BASIC: A Computer Programming Language

12:48 AM Add Comment
Computer programming has its own language, and that’s just the beginning of the software adventure. There are many different languages in computer programming, and all of them have their own purposes. In order to understand the importance of computer programming languages, knowing them, and tweaking them, one has to understand the importance of computer programming. Computer programming produces software packages, among other things, to meet our needs. We may need software for accounting, making photos bigger or smaller, or editing our home videos. Behind all these software packages are the computer programmers who use their individual languages in order to create the software.


One such computer programming language is the Beginner’s All-Purpose Symbolic Instruction Code, or BASIC. BASIC is actually composed of many different kinds of programming languages that are actually higher level than most other languages. This BASIC family of computer programming languages was first designed in the 1960’s, and was originally made for non-science people to gain better access to computers. During that time, using a computer required that a person write customized software, a task that only mathematicians and scientists were equipped to do. The BASIC language was therefore a bridge for people of other professions to take advantage of the power of computers.

When the 1970’s came, the BASIC language, whether in its original form or a variant of it, spread onto microcomputers; and by the 1980’s, even home computers could be run in BASIC. Today, BASIC remains popular, as it serves as the basis for many of the more modern programming languages that have been developed in the wake of advanced operating systems and the Internet.

When it was originally conceived, BASIC was meant for beginners: it was a language that people could use easily, whether or not they were educated in mathematics and the sciences. The language also had to be a general purpose one, in that it had to serve many different needs, and not only those that mathematicians and scientists required. The root language of BASIC also had to allow for advanced features to be plugged on as experts grew more and more adept in it, and as the language found further use in many other fields. BASIC was also meant to be interactive, and was designed to show error messages that were clear and friendly; that is, these error messages had to completely explain what the problem was, which would hopefully allow the user to fix it faster and easier.

When it was first released, moreover, BASIC was free of charge, which allowed the language to spread much faster. Once the language spread much faster, it was also easy to modify it and correct errors. BASIC was also distributed to a few high schools in order to promote it faster. Thanks to this widespread use of the language, BASIC was soon implemented on several microcomputers, and by several software manufacturers.

Despite its success, BASIC has had its dissenters. For instance, some programmers find that its scripts do not show proper programming practices, and the language itself is too slow, or sometimes even too simple. Despite all these, however, BASIC has continued to thrive, succeed, and evolve, and has thus become a good tool to introduce beginner programmers to the concept of coding and computer programming.

These are only a few facts about the BASIC language. For more information on BASIC, read and do your own research through several key pages online, or using computer programming books.

Are Functions Core Concepts in Computer Programming?

12:46 AM Add Comment
Computer programming is a phrase that is bandied about quite heavily, but only few people actually understand its implications. The process of computer programming itself is difficult to understand for people who are not in the computer science field. Computer programming makes use of a code or a language: this language can be placed into several lines of code that can be translated to mean different things once they are processed as a program. For instance, the software that you use to calculate your taxes, or the software that you employ to make your simple web page are all products of skilful computer programming. Behind these software programs are scripts and codes, and these scripts and codes can mean different things.


For many different programming languages, a function can be important and can therefore be a key concept to learn when someone is interested in software and computer programming. A function can also be termed as a subroutine, procedure, or sub-query. How is a function important? For instance, if a company or institution has a library of many different programs, these programs can therefore consist of millions upon millions of lines of a source code. In the interests of time and space, you would like to keep from duplicating a certain source code in many different places.

Why is duplication so undesirable? If a source code is duplicated in many different places, it is being needlessly copied, and it can spell Hell for the programmer and troubleshooter when things go wrong down the line. If the source code is actually erroneous, the programmer or troubleshooter will have to correct the code in all the different places that it appears. If the source code has to be updated or improved in order to make the program either run faster or perform more operations, then the source code has to be modified, improved, and updated in all the places that it appears. And if the source code has to be removed and replaced with a new source code, then it has to be erased and replaced with the new code in every single place that it appears.

This is indeed time-consuming, and it can lead to more errors because of all the human intervention that has to be done. On the other hand, if there are functions that are built to handle all the different programs, then only one or a few changes need to be made should there be errors, or should the source code have to be updated, modified, improved, or changed. You can think of the function as an umbrella: it covers all of many different programs beneath it, so that you do not have to cover each program individually.

Having a single source code serving as the function is also advantageous when you have to introduce a new program that still makes use of that same source code. Because the source code is already available as an overall function or sub-program, you do not need to add the source code to the new program. You only need to find a way for the new program to interact with the source code itself.

These are only a few facts that you need to know about functions in computer programming. For more information, read up on the latest computer programs, how different programs can interact with each other using some umbrella or overall scripts, and how different programs can be improved when using functions.

3 Easy Ways To Relieve Insomnia Starting Tonight

12:43 AM Add Comment
If you are one of the millions of people that are suffering from insomnia, then you should know that there are some things you can do to make it less of a problem. While many turn to prescription medications, they don't always work and they can have a big impact on your health and your pocketbook. Not to worry, there are other ways to combat sleeplessness and we will look at some of the best ones in this article.


There are many causes of insomnia, with hormonal imbalance and stress being two of the biggest culprits. While the items below will help in a lot of cases, your case may be more severe. If so, then see your doctor as a prescription may be your best alternative. But, before you go that route, try these things first:

1. Loosen up - Okay, I'll be the first to admit that this is easier said than done, but it is the first step to beating insomnia. We all have things to worry about, but you have to find a way to let those things go before bedtime. In fact, by purposely forgetting them before retiring for the evening, you may actually solve those problems while you sleep. However, if you go to bed with the intention of solving a hard problem, then your subconscious will work differently by trying to keep you awake to solve. It all sounds counter-intuitive, but you have the best chance of solving your problems by not worrying about them before bed. At the same time, it's vital that you don't worry about how much sleep you will or won't get. Focusing on your insomnia is about the surest way to have insomnia. The key is to do things to help you unwind, to help you shift from the cares of the day to preparing to sleep.

2. Stay healthy - Exercising too close to bedtime will only serve to make it harder to fall asleep. However if you exercise several hours earlier, your body will be more ready to sleep. Eating well is important to your overall health, and this extends to how well sleep. The healthier you are, the better you will sleep. Also, sleeping well is part of being healthy, so you will see a difference if you maintain a healthy lifestyle.

3. Learn relaxation techniques - There are many different techniques designed to help people relax and sleep better. You can purchase audio programs that use a form of guided meditation to help you drift off into a deep and restorative sleep. You can also try the following technique on your own: As you lie in bed start at your toes and release all of the energy from them, letting them melt right into your mattress. Then move up to your feet, ankles, calves, knees, and all the way up to the top of your head. As you do this, you will be letting go of the tension you have built up over the course of your day and drifting off to sleep before you know it.

"OTA’s" - What They Mean And What They Can Mean

12:42 AM Add Comment
In recent years in the NFL, the term "OTA" (Organized Team Activity) has come to the forefront this time of year. There are a few reasons for that. One is that the calendar reads May and June, and this is the time of year when activity is at its lowest. The draft is over, free agency, for all intents and purposes, is finished and coaches and staff members are going to cycle into their much-needed vacations.

Another, and perhaps more important reason, is that these OTA’s ha...



Keywords:
sports,tickets,OTA’s,Mean,Can,NFL,Organized,Team,Activity


Article Body:
In recent years in the NFL, the term "OTA" (Organized Team Activity) has come to the forefront this time of year. There are a few reasons for that. One is that the calendar reads May and June, and this is the time of year when activity is at its lowest. The draft is over, free agency, for all intents and purposes, is finished and coaches and staff members are going to cycle into their much-needed vacations.

