Subscribe to:

Subscribe to :: TheGuruReview.net ::

SAP Sees High Profit Potential In Cloud

January 27, 2015 by mphillips  
Filed under Computing

European software giant SAP could eventually see its software delivered via the cloud deliver higher profit margins than its traditional packaged software, its finance chief told a newspaper.

“Such contracts become profitable over time. In the long term, they can definitely become more profitable than our classic license sales,” Luka Mucic told the Euro am Sonntag business weekly in an interview.

SAP said last week its push to deliver cloud-based products via the Internet – which allow customers to access powerful remote data centers for processing and storage – would dampen profitability until at least 2018.

Unlike the packaged software SAP has been selling for decades, for which clients pay a immediate license fee, cloud-based software is generally paid for by subscription over time, but most of the costs for the software provider are upfront.

Mucic said such contracts were loss-making for the first year of operation.

To strengthen its position in the fast-growing cloud market, SAP agreed in September to buy cloud-based travel and expenses software maker Concur for $7.3 billion in cash, its biggest takeover ever.

The company issued a triple-tranche, 2.75 billion-euro ($3.08 billion) bond in November to help finance the deal.

Mucic said SAP might add another, smaller tranche, perhaps as soon as the first half of this year, but said otherwise the company had no need for further capital.

“We are just examining whether this would be advantageous for us,” he said.

 

 

China Further Restricts Internet, Blocks VPN Access

January 26, 2015 by mphillips  
Filed under Around The Net

China is further tightening its grip on access to the Internet by blocking services that allow users to get around government censorship.

Several foreign-based operators of virtual private network (VPN) services said Friday that access to their services in China had been disrupted as a result of the crackdown and users are facing a harder time getting to some foreign websites.

Virtual private networks work by establishing an encrypted pipe between a computer or smartphone and a server in a foreign country. All communications are sent inside the pipe, effectively shielding Internet traffic from government filters that determine whether a site can be accessed. VPNs are used by Chinese citizens to get to external news sources and by resident foreigners and businesses for day-to-day communications.

StrongVPN, a commercial provider that operates a network of servers around the world, said users in China had recently begun experiencing connection problems to some of its sites. Comments alongside a company blog post indicate the list of sites affected is changing and sites that might work one day are failing the following day.

Another VPN provider, Golden Frog, told customers they might have more success connecting to services in Hong Kong or The Netherlands than those in the United States or Australia.

The Chinese government appears to be using two techniques to disrupt service, said Andrew Staples, a spokesman for Golden Frog. One, deep packet inspection, examines the data in Internet packets to try to determine if it’s a VPN connection. The other, IP blocking, shuts off traffic destined for the Internet addresses used by VPN servers.

 

 

Box Riding High After Success IPO

January 26, 2015 by mphillips  
Filed under Around The Net

Box made a splashy entrance on the New York Stock Exchange Friday, opening at $20.20 per share, or 44 percent higher than the price it had set for itself the night before.

With 12.5 million shares for sale, the initial public offering raised some $175 million that Box can now use to invest in its business, and a market capitalization of $1.6 billion.

By Friday afternoon, the stock — trading under the symbol “BOX” — had reached as high as $24.73 per share, or 77 percent above its IPO price.

“It was unbelievable,” said Steve Sarracino, a founder and partner at Activant Capital, noting that current prices were giving Box a valuation on a par with the $2 billion it saw in its last private funding round in July.

“We were watching closely because for the first time it looked like the public market was going to impose discipline on the private market, but they blew right through there. I don’t know if it’s good or bad, but it tells us the market is risk-on,” he said.

Wall Street’s warm reception can only come as welcome reassurance for Box, whose IPO journey has been a rocky one. After originally filing to go public last March, the company ended up postponing those plans, citing unfavorable market conditions.

Looking ahead, though, there’s no doubt Box will have to move quickly. Storage is a commodity business,analysts have noted, and Box will have to make sure customers see it as a provider of more than just storage.

 

 

 

AMD’s Carrizo Coming In The Second Quarter

January 26, 2015 by Michael  
Filed under Computing

AMD released its earnings today and one cool question came up about the upcoming Carrizo mobile APU.

