Friday, March 4, 2016

Dell's Embedded PCs Take the IoT to the Mainstream

xl-2016-dell-embedded-box-pc-1

Dell on Tuesday announced the release of its first purpose-built industrial PC products for the mainstream market: the Embedded Box PC 3000 Series and 5000 Series.


The products are a response to the growing embedded computing market and the lack of reliable devices, Dell said.

The embedded systems market was valued at more than US$11 billion in 2014 and is expected to reach $23.1 billion in 2019, growing at a compound annual rate of almost 15 percent, according to a Technavio study that Dell cited.

Falling component costs, improved power efficiencies, increasing return-on-investment needs, and demand from the Internet of Things are fueling that growth.

Known Quantity


"Customers have consistently told us that current embedded solutions do not meet the level of cost-effective sophistication, scale and support they need for these to be a critical, reliable component of their operations," said Andy Rhodes, Dell's executive director of commercial IoT solutions.

Dell provides global scale and an end-to-end IT and operations technology security portfolio, he said.

The products' rugged design can withstand extreme temperatures while using a fanless cooling system, which is beneficial in several applications, according to Dell spokesperson Sarah Luden.

"These were made to be used in a wide range of industries, from digital signage to factory automation and transportation and construction. Within factory automation, the fan is the first thing to go down," she told TechNewsWorld.

"It's also much quieter, so in a hospital setting, think of MRI machines, where patient care and comfort is important," Luden added.

The IoT is a new arena for many business owners, and investing in costly computers and programmers can be a scary proposition, she noted. "For some people, the Internet of Things is new, so they want to go with a brand they know."

Why This Box Is Different


What makes the Dell PC appealing is its out-of-the-box capabilities, said Christian Juarez, an instructor at TechShop.


Dell Embedded Box PC

Dell Embedded Box PC


The IoT is helping industries streamline their processes to make work more efficient. "The whole point of IoT is bringing everything to the cloud and then connecting to the Internet and then having a control center for it," Juarez told TechNewsWorld.

"What happens a lot of times is that you have to set up the control center yourself. If you're setting it up yourself, as opposed to what Dell's offering, you have to decide on your distro, have all kinds of software running to get everything working together, you have to code things yourself, things of that nature," he said.

"With Dell, they have software built in for you, so you don't have to do that much. Software can be a huge issue, so with something like an out-of-the-box embedded machine you're going to appeal to a lot more people," Juarez added.

Microcomputers like Raspberry Pi are used for control centers, he noted, but that kind of device requires expert-level programming skills that a Dell doesn't necessarily need, which may help companies save money in the long run.

The Embedded Box PCs will be available this summer. Pricing starts at $1,099 for the 3000 series and $1,699 for the 5000 series.


Source by: http://www.technewsworld.com

Windows 10 Gains on 7, Inch by Inch

xl-2015-windows10-4

Windows 10 last month had more user share than Windows XP and Windows 8, according to data released by NetMarketShare.


It held 11.85 percent of the global OS market, though Windows 7 was still No. 1 with 52.47 percent.

Though adoption has slowed, the NetMarketShare numbers helped validate Microsoft's claim last month that Windows 10 was active on 200 million devices.

Hot Start


Windows 10 dashed out to a 4.8 percent gain in user share in August, after launching the previous month. For January, the OS gained about 1.9 percent of global user share.

That gain was the biggest the OS has seen since August, and a holiday bump in PC sales may have boosted January's jump.

"Windows 10 is off to the hottest start in Windows history," Microsoft said in comments provided to the E-Commerce Times by spokesperson Carmen Vasilatos. It is "already running on more than 200 million devices, with unprecedented early demand from consumers and enterprise customers."

Microsoft attributed much of that momentum to its free upgrade offer. The upgrade was available to users running legitimate installations of Windows 7 and higher.

"With 300 million new PCs expected to ship in 2016 alone, we're looking forward to a great year ahead, along with our partners," Microsoft said.

The Surface: Windows 10's Interface


Microsoft hasn't explained the jump from Windows 8.1 to Windows 10, skipping over what would have been Windows 9.

Windows 8, and the Metro tiles it brought with it, turned a lot of people off, but people seem to appreciate the Windows 10 interface, according to Joe Silverman, owner of New York Computer Help.

"Windows 10 was well-reviewed by our technicians and customers in regard to its interface, especially from Windows 8," he told the E-Commerce Times.

Really Getting to Know Windows 10


Two separate tales have been playing out among Windows 10 migrants, according to Silverman.

Customers who bought new computers with Windows 10 preinstalled have been "relatively happy," but the story often is different for those upgrading to the OS, which he described as a potential memory hog after system updates slowed it down.

"At first, customers gladly upgraded to Windows 10 as it is a free upgrade," Silverman said. "Soon after, they complained about the slowness, and we have seen the aftereffects by customers requesting us to downgrade their computers to Windows 7 or 8."

It may be time for another major marketing push: The message of frustrated Windows 10 users has spread inside the tech community, according to Silverman.

"As such, other computer users are leery of performing the upgrade and shied away from installing Windows 10," he said. "It is likely the slow adoption of upgrading Windows 10 will continue due to the negative reviews it is getting."


Source by: http://www.technewsworld.com

Wall Street Backs Off Apple

apple-earnings-report

Their fears confirmed, investors were bearish on Apple Wednesday, the day after the company reported its slowest-growth quarter ever. The company's shares closed the day at US$93.44, down 6.55 percent.

In its Q1 earnings report, Apple prepared investors for what may come next: its weakest quarter for iPhone sales in 13 years. Even worse is that the company may not see a significant boost in handset sales until the launch of the iPhone 7 later this year.

Apple moved about 74.8 million iPhones during the quarter that ended in January, and the company forecast sales of between 50 and 52 million units during the three-month period that will end in March.

The news of Apple's slowing growth came on the heels of reports detailing the rise of Alphabet, Google's recently formed parent company, valued at around $500 billion.

For now, Apple is still the world's most valuable company, with a valuation of around $562 million.

Apple reported that it sold about 16 million iPads and 5.3 million Macs in Q1 -- down about 25 percent and 4 percent, respectively, from the year-ago quarter.

Keeping the Faith


Taking note of the general saturation of the smartphone market, many investors have been turning to Alphabet, Facebook and Amazon for growth. However, those companies rely on ad revenues, which could prove more volatile than Apple's handsets reliance.

Though hardware accounts for more than half of Apple's business, the company has been pivoting toward services, noted Larry Chiagouris, professor of marketing at Pace University'sLubin School of Business.

That should count for something with investors, he said.

"Its ecosystem, to include iTunes and iCloud services, are either already dominant or possibly on the way to being dominant, and so this is not the time to lose faith in the company or its stock," Chiagouris told the E-Commerce Times.

The current perceived loss of faith likely is a byproduct of the times, he suggested. In a connected world, speed rules and investors don't hesitate to look elsewhere for growth when a company stumbles.

Also, investors are more influenced by media reports today than they were a decade or two ago, Chiagouris pointed out.

"All the reporting as of late has been on iPhone sales slowing, and so investors are reacting to these reports," he said. "The more important fact is that, ultimately, hardware companies always confront shrinking margins as the products that they make begin to become less differentiated or even commoditized."

Too Big to Fail


Paradoxically, investor disappointment might be a consequence of Apple's historic rise to become the most valuable company in the world and its position at or near the top of any list of most-respected organizations, suggested Ritch Blasi, president of MediaRitch.

"By continually overachieving in offering innovative products and services, and outperforming financial targets, it has become a darling of investors," Blasi told the E-Commerce Times. "Apple's latest numbers are viewed as not quite up to snuff, and the financial markets are feeling jittery."

While investors may want to hedge some of their bets by looking elsewhere, it would be premature to count Apple out, he said. The company didn't become this powerful by chance.

"While it may never again have the impact magnitude it did when introducing the iPhone," said Blasi, "expect Apple to rebound from this financial burp and continue on its course of changing the way we work and live."


Source by: http://www.technewsworld.com

Major Security Flaw Found in Silent Circle's Blackphone

xl-2014-blackphone-1

Security researchers at SentinelOne on Wednesday revealed a vulnerability they discovered in the Blackphone.


The flaw -- an obscure socket -- lets an attacker take over and control communications on the Blackphone, a highly secure Android smartphoneSilent Circle developed and marketed in reaction to news of government surveillance of people's communications.

Silent Circle began taking preorders for the device in 2014, and "despite [its] best attempts, a severe zero day remained undetected for nearly a year before we uncovered it," said Tim Strazzere, SentinelOne's director of mobile research.

No Evidence of Exploitation


The vulnerability, a socket left open and accessible on the Nvidia Icera modem used in the Blackphone, lets attackers take control of many of the modem's functions, including sending and receiving text messages, dialing or connecting calls, and changing the phone's settings.

Attackers could use a malicious application that exploits the vulnerability in the background without the device owner's knowledge, Strazzere told TechNewsWorld.

Exploit-based attacks would be used against this open socket, and "any antivirus- or antimalware-based technology wouldn't prevent it," he observed. "Even an HIPS-based solution that focused on exploits would have missed it since this is a zero-day-based vulnerability with no available signatures used for protection."

The options available to an attacker "are extensive," Strazzere remarked, but "we have seen no evidence that [it] was ever used for surveillance or malicious purposes."