Another, and perhaps more important reason, is that these OTA’s have come to mean much more to not only the team involved, but to individual players. There are several teams around the league this year that are holding OTA’s that could bear a direct correlation to on-the-field results in 2006. We’ll take a look at a few of them here.

Houston Texans

The Texans have officially cleaned house since the end of the 2005 season. The coach and GM have both moved on, and the team is attempting to implement an entirely new approach both on the field and off as it continues to search for a new general manager. There is a lot to be done in Houston, and the more work the team can get, the better.

Oakland Raiders

The Raiders have a new coach who’s trying to instill discipline and toughness on a team that has lacked both in recent years. They also have a new QB to acclimate to their offense, and Aaron Brooks needs that same dose of discipline that the rest of the team does, as he’s been error prone in recent years.

New Orleans Saints

For the Saints, everything starts anew this year. There is a new coach, a new QB coming off a serious injury and a new potential superstar whose complete role has yet to be defined. Sean Payton needs to make sure Drew Brees’ shoulder will hold up before he can fashion his offense, and Reggie Bush’s talents are so unique that they really don’t fit a template.

Green Bay Packers

The Packers have a new coach and a slew of young players attempting to earn starting spots all over the roster. Although Brett Favre has always operated in some form of the West Coast offense, he still needs to learn the nuances of Coach Mike McCarthy’s scheme. Their defense will feature several new starters and there’s a new defensive coordinator running the system.

Miami Dolphins

Although the Dolphins don’t have a new coach, they’re in a different situation than the teams above because they’re right on the cusp of the playoffs. In order to reach that potential, though, Coach Nick Saban will have to break in a new QB in Daunte Culpepper, assuming he’s healthy, and fine tune his overall system to ensure that the team takes that next step.

Dallas Cowboys

The Cowboys are the choice by many to represent the NFC in the Super Bowl. Bill Parcells has been building the team his way for two years, and he and Jerry Jones added a player who’s explosive in more ways than one in WR Terrell Owens. Parcells needs to integrate Owens into his offense and instill air-tight team chemistry to keep all the personalities in check. Every detail matters for a team that could go all the way, and Parcells is taking no chances.

Teams have different reasons for their OTA’s, but they are important. Even though they’re considered “voluntary” under the existing CBA, players’ chances to earn starting spots can be damaged if they’re absent, and teams with bigger dreams can have them dashed if they don’t hit the ground running in training camp in July. The teams we see playing into January will most likely be able to look back at a successful OTA season.

“It’s Not Rocket Science”

12:39 AM Add Comment
Wagerweb.com has posted odds offering bettors the chance to predict which Major League Baseball team Roger Clemens will return to.



Keywords:
MLB, baseball, sportsbetting, online sportsbook


Article Body:
Wagerweb.com has posted odds offering bettors the chance to predict which Major League Baseball team Roger Clemens will return to.  Clemens is clearly enjoying the attention he is garnering from his four suitors.  Let’s take a look at how Clemens has played this situation thus far, and how it will play out at the end.

THE EASY MARK:
Roger Clemens enjoyed opening day in Arlington Stadium, sitting next to owner Tom Hicks. When Clemens was introduced and shown on the scoreboard, the fans went crazy. Do the Rangers, who have gone all these years searching for pitching, really have a shot at Roger Clemens? Well, the Rangers are an improved team, with Kevin Millwood leading some young up-and-coming pitchers. And it would do wonders for Clemens’ legend to ride into Arlington on his horse and lead them to their first World Series. Is it going to happen? No. Why would Clemens pitch in a hitter’s park for a team which, despite their improvements, is not a serious World Series contender? More likely, Roger was paying attention when Tom Hicks bid against himself to sign Alex Rodriguez to his franchise-crippling $250 million dollar contract. This is exactly the type of guy you want to draw into the bidding.  Wagerweb.com has the odds on Clemens going to the Rangers at 6-1. Trust me, it’s far longer than that.

AN OFFER HE CAN’T REFUSE:
Roger Clemens still keeps in touch with buddies Derek Jeter and Jorge Posada, and there were reports that Jeter had his ear during the World Baseball Classic. And if Clemens is looking for a sure bet to get to the playoffs, it’s been a while since the Yanks sat out October. Can Clemens return to the Yankees? Probably not.  Roger Clemens already got a Hummer as a retirement gift, and you have to figure, after feasting on weaker National League number eight hitters, and pitchers’ feeble attempts to catch up to his fastball, he might not be dying to face more formidable American League lineups.  If Randy Johnson keeps looking his age, can George Steinbrenner make Roger Clemens an offer he can’t refuse? Could happen, but George will never let Clemens skip road trips in fear that all of his stable of superstars will demand the same special treatment. At 1:2, this is not a good bet.

FINISH WHERE HE STARTED
Imagine the nostalgic feeling of coming back where you began your career, and leading that team to a World Series. What a perfect symmetry to a career.  Almost like a movie script. Only the impact of leading the Red Sox to a World Series is not nearly what it was two years ago.  The Red Sox already have had a hero who started in their organization come back and lead them to the Promised Land. And that hero wore a bloody Red Sock. How can Clemens possibly top that? Besides, if the Red Sox really get close, Mr. Steinbrenner may very well make him an offer he can’t refuse. At 1:1, I just can’t see this as a good bet.

FINISH WHAT HE STARTED
The first year, Clemens led the Astros to the playoffs. His second year, he helped them to their first World Series.  Why not finish what he started? The Astros are off to a great start. Besides, the Mets, Cardinals and, possibly the Phillies, who can you remotely predict can stop them from at least getting there? His best friend Andy Pettitte has mentioned the possibility of retirement after this year (Don’t bet on that, though). Houston offers him a chance to stay close to home and it lets him skip those pesky road trips.  They have already made him a generous contract offer. The odds are 2:1.

After all that analysis, it must come down to this: If you could work closer to home, travel less, and not have to work as hard, for similar money, what would you do? Come on, this may be Roger Clemens, but it is not rocket science. Bet the 2:1 on him returning to the Astros. It may be the best bet available on the entire website.
Dell's Embedded PCs Take the IoT to the Mainstream

Dell's Embedded PCs Take the IoT to the Mainstream

3:44 AM Add Comment
xl-2016-dell-embedded-box-pc-1

Dell on Tuesday announced the release of its first purpose-built industrial PC products for the mainstream market: the Embedded Box PC 3000 Series and 5000 Series.


The products are a response to the growing embedded computing market and the lack of reliable devices, Dell said.

The embedded systems market was valued at more than US$11 billion in 2014 and is expected to reach $23.1 billion in 2019, growing at a compound annual rate of almost 15 percent, according to a Technavio study that Dell cited.

Falling component costs, improved power efficiencies, increasing return-on-investment needs, and demand from the Internet of Things are fueling that growth.

Known Quantity


"Customers have consistently told us that current embedded solutions do not meet the level of cost-effective sophistication, scale and support they need for these to be a critical, reliable component of their operations," said Andy Rhodes, Dell's executive director of commercial IoT solutions.

Dell provides global scale and an end-to-end IT and operations technology security portfolio, he said.

The products' rugged design can withstand extreme temperatures while using a fanless cooling system, which is beneficial in several applications, according to Dell spokesperson Sarah Luden.

"These were made to be used in a wide range of industries, from digital signage to factory automation and transportation and construction. Within factory automation, the fan is the first thing to go down," she told TechNewsWorld.

"It's also much quieter, so in a hospital setting, think of MRI machines, where patient care and comfort is important," Luden added.

The IoT is a new arena for many business owners, and investing in costly computers and programmers can be a scary proposition, she noted. "For some people, the Internet of Things is new, so they want to go with a brand they know."