Lisa SU, the new AMD President and CEO, told MKM Partners analyst Ian Ing that Carrizo is coming in Q2 2015.

This is a great news and AMD’s Senior VP and outgoing general manager of computing and graphics group John Byrne already shared a few details about his excitement about Carrizo.

There are two Carrizo parts, one for big notebooks and All in Ones called Carrizo and a scaled down version called Carrizo L. We expect that the slower Carrizo-L is first to come but, Lisa was not specific. Carrizo-L is based on Puma+ CPU cores with AMD Radeon R-Series GCN graphics is intended for mainstream configurations with Carrizo targeting the higher performance notebooks.

Usually when a company says that something is coming in Q2 2015 that points to a Computex launch and this Taipei based tradeshow starts on June 2 2015. We strongly believe that the first Carrizo products will showcased at or around this date.

Lisa also pointed out that AMD has “significantly improved performance in battery life in Carrizo.” This is definitely good news, as this was one of the main issues with AMD APUs in the notebook space.

Lisa also said that AMD expects Carrizo to be beneficial for embedded and other businesses as well. If only it could have come a bit earlier, so let’s hope AMD can get enough significant design wins with Carrizo. AMD has a lot of work to do in order to get its products faster to market, to catch up with Intel on power and performance or simply to come up with innovative devices that will define its future. This is what we think Lisa is there for but in chip design, it simply takes time.

Courtesy-Fud

Microsoft Unveils Hologram Visor

January 23, 2015 by mphillips  
Filed under Consumer Electronics

Microsoft Corp surprised the tech world with the unveiling of a prototype hologram visor that can bring the Minecraft video game, Skype calls and even the landscape of Mars to three-dimensional life.

The veteran tech pioneer, which long ago lost the mantle of the world’s most inventive company, is making a bold play to regain that title in the face of stiff competition from Google Inc and Apple Inc.

Virtual or enhanced reality is the next frontier in computing interaction, with Facebook Inc focusing on its Oculus virtual reality headset and Google working on its Glass project.

Microsoft said its wire-free Microsoft HoloLens device will be available around the same time as Windows 10 this autumn. Industry analysts were broadly excited at the prospect, but skeptical that it could produce a working model at a mass-market price that soon.

“That was kind of a ‘Oh wow!’ moment,” said Mike Silver, an analyst at Gartner who tried out the prototype on Wednesday. “You would expect to see a relatively high-priced model this year or next year, then maybe it’ll take another couple of years to bring it down to a more affordable level.”

Microsoft does not have a stellar record of bringing ground-breaking technology to life. Its Kinect motion-sensing game device caused an initial stir but never gripped the popular imagination.

The company showed off a crude test version of the visor – essentially jerry-rigged wires and cameras pulled over the head – to reporters and industry analysts at a gathering at its headquarters near Seattle.

It did not allow any photographs or video of the experience, but put some images on its website.

 

 

ARM Develops IoT For Students

January 23, 2015 by Michael  
Filed under Computing

ARM has created a course to teach IoT skills to students at University College London (UCL)

The course is designed to encourage graduates in science, technology, engineering and maths (Stem) to seek careers in IT.

The IoT Education Kit will teach students how to use the Mbed IoT operating system to create smartphone apps that control mini-robots or wearable devices.

Students are expected to be interested in building their own IoT business, or joining IoT-focused enterprises like ARM. The course will also try to limit the number of Stem graduates pursuing non-technology careers.

ARM reported statistics from a 2012 study by Oxford Policy and Research revealing how many engineering graduates (36 percent of males, 51 percent of females), technology graduates (44 percent, 53 percent) and computer scientists (64 percent, 66 percent) end up with non-Stem jobs.

The IoT Education Kit will be rolled out by UCL’s Department of Electronics from September 2015, with a week-long module for full-time and continuing professional development students.

The Kit comprises a complete set of teaching materials, Mbed-enabled hardware boards made by Nordic Semiconductor, and software licensed from ARM. A second teaching module for engineering graduates is being developed for 2016.

“Students with strong science and mathematical skills are in demand and we need to make sure they stay in engineering,” said ARM CTO Mike Muller.

“The growth of the IoT gives us a great opportunity to prove to students why our profession is more exciting and sustainable than others.”