The vulnerability was discovered during a reverse engineering exercise to prepare for a Red Naga training session. Red Naga is a security training group Strazzere and friends created to teach, train and grow the mobile security community at no cost.

The Icera modem is fairly obscure, used only by the Nvidia Shield tablet and "a few phones in India," Strazzere noted.

Because it's obscure, few security researches have looked into it, and devices in the field "might not be getting updates or the attention that more popular modems would receive," he said.

Following notification from SentinelOne, Silent Circle patched the vulnerability, which was found on the Blackphone 1.

It's not clear whether it exists in the Blackphone 2, which Silent Circle released in September.

The Third-Party Risk Factor


It's possible the socket was left open for debugging purposes in preproduction and was mistakenly left that way in production devices, Strazzere speculated.

Most mobile makers use third-party technology.

Third parties for both hardware and software components "are part of the supply chain for mobile device manufacturers and represent a significant risk," said Tim Erlin, director of IT security and risk strategy for Tripwire.

However, providing assurance for both hardware and software "has really been limited to high-level government equipment, so there are few assurance operations [for] the consumer goods market," he told TechNewsWorld.

Third-party providers typically are granted access to critical elements of the internal infrastructure and to sensitive data, said István Szabó, product manager at BalaBit. One remedy would be to monitor and record all activities when third parties access internal systems.

Such monitoring "gives the mobile device producer the ability to detect and immediately terminate sessions if something suspicious occurs ... and provides important evidence to help investigations should an incident occur," he told TechNewsWorld.

Another option is to use a behavioral-based technology such as the one SentinelOne offers to detect, prevent and remediate against attacks.

Silent Circle did not respond to our request to comment for this story.


Source by: http://www.technewsworld.com

iPhone Sales Could Be Slowing

xl-2015-iphone6s-6s-plus-1

In the runup to the release of Apple's Q1 2016 earnings report Tuesday, one of the big unanswered questions was whether the iPhone could maintain its sales momentum.

Q1 2015 iPhone sales hit a record 74.5 million units, and it's possible the latest quarter's shipments may not equal -- let alone exceed -- that mark.

IDC has forecast of slowing sales industrywide for 2016. The smartphone market will see the first single-digit growth year ever.

The slowdown in China's economy, weak demand for the iPhone 6s and 6s Plus, and sluggish Apple Watch sales are also of concern.

However, "we think sales are actually going to be up in volume this year compared to a year ago," said Jeff Orr, a senior practice director at ABI Research.

First, China is still a great opportunity despite the slowing down of its economy, and second, the iPhone 6s and 6s Plus were launched "a little later than iPhones used to be launched previously, so we aren't sure whether or not they'll hinder Apple's quarter," he told the E-Commerce Times.

Great Expectations


Apple historically has exceeded analysts' expectations while playing down its performance prior to releasing its earnings reports.

FactSet StreetAccount estimated Apple sold 75.5 million iPhones in the quarter -- surpassing the previous year's record by about 1 million units, according to news reports.

FBR, which slashed its estimates for iPhone 6s sales in December, earlier this month predicted a huge uptick for the upcoming iPhone 7 and dismissed investors' fears about slowing growth at Apple as being overblown, while acknowledging the company has been through a rough patch.

The market agrees -- Apple shares were up by US$1.28 to $100.72 at the time of writing.

"Should we expect any company to keep setting records year over year? The answer is no," Orr said. "The problem Apple has is that investors always expect it to show a meteoric performance. The question is, at what point do you become disgruntled because you don't get meteoric performance out of the company?"

Leveraging Preowned Phones


Sales of refurbished smartphones are taking off, and Apple has ventured into this area.

Refurbished iPhones "can be sold in price-sensitive but growing markets without any brand dilution," pointed out Andreas Scherer, managing partner at Salto Partners.

"It could be tempting to develop a cheaper product that's being sold utilizing a different brand name in order to win in Africa, India and Indonesia, but the better strategy is to sell refurbished iPhones," he told the E-Commerce Times.

Grabbing Market Share


In the future, the replacement business will outpace the new phone business, ABI's Orr suggested.

"For Apple the issue no longer will be offering items good enough for first-time buyers to purchase an Apple product; it will be about getting Android or Microsoft phone users to switch," he explained.

It's "getting increasingly difficult to get that kind of differentiation, but that's not just an Apple problem. It's the same thing Samsung has been facing over the past two years and being hammered by investors over," Orr said.

Where Apple Might Go


Apple "needs to continue to win in its core markets," Scherer observed. That means "relentlessly focusing on replacing existing iPhones with newer versions" in markets such as the United States, and introducing upgrade incentive programs and incentives to buy additional phones as part of family plans through carriers.

Perhaps Apple could move away from its image as the largest manufacturer of smartphones, Orr said.

"We're hearing talk about moving the audio jack and creating a new accessories market that's exclusive and led by Apple -- Beat headphones and other products using the Lightning connector or wireless interfaces," he elaborated.

Other possibilities for Apple are wireless charging, improving battery life, wraparound screens, incorporating OLED technologies, and making iPhones "more user-proof and water-resistant," Orr suggested.


Source by: http://www.technewsworld.com

Rugged Turing Phone to Run on Sailfish OS, Not Android

xl-2016-turing-phone-1

Turing Robotic Industries this week announced that it has uninstalled Google's Android mobile platform in favor of Jolla's Sailfish OS in its yet-to-appear secure smartphone.


The Turing Phone, molded from a single unit of the Liquidmorphium liquid-metal alloy, is designed to be more durable to absorb shocks and prevent screen breakage.

Preorder pricing ranges from US$610 for the 16-GB version to $870 for the 128-GB model.

Optimized for Swiftness


TRI started taking preorders for the smartphone last year. It delayed the planned shipping date of Dec. 18 to resolve remaining developmental steps for the device, including its security platform and operating system. The new projected shipping date is in April.

Customers found out about the OS switch this week through an email.

The Sailfish OS is optimized to run fast on the Turing Phones and the Snapdragon 801 processor, according to the notice.

"It has a super-secured platform environment, which Android lacks, and it does not use Java for UI (Android). So Turing targets design-savvy users and those who care about their privacy," said Steve Chao, CEO of TRI.

Google Play Store apps and Android apps in general will run on the Sailfish OS via the Alien Dalvik engine. User experience with Android will not be impacted, he told LinuxInsider.

Sailfish vs. Android


The Sailfish OS is a continuation of the Linux MeeGo OS, which was developed by an alliance of Nokia and Intel. The MeeGo mobile software platform was created through the merging of Moblin and the Maemo OS, which was developed by Nokia, according to Turing officials.

"TRI decided to use Sailfish OS because it has a long-term plan to build a trustworthy communications network. Sailfish is based on a pure mobile Linux platform with unmatched speed and with great performance," Chao said.

The decision was not made from a comparison with Android. Rather, the goal is to enable TRI to build an ecosystem around its own devices. The Turing Phone is just one example, he said.

"Sailfish is the perfect platform in which Turing may start building its ecosystem surrounding the IoT and the Future Networks (ISO/IEC 29181)," Chao said.

Tarnished Efforts


It's hard to understand why Turing would swap out the mature Android distro it originally promised. Sailfish is too new to know how it will perform, according to Charles King, principal analyst at Pund-IT.

"Turing claims it's the fastest mobile OS in the market. That may matter since the Turing Phone is running a 2-year-old CPU. While Sailfish is capable of supporting Android apps, early reviews have also noted significant glitches," he told LinuxInsider.

TRI may have discouraged potential buyers with the change in OS. The company got a lot of good press for its idea of shipping a highly durable and secure phone aimed at consumers.

"But the project's delays have tarnished the effort somewhat, and it is not clear how this latest twist will play among Turing supporters," said King.

Better Plan In the Works


The change in OS will have little impact on buyers' interest in the Turing Phone, Chao maintained. The phone will be unique and secure.

"Most Turing users went for Turing's unique design. The design was the most important part of their decision in purchasing it. Most of them were tired of the iPhone and the same looks that Android phones had to offer," he said.

The OS change strengthens the interest of Turing fans who sought a secured environment for mobile computing. Sailfish is the perfect answer to that, he said.

Security Factors


TRI developed a decentralized authentication technology that provides a dramatic improvement over the logic of identity-based encryption, according to the company.

Both the master public key and the unique private key are anonymously bundled into the phone. Each Turing Phone can directly verify the identity of other Turing devices without the need for a third-party key center, it said.

This complete authentication creates a protected communications network insulated from cyberthreats and privacy intrusions, the company said. This circle of trust lets users exchange sensitive data such as Social Security numbers or bank wiring instructions with the assurance the information will reach only the device intended.


Source by: http://www.technewsworld.com

Vaio's Phone Biz to Test Windows 10's Reception in Asia

xl-2016-vaio-phone-biz-1

Vaio on Wednesday announced Phone Biz, a Windows 10 mobile phone.


The device doesn't have a SIM, leaving users free to select their own carriers.

The Phone Biz lets users easily access corporate apps, Microsoft SharePoint and Microsoft Exchange, as well as the Azure cloud, according to Vaio.

The OS is synced with the latest version of Windows 10. Users can manage settings from the same Microsoft account as their PCs.

The Phone Biz incorporates Microsoft's Continuum feature, which lets users connect phones to TVs or monitors, if they want to work on a larger screen.

