The app, named Livetext, is video calling with a twist: there’s no audio. To communicate, users type texts and emojis that are overlaid onto the screen during the call.
The app’s format might sound restricting, but Yahoo says Livetext will help users to communicate more freely. The lack of audio, the company says, removes inhibitions that people might feel when they otherwise receive video calls in public.
“We wanted to bridge the gap between the simplicity and ease of texting, with the live feeling of calling,” said Adam Cahan, senior vice president of video, design and emerging products at Yahoo, during the app’s unveiling at an event in New York on Wednesday that was webcast.
Livetext was developed from scratch at Yahoo. Its development was aided by Yahoo’s acquisition last year of mobile messaging app MessageMe, the company said Wednesday. It’s yet another messaging app in a sea of competitors like Snapchat, WhatsApp and Facebook Messenger.
Still, Livetext is the latest attempt by Yahoo to provide a messaging app that resonates with users. It became available to download for free on Thursday for iOS and Android, in the U.S., U.K, Canada, Ireland, Germany, France, Hong Kong and Taiwan. Users will be able to text in English, French, German and Chinese using the app.
The app streams video only when two people are connected through the app at the same time. Users can search for friends in the app through their Livetext user name, or through the contacts list on their phone.
There is no time limit on calls placed through the app, and no way to save or archive the sessions. The video quality will depend on the strength of the data connection, although connections at 3G and above should suffice, Yahoo said.
It’s available on Android and the desktop, but not on iOS.
In the key smartphone market, an area led by Samsung until recently, the popularity of Apple’s iPhone 6 and 6 Plus handsets and the rise of lower-cost phones from Chinese vendors squeezed Samsung at both the high and low end of the market.
The company said Galaxy S6 and S6 Edge sales were lower than expected.
It still managed to make money but not nearly as much as the same time last year. Operating profit for the quarter was 2.8 trillion won, down about 38 percent on the same period of 2014.
The results come against a backdrop of continuing record quarterly results at smartphone rival Apple. It sold 47.5 million phones in the quarter and recorded sales of $49.6 billion and a quarterly net profit of $10.7 billion — both squarely ahead of sales and profits at Samsung.
For the rest of this year, Samsung said it will attempt to boost smartphone sales by reducing the price of the Galaxy S6 and introducing new large-screen models. This time more than ever before, the company is under intense pressure to score a hit with a new phone to help turn around its declining business.
United Microelectronics (UMC) expects to post an up to 5 per cent decrease in wafer shipments for the third quarter of 2015.
The outfit’s capacity rate will fall below 90 per cent for the first time after being flat out for ages.
UMC CEO Po-Wen Yen said the third quarter, would suffer from the inventory correction problems that were first noticed in the first quarter.
Current weakness in overall demand, partly due to the uncertainties in economic outlook, will prolong the inventory adjustment through the second half of 2015,” he said.
UMC used 94 per cent of its overall capacity in the second quarter of 2015, when the company shipped a record 1.54 million 8-inch equivalent wafers.
Shipments during the quarter were driven mainly by 28nm products, the foundry noted.
UMC reported consolidated revenues of $1.23 billion for the second quarter, down 6 per cent on last year. Gross margin came to 22.9 per cent compared with 24.3 per cent in the first quarter and 22.9 per cent in second.
UMC created net profits of $1.45 billion in the second quarter of 2015 – the highest level in nine quarters.
Looking into the third quarter, UMC expects to use 87-89 per cent of its overall capacity in the third quarter. Wafer shipments and ASPs will fall up to 5 per cent and about 3 per cent, respectively, on quarter.
Uber Technologies has rolled out its own auto leasing subsidiary in an effort to secure more drivers, injecting the fast-growing ride services company directly into the financial services sector for the first time.
The move by Uber, announced as a pilot project, follows the end of its partnership with Banco Santander’s U.S. lending unit earlier this year.
Uber announced the initiative but disclosed few financial details, though it said it would offer both new and used cars.
Uber launched a program in November 2013 to arrange manufacturer discounts and lenders for prospective drivers who lacked cars in the hopes it would boost vehicles driving for the app-based service.
At the time, Uber said it hoped to finance 100,000 drivers. Nearly 20,000 drivers have participated in the program so far, Uber said.
Santander Consumer USA Holdings declined to comment last week on why the Uber leasing deal ended. Uber continues to partner with other lenders for car purchases.
Andrew Chapin, head of vehicle solutions for Uber, this week said Uber wants to provide drivers with more flexibility than traditional leasing companies can offer. Participants in Uber’s program can return their vehicle with two weeks notice and “limited additional costs,” the company said.
One of the fastest-growing sharing-economy companies, Uber operates in 57 countries, with an estimated value of more than $40 billion. It has also tangled with transportation authorities across the globe, along with attorneys seeking to deem Uber drivers employees entitled to benefits.