UCL professor Izzat Darwazeh also highlighted the importance of Stem skills, saying that “many students are not following through to an engineering career and that is a real risk to our long-term success as a nation of innovators”.

Courtesy-TheInq

Do Game Developers Have Unrealistic Expectations?

January 22, 2015 by Michael  
Filed under Gaming

Over the last few years, the industry has seen budget polarization on an enormous scale. The cost of AAA development has ballooned, and continues to do so, pricing out all but the biggest warchests, while the indie and mobile explosions are rapidly approaching the point of inevitable over-saturation and consequential contraction. Stories about the plight of mid-tier studios are ten-a-penny, with the gravestones of some notable players lining the way.

For a company like Ninja Theory, in many ways the archetypal mid-tier developer, survival has been a paramount concern. Pumping out great games (Ninja Theory has a collective Metacritic average of 75) isn’t always enough. Revitalizing a popular IP like DMC isn’t always enough. Working on lucrative and successful external IP like Disney Infinity isn’t always enough. When the fence between indie and blockbuster gets thinner and thinner, it becomes ever harder to balance upon.

Last year, Ninja Theory took one more shot at the upper echelons. For months the studio had worked on a big budget concept which would sit comfortably alongside the top-level, cross-platform releases of the age: a massive, multiplayer sci-fi title that would take thousands of combined, collaborative hours to exhaust. Procedurally generated missions and an extensive DLC structure would ensure longevity and engagement. Concept art and pre-vis trailers in place, the team went looking for funding. Razor was on its way.

Except the game never quite made it. Funding failed to materialize, and no publisher would take the project on. It didn’t help that the search for a publishing deal arrived almost simultaneously with the public announcement of Destiny. Facing an impossible task, the team abandoned the project and moved on with other ideas. Razor joined a surprisingly large pile of games that never make it past the concept stage.

Sadly, it’s not a new story. In fact, at the time, it wasn’t even a news story. But this time Ninja Theory’s reaction was different. This was a learning experience, and learning experiences should be shared. Team lead and co-founder Tameem Antoniades turned the disappointment not just into a lesson, but a new company ethos: involve your audience at an early stage, retain control, fund yourself, aim high, and don’t compromise. The concept of the Independent AAA Proposition, enshrined in a GDC presentation give by Antoniades, was born.

Now the team has a new flagship prospect, cemented in this fresh foundation. In keeping with the theme of open development and transparency, Hellblade is being created with the doors to its development held wide open, with community and industry alike invited to bear witness to the minutiae of the process. Hellblade will be a cross-platform game with all of the ambition for which Ninja Theory is known, and yet it is coming from an entirely independent standpoint. Self-published and self-governed, Hellblade is the blueprint for Ninja Theory’s future.

“We found ourselves as being one of those studios that’s in the ‘squeezed middle’,” project lead Dominic Matthews says. “We’re about 100 people, so we kind of fall into that space where we could try to really diversify and work on loads of smaller projects, but indie studios really have an advantage over us, because they can do things with far lower overheads. We have been faced with this choice of, do we go really, really big with our games and become the studio that is 300 people or even higher than that, and try to tick all of these boxes that the blockbuster AAA games need now.

“We don’t really want to do that. We tried to do that. When we pitched Razor, which we pitched to big studios, that ultimately didn’t go anywhere. That was going to be a huge game; a huge game with a service that would go on for years and would be a huge, multiplayer experience. Although I’m sure it would have been really cool to make that, it kind of showed to us that we’re not right to try to make those kinds of games. Games like Enslaved – trying to get a game like that signed now would be impossible. The way that it was signed, there would be too much pressure for it to be…to have the whole feature set that justifies a $60 price-tag.

“That $60 price-tag means games have to add multiplayer, and 40 hours of gameplay minimum, and a set of characters that appeal to as many people as they possibly can. There’s nothing wrong with games that do that. There’s some fantastic games that do, AAA games. Though we do think that there’s another space that sits in-between. I think a lot of indie games are super, super creative, but they can be heavily stylised. They work within the context of the resources that people have.

“We want to create a game that’s like Enslaved, or like DMC, or like Heavenly Sword. That kind of third-person, really high quality action game, but make it work in an independent model.”