The Phone Biz supports single sign-on and connection speeds of up to 225 Mbps.

The position and size of tiles are customizable, and the phone comes with the Cortana digital assistant.

The phone can use encryption or a virtual private network. It includes built-in GPS and supports remote data erase and remote locking.

Admins can change users' access to apps and data remotely.

The Phone Biz will be available on NTT DoCoMo's network. It reportedly will begin selling in Japan in April for about US$430.

More About the Phone Biz


The Phone Biz has an aluminum body and a full high-definition tempered glass screen. It has a microUSB 2.0 port, said Vaio.

Four versions will be available. Two use eight-core 1.5-GHz Qualcomm Snapdragon 617 processors. One of them has a 5.5-inch 1080x1920 screen and the other a 5-inch 720x1280 screen.

The other two are 5-inch devices with 720x1280 screens. One has a 1.2 GHz quad-core processor and the other a 1.1 GHz quad-core processor.

RAM ranges from 1 GB to 3 GB, and internal storage from 8 GB to 16 GB.

Rear cameras are 8 MP or 13 MP, depending on the model, and front cameras range from 1 to 5 MP.

None of the features is particularly outstanding, said Mike Jude, a program manager at Stratecast/Frost & Sullivan.

However, "the Continuum capability that allows the phone to serve as a platform or CPU for a desktop ... makes the Vaio phone better suited for business use than personal use," he told TechNewsWorld.

"With Sony, it's all about design, so this phone is incredibly good-looking," said Rob Enderle, principal analyst at the Enderle Group.

Sony has a minority stake in Vaio, which it spun off in 2014.

Alternative platforms often work far better in Asia than they do in the U.S., Enderle told TechNewsWorld. The Asia-Pacific region as a whole "is more accepting of diversity, making it a far better geography to launch a phone like this."

Fighting an Uphill Battle


Worldwide smartphone shipments hit a record in Q4 2015, totaling nearly 400 million units, IDC reported. That is nearly 6 percent higher than the same quarter in 2014. As a whole, 2015 was a record year for phone shipments.

However, the Windows Phone OS' share of the market has been hovering around 2 percent since March, according to Netmarketshare.

That hasn't deterred Microsoft, which last fall announced that several Japanese companies would be making Windows 10 phones.

That said, Windows Phone "never really caught on that much, because it's highly dependent on a very good network connection," said Frost's Jude. "With active tiles, you need a reliable data connection and, if you're roaming, that might be hard to come by."

The current push in Japan indicates Microsoft is "fighting for a beachhead and have found Asia a far better geography to get one," Enderle said.

Microsoft "isn't giving up on mobile as the SwiftKey purchase clearly showcases," he noted. "It's looking for a geography to take back and use as a springboard to once again become relevant in this space."


Source by: http://www.technewsworld.com

FBI Director Makes Case for Security Trade-Off in Congressional Hearing

xl-2016-comey-testimony-1

FBI Director James Comey on Tuesday testified before the House Judiciary Committee that the government has the legal right to gain limited access to the iPhone of one of the San Bernardino, California, shooters and other suspected terrorists.


Congress and the judicial system can create a mechanism to protect the safety of the American people while preserving constitutional rights against government overreach, he said in prepared testimony.

New methods of electronic communications have transformed society, Comey noted, adding that he supports the creation of strong encryption technology that protects large institutions and private citizens against cybercriminals and others who might attempt to gain access to proprietary data.

At the same time, terrorists and others criminals have used this technology to stay one step ahead of law enforcement, he said.

"We have always respected the fundamental right of people to engage in private communications, regardless of the medium or technology," Comey testified. "Whether it is instant messages, texts or old-fashioned letters, citizens have the right to communicate with one another in private -- without unauthorized government surveillance -- not simply because the Constitution demands it, but because the free flow of information is vital to a thriving democracy."

Clear and Present Threat


However, groups like the Islamic State have used social media to recruit and radicalize individuals to commit terrorist acts, he warned. Law enforcement needs additional tools to gather evidence to prosecute cases and in some instances prevent the acts from occurring.

The FBI is seeking only limited steps from Apple to help it open the San Bernardino shooter's encrypted iPhone. It wants the ability to bypass the encryption and spread out the time between individual attempts to guess a password, Comey said during a question-and-answer session with House members.

He likened the request to removing a group of guard dogs so that investigators could access the iPhone and get enough time to essentially break into the device themselves.

Asked repeatedly if the FBI had gone to other private companies or agencies to try to use alternative methods for unlocking the phone, Comey admitted that he was not an expert on the technology and that the FBI and other agencies had been stymied in their attempts to break into the phone.

Agency Assistance


The FBI asked San Bernardino County, where the shooter was employed, for assistance in retrieving data from the iPhone in December, county spokesperson David Wert said.

"The statements that have been made contending that resetting the Apple ID password is what made the backup impossible are incorrect. The fact that the phone was off and PIN locked is what made a cloud backup impossible before the Apple ID password was reset," he told the E-Commerce Times.

An iCloud backup requires a WiFi connection, and an iPhone that's turned off won't link to WiFi until the phone is unlocked, Wert said.

"At that point, the county said the best that could be done was to check the cloud for any past data uploads, but we would need to reset the Apple ID password because no one knew it. The FBI asked the county if it would do that, and the county agreed, unlocking the cloud and providing the FBI with the data that was in the cloud," he said.

Can of Worms


Granting the backdoor software request in the San Bernardino case will open the door for countless other requests by the Department of Justice -- and foreign governments -- in far less important circumstances, according to Eli Dourado, director of the Technology Policy Program at the Mercatus Center at George Mason University.

"This isn't a trade-off between security and privacy -- it's a trade-off between two kinds of security," he told the E-Commerce Times. One type of security is the kind provided by the FBI; the other is the security that iPhone users can get from encryption on their phones.

"In a world with repressive regimes as well as cybercriminals, the latter takes on greater importance," Dourado said.

A U.S. magistrate judge in New York ruled Monday that Apple did not have to assist the government in accessing the phone of a drug dealer whose encrypted iPhone was seized along with other mobile devices in a 2014 raid by the U.S. Drug Enforcement Agency.

The government did not have the legal authority under the All Writs Act to make Apple provide a way to bypass the encryption built into the phone and give law enforcement the ability to search for additional evidence, the judge ruled.

The dealer in that case pleaded guilty last year, and any new evidence would be used at sentencing or to pursue co-conspirators or others involved in the drug ring, according to court documents.

"We are disappointed in the magistrate's ruling and plan to ask the district judge to review the matter in the coming days," DOJ spokesperson Emily Pierce said.

"As our prior court filings make clear, Apple expressly agreed to assist the government in accessing the data on this iPhone -- as it had many times before in similar circumstances -- and only changed course when the government's application for assistance was made public by the court," she told the E-Commerce Times.

"This phone may contain evidence that will assist us in an active criminal investigation," Pierce added, "and we will continue to use the judicial system in our attempt to obtain it."


Source by: http://www.technewsworld.com

Apple Lawyer Pushes Back Against FBI Testimony to Judiciary Committee

xl-2016-sewell-testimony-1

Apple General Counsel Bruce Sewell on Tuesday testified before the House Judiciary Committee that his company should not be required write new code for software that would weaken the security of the iPhone in the wake of the San Bernardino, California, terrorist attacks.


The FBI wants Apple to take action that would put the privacy and security of millions of the company's customers at risk, he said.

Apple has no sympathy for terrorists, said Sewell, who noted that the company immediately cooperated with authorities in the investigation.

The request not only sets a dangerous precedent, but would open the company to countless other requests in the future, putting the security of all those involved in jeopardy, he said. Congress should settle the debate based on a thoughtful and honest conversion on the facts.

"Most importantly, the decisions should be made by you and your colleagues as representatives of the people, rather than through warrant based on a 220-year-old statute," Sewell told the committee in prepared testimony.

During questions and answers with committee members, Sewell pushed back on the notion Apple was engaged in some sort of marketing exercise in its quest to fight the order. The government claimed in some court filings that Apple had complied numerous times with the requests until they were made public.

Apple was doing what was in the best interests of its shareholders, FBI Director James Comey told the committee, noting that he had previously worked in a corporate capacity and understood the company's corporate accountability.

Microsoft plans to file an amicus brief on behalf of Apple this week in its court battle with the Department of Justice and the FBI, a spokesperson for Apple told the E-Commerce Times.

Prosecutors Stymied


Congress should take the lead on deciding how to balance the issues involved with accessing data on encrypted devices, Manhattan District Attorney Cyrus Vance Jr. testified at the House hearing.

Ninety-five percent of the criminal cases in the U.S. are handled by state and local law enforcement agencies, and Apple's switch to default device encryption in 2014 has severely hampered their ability to investigate many criminal cases, he said.

As of November, Vance's office was locked out of 111 smartphones running iOS 8 or higher, he said, citing a report released by the DA's office, called "Report on Smartphone Encryption and Public Safety." The number has grown to 175 devices since then, representing 25 percent of the phones received by his office's cyber lab.

With more users migrating to the newer operating systems, investigators can't access half of the phones coming into the DA's office, he said. The phones are involved in investigations of attempted murder, child pornography, sex trafficking, sexual abuse of a child and other crimes.