Why This Box Is Different


What makes the Dell PC appealing is its out-of-the-box capabilities, said Christian Juarez, an instructor at TechShop.


Dell Embedded Box PC

Dell Embedded Box PC


The IoT is helping industries streamline their processes to make work more efficient. "The whole point of IoT is bringing everything to the cloud and then connecting to the Internet and then having a control center for it," Juarez told TechNewsWorld.

"What happens a lot of times is that you have to set up the control center yourself. If you're setting it up yourself, as opposed to what Dell's offering, you have to decide on your distro, have all kinds of software running to get everything working together, you have to code things yourself, things of that nature," he said.

"With Dell, they have software built in for you, so you don't have to do that much. Software can be a huge issue, so with something like an out-of-the-box embedded machine you're going to appeal to a lot more people," Juarez added.

Microcomputers like Raspberry Pi are used for control centers, he noted, but that kind of device requires expert-level programming skills that a Dell doesn't necessarily need, which may help companies save money in the long run.

The Embedded Box PCs will be available this summer. Pricing starts at $1,099 for the 3000 series and $1,699 for the 5000 series.


Source by: http://www.technewsworld.com
Wall Street Backs Off Apple

Wall Street Backs Off Apple

3:38 AM Add Comment
apple-earnings-report

Their fears confirmed, investors were bearish on Apple Wednesday, the day after the company reported its slowest-growth quarter ever. The company's shares closed the day at US$93.44, down 6.55 percent.

In its Q1 earnings report, Apple prepared investors for what may come next: its weakest quarter for iPhone sales in 13 years. Even worse is that the company may not see a significant boost in handset sales until the launch of the iPhone 7 later this year.

Apple moved about 74.8 million iPhones during the quarter that ended in January, and the company forecast sales of between 50 and 52 million units during the three-month period that will end in March.

The news of Apple's slowing growth came on the heels of reports detailing the rise of Alphabet, Google's recently formed parent company, valued at around $500 billion.

For now, Apple is still the world's most valuable company, with a valuation of around $562 million.

Apple reported that it sold about 16 million iPads and 5.3 million Macs in Q1 -- down about 25 percent and 4 percent, respectively, from the year-ago quarter.

Keeping the Faith


Taking note of the general saturation of the smartphone market, many investors have been turning to Alphabet, Facebook and Amazon for growth. However, those companies rely on ad revenues, which could prove more volatile than Apple's handsets reliance.

Though hardware accounts for more than half of Apple's business, the company has been pivoting toward services, noted Larry Chiagouris, professor of marketing at Pace University'sLubin School of Business.

That should count for something with investors, he said.

"Its ecosystem, to include iTunes and iCloud services, are either already dominant or possibly on the way to being dominant, and so this is not the time to lose faith in the company or its stock," Chiagouris told the E-Commerce Times.

The current perceived loss of faith likely is a byproduct of the times, he suggested. In a connected world, speed rules and investors don't hesitate to look elsewhere for growth when a company stumbles.

Also, investors are more influenced by media reports today than they were a decade or two ago, Chiagouris pointed out.

"All the reporting as of late has been on iPhone sales slowing, and so investors are reacting to these reports," he said. "The more important fact is that, ultimately, hardware companies always confront shrinking margins as the products that they make begin to become less differentiated or even commoditized."

Too Big to Fail


Paradoxically, investor disappointment might be a consequence of Apple's historic rise to become the most valuable company in the world and its position at or near the top of any list of most-respected organizations, suggested Ritch Blasi, president of MediaRitch.

"By continually overachieving in offering innovative products and services, and outperforming financial targets, it has become a darling of investors," Blasi told the E-Commerce Times. "Apple's latest numbers are viewed as not quite up to snuff, and the financial markets are feeling jittery."

While investors may want to hedge some of their bets by looking elsewhere, it would be premature to count Apple out, he said. The company didn't become this powerful by chance.

"While it may never again have the impact magnitude it did when introducing the iPhone," said Blasi, "expect Apple to rebound from this financial burp and continue on its course of changing the way we work and live."


Source by: http://www.technewsworld.com
Major Security Flaw Found in Silent Circle's Blackphone

Major Security Flaw Found in Silent Circle's Blackphone

3:33 AM Add Comment
xl-2014-blackphone-1

Security researchers at SentinelOne on Wednesday revealed a vulnerability they discovered in the Blackphone.


The flaw -- an obscure socket -- lets an attacker take over and control communications on the Blackphone, a highly secure Android smartphoneSilent Circle developed and marketed in reaction to news of government surveillance of people's communications.

Silent Circle began taking preorders for the device in 2014, and "despite [its] best attempts, a severe zero day remained undetected for nearly a year before we uncovered it," said Tim Strazzere, SentinelOne's director of mobile research.

No Evidence of Exploitation


The vulnerability, a socket left open and accessible on the Nvidia Icera modem used in the Blackphone, lets attackers take control of many of the modem's functions, including sending and receiving text messages, dialing or connecting calls, and changing the phone's settings.

Attackers could use a malicious application that exploits the vulnerability in the background without the device owner's knowledge, Strazzere told TechNewsWorld.

Exploit-based attacks would be used against this open socket, and "any antivirus- or antimalware-based technology wouldn't prevent it," he observed. "Even an HIPS-based solution that focused on exploits would have missed it since this is a zero-day-based vulnerability with no available signatures used for protection."

The options available to an attacker "are extensive," Strazzere remarked, but "we have seen no evidence that [it] was ever used for surveillance or malicious purposes."

The vulnerability was discovered during a reverse engineering exercise to prepare for a Red Naga training session. Red Naga is a security training group Strazzere and friends created to teach, train and grow the mobile security community at no cost.

The Icera modem is fairly obscure, used only by the Nvidia Shield tablet and "a few phones in India," Strazzere noted.

Because it's obscure, few security researches have looked into it, and devices in the field "might not be getting updates or the attention that more popular modems would receive," he said.

Following notification from SentinelOne, Silent Circle patched the vulnerability, which was found on the Blackphone 1.

It's not clear whether it exists in the Blackphone 2, which Silent Circle released in September.

The Third-Party Risk Factor


It's possible the socket was left open for debugging purposes in preproduction and was mistakenly left that way in production devices, Strazzere speculated.

Most mobile makers use third-party technology.

Third parties for both hardware and software components "are part of the supply chain for mobile device manufacturers and represent a significant risk," said Tim Erlin, director of IT security and risk strategy for Tripwire.

However, providing assurance for both hardware and software "has really been limited to high-level government equipment, so there are few assurance operations [for] the consumer goods market," he told TechNewsWorld.

Third-party providers typically are granted access to critical elements of the internal infrastructure and to sensitive data, said István Szabó, product manager at BalaBit. One remedy would be to monitor and record all activities when third parties access internal systems.

Such monitoring "gives the mobile device producer the ability to detect and immediately terminate sessions if something suspicious occurs ... and provides important evidence to help investigations should an incident occur," he told TechNewsWorld.

Another option is to use a behavioral-based technology such as the one SentinelOne offers to detect, prevent and remediate against attacks.

Silent Circle did not respond to our request to comment for this story.


Source by: http://www.technewsworld.com
iPhone Sales Could Be Slowing

iPhone Sales Could Be Slowing

3:16 AM Add Comment
xl-2015-iphone6s-6s-plus-1

In the runup to the release of Apple's Q1 2016 earnings report Tuesday, one of the big unanswered questions was whether the iPhone could maintain its sales momentum.

Q1 2015 iPhone sales hit a record 74.5 million units, and it's possible the latest quarter's shipments may not equal -- let alone exceed -- that mark.

IDC has forecast of slowing sales industrywide for 2016. The smartphone market will see the first single-digit growth year ever.