Cutting out the middle-man is a key part of the strategy. But if dealing with the multinational machinery of ‘big pubs’ is what drove Ninja Theory to make such widespread changes, there must surly have been some particularly heinous deals that pushed it over the edge?

“I think it’s just a reality of the way that those publisher/developer deals work,” Matthews says. “In order for a publisher to take a gamble on your game and on your idea, you have to give up a lot. That includes the IP rights. It’s just the realities of how things work in that space. For us, I think any developer would say the same thing, being able to retain your IP is a really important thing. So far, we haven’t been out to do that.

“With Hellblade, it’s really nice that we can be comfortable in the fact that we’re not trying to appeal to everyone. We’re not trying to hit unrealistic forecasts. Ultimately, I think a lot of games have unrealistic forecasts. Everyone knows that they’re unrealistic, but they have to have these unrealistic forecasts to justify the investment that’s going into development.

“Ultimately, a lot of games, on paper, fail because they don’t hit those forecasts. Then the studios and the people that made those games, they don’t get the chance to make any more. It’s an incredibly tough market. Yes, we’ve enjoyed working with our publishers, but that’s not to say that the agreements that developed are all ideal, because they’re not. The catalyst to us now being able to do this is really difficult distribution. We can break away from that retail $60 model, where every single game has to be priced that way, regardless of what it is.

Driven into funding only games that will comfortably shift five or six million units, Matthews believes that publishers have no choice but to stick to the safe bets, a path that eventually winnows down diversity to the point of stagnation, where only a few successful genres ever end up getting made: FPS, sports, RPG, maybe racing. Those genres become less and less distinct, while simultaneously shoe-horning in mechanics that prove popular elsewhere and shunning true innovation.

While perhaps briefly sustainable, Matthews sees that as a creative cul-de-sac. Customers, he feels, are too smart to put up with it.

“Consumers are going to get a bit wary of games that have hundreds of millions of dollars spent on them”

“I think consumers are going to get a bit wary. Get a bit wary of games that have hundreds of millions of dollars spent on them. I think gamers are going to start saying, ‘For what?’

“The pressures are for games to appeal to more and more people. It used to be if you sold a million units, then that was OK. Then it was three million units. Now it’s five million units. Five million units is crazy. We’ve never sold five million units.”

It’s not just consumers who are getting wise, though. Matthews acknowledges that the publishers also see the dead-end approaching.

“I think something has to be said for the platform holders now. Along with digital distribution, the fact that the platform holders are really opening their doors and encouraging self-publishing and helping independent developers to take on some of those publishing responsibilities, has changed things for us. I think it will change things for a lot of other developers. “Hellblade was announced at the GamesCom Playstation 4 press conference. My perception of that press conference was that the real big hitters in that were all independent titles. It’s great that the platform holders have recognised that. There’s a real appetite from their players for innovative, creative games.

“It’s a great opportunity for us to try to do things differently. Like on Hellblade, we’re questioning everything that we do. Not just on development, but also how we do things from a business perspective as well. Normally you would say, ‘Well, you involve these types of agencies, get these people involved in this, and a website will take this long to create.’ The next thing that we’re doing is, we’re saying, ‘Well, is that true? Can we try and do these things a different way,’ because you can.

“There’s definitely pressure for us to fill all those gaps left by a publisher, but it’s a great challenge for us to step up to. Ultimately, we have to transition into a publisher. That’s going to happen at some point, if we want to publish our own games.”

Courtesy-GI.biz

Technology Has Had Negative Impact On Privacy, Survey Reveals

January 21, 2015 by mphillips  
Filed under Around The Net

Internet users in the U.S., France Germany and other nations are increasingly concerned about the impact technology has on privacy, and feel legal protections are insufficient.

In 11 of the 12 countries surveyed as part of a report published by Microsoft, respondents said that technology’s effect on privacy was mostly negative. Most concerned were people in Japan and France, where 68 percent of the respondents thought technology has had a mostly negative impact on privacy.

A majority want better legal protections and say the rights of Internet users should be governed by local laws irrespective of where companies are based.

Internet users in India, Indonesia and Russia were the least concerned, according to the survey. In general, those in developing countries were less bothered.