The district attorney in Harris County, Texas, has more than 100 iPhones that it can't access, involving cases of human trafficking, violent sex crimes and other crimes, said Vance, who also was representing the National District Attorneys Association. Prosecutors in Cook County, Illinois, can't access 30 devices, and authorities in Connecticut can't access 46 devices.

His office has drafted language for legislation that would require designers of operating systems to provide a way for law enforcement to access unencrypted data on the phones as long as they had a warrant, he said. The legislation would not require the makers to do anything themselves unless the encryption was part of the design.

Other telecom and technology companies have received official requests for data, Vance noted. Verizon received 149,810 in the first half of 2015; Facebook received 17,577 during the same period.

FBI Fighting Last Battle


Law enforcement is using outdated methods and laws to combat a 21st century problem, Susan Landau, who teaches cybersecurity policy atWorcester Polytechnic University, testified. Many law enforcement agencies lack the tools and expertise to fight modern cybercriminals and terrorists using new technologies.

Counter to claims by FBI Director Comey, encryption has been an issue for decades, dating back to at least the 1970s, she said. Other experts in the private sector have ways of accessing the data that the FBI insists only Apple can provide.

Landau, a former policy analyst at Google and distinguished engineer at Sun Microsystems, cited the Chaos Computer Club, a group of European hackers that has exposed flaws in security systems over 30 years. The group last year demonstrated that it could recover data on security chips using electron microscopes.

Technological Misunderstandings


Landeau's testimony echoed the wider security community and computer security experts that Apple should not be forced to reengineer its devices, said Mark Jaycox, civil liberties legislative lead at the Electronic Frontier Foundation.

"Director Comey kept on urging Congress to handle this issue -- clearly implying legislation -- despite the fact that President Obama and the administration said they did not plan on proposing or supporting any legislation," he told the E-Commerce Times.

"The law enforcement witnesses appear to not understand the technology or wide-ranging precedent at stake in this case," Jaycox said, adding that committee members did seem to be trying to understand the technological details.

"A majority of the committee appear to be on Apple's -- and the Constitution's -- side," he said.

The American Civil Liberties Union on Wednesday announced that it will file a friend-of-the-court brief supporting Apple's fight against the FBI request to create software that will open encrypted iPhones.

The brief notes that Congress deliberately withheld authority from the government to require that technology companies bypass the security built into their own devices.

"Law enforcement may not commandeer innocent third parties into becoming its undercover agents, its spies or its hackers," the brief states.


Source by: http://www.technewsworld.com

Fire season brings warning from ministry

satellite_image_of_forest_fires_across_cambodia_and_surrounding_countries_on_the_06_02_2016_nasa

As the Kingdom moves into the heart of the dry season, the Ministry of Agriculture, Forests and Fisheries has issued a set of guidelines on the prevention of forest fires, stressing that jail is in the cards for those starting blazes.

The notice, issued to various government ministries on January 21 and obtained by thePost yesterday, says that while the time of year brings with it naturally occurring fires,those caused by human activity “are the most worrying issue”.

Punishment for setting fires in forests carries a three- to five-year prison sentence, and in the case of mangrove forests, five to 10 years, according to the document.

However, Forestry Management Office director Dr Kao Dana, said that despite having the laws on the books, arresting offenders has proved difficult in practice.

“We cannot arrest; when we arrive there, the people run away,” he said.

Based in Phnom Penh, Dana coordinates with the various provincial Forestry Administration (FA) offices to investigate fires and illegal logging. However, he says, the resources to crack down are lacking.

“Look at the experience in Japan … The government flies over the area and then you see the person burning,” he said, pointing out the wealthier country’s resources, adding that – airplanes aside – there are not enough firefighters and equipment is expensive.

While Dana could not speak to whether fires observed raging in Stung Treng, Koh Kong, Mondulkiri, Ratanakkiri and Kratie were due to logging activities, deforestation compounds the issue.

“[Loggers] first cut it down. After six months, the trees are dead; after that it can burn easily. The forest in Cambodia is not easy to burn unless you cut the old trees first,” he said, referring to how a tropical forest dries out once the canopy trees are felled.

Speaking by phone yesterday, Mondulkiri’s provincial governor, Svay Sam Eang, said there were a lot of “small” forest fires throughout his province.

Asked how the provincial government worked with the local FA to solve the problem, Sam Eang said “we have a plan” but did not go into detail.

Travel guide author Matt Jacobson, who has lived in the country since 1997 and travelled through Mondulkiri and Kratie just last week, said yesterday that he had not seen smoke from fires so bad “in years”.

The worst, he said, is in the Cardamon Mountains of Koh Kong, where he said visibility has dropped to the point where he can no longer see the Gulf of Thailand from coastal hills.

“It’s the worst in the country down here.”



Source by: http://www.phnompenhpost.com

Firm denies circumventing Malaysia maid ban

malaysia_maid_training_at_a_facility_in_phnom_penh_16_10_2013_pha_lina

Four domestic workers sent to Malaysia despite an official moratorium on the practice have been repatriated amid claims of unpaid wages and harsh working conditions, though the company that recruited them has insisted that the terms of their employment didn’t technically violate the government ban.

The four women, who were all from Kampong Chhnang province and who went to Malaysia in May, returned to Cambodia on February 25. However, three more women from the same province are reportedly being detained by Malaysian immigration authorities.

One of the repatriated women, Phon Srey Mey, 19, arrived back to her home in Koh Thkov’s Tamoul Krom village claiming she had worked for almost a year with no salary.

Srey Mey said yesterday that every time she would ask for her salary, her boss would tell her that she would get paid the following month.

“Every week, I had to borrow $7.50 from the team leader at the company,” she said. “We didn’t have enough food and the working conditions were very hard. If we couldn’t finish our work, they wouldn’t allow us to go home.”

Srey May said when she returned to Cambodia, the company made her sign a contract saying that her “salary” was money she had borrowed for expenses such as the cost of her passport and flight.

A ban on Cambodians going to work as maids in Malaysia was implemented in 2011 after a series of often brutal cases of abuse.

The company that recruited the four women, APTSE&C Cambodia Resources, claims the women were not working in Malaysia as maids.

However, the company the women worked for – H2O Cleaning Service – on its website described the women’s job as part-time maids, catering to employers who didn’t want to deal with problems that could arise from employing full-time domestic workers.

Labour advocate Moeun Tola, head of the labour program at the Community Legal Education Center, yesterday questioned the loophole and the effectiveness of the ban.

“I think the company tried to manipulate the ban,” Tola said.Heng Sour, spokesman for the Ministry of Labour, meanwhile said APTSE&C Cambodia Resources was not even licensed and recommended the women file an official complaint with the ministry so their cases can be investigated.

“We will take action if this company committed any wrongdoing,” he said. Saw Sreythea, 45, whose daughter also arrived last month, said she planned to file a complaint with the Ministry of Labour, but would wait to do so until her three nieces were released from Malaysia.

She added she was “afraid” the company could retaliate against her nieces. Sen Setthy Chey, executive director of APTSE & C Cambodia, said the owner of the company in Malaysia was arrested and the three other women were being held as witnesses. However, he insisted the women were not working as maids.

In December, both countries signed a memorandum of understanding to lift the ban, although the details are still being worked out.

Tola said his organisation had found the ban wasn’t effective in preventing maids from being sent to Malaysia.

“Maids were still sent,” he said. “It’s quite shameful for the Cambodian government not to fully manage the ban.”

Chum Sunry, spokesman for the Ministry of Foreign Affairs, said the ministry helped repatriate 573 Cambodian workers in 2015, including 55 women from Malaysia and 82 women from China.

He said most of the women who were returned from Malaysia were maids.


Source by: http://www.phnompenhpost.com

KRT witness recounts giving birth in security centre

a_krt_witness_appears_befor_the_eccc_yesterday_in_phnom_penh_03_03_2016_eccc

When Moeurng Chandy gave birth to a daughter in prison at the Au Kanseng Security Centre in 1978, there was not a hospital or a midwife in sight.

As she testified at the Khmer Rouge tribunal yesterday, she had only the help of a male medic, who cut the umbilical cord, and other female inmates at the regime’s “re-education school”.

Chandy gave evidence immediately after her ex-husband Phon Thol – who said he had not spoken to his former wife since 1986 – vacated the witness stand.

It was the second day the court heard testimony regarding the Au Kanseng prison, located near the current provincial hospital in Ratanakkiri, which housed soldiers and civilians during the Khmer Rouge regime.

Responding to questions from prosecution lawyers, Chandy said she was tasked with cooking rice in the prison’s kitchen soon after giving birth.

“However, I did not have any breast milk to give my baby,” she said. “When you asked me this question, it triggers the pain inside me.”

“I asked for sugar cane juice to feed her, and that happened because I did hard work,” she continued. “I had to carry the wood planks from the forest.”

Describing a moment of warmth during an otherwise bleak existence, Chandy told the court how, when she was still weak from childbirth and given meagre food rations, her fellow inmates would take turns to carry her share of the wood.

“Luckily enough, the baby survived and is still living now,” she said.

Chandy also testified to having witnessed a security guard named Ta Auy murder a woman at the centre.

“That woman was smashed with the back of the hoe . . . [and] she died,” Chandy said.

“This was an actual incident I witnessed. He was so cruel and vicious.”

Rehashing topics addressed during her ex-husband’s testimony, Chandy spoke about a group of ethnic Jarai women and children she had seen arrive at the centre, only to be taken away shortly thereafter.