The slowdown in China's economy, weak demand for the iPhone 6s and 6s Plus, and sluggish Apple Watch sales are also of concern.

However, "we think sales are actually going to be up in volume this year compared to a year ago," said Jeff Orr, a senior practice director at ABI Research.

First, China is still a great opportunity despite the slowing down of its economy, and second, the iPhone 6s and 6s Plus were launched "a little later than iPhones used to be launched previously, so we aren't sure whether or not they'll hinder Apple's quarter," he told the E-Commerce Times.

Great Expectations


Apple historically has exceeded analysts' expectations while playing down its performance prior to releasing its earnings reports.

FactSet StreetAccount estimated Apple sold 75.5 million iPhones in the quarter -- surpassing the previous year's record by about 1 million units, according to news reports.

FBR, which slashed its estimates for iPhone 6s sales in December, earlier this month predicted a huge uptick for the upcoming iPhone 7 and dismissed investors' fears about slowing growth at Apple as being overblown, while acknowledging the company has been through a rough patch.

The market agrees -- Apple shares were up by US$1.28 to $100.72 at the time of writing.

"Should we expect any company to keep setting records year over year? The answer is no," Orr said. "The problem Apple has is that investors always expect it to show a meteoric performance. The question is, at what point do you become disgruntled because you don't get meteoric performance out of the company?"

Leveraging Preowned Phones


Sales of refurbished smartphones are taking off, and Apple has ventured into this area.

Refurbished iPhones "can be sold in price-sensitive but growing markets without any brand dilution," pointed out Andreas Scherer, managing partner at Salto Partners.

"It could be tempting to develop a cheaper product that's being sold utilizing a different brand name in order to win in Africa, India and Indonesia, but the better strategy is to sell refurbished iPhones," he told the E-Commerce Times.

Grabbing Market Share


In the future, the replacement business will outpace the new phone business, ABI's Orr suggested.

"For Apple the issue no longer will be offering items good enough for first-time buyers to purchase an Apple product; it will be about getting Android or Microsoft phone users to switch," he explained.

It's "getting increasingly difficult to get that kind of differentiation, but that's not just an Apple problem. It's the same thing Samsung has been facing over the past two years and being hammered by investors over," Orr said.

Where Apple Might Go


Apple "needs to continue to win in its core markets," Scherer observed. That means "relentlessly focusing on replacing existing iPhones with newer versions" in markets such as the United States, and introducing upgrade incentive programs and incentives to buy additional phones as part of family plans through carriers.

Perhaps Apple could move away from its image as the largest manufacturer of smartphones, Orr said.

"We're hearing talk about moving the audio jack and creating a new accessories market that's exclusive and led by Apple -- Beat headphones and other products using the Lightning connector or wireless interfaces," he elaborated.

Other possibilities for Apple are wireless charging, improving battery life, wraparound screens, incorporating OLED technologies, and making iPhones "more user-proof and water-resistant," Orr suggested.


Source by: http://www.technewsworld.com
Rugged Turing Phone to Run on Sailfish OS, Not Android

Rugged Turing Phone to Run on Sailfish OS, Not Android

3:12 AM Add Comment
xl-2016-turing-phone-1

Turing Robotic Industries this week announced that it has uninstalled Google's Android mobile platform in favor of Jolla's Sailfish OS in its yet-to-appear secure smartphone.


The Turing Phone, molded from a single unit of the Liquidmorphium liquid-metal alloy, is designed to be more durable to absorb shocks and prevent screen breakage.

Preorder pricing ranges from US$610 for the 16-GB version to $870 for the 128-GB model.

Optimized for Swiftness


TRI started taking preorders for the smartphone last year. It delayed the planned shipping date of Dec. 18 to resolve remaining developmental steps for the device, including its security platform and operating system. The new projected shipping date is in April.

Customers found out about the OS switch this week through an email.

The Sailfish OS is optimized to run fast on the Turing Phones and the Snapdragon 801 processor, according to the notice.

"It has a super-secured platform environment, which Android lacks, and it does not use Java for UI (Android). So Turing targets design-savvy users and those who care about their privacy," said Steve Chao, CEO of TRI.

Google Play Store apps and Android apps in general will run on the Sailfish OS via the Alien Dalvik engine. User experience with Android will not be impacted, he told LinuxInsider.

Sailfish vs. Android


The Sailfish OS is a continuation of the Linux MeeGo OS, which was developed by an alliance of Nokia and Intel. The MeeGo mobile software platform was created through the merging of Moblin and the Maemo OS, which was developed by Nokia, according to Turing officials.

"TRI decided to use Sailfish OS because it has a long-term plan to build a trustworthy communications network. Sailfish is based on a pure mobile Linux platform with unmatched speed and with great performance," Chao said.

The decision was not made from a comparison with Android. Rather, the goal is to enable TRI to build an ecosystem around its own devices. The Turing Phone is just one example, he said.

"Sailfish is the perfect platform in which Turing may start building its ecosystem surrounding the IoT and the Future Networks (ISO/IEC 29181)," Chao said.

Tarnished Efforts


It's hard to understand why Turing would swap out the mature Android distro it originally promised. Sailfish is too new to know how it will perform, according to Charles King, principal analyst at Pund-IT.

"Turing claims it's the fastest mobile OS in the market. That may matter since the Turing Phone is running a 2-year-old CPU. While Sailfish is capable of supporting Android apps, early reviews have also noted significant glitches," he told LinuxInsider.

TRI may have discouraged potential buyers with the change in OS. The company got a lot of good press for its idea of shipping a highly durable and secure phone aimed at consumers.

"But the project's delays have tarnished the effort somewhat, and it is not clear how this latest twist will play among Turing supporters," said King.

Better Plan In the Works


The change in OS will have little impact on buyers' interest in the Turing Phone, Chao maintained. The phone will be unique and secure.

"Most Turing users went for Turing's unique design. The design was the most important part of their decision in purchasing it. Most of them were tired of the iPhone and the same looks that Android phones had to offer," he said.

The OS change strengthens the interest of Turing fans who sought a secured environment for mobile computing. Sailfish is the perfect answer to that, he said.

Security Factors


TRI developed a decentralized authentication technology that provides a dramatic improvement over the logic of identity-based encryption, according to the company.

Both the master public key and the unique private key are anonymously bundled into the phone. Each Turing Phone can directly verify the identity of other Turing devices without the need for a third-party key center, it said.

This complete authentication creates a protected communications network insulated from cyberthreats and privacy intrusions, the company said. This circle of trust lets users exchange sensitive data such as Social Security numbers or bank wiring instructions with the assurance the information will reach only the device intended.


Source by: http://www.technewsworld.com
Vaio's Phone Biz to Test Windows 10's Reception in Asia

Vaio's Phone Biz to Test Windows 10's Reception in Asia

3:07 AM Add Comment
xl-2016-vaio-phone-biz-1

Vaio on Wednesday announced Phone Biz, a Windows 10 mobile phone.


The device doesn't have a SIM, leaving users free to select their own carriers.

The Phone Biz lets users easily access corporate apps, Microsoft SharePoint and Microsoft Exchange, as well as the Azure cloud, according to Vaio.

The OS is synced with the latest version of Windows 10. Users can manage settings from the same Microsoft account as their PCs.

The Phone Biz incorporates Microsoft's Continuum feature, which lets users connect phones to TVs or monitors, if they want to work on a larger screen.

The Phone Biz supports single sign-on and connection speeds of up to 225 Mbps.

The position and size of tiles are customizable, and the phone comes with the Cortana digital assistant.

The phone can use encryption or a virtual private network. It includes built-in GPS and supports remote data erase and remote locking.

Admins can change users' access to apps and data remotely.