Surveys like this one should always be looked at with a healthy dose of skepticism. But there is little doubt that people are wary of how their personal data is used by companies and governments, according to John Phelan, communications officer at European consumer organization BEUC.

That people shouldn’t take privacy for granted has been highlighted on several occasions in just the last week.

Shortly after the horrific Paris shootings, British Prime Minister David Cameron was criticized for saying that authorities should have the means to read all encrypted traffic.

Also, U.S. mobile operator Verizon Wireless found itself in hot water over the way one of its advertising partners used the Unique Identifier Headers Verizon embeds in its customers’ Internet traffic to recreate tracking cookies that had been deleted by users. Online advertising company Turn defended its practises, but still said on Friday it would stop using the method by next month.

Worries about privacy aren’t likely to subside anytime soon, with more devices becoming connected as part of the expected Internet of Things boom.

The “Views from Around the Globe: 2nd Annual Poll on How Personal Technology is Changing our Lives” survey queried 12,002 Internet users in the U.S., China, India, Brazil, Indonesia, South Africa, South Korea, Russia, Germany, Turkey, Japan and France.

 

 

 

NSA Reportedly Hijacked And Repurposed Third-Party Malware

January 21, 2015 by mphillips  
Filed under Around The Net

In addition to having its own bag of digital tricks, the U.S. National Security Agency reportedly hijacks and repurposes third-party malware.

The NSA is using its network of servers around the world to monitor botnets made up of thousands or millions of infected computers. When needed, the agency can exploit features of those botnets to insert its own malware on the already compromised computers, through a technology codenamed Quantumbot, German news magazine Der Spiegel reported.

One of the secret documents leaked by former NSA contractor Edward Snowden and published by Der Spiegel contains details about a covert NSA program called DEFIANTWARRIOR that’s used to hijack botnet computers and use them as “pervasive network analysis vantage points” and “throw-away non-attributable CNA [computer network attack] nodes.”

This means that if a user’s computer is infected by cybercriminals with some malware, the NSA might step in, deploy their own malware alongside it and then use that computer to attack other interesting targets. Those attacks couldn’t then be traced back to the NSA.

According to the leaked document, this is only done for foreign computers. Bots that are based in the U.S. are reported to the FBI Office of Victim Assistance.

The NSA also intercepts and collects data that is stolen by third-party malware programs, especially those deployed by other foreign intelligence agencies, if it is valuable. It refers to this practice as “fourth party collection.”

In 2009, the NSA tracked a Chinese cyberattack against the U.S. Department of Defense and was eventually able to infiltrate the operation. It found that the Chinese attackers were also stealing data from the United Nations so it continued to monitor the attackers while they were collecting internal UN data, Der Spiegel reported.

It goes deeper than that. One leaked secret document contains an NSA worker’s account of a case of fifth party collection. It describes how the NSA infiltrated the South Korean CNE (computer network exploitation) program that targeted North Korea.

“We found a few instances where there were NK officials with SK implants on their boxes, so we got on the exfil [data exfiltration] points, and sucked back the data,” the NSA staffer wrote in the document. “However, some of the individuals that SK was targeting were also part of the NK CNE program. So I guess that would be the fifth party collect you were talking about.”

In other words, the NSA spied on a foreign intelligence agency that was spying on a different foreign intelligence agency that had interesting data of its own.

Sometimes the NSA also uses the servers of unsuspecting third parties as scapegoats, Der Spiegel reported. When exfiltrating data from a compromised system, the data is sent to such servers, but it is then intercepted and collected en route though the NSA’s vast upstream surveillance network.

 

 

 

 

Microsoft Looking Into Light Beams

January 21, 2015 by Michael  
Filed under Around The Net

Microsoft Researchers have worked out a way that means you will never have to plug in your phone again.

Yunxin Liu, Zhen Qin and Chunshui Zhao from Microsoft Research’s Beijing campus have developed a new system they call AutoCharge.

The researchers’ paper said that “wireless power methods have several disadvantages, preventing them from being used in our targeted usage scenarios”

Electromagnetic radiation of wireless power is much higher than wireless communications (Wi-Fi or 3G). Thus, safety to human bodies is a big issue in wireless power. As a result, wireless power is usually used only in extreme scenarios such as in outer space, for military purposes, or in very short ranges.