A few days later, she said, she found herself near a previously empty crater – caused by a B-52 bombing – some distance from the compound.

“I returned and could smell the decomposing bodies from the cracked-open soil,” she said.

Like Thol, she suspected the Jarai people had been “smashed” – the term by which the regime referred to executions – “and thrown into the pit”.

Chanthy and Thol were only reunited and managed to escape when Vietnamese troops invaded, forcing guards to evacuate the prison. The trial resumes on Monday.


Source by: http://www.phnompenhpost.com

Wednesday, March 2, 2016

Apple FBI Standoff Stretches Into Week Two

xl-2016-iphone-encryption-1

Apple on Monday called for the creation of a government panel to help resolve a standoff between the company and the Federal Bureau of Investigation over the issue of national security vs. data privacy.


The proposal for a commission followed FBI Director James Comey's Sunday post on Lawfare -- an apparent effort to quell the controversy. Comey emphasized that the bureau was not seeking a master key that would allow it to snoop into American citizens' devices at will.

The American public expects the bureau to do its utmost to investigate the killings carried out in last year's terrorist attack in San Bernardino, and that includes examining the data contained in a locked iPhone 5c used by shooter Syed Rizwan Farook, he argued.

The FBI's goal is to obtain any information that will aid its investigation within the limits of the law, and it would seek search warrants when appropriate, Comey reaffirmed.

The bureau wants Apple to disable some of the passcode protections on Farook's iPhone, Comey said. Officials are concerned that any efforts to gain access to the device without Apple's assistance could result in the handset self-destructing, or in the data becoming corrupted.

Magistrate Judge Sheri Pym of the U.S. District Court for the Central District of California last week ordered Apple to provide assistance to the FBI by creating software that could allow authorities to access data on Farook's handset. However, Apple has objected on the grounds that such a move would result in a general loss of user privacy.

Apple CEO Tim Cook shone a spotlight on the company's dispute with FBI with the publication of an open letter defending Apple's resistance to the federal magistrate's order.

Master Key


The dispute appears to be one in which existing laws have not kept pace with technological advances, and both sides are making their cases on the issue.

"The FBI insists that it's not making a blanket request covering all iPhones, but simply [seeking] Apple's assistance unlocking one device," said Charles King, principal analyst at Pund-IT.

"Since that would require Apple to break what it says is an unbreakable security technology, doing so would resonate across the company's business," he told TechNewsWorld.

The public in the past has supported government agencies' investigation efforts, and given that 14 people were killed in the San Bernardino terrorist shooting, opinion could swing to the FBI's side.

"Given the heinous acts related to this phone, I expect most people -- were they asked directly -- would side with the FBI," said King.

Locked Horns


Judging from the tenor of their arguments, it doesn't appear that the FBI and Apple have found any common ground.

Although a judge already has ruled in favor of the FBI, "this is going to be decided in the court of public opinion, and it will play out based on who makes the best argument to support their case," opined Scott Steinberg, founder and principal analyst at TechSavvy Global.

"The FBI is not trying anything nefarious here. They have a concrete argument that they are trying to look for evidence that can shed some light on the shooting," he told TechNewsWorld.

"Comey's statement is clearly meant to counter support Apple has received from other IT vendors, but in a way that's turned this thing into a battle of PR agencies," observed Pund-IT's King.

Privacy Issues


Apple could sway public opinion its way through its dire warnings of how its compliance with the order could result in a loss of privacy by all handset users.

"There is the danger of creating a skeleton key that could find its way to unwanted hands and which could be abused," Steinberg pointed out.

"The FBI claims this is a one-time use case, but who is to say that this couldn't open Pandora's Box, which couldn't be closed again?" he asked.

Given that other governmental organizations -- notably the National Security Agency -- have been called out for surveillance programs that in some cases were conducted with the support of tech firms, it isn't hard to see why Apple would take a hard line approach this time around.

"Absolutely, it is a concern in the age of big data, where so much information is out there, and there is this increasingly sense of paranoia -- some of it rightly so -- that anything you put out there could be susceptible to prying eyes," said TechSavvy's Steinberg.

Technological tools "can be used for good or bad by those who choose to use them," he added.

The more powerful encryption is, and the more difficult it is to break, the more useful it can be for carrying out clandestine operations and for other disreputable purposes," Steinberg noted.

Orchestrated Moves


Apple has demonstrated that it's one of the least spontaneous vendors in the marketplace when it comes to reacting to issues such as this one, noted Pund-IT's King.

"Virtually everything the company does is orchestrated, and it would be silly to think that any statement Apple or its executives make hasn't been vetted by PR and legal teams," he pointed out.

"The company's request for a 'commission' to study the FBI request seems like little more than a delaying tactic, but that's not surprising given the size of the stakes," said King. "If Apple obeys the court order, it seems likely that the company's business will be injured -- particularly in overseas markets, including China, that it hopes will drive next-generation growth."


Source by: http://www.technewsworld.com

Samsung Raises Curtain on Galaxy S7 Models

xl-2016-samsung-galaxy-s7-s7edge-1

Samsung on Sunday introduced two new models of its flagship Galaxy smartphone line at the annual gala for the mobile world, the Mobile World Conference in Barcelona, Spain.


Both phones have similar features, but one, the Galaxy S7 Edge, has a 5.5-inch display, the same size as the iPhone 6s Plus.

The units have curved screens that support quad HD resolution, as well as a slight curve on the back, making them easier to hold.

To soothe complaints about the battery life of the previous Galaxy generation, the units have received power boosts. The S7 Edge has a 3,600-mAh battery, a jump from the S6 Edge's 2,600, and the S7 has a 3,000-mAh power supply, while the S6's battery was only 2,550.

In addition, the units are water and dust resistant, support microSD storage, and run on Android 6.0 Marshmallow.

Fewer Megapixels


Samsung also has made some changes in the Galaxy's camera. It has reduced the number of megapixels on the shooter's sensor to 12 from 16, but increased the size of the pixels, which should improve the camera's performance in low light conditions.

The pixels in the new Galaxy models are 30 percent larger than those in the iPhone 6s Plus, 1.4 micron compared to 1.22 micron for Apple.

Both Apple and Google have gone the fewer-but-bigger-pixel route with some success, so Samsung's rivals already have done some of the consumer education about the move.

"It will work as long as they frame it in terms of bigger pixels get more light," said Daniel Matte, an analyst with Canalys.

Larger pixels also make it easier to incorporate into each pixel autofocusing technology, which allows the camera to take sharper pictures faster.

"Autofocus is really fast now -- nearly instantaneous anywhere across the image," Matte told TechNewsWorld.

"That's been in DSLRs and quality cameras for a while, and now it's migrated to the smartphone market," he added. "That's a big improvement."

Mixed Reviews


"They're a nice improvement over previous versions, but they're not groundbreaking," said Bob O'Donnell, founder and chief analyst atTechnalysis Research.

"There isn't any one feature that's a killer and will massively move the needle in the market," Matte said.

"The best addition they made was adding Qualcomm's Snapdragon 820, which in certain use cases doubles the performance," Patrick Moorhead, principal analyst at Moor Insights & Strategy, told TechNewsWorld.

Virtual Reality


For consumers who preorder either of the new phone models up to March 18, Samsung is offering a sweet deal: a free Gear VR headset.
Samsung Gear VR powered by Oculus

In addition, Oculus is offering those who preorder the phones six Gear VR games for free.

Will the lure of a free VR headset help boost initial sales?

"There's not that much content out there for VR, so it's more of a gimmick at this point," Technalysis' O'Donnell told TechNewsWorld.

"They're going to incent people to try VR," said Gartner Research Director Brian Blau.

"It's a nice incentive if you're interested in doing VR with a Samsung phone," he told TechNewsWorld. "Beyond that, it's not going to change the picture for overall smartphone sales."

Cooling Market


Samsung, as well other smartphone makers, would very much like to change the current picture for smartphone sales.

"We're seeing a lengthening of upgrade cycles for smartphones and growth is slowing. It's going to be hard for anyone to do well in the smartphone market in the next few years in terms of growth," Canalys' Matte said.

"As phones mature," he continued, "they become good enough for most people, so it's more difficult to sell them."

In the United States, another factor contributing to longer upgrade cycles is the phasing out of phone subsidies.

"Now that people are paying full price for their phones, they want them to last longer," O'Donnell said.

"Lifetimes are extending beyond two years, so just as we saw lifetimes extend for PCs, we're going to see them extended for phones," he added.

Nevertheless, Canalys is predicting another double-digit growth year for smartphones this year. Globally, it predicts smartphone shipments will crack 1.5 billion in 2016.

"Despite turbulence for certain vendors and countries," it noted in a report released Monday, "the industry will still grow by over 10 percent this year thanks to new opportunities."


Source by: http://www.technewsworld.com

Gates Sees Both Sides in Apple vs. FBI Ruckus

xl-2016-bill-gates-1

Microsoft founder Bill Gates on Tuesday attempted to clarify his position regarding Apple's conflict with the FBI, telling Bloomberg he was disappointed that his earlier comments had been construed as taking sides with the government.


Apple has sparked a public debate through its resistance to a court order to unscramble the data on the iPhone used by one of the San Bernardino terrorists.

The FBI has sought to access the data in the course of its investigation, but Apple has argued that unlocking it could jeopardize the privacy of millions of people.