The Phone Biz will be available on NTT DoCoMo's network. It reportedly will begin selling in Japan in April for about US$430.

More About the Phone Biz


The Phone Biz has an aluminum body and a full high-definition tempered glass screen. It has a microUSB 2.0 port, said Vaio.

Four versions will be available. Two use eight-core 1.5-GHz Qualcomm Snapdragon 617 processors. One of them has a 5.5-inch 1080x1920 screen and the other a 5-inch 720x1280 screen.

The other two are 5-inch devices with 720x1280 screens. One has a 1.2 GHz quad-core processor and the other a 1.1 GHz quad-core processor.

RAM ranges from 1 GB to 3 GB, and internal storage from 8 GB to 16 GB.

Rear cameras are 8 MP or 13 MP, depending on the model, and front cameras range from 1 to 5 MP.

None of the features is particularly outstanding, said Mike Jude, a program manager at Stratecast/Frost & Sullivan.

However, "the Continuum capability that allows the phone to serve as a platform or CPU for a desktop ... makes the Vaio phone better suited for business use than personal use," he told TechNewsWorld.

"With Sony, it's all about design, so this phone is incredibly good-looking," said Rob Enderle, principal analyst at the Enderle Group.

Sony has a minority stake in Vaio, which it spun off in 2014.

Alternative platforms often work far better in Asia than they do in the U.S., Enderle told TechNewsWorld. The Asia-Pacific region as a whole "is more accepting of diversity, making it a far better geography to launch a phone like this."

Fighting an Uphill Battle


Worldwide smartphone shipments hit a record in Q4 2015, totaling nearly 400 million units, IDC reported. That is nearly 6 percent higher than the same quarter in 2014. As a whole, 2015 was a record year for phone shipments.

However, the Windows Phone OS' share of the market has been hovering around 2 percent since March, according to Netmarketshare.

That hasn't deterred Microsoft, which last fall announced that several Japanese companies would be making Windows 10 phones.

That said, Windows Phone "never really caught on that much, because it's highly dependent on a very good network connection," said Frost's Jude. "With active tiles, you need a reliable data connection and, if you're roaming, that might be hard to come by."

The current push in Japan indicates Microsoft is "fighting for a beachhead and have found Asia a far better geography to get one," Enderle said.

Microsoft "isn't giving up on mobile as the SwiftKey purchase clearly showcases," he noted. "It's looking for a geography to take back and use as a springboard to once again become relevant in this space."


Source by: http://www.technewsworld.com
FBI Director Makes Case for Security Trade-Off in Congressional Hearing

FBI Director Makes Case for Security Trade-Off in Congressional Hearing

3:03 AM Add Comment
xl-2016-comey-testimony-1

FBI Director James Comey on Tuesday testified before the House Judiciary Committee that the government has the legal right to gain limited access to the iPhone of one of the San Bernardino, California, shooters and other suspected terrorists.


Congress and the judicial system can create a mechanism to protect the safety of the American people while preserving constitutional rights against government overreach, he said in prepared testimony.

New methods of electronic communications have transformed society, Comey noted, adding that he supports the creation of strong encryption technology that protects large institutions and private citizens against cybercriminals and others who might attempt to gain access to proprietary data.

At the same time, terrorists and others criminals have used this technology to stay one step ahead of law enforcement, he said.

"We have always respected the fundamental right of people to engage in private communications, regardless of the medium or technology," Comey testified. "Whether it is instant messages, texts or old-fashioned letters, citizens have the right to communicate with one another in private -- without unauthorized government surveillance -- not simply because the Constitution demands it, but because the free flow of information is vital to a thriving democracy."

Clear and Present Threat


However, groups like the Islamic State have used social media to recruit and radicalize individuals to commit terrorist acts, he warned. Law enforcement needs additional tools to gather evidence to prosecute cases and in some instances prevent the acts from occurring.

The FBI is seeking only limited steps from Apple to help it open the San Bernardino shooter's encrypted iPhone. It wants the ability to bypass the encryption and spread out the time between individual attempts to guess a password, Comey said during a question-and-answer session with House members.

He likened the request to removing a group of guard dogs so that investigators could access the iPhone and get enough time to essentially break into the device themselves.

Asked repeatedly if the FBI had gone to other private companies or agencies to try to use alternative methods for unlocking the phone, Comey admitted that he was not an expert on the technology and that the FBI and other agencies had been stymied in their attempts to break into the phone.

Agency Assistance


The FBI asked San Bernardino County, where the shooter was employed, for assistance in retrieving data from the iPhone in December, county spokesperson David Wert said.

"The statements that have been made contending that resetting the Apple ID password is what made the backup impossible are incorrect. The fact that the phone was off and PIN locked is what made a cloud backup impossible before the Apple ID password was reset," he told the E-Commerce Times.

An iCloud backup requires a WiFi connection, and an iPhone that's turned off won't link to WiFi until the phone is unlocked, Wert said.

"At that point, the county said the best that could be done was to check the cloud for any past data uploads, but we would need to reset the Apple ID password because no one knew it. The FBI asked the county if it would do that, and the county agreed, unlocking the cloud and providing the FBI with the data that was in the cloud," he said.

Can of Worms


Granting the backdoor software request in the San Bernardino case will open the door for countless other requests by the Department of Justice -- and foreign governments -- in far less important circumstances, according to Eli Dourado, director of the Technology Policy Program at the Mercatus Center at George Mason University.

"This isn't a trade-off between security and privacy -- it's a trade-off between two kinds of security," he told the E-Commerce Times. One type of security is the kind provided by the FBI; the other is the security that iPhone users can get from encryption on their phones.

"In a world with repressive regimes as well as cybercriminals, the latter takes on greater importance," Dourado said.

A U.S. magistrate judge in New York ruled Monday that Apple did not have to assist the government in accessing the phone of a drug dealer whose encrypted iPhone was seized along with other mobile devices in a 2014 raid by the U.S. Drug Enforcement Agency.

The government did not have the legal authority under the All Writs Act to make Apple provide a way to bypass the encryption built into the phone and give law enforcement the ability to search for additional evidence, the judge ruled.

The dealer in that case pleaded guilty last year, and any new evidence would be used at sentencing or to pursue co-conspirators or others involved in the drug ring, according to court documents.

"We are disappointed in the magistrate's ruling and plan to ask the district judge to review the matter in the coming days," DOJ spokesperson Emily Pierce said.

"As our prior court filings make clear, Apple expressly agreed to assist the government in accessing the data on this iPhone -- as it had many times before in similar circumstances -- and only changed course when the government's application for assistance was made public by the court," she told the E-Commerce Times.

"This phone may contain evidence that will assist us in an active criminal investigation," Pierce added, "and we will continue to use the judicial system in our attempt to obtain it."


Source by: http://www.technewsworld.com
Apple Lawyer Pushes Back Against FBI Testimony to Judiciary Committee

Apple Lawyer Pushes Back Against FBI Testimony to Judiciary Committee

2:59 AM Add Comment
xl-2016-sewell-testimony-1

Apple General Counsel Bruce Sewell on Tuesday testified before the House Judiciary Committee that his company should not be required write new code for software that would weaken the security of the iPhone in the wake of the San Bernardino, California, terrorist attacks.


The FBI wants Apple to take action that would put the privacy and security of millions of the company's customers at risk, he said.

Apple has no sympathy for terrorists, said Sewell, who noted that the company immediately cooperated with authorities in the investigation.

The request not only sets a dangerous precedent, but would open the company to countless other requests in the future, putting the security of all those involved in jeopardy, he said. Congress should settle the debate based on a thoughtful and honest conversion on the facts.

"Most importantly, the decisions should be made by you and your colleagues as representatives of the people, rather than through warrant based on a 220-year-old statute," Sewell told the committee in prepared testimony.