Radio frequencies used in wireless power are much lower than the frequencies of light, it is hard to emit the radio waves within a straight beam. This causes energy waste if the receiver is not large enough and makes it hard to ensure safety.
The current crop of wireless charging solutions for smartphones typically require special phone cases and ‘charging pads’, and work using electromagnetic induction. Power is transmitted only over a few centimetres.

However the researchers came up with a way of using solar power techniques to charge smartphones.

Indoor surrounding light is usually much than the sunlight and thus cannot be used to charge a smartphone but instead of relying on the sun, the team built a prototype charger that can be mounted on a ceiling and automatically locate a smartphone lying on a table, then charge it using a directed beam of light.

The light charger has two modes. In the ‘detection’ mode, it uses a camera and image recognition software to detect objects with the size and shape of a smartphone lying on a table. The charger will rotate until it detects an object that looks like a smartphone.

The device then enters charging mode and turns on its light. The prototype used an UltraFire CREE XM-L T6 Focusing LED Flashlight.

Courtesy-Fud

Will Apple Drop Intel?

January 21, 2015 by Michael  
Filed under Computing

Intel’s CEO Brian Krzanich has shrugged off rumors that Apple is about to switch to ARM in future Mac releases.

Of course the Tame Apple Press is declaring that this will mean the end of Intel as we know it. AppleInsider even ran a story claiming that Intel’s mobile was effectively destroyed by Apple’s Ax ARM Application Processors

After all only five or six percent of the world run on Apple Macs so the loss of Apple business would be annoying to Intel but no great problem.

Krzanich says the rumors of Apple switching to ARM are just that anyway and not likely.

“Apple is always going to choose the supplier who can provide the most amount of capability in innovation to build on. They’re a company based on innovation.”

Krzanich, who maintains that Intel needs to continue focusing on delivering parts that are better than its competitors.

But does Intel have anything to worry about? Well not really. Apple Macs are at the expensive end of the market and they need chips to match their price tag – well at least half of their price tag. ARM is still a long way from matching anything remotely like the what Intel shoves under the bonnet of Apple macs.

Courtesy-Fud

U.S. And Britain Ramping Up Joint Cyber Defense Efforts

January 20, 2015 by mphillips  
Filed under Around The Net

The U.S. and Britain are increasing their collaboration to thwart digital threats. They are planning to launch more attacks against each other to test their defenses and scare away possible enemies.

The U.S. and the U.K. have been working together to prevent cyber attacks for some time, but are going to increase the collaboration. They will combine their expertise to set up “cyber cells” on both sides of the Atlantic to increase sharing information about threats and to work out how to best protect themselves and create a system that lets hostile states and organization know they shouldn’t attack, said U.K. prime minister David Cameron in an interview published by the BBC.

Cyber attacks “are one of the biggest modern threats that we face,” according to Cameron who is visiting Washington for talks with U.S. president Barack Obama. One of the topics high on the agenda is digital security.

The countries will increase the “war games” launched at each other to test defenses. “It is happening already but it needs to be stepped up,” Cameron said, adding that British intelligence service GCHQ and the U.S. equivalent NSA have know-how that should be shared more.

“It is not just about protecting companies, it is also about protecting people’s data, about protecting people’s finances. These attacks can have real consequences to people’s prosperity,” he said.

The increased cooperation between the countries comes in the wake of the Sony hack and the apparent hacking of the U.S. Central Command’s Twitter account by ISIS (Islamic State of Iraq and Syria), which posted tweets threatening families of U.S. soldiers and claiming to have hacked into military PCs.

 

 

 

Will Windows 10 Have An Impact On Tablets?

January 20, 2015 by Michael  
Filed under Computing

CCS Insight has said that, while Microsoft’s share of the tablet market is expected to grow, Windows 10 will have “little impact” before the end of 2016.

CCS has cast its eye over tablet sales, and said that while the market saw minimal growth in 2014, sales are likely to increase by 28 percent in 2015.

The growth will largely be driven by Android, thanks to affordably priced tablets running Google’s software, while Apple is expected to continue to woo those in the market for a high-end device.

Apple will also grow its position in the business tablet market, CCS expects, thanks to its partnership with IBM.