Uber’s entry into auto leasing brings it into contact with yet another set of regulators in a controversial business. The U.S. Consumer Financial Protection Bureau last month said it would oversee non-bank auto lenders who process at least 10,000 loans or leases per year.
The CFPB said it seeks to ensure such leases are marketed accurately, and that debt collectors operate fairly.
Workhorse isn’t as high profile as Amazon or Google, but it demonstrated an eight-rotor delivery drone designed to work with its electric trucks and use some of the same battery technology.
“Our concept is, you have a package-delivery drone that rides on top of a truck as the driver goes about his day, and helps to pick off outliers on his route to help cut down on the cost of delivery per package,” said Elliot Bokeno, a mechanical engineer with Workhorse, who demonstrated the drone at a conference at NASA’s Ames Research Center in Silicon Valley.
If a driver had four deliveries in one part of town but only one in another, the drone might be able to handle that single, less convenient delivery.
The technology combines autonomous and manual control.
GPS is used to determine the delivery location, and the drone flies there without any human input, Bokeno said. But when it gets to the address, a downward-pointing camera switches on and an operator at a remote center takes over.
The operator guides the drone down, making sure to avoid people and obstacles, and releases the package. The drone then resumes autonomous flight and makes its way back to the truck.
In tests, the drone has flown as fast at 55 mph and has a maximum flight time of 30 minutes. The company is working with Panasonic, which provides batteries for Workhorse’s electric vehicles, on more advanced battery technology that will increase flight times to 45 minutes.
Bokeno said his company has already talked to several package delivery companies about using its technology.
For now, tests of the technology over relatively short distances continue. Workhorse is collaborating with the University of Cincinnati and hopes to begin multi-mile delivery tests soon.
“This is unacceptable and we’re not happy about it,” Jack Dorsey, who stepped in as interim chief executive on July 1, said on a call with analysts.
Twitter said it had 304 million core users in the second quarter, up from 302 million in the prior quarter.
Twitter’s struggles to increase its audience worries investors, who are focused on the company’s growth potential, and the latest figures did little to reassure them.
The data on users overshadowed the company’s second-quarter earnings and revenue, which exceeded expectations, and its bullish projections for future revenue.
Executives also made clear it would be a long process, and were candid about problems with the service.
“We do not expect to see sustained meaningful growth (in monthly active users) until we start to reach the mass market,” Chief Financial Officer Anthony Noto said on the call.
“We have not clearly communicated Twitter’s unique value. And as a result non-users continue to ask, ‘Why should I use Twitter?’ “Simply said, the product remains too difficult to use.”
Twitter recognizes “there is an issue that needs to be worked on,” Evercore ISI analyst Ken Sena said. “They were giving investors a sense of the challenge and I think the stock sell-off that you saw just reflected that.”
Finland’s Nokia, once the world’s largest mobile phone manufacturer, has debuted a spherical camera designed for making 3D movies and games that can be watched and played with virtual reality headsets.
The device, showcased at an event in Los Angeles, takes video and audio in 360 degrees with eight sensors and microphones, and is the first from Nokia’s digital media solutions business — one of its new focuses for future growth.
Nokia is going through restructuring after selling its mobile phone business to Microsoft last year and following that up with a proposed 15.6 billion euro ($17.2 billion) acquisition of Alcatel-Lucent, which is set to boost its main network equipment business.
“We expect that virtual reality experiences will soon radically enhance the way people communicate and connect to stories, entertainment, world events and each other,” Nokia executive Ramzi Haidamus said in a statement.
In May, GoPro introduced a similar system using 16 cameras and Google’s software, while several other technology companies such as Facebook and Samsung have announced different plans to enter the virtual reality market.
Nokia is also planning to come back to the phone business by designing and licensing handsets once its deal with Microsoft allows it to do that late next year.
The National Security Agency has said that it will end its access to most bulk data collected under a controversial surveillance program in November, but keep records for litigation purposes.
The office of the Director of National Intelligence said in a statement that the bulk telephony data — the subject of leaks by former intelligence contractor Edward Snowden which shocked many in the US and abroad — would be destroyed “as soon as possible” to comply with a law passed by Congress in early June.
The statement said that during the 180-day transition period required under the USA Freedom Act, “analytic access to that historical metadata… will cease on November 29, 2015.”
But it added that “for data integrity purposes,” NSA will allow technical personnel to continue to have access to the metadata for an additional three months.
The NSA must preserve bulk telephony metadata collection “until civil litigation about the program is resolved, or the relevant courts relieve NSA of such duties.”
The data kept for litigation “will not be used or accessed for any other purpose, and, as soon as possible, NSA will destroy the Section 215 bulk telephony metadata on expiration of its litigation preservation duties.”
The U.S. National Security Agency will no longer have access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National Intelligence announced .
