routed through Google before being charged to the customer’s credit card.
That gives Google even greater insight into the lives of its users. In contrast, Apple doesn’t see any details of purchases made on its system.
Getting the Google Wallet app in front of more consumers could help reduce confusion over the different brands — an important consideration when the biggest Android phone maker is making moves of its own in mobile payments.
A federal judge has dismissed an antitrust lawsuit that alleged Google harmed consumers by forcing Android mobile phone makers to use its apps by default. The plaintiffs were given three weeks to amend their complaint.
The two consumers who filed the suit failed to show that Google’s allegedly illegal restrictive contracts on manufacturers of Android devices resulted in higher prices on phones, U.S. District Judge Beth Labson Freeman said in a Feb. 20 ruling.
The complainants, who were seeking class-action status for the lawsuit, said that Google required manufacturers, including Samsung Electronics, to set the search giant’s own apps as default options on Android-based phones, restricting access to competing software such as Microsoft’s Bing search engine. The complaint alleged that this practice limited competition in the search engine market, stifled innovation and resulted in higher prices for phones.
But Freeman ruled that the complainants failed to establish a link between software requirements and phone pricing, also noting that “there are no facts alleged to indicate that defendant’s conduct has prevented consumers from freely choosing among search products or prevented competitors from innovating.”
She gave the plaintiffs three weeks to amend the antitrust complaint, filed in U.S. District Court, Northern District of California.
Gemalto said its initial investigations into a reports that U.S. and British spies had gained unauthorized access to it systems showed its products were secure and it thus did not expect a significant financial impact.
Gemalto’s shares fell sharply late last week after news website Intercept reported a hack by the U.S. National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ).
The hack into the world’s biggest maker of phone SIM cards allowed the spies to potentially monitor the calls, texts and emails of billions of mobile users around the world, the investigative news website reported.
Gemalto said it would communicate on the results of its investigations on Wednesday, Feb. 25 through a press release and a press conference that will be held in Paris at 0930 GMT.
Gemalto makes smart chips for mobile phones, bank cards and biometric passports and counts Verizon, AT&T Inc and Vodafone among its 450 wireless network provider customers around the world.
Security vendor AVG has spotted a malicious program that fakes the sequence a user sees when they shut off their phone, giving it freedom to move around on the device and steal data.
When someone presses the power button on a device, a fake dialog box is shown. The malware then mimics the shutdown animation and appears to be off, AVG’s mobile malware research team said in a blog post.
“Although the screen is black, it is still on,” they said. “While the phone is in this state, the malware can make outgoing calls, take pictures and perform many other tasks without notifying the user.”
The malware requires an Android device to be “rooted,” or modified to allow deep access to its software. That may eliminate a lot of Android owners who don’t modify their phones.
But some vendors of Android phones ship their devices with that level of access, potentially making it easier for the malware to get onto a device.
This malware is unlikely to show up in Google’s Play Store, since Google tries to block applications that have malicious functions. But it could be a candidate for one of the many third-party app stores with looser restrictions.
The free app from Google Inc’s online video service will be available for download as of today, February 23rd, and will feature kid-friendly design, with big icons and minimal scrolling, according to details seen by Reuters.
The app, which will be separate from the mainstream YouTube mobile app, will also feature parental controls such as a timer that can be used to limit a child’s screen time.
The Wall Street Journal earlier reported the launch, saying the company is planning to announce the new app today at a children’s entertainment industry conference.
A YouTube spokeswoman confirmed the information.
In December, USA Today reported that Google was planning to roll out child-friendly versions of its most popular products in a bid to be “fun and safe for children.”
Internet companies such as Google and Facebook Inc do not offer their services to children under 13.
Today the company is hosting its first-ever mobile developer conference. The daylong event in San Francisco shows the company wants to develop lucrative relationships with developers and put mobile at the center of its turnaround effort.
The event will feature talks by top Yahoo executives, including CEO Marissa Mayer, and deep dives into Yahoo’s technology services for mobile apps. A critical part of those services is Flurry, a mobile analytics and advertising company Yahoo acquired last year. Flurry tracks more than 600,000 apps worldwide, providing information on app performance and users that can aid in ad targeting.
Yahoo needs that data to kickstart its sluggish ad business, especially on mobile devices.
During the show, Yahoo executives will try to sell third-party developers on the value of using Flurry. They will also promote Yahoo Gemini, the company’s platform for mobile advertising, and BrightRoll, a digital video advertising platform the company also acquired last year.
It’s a multi-pronged strategy, and the pieces are still coming together. But by encouraging more outside developers to use Yahoo’s services, Yahoo hopes to gain valuable information about how people use mobile apps.
That information could help Yahoo do its job. “We can help advertisers find the right audience they’re looking for, target the ads they want to target, using strong data from Yahoo, and find users wherever they are, on or off Yahoo,” Mayer said last week during the Goldman Sachs Technology and Internet Conference in San Francisco.
And if Yahoo can freshen its appeal to outside software developers and build new partnerships with them, then all the better.
“Yahoo is working on their own apps, but they will be able to extend their reach and their advertising inventory by getting outside developers into the fold,” said Karsten Weide, an industry analyst at IDC who studies consumer apps and platforms.