During questions and answers with committee members, Sewell pushed back on the notion Apple was engaged in some sort of marketing exercise in its quest to fight the order. The government claimed in some court filings that Apple had complied numerous times with the requests until they were made public.

Apple was doing what was in the best interests of its shareholders, FBI Director James Comey told the committee, noting that he had previously worked in a corporate capacity and understood the company's corporate accountability.

Microsoft plans to file an amicus brief on behalf of Apple this week in its court battle with the Department of Justice and the FBI, a spokesperson for Apple told the E-Commerce Times.

Prosecutors Stymied


Congress should take the lead on deciding how to balance the issues involved with accessing data on encrypted devices, Manhattan District Attorney Cyrus Vance Jr. testified at the House hearing.

Ninety-five percent of the criminal cases in the U.S. are handled by state and local law enforcement agencies, and Apple's switch to default device encryption in 2014 has severely hampered their ability to investigate many criminal cases, he said.

As of November, Vance's office was locked out of 111 smartphones running iOS 8 or higher, he said, citing a report released by the DA's office, called "Report on Smartphone Encryption and Public Safety." The number has grown to 175 devices since then, representing 25 percent of the phones received by his office's cyber lab.

With more users migrating to the newer operating systems, investigators can't access half of the phones coming into the DA's office, he said. The phones are involved in investigations of attempted murder, child pornography, sex trafficking, sexual abuse of a child and other crimes.

The district attorney in Harris County, Texas, has more than 100 iPhones that it can't access, involving cases of human trafficking, violent sex crimes and other crimes, said Vance, who also was representing the National District Attorneys Association. Prosecutors in Cook County, Illinois, can't access 30 devices, and authorities in Connecticut can't access 46 devices.

His office has drafted language for legislation that would require designers of operating systems to provide a way for law enforcement to access unencrypted data on the phones as long as they had a warrant, he said. The legislation would not require the makers to do anything themselves unless the encryption was part of the design.

Other telecom and technology companies have received official requests for data, Vance noted. Verizon received 149,810 in the first half of 2015; Facebook received 17,577 during the same period.

FBI Fighting Last Battle


Law enforcement is using outdated methods and laws to combat a 21st century problem, Susan Landau, who teaches cybersecurity policy atWorcester Polytechnic University, testified. Many law enforcement agencies lack the tools and expertise to fight modern cybercriminals and terrorists using new technologies.

Counter to claims by FBI Director Comey, encryption has been an issue for decades, dating back to at least the 1970s, she said. Other experts in the private sector have ways of accessing the data that the FBI insists only Apple can provide.

Landau, a former policy analyst at Google and distinguished engineer at Sun Microsystems, cited the Chaos Computer Club, a group of European hackers that has exposed flaws in security systems over 30 years. The group last year demonstrated that it could recover data on security chips using electron microscopes.

Technological Misunderstandings


Landeau's testimony echoed the wider security community and computer security experts that Apple should not be forced to reengineer its devices, said Mark Jaycox, civil liberties legislative lead at the Electronic Frontier Foundation.

"Director Comey kept on urging Congress to handle this issue -- clearly implying legislation -- despite the fact that President Obama and the administration said they did not plan on proposing or supporting any legislation," he told the E-Commerce Times.

"The law enforcement witnesses appear to not understand the technology or wide-ranging precedent at stake in this case," Jaycox said, adding that committee members did seem to be trying to understand the technological details.

"A majority of the committee appear to be on Apple's -- and the Constitution's -- side," he said.

The American Civil Liberties Union on Wednesday announced that it will file a friend-of-the-court brief supporting Apple's fight against the FBI request to create software that will open encrypted iPhones.

The brief notes that Congress deliberately withheld authority from the government to require that technology companies bypass the security built into their own devices.

"Law enforcement may not commandeer innocent third parties into becoming its undercover agents, its spies or its hackers," the brief states.


Source by: http://www.technewsworld.com
Fire season brings warning from ministry

Fire season brings warning from ministry

2:53 AM Add Comment
satellite_image_of_forest_fires_across_cambodia_and_surrounding_countries_on_the_06_02_2016_nasa

As the Kingdom moves into the heart of the dry season, the Ministry of Agriculture, Forests and Fisheries has issued a set of guidelines on the prevention of forest fires, stressing that jail is in the cards for those starting blazes.

The notice, issued to various government ministries on January 21 and obtained by thePost yesterday, says that while the time of year brings with it naturally occurring fires,those caused by human activity “are the most worrying issue”.

Punishment for setting fires in forests carries a three- to five-year prison sentence, and in the case of mangrove forests, five to 10 years, according to the document.

However, Forestry Management Office director Dr Kao Dana, said that despite having the laws on the books, arresting offenders has proved difficult in practice.

“We cannot arrest; when we arrive there, the people run away,” he said.

Based in Phnom Penh, Dana coordinates with the various provincial Forestry Administration (FA) offices to investigate fires and illegal logging. However, he says, the resources to crack down are lacking.

“Look at the experience in Japan … The government flies over the area and then you see the person burning,” he said, pointing out the wealthier country’s resources, adding that – airplanes aside – there are not enough firefighters and equipment is expensive.

While Dana could not speak to whether fires observed raging in Stung Treng, Koh Kong, Mondulkiri, Ratanakkiri and Kratie were due to logging activities, deforestation compounds the issue.

“[Loggers] first cut it down. After six months, the trees are dead; after that it can burn easily. The forest in Cambodia is not easy to burn unless you cut the old trees first,” he said, referring to how a tropical forest dries out once the canopy trees are felled.

Speaking by phone yesterday, Mondulkiri’s provincial governor, Svay Sam Eang, said there were a lot of “small” forest fires throughout his province.

Asked how the provincial government worked with the local FA to solve the problem, Sam Eang said “we have a plan” but did not go into detail.

Travel guide author Matt Jacobson, who has lived in the country since 1997 and travelled through Mondulkiri and Kratie just last week, said yesterday that he had not seen smoke from fires so bad “in years”.

The worst, he said, is in the Cardamon Mountains of Koh Kong, where he said visibility has dropped to the point where he can no longer see the Gulf of Thailand from coastal hills.

“It’s the worst in the country down here.”



Source by: http://www.phnompenhpost.com
Firm denies circumventing Malaysia maid ban

Firm denies circumventing Malaysia maid ban

2:39 AM Add Comment
malaysia_maid_training_at_a_facility_in_phnom_penh_16_10_2013_pha_lina

Four domestic workers sent to Malaysia despite an official moratorium on the practice have been repatriated amid claims of unpaid wages and harsh working conditions, though the company that recruited them has insisted that the terms of their employment didn’t technically violate the government ban.

The four women, who were all from Kampong Chhnang province and who went to Malaysia in May, returned to Cambodia on February 25. However, three more women from the same province are reportedly being detained by Malaysian immigration authorities.

One of the repatriated women, Phon Srey Mey, 19, arrived back to her home in Koh Thkov’s Tamoul Krom village claiming she had worked for almost a year with no salary.

Srey Mey said yesterday that every time she would ask for her salary, her boss would tell her that she would get paid the following month.

“Every week, I had to borrow $7.50 from the team leader at the company,” she said. “We didn’t have enough food and the working conditions were very hard. If we couldn’t finish our work, they wouldn’t allow us to go home.”

Srey May said when she returned to Cambodia, the company made her sign a contract saying that her “salary” was money she had borrowed for expenses such as the cost of her passport and flight.

A ban on Cambodians going to work as maids in Malaysia was implemented in 2011 after a series of often brutal cases of abuse.

The company that recruited the four women, APTSE&C Cambodia Resources, claims the women were not working in Malaysia as maids.