Congress voted in June to rein in the NSA’s mass collection of U.S. phone metadata, which includes information such as the timing and location of calls. The Foreign Intelligence Surveillance Court, also known as the FISA court, then gave the NSA 180 days to wind down the program.
The Director of National Intelligence had been evaluating whether the NSA should maintain access to the historical data it collected after that 180 days is up. It’s now determined that access to that data will cease on Nov. 29.
After that date, the NSA must receive approval from the FISA court to request the data from phone companies on a case-by-case basis.
NSA personnel will have continued access to the historical data for an additional three months, “solely for data integrity purposes” to verify records produced under that new, case-by-case system.
The NSA will also need to preserve the metadata until civil lawsuits over the program have been resolved, or until “the relevant courts relieve NSA of such obligations,” the Office of the Director of National Intelligence said Monday.
The metadata “will not be used for any other purpose,” and will be destroyed when the litigation is over, the office said.
Internet.org turns one year old this week, and Facebook says it’s ready to scale the project to reach more people.
The company is making it easier for more mobile operators to join the project by launching an online portal where they’ll find technical tools and best practices to help them get started.
So far, Facebook has been working with about a dozen operators in 17 countries to provide an app that gives people free access to a set of basic Internet services.
According to Facebook, people who use the app quickly become paying subscribers — something that will no doubt appeal to the mobile operators it’s trying to partner with.
“Internet.org brings new users onto mobile networks on average over 50 percent faster after launching free basic services, and more than half of the people who come online through Internet.org are paying for data and accessing the Internet within the first 30 days,” Facebook said.
The Internet.org mobile app is perhaps the most tangible element in Facebook’s efforts to expand Internet access — and its own services — to more people throughout the world. It’s also using satellites, drones and lasers that can beam Internet signals through space to bring people online.
While the number of people with Internet access continues to grow, 4.2 billion of the world’s roughly 7.4 billion people will still be offline by the end of the year, according to data from the International Telecommunication Union.
The Internet.org app typically includes a stripped-down version of Facebook and access to other free services like weather reports, health information and services for finding jobs.
CEO Mark Zuckerberg has said Facebook could become the Internet on-ramp for the world.
Researchers from the University of Salerno and the Sapienza University of Rome in Italy have used three different techniques to obfuscate exploits like the ones usually used in drive-by download attacks.
Functionality provided by HTML5 can be efficient for malware obfuscation, the Italians have proved.
Modern security software can detect a big chunk of threats, but if they use some HTML5 features to hide the exploits served in drive-by download attacks, they could evade static and dynamic detection systems.
Experts say some of these APIs can be used to deliver and assemble the exploit in the web browser without being detected.
One method dubbed “delegated preparation” involves delegating the preparation of the malware to system APIs.
Another called “distributed preparation,” shares the code over concurrent and independent processes running within the browser.
A third involves triggering the code preparation based on the user’s actions on the malicious webpage or website.
VirusTotal detection rates for these sorts of obscured attacks remains low.
The paper published by researchers, with the catchy title of “Using HTML5 to Prevent Detection of Drive-by-Download Web Malware,” contains recommendations about some of the steps that can be taken to counter these obfuscation techniques.
The SE370 monitor will come in 23.6-inch and 27-inch formats and is the industry’s first to have an integrated wireless charging station, the South Korean manufacturer said Monday.
But your phone will have to support the Qi wireless charging standard, which was developed by the Wireless Power Consortium (WPC) and is supported by makers such as Samsung, Sony, LG, HTC and Huawei.
The charging area is on the stand for the monitor, and an LED lights up when it’s in use. The monitor has a 1920 x 1080 resolution and is optimized for video games, with richer black hues when it’s in game mode. The screen will not distort graphics with stutter and lag and has a response time of 4 milliseconds, Samsung said.
Compatible with Mac OS X and Windows 10, the SE370 also has an eye-saver mode that reduces blue light, which is believed to cause eye strain and sleep problems.
Samsung did not provide information about pricing or availability for the SE370 monitor and did not immediately respond to a request for more information.
The company’s Galaxy S6 and GS6 edge flagship smartphones support the Qi and rival Power Matters Alliance (PMA) standards for wireless charging. Earlier this year, Samsung released its own branded charging pad to juice them up.
The latest Qi specification, announced last month, will allow manufacturers to provide much faster wireless power charging options than earlier versions.
The platform has also caught on with makers such as Ikea, which launched a collection of furniture in April with built-in Qi-enabled wireless chargers.
Qi had been competing with PMA and the Alliance for Wireless Power (A4WP). Following a decision earlier this year, however, the two organizations announced their merger in June, with a new name yet to be decided.
Police in Beijing have raided a factory that made more than 41,000 fake iPhones worth as much as 120 million yuan ($19 million), including some that reached the United States, and have arrested nine suspects in the counterfeiting operation.