Gates on Monday appeared to discount Apple's position in an interview with the Financial Times, noting that the government's request was specific to one case, and that it was not seeking a means for general access. He compared it to obtaining phone or bank records to aid specific investigations.

However, Gates had more to say on the subject a day later, when he acknowledged that the government had a history of overstepping its bounds.

Still, with the right safeguards in place, he told Bloomberg, government should be able to access information to perform valuable services for citizens, such as fighting terrorism.

"The government shouldn't have to be completely blind," Gates said.

Dubious Privacy Issue


"Gates is absolutely right," maintained Al Berman, president of DRI International.

"It's a very specific case. It doesn't extend beyond this phone in the possession of the FBI," he told the E-Commerce Times.

"It's a one-off, and it's such a specific one-off that I think we're trying to make it bigger than it is," Berman added.

Apple should cooperate with the FBI, said Darren Oved, a partner in Oved & Oved.

"The facts of this case are very favorable to the government," he told the E-Commerce Times.

"What we have is a dead murderer's alleged right to privacy versus a very real right to protect the citizens of San Bernardino, the state of California and the United States from any potential real harm," Oved contended.

"When you weigh those two against each other," he reasoned, "I think Apple should do what the FBI wants it to do."

Further, the data on the iPhone doesn't need Apple's protection to ensure the privacy of the phone's operator, Oved maintained.

"The device in question here belongs to San Bernardino County. The law is undisputed that any information on a device that belongs to an employer is the employer's," he explained.

"Since San Bernardino County is a public organization, the government can make a very compelling argument that the information contained on the phone is part of the public record, and we should be allowed to see it," Oved added.

Need to Hunt Terror Cells


Apple should help the FBI find more terrorists, noted Nitsana Darshan-Leitner, founder of the Israel Law Center.

"The FBI needs Apple's help because there are other terrorist cells that the FBI needs to hunt down before [those cells] harm others," she told the E-Commerce Times.

"There's no reason to believe that the FBI will reuse this one-time case to create a broad precedent for more and more subpoenas," Darshan-Leitner said.

"Bill Gates realized that, and that's why he said what he said," she added.

Slippery Slope


Gates is out of touch with the industry he helped create, opined Michael Harris, chief marketing officer with Guidance Software.

"Gates doesn't understand the real issue. He sounds like a guy who hasn't moved forward in 20 years in terms of what technology can do and how it works," he told the E-Commerce Times.

The analogy between what the FBI was asking of Apple and searching bank records is misguided, Harris contended.

"They want Apple to write custom code," he said. "Once you do that, that's not at all the same as supplying records from a database."

If Apple does what the FBI wants done, it will set a dangerous precedent, maintained Nathan Leamer, policy analyst at the R Street Institute.

"You're compelling a company to create out of thin air an FBI OS to enable access to a phone. I'm not sure how you limit that," he told the E-Commerce Times.

Upsetting Delicate Balance


The San Bernardino case -- however it's resolved -- could have a significant ripple effect.

"There are 15 other cases where the FBI wants Apple's help to break into other iPhones," observed Amit Sethi, principal consultant for mobile security at Cigital.

"If Apple helps in this one case, it will have to help in those 15 cases as well. Then what about other law enforcement agencies and foreign governments?" he asked.

"It's a bad precedent," Sethi told the E-Commerce Times, "because while it may seem like a one-off case, it's really not."

Forcing Apple to cooperate with the FBI could upset a delicate balance in society, noted Suzanne Nossel, executive director of the PEN American Center.

"We're concerned that the careful balance between security and liberty plays out differently when a counterterrorism investigation is involved," she told the E-Commerce Times."Our concern is that by complying with this request, Apple is going to compromise the privacy not just of these individuals who are associated with this terrible crime but the privacy of millions of others."


Source by: http://www.technewsworld.com

Apple Motion Seeks to Block Feds From Acquiring 'Dangerous Power'

xl-2016-encryption-3

Apple last week filed a motion to vacate a federal order requiring the company to create a tool or code to unlock the iPhone of one of the San Bernardino, California, shooters.


The order would set a dangerous precedent and release a powerful means to breach security on potentially millions of phones around the world, Apple argued.

It transcends one phone and would empower government to make private companies compromise the security of all their users whenever it sees fit, the company said.

"This is not a case about one isolated iPhone. Rather, this case is about the Department of Justice and the FBI seeking through the courts a dangerous power that Congress and the American people have withheld: the ability to force companies like Apple to undermine the basic security and privacy interests of hundreds of millions of individuals around the globe," the motion says.

Signature Required


Apple already has tools that could compromise the security of millions of people, so the implication that this code is any different from similar capabilities the company possesses is baseless, according to Stewart Baker, partner at Steptoe & Johnson.

Furthermore, Apple has security in place to protect itself and its users from data breaches, he told TechNewsWorld.

"The code that they're so worried will get out is no different than any of the other codes they write, in that if it gets out, then bad things will happen. Apple already protects its code very aggressively because they don't want that to happen, so there's no super-burden to protecting this code, Baker noted.

"This is particularly true because in order to install this code on the phone that is the target it is going to be necessary for Apple to sign the code with their super-secret signature," he added.

"What would happen is that Apple would send this signature to the phone, which will identify itself back to Apple, which means Apple almost certainly has to be right in the middle of any such transaction. It's not like you can just steal the code and walk off and use it -- because you also have to have Apple's signature, Baker said.

"If Apple's signature is compromised, it's the end of security for everyone, and they're already in a position where they have to protect that aggressively," he added.

The case is a matter of getting information that's imperative to an ongoing investigation, according to Paul Charlton, a partner at Steptoe & Johnson.

"What we can say with absolute certainty is that if you think about this as something other than a technology company -- if you think about this in terms of Apple being the landlord that holds within its building evidence of terrorist activity -- there wouldn't be any doubt in anyone's mind that the government should be allowed, with the appropriate court authority, ... to go in and take what they need," he told TechNewsWorld.

FBI director James Comey "has made it very clear that what he's interested in is not a back door, not a wide open door into this apartment complex, if you will, but entry into a specific apartment ... to grab this specific piece of information. That seems narrowly tailored and wholly reasonable to me," Charlton said.

Uninted Consequences


Creating the code the government is asking for would open a Pandora's box of unforeseen consequences, according to Christopher Maurer, assistant professor of information technology and management at the University of Tampa.

"We see time and time again that there are really good intentions. There might be a real problem and government is not addressing the underlying issue and instead is creating other issues in the form of loopholes or unintended side effects," he told TechNewsWorld.

One such side effect would be a precedent allowing other law enforcement agencies to order phones to be unlocked, noted Chris Calabrese, vice president for policy at the Center for Democracy & Technology.

"In terms of the idea that this is no different and that this back door doesn't create a vulnerability is just not true. What we're talking about is a precedent that will not just be for the FBI but will almost certainly be for those state and local law enforcement, of which there will be tens of thousands across the country. They're all going to encounter iPhones. They're all going to want them to be unlocked," he told TechNewsWorld.

A back door would be a potentially hazardous tool if it fell into the wrong hands, Calabrese added.

"There's going to have to be an entire process in place on unlocking iPhones somehow, which is to say subverting their security. That's a giant process designed to be exploited by bad guys. And you just can't say somehow that this is a one-off," he said.

Congressional Action Ahead


Congress eventually will have to answer the larger privacy question, Steptoe & Johnson's Charlton noted.

"We are constantly weighing our rights to privacy versus our need for security. That's why we have a Fourth Amendment. That's why we have to get search warrants before we conduct searches on individual's homes," he said.

"Here, that's exactly what happened. The FBI obtained a valid court order after showing probable cause to believe that there's evidence of terrorist activity on this phone, and right now that court order is still in place, absent the lawyers from Apple being able to reverse that order they're going to have to turn that information over," Charlton added.

However, incentives already are in place to ensure that customer data is secure, the Center for Democracy & Technology's Calabrese maintained, citing the Sony hack.

"There are a lot of incentives to want to build devices that are private and secure. There are reputational harms, potential liability, the requirement that they do a data breach notice if the information gets out," he said.

"We've all seen, for example, what happened with Sony and the devastating result of not having good security in their systems," Calabrese said.

The National Institute of Standards and Technology has published standards for good security and cryptology, he noted. "There are guidelines in place that help people know what they need to do. There are best practices out there that have nothing to do with legislation."

On the other hand, rigid mandates might freeze the development of security technology, Calabrese added.

"You don't want to say you must do the following six things to secure a phone when in three years those things could be totally out of date but you still have a legal requirement to do them," he said.

"There's a push pull when it comes to whether you should mandate security," Calabrese added. "Our view is that you need baseline security standards, and you need to let people know what best practices are and then create incentives to get people to meet those best practices without mandating anything in particular."


Source by: http://www.technewsworld.com

Apple Event Date Nudges Court Showdown

apple-court-order

Apple has changed the date for the launch event for its 4-inch iPhone and new iPad Air from March 15 to March 21, according to news reports.

If the rumor is correct, Apple will be holding the event the day before it appears in a federal court in California to contest a controversial court order. Apple has filed a motion to vacate the order requiring it to comply with the U.S. Justice Department's request for assistance in accessing data on an iPhone used by one of the San Bernardino terrorists.

"The timing seems to be a miscalculation on Apple's part," said John Carroll, a mass communications professor at Boston University.