However, CCS stressed that Microsoft should not be overlooked. Sales of Windows-based tablets won’t see huge growth this year, but will gain a bigger share of the market.

Marina Koytcheva, CCS director of forecasting, said: “We expect Android to continue dominating the low-end and mid-range market, with Apple taking the lion’s share of the high-end.

“But Windows is gaining a bigger slice of the pie, albeit from a very low level, and should not be overlooked.”

Koytcheva added that Microsoft’s decision to scrap its licence fee for Windows devices under 9in is a major factor.

“It has given Windows fresh impetus, as it has spurred manufacturers to produce a better range of devices at a variety of prices, as low as $99 for HP’s Stream 7, for example,” she said.

Windows 10 is expected to make its debut on 21 January, but isn’t likely to have much of an impact, according to CCS.

“Microsoft still runs the risk of failing to convert the wide availability of cheaper Windows tablets into strong growth in unit sales before 2017,” Koytcheva said.

“Windows 10 will take time to make its mark, and developers will need a few months to perfect applications for the new platform. We expect Windows 10 to have little impact on tablet sales before late 2016.”

Courtesy-TheInq

Alibaba Piloting Social Networking For Businesses

January 19, 2015 by mphillips  
Filed under Mobile

China’s Alibaba Group Holding Ltd , the world’s biggest e-commerce company, is piloting a mobile messaging app geared toward merging social networking with business, an Alibaba spokeswoman said, as the company expands its enterprise services.

The app, called DingTalk, was quietly made available in December and is still in beta testing, according to its website.

Capable of carrying conference calls and group messaging, DingTalk targets small- and medium-sized enterprises, many of which are already Alibaba’s customers. The company has 8.5 million active sellers on its various e-commerce platforms, according to Alibaba’s initial public offering prospectus.

It is not Alibaba’s first stab at a mobile messaging app and others have become hot property in the tech sector. The company’s arch-rival, Tencent Holdings Ltd,  operates WeChat, known as Weixin in China, which has 468 million monthly active users and was estimated to be worth as much as $64 billion by brokerage CLSA.

Underscoring the appeal of such apps, Facebook Inc  in October completed its $22 billion acquisition of WhatsApp.

But Alibaba’s previous attempt at a mobile messaging app, Laiwang, is seen by many analysts and industry observers as a dud, with the Chinese market dominated by Tencent’s WeChat.

By going for smaller companies, DingTalk is chasing a target audience that already includes many Alibaba clients. This fits with its broader enterprise strategy, including the Alibaba Cloud Computing business, which also serves Alibaba’s merchants as well as other companies.

“DingTalk is a versatile mobile communications app that fills a gap in the market for corporate mobile messaging,” the Alibaba spokeswoman said.

 

 

AMD Headed To The Facial Recognition Space

January 19, 2015 by Michael  
Filed under Computing

AMD has developed facial recognition technology to enable users to organize and search video clips based on the people featured in them.

AMD executive Richard Gayle demonstrated to Tom’s Guide how AMD Content Manager, uses facial recognition to browse through a group of local videos to find specific faces.

There is an index that displays the people’s faces that have been detected throughout the video clips.

The user can edit the names of the people as well as add keyword tags to help improve future searches for specific people.

For instance, if you are searching for videos that feature one person, you can click on his or her respective face to pull up the corresponding videos.

Additionally, if you want to narrow a search to a specific person combined with a keyword tag, you can drag the face icon and click on the desired keyword.

Once you click on the video you wish to view, a player appears in the right windowpane, along with a timeline displayed at the bottom with a list of all the people who appear in the video.

The timeline is separated into various coloured boxes to mark the exact moment in the video when each person first appears on screen, so you do not have to watch the entire video to see the bit you want.

The application also has facial recognition capabilities that allow users to do some basic editing, such as compiling a single montage video of any individual or individuals.

While this is pretty good technology, it probably does not have any major use yet on its own.

Gayle said it is unlikely that AMD will release Content Manager in its current form but will license it to OEMs that are able to rebrand the application before offering it on their respective systems.

He claimed that only AMD processors have sufficient power to operate the application, because of the processor’s ability to have the CPU, GPU and memory controller work closely together.

Courtesy-Fud