Apple is one of the most popular brands in China, where authorities have stepped up efforts in recent years to dispel the country’s reputation for turning out counterfeit goods.
Officials have taken stiffer action to enforce intellectual property (IP) rights, pushed firms to apply for trademarks and patents and cracked down on fakes.
Police arrested nine people, including a married couple who led the operation, after a raid in May on the factory, run under the guise of a gadget maintenance shop on the northern outskirts of the Chinese capital.
The details were revealed in a social media posting on Sunday by the public security bureau in Beijing.
The group, headed by a 43-year old man, surnamed Yu, and his 40-year old wife, surnamed Xie, both from the southern hardware manufacturing city of Shenzhen, allegedly set up the Beijing factory with six assembly lines in January, the bureau said.
They hired “hundreds” of workers to repackage second-hand smartphone components as iPhones for export, it added.
Police seized 1,400 handsets and large quantities of accessories during the May 14 raid. In the United States, the newest Apple Inc handsets can fetch $649, or more, depending on the model.
Beijing police said their investigation followed a tip-off from U.S. authorities who seized some of the fake devices.
The destination of the counterfeit phones, and how many made it there, remains unknown.
Public security representatives declined to comment on Monday, telling Reuters they had no additional information.
Apple also declined to comment, saying the investigation was ongoing.
The software genii at Apple have redesigned their OSX software to allow malware makers to make designer micro-software that can infect Macs with rootkits.
Obviously the feature is one that Apple software experts designed specifically for malware writers, perhaps seeing them as an untapped market.
The bug in the latest version of Apple’s OS X allows attackers root user privileges with a micro code which could be packed into a message.
Security researcher Stefan Esser said that this was the security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications.
The OS X privilege-escalation flaw stems from new error-logging features that Apple added to OS X 10.10. Plainly the software genii did not believe that standard safeguards involving additions to the OS X dynamic linker dyld applied to them because they were protected from harm by Steve Job’s ghost.
This means that attackers to open or create files with root privileges that can reside anywhere in the OS X file system.
“This is obviously a problem, because it allows the creation or opening (for writing) of any file in the filesystem. And because the log file is never closed by dyld and the file is not opened with the close on exec flag the opened file descriptor is inherited by child processes of SUID binaries. This can be easily exploited for privilege-escalation,” Esser said.
The vulnerability is present in both the current 10.10.4 (Yosemite) version of OS X and the current beta version of 10.10.5. Importantly, the current beta version of 10.11 is free of the flaw, an indication that Apple developers may already be aware of the vulnerability.
An Apple spokesman said that engineers are aware of Esser’s post of course they did not say they would do anything about it. They will have to go through the extensional crisis involved in realising that their product was not secure or perfect. Then the security team will have to issue orders, signed in triplicate, sent in, sent back, queried, lost, found, subjected to an internal inquiry, lost again, and finally bury it in soft peat for three months and recycled as firelighters.
IBM has added another stick to its pile, picking up a company called Compose to increase its standing in the cloud database-as-a-service (DBaaS) market.
The firm has come straight out with the news and explained how it expects to benefit.
Compose, it said, offers a bountiful on-demand business and will let IBM roll out DBaaS offerings to a presumably hungry market. IBM has a big focus on the cloud and likes to see action around its Bluemix platform.
IBM said that Compose is a player in the MongoDB, Redis, Elasticsearch and PostgreSQL DBaaS game, and that this honour will extend itself to the new parent and its punters.
“Compose’s breadth of database offerings will expand IBM’s Bluemix platform for the many app developers seeking production-ready databases built on open source,” said Derek Schoettle, general manager of IBM cloud data services.
“Compose furthers IBM’s commitment to ensuring developers have access to the right tools for the job by offering the broadest set of DBaaS and the flexibility of hybrid cloud deployment.”
IBM acquires @composeio as complement to Cloudant CouchDB, cloud data warehouse, dashDB, and more #bluemix services. https://t.co/2j4ASqisGi
— IBM Bluemix™ (@IBMBluemix) July 23, 2015
There is money behind this, and IBM said that the DBaaS market is likely to be worth almost $20bn by 2020 thanks to thousands of companies and their multitudes of demands for easy to grasp databases. This is not the first cloudy move the firm had made.
Compose, naturally, is keen on the arrangement and expects that its union with the veteran firm will increase the scale of its services, and allow customers more freedom to innovate.
“By joining IBM, we will have an opportunity to accelerate the development of our database platform and offer even more services and support to developer teams,” said Kurt Mackey, co-founder and CEO at the firm.
“As developers, we know how hard it can be to manage databases at scale, which is exactly why we built Compose – to take that burden off our customers and allow them to get back to the engineering they love.”
No financial terms were revealed.