However, the company the women worked for – H2O Cleaning Service – on its website described the women’s job as part-time maids, catering to employers who didn’t want to deal with problems that could arise from employing full-time domestic workers.

Labour advocate Moeun Tola, head of the labour program at the Community Legal Education Center, yesterday questioned the loophole and the effectiveness of the ban.

“I think the company tried to manipulate the ban,” Tola said.Heng Sour, spokesman for the Ministry of Labour, meanwhile said APTSE&C Cambodia Resources was not even licensed and recommended the women file an official complaint with the ministry so their cases can be investigated.

“We will take action if this company committed any wrongdoing,” he said. Saw Sreythea, 45, whose daughter also arrived last month, said she planned to file a complaint with the Ministry of Labour, but would wait to do so until her three nieces were released from Malaysia.

She added she was “afraid” the company could retaliate against her nieces. Sen Setthy Chey, executive director of APTSE & C Cambodia, said the owner of the company in Malaysia was arrested and the three other women were being held as witnesses. However, he insisted the women were not working as maids.

In December, both countries signed a memorandum of understanding to lift the ban, although the details are still being worked out.

Tola said his organisation had found the ban wasn’t effective in preventing maids from being sent to Malaysia.

“Maids were still sent,” he said. “It’s quite shameful for the Cambodian government not to fully manage the ban.”

Chum Sunry, spokesman for the Ministry of Foreign Affairs, said the ministry helped repatriate 573 Cambodian workers in 2015, including 55 women from Malaysia and 82 women from China.

He said most of the women who were returned from Malaysia were maids.


Source by: http://www.phnompenhpost.com
KRT witness recounts giving birth in security centre

KRT witness recounts giving birth in security centre

2:34 AM Add Comment
a_krt_witness_appears_befor_the_eccc_yesterday_in_phnom_penh_03_03_2016_eccc

When Moeurng Chandy gave birth to a daughter in prison at the Au Kanseng Security Centre in 1978, there was not a hospital or a midwife in sight.

As she testified at the Khmer Rouge tribunal yesterday, she had only the help of a male medic, who cut the umbilical cord, and other female inmates at the regime’s “re-education school”.

Chandy gave evidence immediately after her ex-husband Phon Thol – who said he had not spoken to his former wife since 1986 – vacated the witness stand.

It was the second day the court heard testimony regarding the Au Kanseng prison, located near the current provincial hospital in Ratanakkiri, which housed soldiers and civilians during the Khmer Rouge regime.

Responding to questions from prosecution lawyers, Chandy said she was tasked with cooking rice in the prison’s kitchen soon after giving birth.

“However, I did not have any breast milk to give my baby,” she said. “When you asked me this question, it triggers the pain inside me.”

“I asked for sugar cane juice to feed her, and that happened because I did hard work,” she continued. “I had to carry the wood planks from the forest.”

Describing a moment of warmth during an otherwise bleak existence, Chandy told the court how, when she was still weak from childbirth and given meagre food rations, her fellow inmates would take turns to carry her share of the wood.

“Luckily enough, the baby survived and is still living now,” she said.

Chandy also testified to having witnessed a security guard named Ta Auy murder a woman at the centre.

“That woman was smashed with the back of the hoe . . . [and] she died,” Chandy said.

“This was an actual incident I witnessed. He was so cruel and vicious.”

Rehashing topics addressed during her ex-husband’s testimony, Chandy spoke about a group of ethnic Jarai women and children she had seen arrive at the centre, only to be taken away shortly thereafter.

A few days later, she said, she found herself near a previously empty crater – caused by a B-52 bombing – some distance from the compound.

“I returned and could smell the decomposing bodies from the cracked-open soil,” she said.

Like Thol, she suspected the Jarai people had been “smashed” – the term by which the regime referred to executions – “and thrown into the pit”.

Chanthy and Thol were only reunited and managed to escape when Vietnamese troops invaded, forcing guards to evacuate the prison. The trial resumes on Monday.


Source by: http://www.phnompenhpost.com
Apple FBI Standoff Stretches Into Week Two

Apple FBI Standoff Stretches Into Week Two

6:56 AM Add Comment
xl-2016-iphone-encryption-1

Apple on Monday called for the creation of a government panel to help resolve a standoff between the company and the Federal Bureau of Investigation over the issue of national security vs. data privacy.


The proposal for a commission followed FBI Director James Comey's Sunday post on Lawfare -- an apparent effort to quell the controversy. Comey emphasized that the bureau was not seeking a master key that would allow it to snoop into American citizens' devices at will.

The American public expects the bureau to do its utmost to investigate the killings carried out in last year's terrorist attack in San Bernardino, and that includes examining the data contained in a locked iPhone 5c used by shooter Syed Rizwan Farook, he argued.

The FBI's goal is to obtain any information that will aid its investigation within the limits of the law, and it would seek search warrants when appropriate, Comey reaffirmed.

The bureau wants Apple to disable some of the passcode protections on Farook's iPhone, Comey said. Officials are concerned that any efforts to gain access to the device without Apple's assistance could result in the handset self-destructing, or in the data becoming corrupted.

Magistrate Judge Sheri Pym of the U.S. District Court for the Central District of California last week ordered Apple to provide assistance to the FBI by creating software that could allow authorities to access data on Farook's handset. However, Apple has objected on the grounds that such a move would result in a general loss of user privacy.

Apple CEO Tim Cook shone a spotlight on the company's dispute with FBI with the publication of an open letter defending Apple's resistance to the federal magistrate's order.

Master Key


The dispute appears to be one in which existing laws have not kept pace with technological advances, and both sides are making their cases on the issue.

"The FBI insists that it's not making a blanket request covering all iPhones, but simply [seeking] Apple's assistance unlocking one device," said Charles King, principal analyst at Pund-IT.

"Since that would require Apple to break what it says is an unbreakable security technology, doing so would resonate across the company's business," he told TechNewsWorld.

The public in the past has supported government agencies' investigation efforts, and given that 14 people were killed in the San Bernardino terrorist shooting, opinion could swing to the FBI's side.

"Given the heinous acts related to this phone, I expect most people -- were they asked directly -- would side with the FBI," said King.

Locked Horns


Judging from the tenor of their arguments, it doesn't appear that the FBI and Apple have found any common ground.

Although a judge already has ruled in favor of the FBI, "this is going to be decided in the court of public opinion, and it will play out based on who makes the best argument to support their case," opined Scott Steinberg, founder and principal analyst at TechSavvy Global.

"The FBI is not trying anything nefarious here. They have a concrete argument that they are trying to look for evidence that can shed some light on the shooting," he told TechNewsWorld.

"Comey's statement is clearly meant to counter support Apple has received from other IT vendors, but in a way that's turned this thing into a battle of PR agencies," observed Pund-IT's King.

Privacy Issues


Apple could sway public opinion its way through its dire warnings of how its compliance with the order could result in a loss of privacy by all handset users.

"There is the danger of creating a skeleton key that could find its way to unwanted hands and which could be abused," Steinberg pointed out.

"The FBI claims this is a one-time use case, but who is to say that this couldn't open Pandora's Box, which couldn't be closed again?" he asked.

Given that other governmental organizations -- notably the National Security Agency -- have been called out for surveillance programs that in some cases were conducted with the support of tech firms, it isn't hard to see why Apple would take a hard line approach this time around.

"Absolutely, it is a concern in the age of big data, where so much information is out there, and there is this increasingly sense of paranoia -- some of it rightly so -- that anything you put out there could be susceptible to prying eyes," said TechSavvy's Steinberg.

Technological tools "can be used for good or bad by those who choose to use them," he added.