"They're stepping on their own story because the focus on the following day's new coverage is going to be all about the FBI," he told the E-Commerce Times.

Worse yet, the whole event could backfire on Apple in a bad way.

"If their product rollout gets any kind of coverage, it's possible it will be covered as an attempted smokescreen to divert attention away from the FBI issue," Carroll added.

Trial Balloon


On the other hand, the date change could be a calculated move by a company known for its marketing acumen.

"It's possible the rumor is a trial balloon from Apple to see what kind of reaction it gets," Carroll said. "If the reaction is skeptical enough or critical enough, that's their signal to pull back."

Although just a rumor, the March 21 date "makes sense," noted Patrick Moorhead, founder and principal analyst at Moor Insights and Strategy.

"Apple has reasons to refresh their lineup to be more competitive in emerging regions and to help turnaround declining iPad sales," he told the E-Commerce Times.

Grief Over Shipping


If Apple did indeed change the date of the event, "maybe it's because they want the announcement to be made closer to when the products are going to ship," suggested Bob O'Donnell, chief analyst at Technalysis Research.

"They caught a fair amount of grief for the big gap between the time of the announcement and shipping of the Apple watch," he told the E-Commerce Times. "That was an unusually long gap, so maybe they're trying to make a statement about being able to deliver products immediately after an event."

There's also the possibility that everything rumored to be announced at the event won't be announced there, remarked Carolina Milanesi, chief of research at Kantar Worldpanel ComTech.

"We have seen before when products are incremental, Apple will just put out a press release about them," she told the E-Commerce Times. "It could be we will not see everything, and some will just come out in a press release at a different date."

Maturing Market


Apple is expected to schedule an event to unveil an iPhone with a 4-inch display and upgraded components, as well as a new iPad Air that will have features similar to the iPad Pro.

"If you look around and see the other devices doing well, it's not tablets -- It's two-in-ones," O'Donnell said. "This new iPad looks like it will be another form of two-in-one because you can use a keyboard and pencil with it."

If the rumors prove true, Apple appears to be adjusting its product line to meet the demands of a maturing market.

"Overall, they're filling out their options in terms of screen sizes to address a wide range of interests," O'Donnell said. "That's how the world works now. As you get a more mature market, you need to have a few different buckets into which people can find a product that best meets their needs."

As for the event being overshadowed by Apple's tussle with the FBI, "from the consumer perspective, it doesn't matter," Milanesi observed. "What consumers think about when a new product is out is the new product."


Source by: http://www.technewsworld.com

Fed Judge Rules for Apple in Drug Case Involving Encryption

xl-2016-apple-vs-fbi-2

A federal magistrate judge on Monday ruled that Apple did not have to unlock an encrypted iPhone used in a federal drug case.


The ruling gave the company a key victory against the Department of Justice in the midst of a legal struggle over an FBI request that the encrypted phone of one of the suspected shooters in the San Bernardino, California, massacre also be unlocked.

Federal Magistrate Judge James Orenstein ruled that the government failed to prove that it had the power under an 18th century law called the "All Writs Act" to force Apple to unlock the phone of the drug dealer.

Following a U.S. Drug Enforcement Agency search and seizure of mobile devices belonging to an alleged dealer -- a New York man named Jun Feng -- in June 2014, the government spent more than a year not doing anything to pursue what evidence there was on his phone, until getting a warrant in July 2015, the court noted.

The DEA was not able to get the information and sought help from the FBI, which was unable to get evidence off the password-protected device. They sought Apple's help two weeks after the expiration of the device warrant, and Apple said it would help if the government obtained a court order, consistent with its practice in 70 other instances.

Feng pleaded guilty in October. However, the government continued the request while it was pursuing additional evidence prior to sentencing and potentially to uncover evidence in related cases of coconspirators, according to court documents.

Apple last month filed documents seeking a review of the repeated requests by the government to unlock encrypted phones under the All Writs Act.

A federal magistrate judge on Monday ruled that Apple did not have to unlock an encrypted iPhone used in a federal drug case.


The ruling gave the company a key victory against the Department of Justice in the midst of a legal struggle over an FBI request that the encrypted phone of one of the suspected shooters in the San Bernardino, California, massacre also be unlocked.

Federal Magistrate Judge James Orenstein ruled that the government failed to prove that it had the power under an 18th century law called the "All Writs Act" to force Apple to unlock the phone of the drug dealer.

Following a U.S. Drug Enforcement Agency search and seizure of mobile devices belonging to an alleged dealer -- a New York man named Jun Feng -- in June 2014, the government spent more than a year not doing anything to pursue what evidence there was on his phone, until getting a warrant in July 2015, the court noted.

The DEA was not able to get the information and sought help from the FBI, which was unable to get evidence off the password-protected device. They sought Apple's help two weeks after the expiration of the device warrant, and Apple said it would help if the government obtained a court order, consistent with its practice in 70 other instances.

Feng pleaded guilty in October. However, the government continued the request while it was pursuing additional evidence prior to sentencing and potentially to uncover evidence in related cases of coconspirators, according to court documents.

Apple last month filed documents seeking a review of the repeated requests by the government to unlock encrypted phones under the All Writs Act.


Source by: http://www.technewsworld.com

Google Killed the Laptop Star

xl-2015-google-logo-1

Anyone who went to business school recognizes the basic tenet that you use marketing to build demand in order to sell products. Through the 1990s, there was impressive marketing surrounding laptops -- Intel's iconic Bunny People come to mind. Apple aggressively marketed this class, as did Microsoft, and it seemed every other brand on TV was trying to convince us we needed a new PC.

PC marketing dropped off a cliff in the last decade, and when the iPad launched with a powerful Apple campaign it nearly took out the PC at the knees. That was not because it was better than a PC, but because folks got more excited about buying a tablet. What happened in the 1990s that killed PC marketing?

I think it was Google that drove the margins out of both PCs and tablets, effectively removing the marketing budgets and destroying the demand generation for the segment. Ironically Google pretty much owns Internet marketing, and it gives Android to many of the PC OEMs that don't realize they are consuming the poison that is killing them.

I'll explain and then close with my product of the week: a new video conferencing system from Logitech.

Marketing 101


One of the big problems that emerged in the last decade was the elimination of strong marketing talent from most technology companies. It seemed most pronounced in firms like Google and Facebook. Ironically, they made the majority of their income from marketing, but seemed to act like it was some kind of embarrassing illicit substance.

Google, in particular, seemed to distance itself from marketing, and it argued that engineers should do every job in the firm, regardless of the skills required. That likely speaks to why most of its efforts, following its buildup of core revenues from ad sales, haven't been very successful financially.

Google simply doesn't understand either the process or need to generate demand, but since it gives away most of its offerings for free, that doesn't seem to have a huge adverse impact.

Tech Marketing Decline


When Google enters a segment, it tends to enter at very aggressive price points -- often free -- and that means even if it understood marketing, it would have no product budget to pay for it.

However, while Google's aggressive downward pressure on PC prices (Chromebooks), tablets and smartphones (Android) has given it beachheads in all of those markets, it also has resulted in very aggressive pricing by other PC and OEM companies. Even Apple is feeling the financial pain, and clearly has cut back on its own spending.

As a result, there isn't any money left over to build demand for products, and -- surprise -- that demand appears to be in decline, along with related revenues. Google took what effectively was a very profitable segment and almost singlehandedly made it far less profitable.

When revenues and profits fall, firms cut marketing. When marketing is cut, demand falls, cutting revenues and profits. In short, the result often becomes a death spiral.

As you watch TV tonight, just count the number of car ads, consumable product ads (beer, for instance), cosmetic ads, food ads, service ads and toy ads you see. Well, you can save a lot of effort if you count only PC and tablet ads. It should be pretty easy, because chances are good that the total number will be zero.

People have a fixed amount of money they can spend on things that are discretionary, and if they are being convinced to buy new cars, motorcycles, appliances, TVs and jewelry -- plus refresh their smartphones regularly -- they won't have a ton of money for things that they aren't being convinced they should buy or replace.

The Absolute Irony


Here is the absolute irony: Google doesn't make money from selling tablets, smartphones or Chromebooks. It makes money selling ads, and using its products to kill profits and marketing dollars results in fewer ads being purchased.

That means Google's impressive efforts to kill off anything that doesn't run Android or Chrome are having an adverse near-term impact on the company's overall ad revenue and its own bottom line.

If people stopped using laptops and tablets tomorrow, Google would take a massive ad revenue hit, because phone conversion rates generally are far lower than PC or tablet conversion rates, and the ads on these legacy products thus should be more valuable to Google.

Yes, Google is causing a lot of revenue and profit drag for both Apple and Microsoft, but it also is hurting its own interests, which makes this look like a less-than-intelligent strategy.

Wrapping Up


The reason behind the slowdown in tablets and PCs is a massive reduction in marketing for these two classes of products, a direct result of the price war Google started.

However, as Google cripples these other tech companies, that means they have less money to use for marketing -- and Google's revenue and profit comes from marketing. Therefore, while Google clearly is doing a lot of damage to the competition, it also is paying for that damage in lost ad revenue, and effectively shooting itself in the foot.

In the end, the decline in PC and tablet sales may be related to a decline in demand generation for those segments, which is tied directly to a massive reduction in pricing that came with Google's entry into those markets.

Given that Google makes its money from ads, this may be one of the stupidest things it has ever done historically. Worse, supporting Google might turn out to be the dumbest thing the industry collectively has done.

Ironically -- or prophetically, depending on how you look at this -- only Steve Jobs seemed to get this early on, and he is no longer with us.

Something to noodle on this week.

Rob Enderle's Product of the Week


I've been following video conferencing ever since the late 1980s, when my organization within IBM participated with Apple in a joint study on the latest technology. The study concluded that folks wouldn't use it.

Since then, I've watched company after company try to launch breakout products, with the most spectacular failures coming from Intel and HP. Over time, products in this category have gotten a ton cheaper.

I have one of Logitech's older integrated systems in my home, mostly for doing remote video interviews (it works surprisingly well).

Logitech's latest offering, the Group, emulates higher-end systems. It comes with HD capability, and is priced between US$999.99 and $1,250 depending on configuration.

What makes Logitech's solutions stand out, other than value, is that they use common communications platforms like Skype, so they are really easy to use, and they are designed to be easy to set up and move.


Logitech Group Video Conferencing System

Logitech's Group Video Conferencing System


This latest system consists of a conference control station with speakerphone, optional remote microphones, a remote control, a pan and zoom high-quality HD camera, and a central hub. Setup should take less than 15 minutes.

It is certified for Skype for Business, Lync, Cisco Jabber and WebEx. You do need to connect it to a PC, which will run the conferencing products native, and you'll likely want to connect the PC to a big screen HD TV, so you can see the folks you are talking to.

In the end, if you want a low cost, high-performance system that rivals those costing thousands more, it is worth checking out Logitech's Group -- my product of the week.


Source by: http://www.technewsworld.com

Fresh Raspberry Pi Has Better Hardware Baked In

xl-2016-raspberry-pi-1

The Raspberry Pi Foundation on Monday announced the availability of the Raspberry Pi 3 Model B for US$35, the same price as the previous model.


It is the second major upgrade to the board in just over a year.

The hardware upgrade boosts the single-core processor of the original Pi to a faster, more capable quad-core chipset in the Pi 3. The current model is based on a 64-bit chipset that runs faster than the Pi 2's 900-MHz quad-core, 32-bit ARM Cortex-A7-based hardware. The credit card-sized computer board adds WiFi and Bluetooth support.

The machine better handles Web browsing and office tasks home users need. It opens up even more possibilities for the Internet of Things and embedded projects, according to Eben Upton, CEO of Raspberry Pi Trading. He launched the first Raspberry Pi version fours years ago.

"The new Raspberry Pi 3 Model B offers a higher level of performance than any other Raspberry Pi board on the market," said Claire Doyle, global head of Raspberry Pi at element14.

It "allows customers to develop specific applications and build new projects. We can't wait to see what customers will do with it," she told LinuxInsider.

Changing Usage Landscape


The upgrade to the Raspberry Pi hardware is a big deal for several reasons, said Jeremy Bray, owner ofCyberspace Fortress. The built-in support for WiFi and Bluetooth means users no longer have to buy third-party dongles to get those services.

"That means you are not taking up the Pi's four USB ports to get that functionality, so you can now use those ports for other things. When it comes to business applications, I have seen businesses customize them for their own uses. ... It is really just up to the business and their imagination for how it can be used in their business," he told LinuxInsider.

The Raspberry Pi will be even more suitable for advanced computer training in classrooms, noted Craig Brown, president at PicoCluster, an educational platform based on Raspberry PIs.

"The bump from 900 MHz to 1.2 GHz allows for faster processing. This is particularly welcome for clustered application learning and certainly any application or learning environment that we're running. This also makes it much better suited as a desktop replacement in classrooms and homes," he told LinuxInsider.

The hardware could use more upgrades, such as options for 2 GB of RAM and Gigabit Ethernet, even if it came at a higher price point, but that may be beyond the scope of the manufacturing plan, Brown noted.

"Overall, this is a great way to upgrade our clusters while giving us a chance to reduce costs," he said.

Business Beneficiaries


IT service businesses looking for lower costs in providing support and services to remotely monitor, manage and maintain their IT environments will benefit from the Raspberry Pi release, according to Ian Newman, CEO of IN NYC IT. His company uses the small footprint of a Raspberry Pi in clients' offices instead of a laptop or small desktop to monitor operations.

"We foresee placing the Pi in locations where clients report WiFi issues. We could use the Raspberry Pi 3 to collect data on the client's wireless infrastructure and possible interference, all without interrupting users, increasing their productivity and our response and resolution times," he told LinuxInsider.

The built-in WiFi/Bluetooth and improved 1.2-GHz, 64-bit CPU makes the Pi 3 easy for hobbyists to start developing projects on, noted Benny Estes, product manager at myDevices. The same makers that are tinkering in their homes are also using the Pi to rapidly prototype solutions for applications for their businesses.

"This tool provides companies with the ability to quickly vet an idea or improve a process at a fraction of the time and cost, with little risk. As the Pi continues to improve, it will be used in production-ready solutions and will not be limited to just prototyping," he told LinuxInsider.

Pi Specs


The Raspberry Pi 3 runs a Broadcom BCM2837 chipset on a 1.2-GHz quad-core 64-bit ARM Cortex-A53 CPU. It has an Ethernet connector for 10/100 with a maximum throughput of 100 Mbps and provides storage on a MicroSD card or via USB-attached storage.

Its graphics are from a 400-MHz VideoCore IV multimedia with full HDMI port, and the system memory is 1-GB LPDDR2-900 SDRAM. Audio support is a combined 3.5-mm audio out jack and composite video. The hardware includes a camera interface (CSI) and display interface (DSI).

The Pi board can play 1080p video at 60 frames per second. It sports a new power supply rated at 2.5A5.1V. Earlier boards used a power supply rated at 2A5V.

Unlike previous boards, the Pi 3 boots directly from a USB-attached hard or pen drive instead of from an SD card. Similarly, Pi 3 supports booting from a network-attached file system using PXE.

The latest Raspbian OS image is available for download.


Source by: http://www.technewsworld.com

IBM Watson Forks Over $2.6B for Health Data Stash

xl-2015-ibm-watson-3

IBM Watson Health on Thursday announced plans to acquire Truven Health Analytics for US$2.6 billion.


The acquisition will give the company access to about 300 million patient files, according to IBM, making it one of the world's largest holders of diverse health-related information.

One of its chief objectives is to use the data to bring more value to healthcare recipients. By integrating Truven's extensive cloud-based data sets, including cost, claims and lab results, into its own data sets, Watson will be able to create meaningful insights that can be translated into practical solutions for patients across the globe, IBM said.

Big Data's Big Impact in Healthcare


"We're adding more than 8,500 clients, which includes all the different stakeholders in the healthcare ecosystem, from government to employers to health plans to hospitals to providers and life science companies," said Kyu Rhee, chief health officer at IBM Watson Health.

The acquisition of information is really about finding meaningful insights that were previously unknown, he told the E-Commerce Times. By combining Watson's analytic capabilities with Truven's rich trove of data, IBM hopes to crack many of the healthcare industry's biggest codes, namely value and accuracy.

"Now we house one of the world's largest and most diverse repositories of health-related data, and it represents about 300 million lives, if you add it all up," Rhee said.

"This is exciting because what does Truven have in terms of data? They've got a great cloud-based data set, which has hundreds of different types of cost data, claims data, quality data, outcomes data, which is now added to the other data sets we have. With the power of Watson, with cognitive insights, we are going to translate that big data into big insights to those key stakeholders in the health and healthcare ecosystem," he added.

An example of a stakeholder who would benefit from the acquisition is a doctor treating a patient, said Rhee, who is a physician.

"It's ultimately about providing more value. ... It is about improving quality, improving the health of populations at a reasonable cost. I, as a physician, want to know if I've got a patient in front of me -- whether it's taking care of diabetes, pneumonia or cancer -- I want to know that I am recommending the highest-value options to my patients in terms of care," he said. "That demonstrates evidence-based guidelines. That is consistent with the literature. That's consistent with the people like the person in front of me in terms of good outcomes. Watson will deliver those insights through cognitive computing. That's value. Obviously, I want to do it at a reasonable cost," Rhee noted.

The Price of Smart Healthcare


While there are other powerful analytics systems, none are focused on healthcare the way Watson is.

One reason is that it's a costly endeavor, especially when you factor in the countless variables such as the number of medicines, illnesses and procedures, according to Rob Enderle, principal analyst at the Enderle Group.

Building Watson was a daunting endeavor, but "IBM did it anyway," he told the E-Commerce Times.

"The first public use of Watson was for healthcare, so an awful lot of work has gone into educating the system so it can diagnose illnesses relatively quickly and very accurately. To carry this thing to scale, however, it kind of needs to be integrated with some system that already exists, thus the purchase of Truven," Enderle said.

"When you tie these two together, now you have the machine and the go-to-market and existing set of folks that can service and sell the overall solution. But now they need to scale it out and get it broadly used so people can see the benefit. Now people will be able to see the advantage of having an intelligent system, a cognitive system, which is better than anything out there," he said.

Because of IBM's huge investment in the healthcare field and its large amassment of data, Enderle speculated that the company won't have competition at that level in the near future.

"For a while now," he said, "they will be the only ones at scale."


Source by: http://www.technewsworld.com