The more powerful encryption is, and the more difficult it is to break, the more useful it can be for carrying out clandestine operations and for other disreputable purposes," Steinberg noted.

Orchestrated Moves


Apple has demonstrated that it's one of the least spontaneous vendors in the marketplace when it comes to reacting to issues such as this one, noted Pund-IT's King.

"Virtually everything the company does is orchestrated, and it would be silly to think that any statement Apple or its executives make hasn't been vetted by PR and legal teams," he pointed out.

"The company's request for a 'commission' to study the FBI request seems like little more than a delaying tactic, but that's not surprising given the size of the stakes," said King. "If Apple obeys the court order, it seems likely that the company's business will be injured -- particularly in overseas markets, including China, that it hopes will drive next-generation growth."


Source by: http://www.technewsworld.com
Samsung Raises Curtain on Galaxy S7 Models

Samsung Raises Curtain on Galaxy S7 Models

6:51 AM Add Comment
xl-2016-samsung-galaxy-s7-s7edge-1

Samsung on Sunday introduced two new models of its flagship Galaxy smartphone line at the annual gala for the mobile world, the Mobile World Conference in Barcelona, Spain.


Both phones have similar features, but one, the Galaxy S7 Edge, has a 5.5-inch display, the same size as the iPhone 6s Plus.

The units have curved screens that support quad HD resolution, as well as a slight curve on the back, making them easier to hold.

To soothe complaints about the battery life of the previous Galaxy generation, the units have received power boosts. The S7 Edge has a 3,600-mAh battery, a jump from the S6 Edge's 2,600, and the S7 has a 3,000-mAh power supply, while the S6's battery was only 2,550.

In addition, the units are water and dust resistant, support microSD storage, and run on Android 6.0 Marshmallow.

Fewer Megapixels


Samsung also has made some changes in the Galaxy's camera. It has reduced the number of megapixels on the shooter's sensor to 12 from 16, but increased the size of the pixels, which should improve the camera's performance in low light conditions.

The pixels in the new Galaxy models are 30 percent larger than those in the iPhone 6s Plus, 1.4 micron compared to 1.22 micron for Apple.

Both Apple and Google have gone the fewer-but-bigger-pixel route with some success, so Samsung's rivals already have done some of the consumer education about the move.

"It will work as long as they frame it in terms of bigger pixels get more light," said Daniel Matte, an analyst with Canalys.

Larger pixels also make it easier to incorporate into each pixel autofocusing technology, which allows the camera to take sharper pictures faster.

"Autofocus is really fast now -- nearly instantaneous anywhere across the image," Matte told TechNewsWorld.

"That's been in DSLRs and quality cameras for a while, and now it's migrated to the smartphone market," he added. "That's a big improvement."

Mixed Reviews


"They're a nice improvement over previous versions, but they're not groundbreaking," said Bob O'Donnell, founder and chief analyst atTechnalysis Research.

"There isn't any one feature that's a killer and will massively move the needle in the market," Matte said.

"The best addition they made was adding Qualcomm's Snapdragon 820, which in certain use cases doubles the performance," Patrick Moorhead, principal analyst at Moor Insights & Strategy, told TechNewsWorld.

Virtual Reality


For consumers who preorder either of the new phone models up to March 18, Samsung is offering a sweet deal: a free Gear VR headset.
Samsung Gear VR powered by Oculus

In addition, Oculus is offering those who preorder the phones six Gear VR games for free.

Will the lure of a free VR headset help boost initial sales?

"There's not that much content out there for VR, so it's more of a gimmick at this point," Technalysis' O'Donnell told TechNewsWorld.

"They're going to incent people to try VR," said Gartner Research Director Brian Blau.

"It's a nice incentive if you're interested in doing VR with a Samsung phone," he told TechNewsWorld. "Beyond that, it's not going to change the picture for overall smartphone sales."

Cooling Market


Samsung, as well other smartphone makers, would very much like to change the current picture for smartphone sales.

"We're seeing a lengthening of upgrade cycles for smartphones and growth is slowing. It's going to be hard for anyone to do well in the smartphone market in the next few years in terms of growth," Canalys' Matte said.

"As phones mature," he continued, "they become good enough for most people, so it's more difficult to sell them."

In the United States, another factor contributing to longer upgrade cycles is the phasing out of phone subsidies.

"Now that people are paying full price for their phones, they want them to last longer," O'Donnell said.

"Lifetimes are extending beyond two years, so just as we saw lifetimes extend for PCs, we're going to see them extended for phones," he added.

Nevertheless, Canalys is predicting another double-digit growth year for smartphones this year. Globally, it predicts smartphone shipments will crack 1.5 billion in 2016.

"Despite turbulence for certain vendors and countries," it noted in a report released Monday, "the industry will still grow by over 10 percent this year thanks to new opportunities."


Source by: http://www.technewsworld.com
Gates Sees Both Sides in Apple vs. FBI Ruckus

Gates Sees Both Sides in Apple vs. FBI Ruckus

6:48 AM Add Comment
xl-2016-bill-gates-1

Microsoft founder Bill Gates on Tuesday attempted to clarify his position regarding Apple's conflict with the FBI, telling Bloomberg he was disappointed that his earlier comments had been construed as taking sides with the government.


Apple has sparked a public debate through its resistance to a court order to unscramble the data on the iPhone used by one of the San Bernardino terrorists.

The FBI has sought to access the data in the course of its investigation, but Apple has argued that unlocking it could jeopardize the privacy of millions of people.

Gates on Monday appeared to discount Apple's position in an interview with the Financial Times, noting that the government's request was specific to one case, and that it was not seeking a means for general access. He compared it to obtaining phone or bank records to aid specific investigations.

However, Gates had more to say on the subject a day later, when he acknowledged that the government had a history of overstepping its bounds.

Still, with the right safeguards in place, he told Bloomberg, government should be able to access information to perform valuable services for citizens, such as fighting terrorism.

"The government shouldn't have to be completely blind," Gates said.

Dubious Privacy Issue


"Gates is absolutely right," maintained Al Berman, president of DRI International.

"It's a very specific case. It doesn't extend beyond this phone in the possession of the FBI," he told the E-Commerce Times.

"It's a one-off, and it's such a specific one-off that I think we're trying to make it bigger than it is," Berman added.

Apple should cooperate with the FBI, said Darren Oved, a partner in Oved & Oved.

"The facts of this case are very favorable to the government," he told the E-Commerce Times.

"What we have is a dead murderer's alleged right to privacy versus a very real right to protect the citizens of San Bernardino, the state of California and the United States from any potential real harm," Oved contended.

"When you weigh those two against each other," he reasoned, "I think Apple should do what the FBI wants it to do."

Further, the data on the iPhone doesn't need Apple's protection to ensure the privacy of the phone's operator, Oved maintained.

"The device in question here belongs to San Bernardino County. The law is undisputed that any information on a device that belongs to an employer is the employer's," he explained.

"Since San Bernardino County is a public organization, the government can make a very compelling argument that the information contained on the phone is part of the public record, and we should be allowed to see it," Oved added.

Need to Hunt Terror Cells


Apple should help the FBI find more terrorists, noted Nitsana Darshan-Leitner, founder of the Israel Law Center.

"The FBI needs Apple's help because there are other terrorist cells that the FBI needs to hunt down before [those cells] harm others," she told the E-Commerce Times.

"There's no reason to believe that the FBI will reuse this one-time case to create a broad precedent for more and more subpoenas," Darshan-Leitner said.

"Bill Gates realized that, and that's why he said what he said," she added.

Slippery Slope


Gates is out of touch with the industry he helped create, opined Michael Harris, chief marketing officer with Guidance Software.

"Gates doesn't understand the real issue. He sounds like a guy who hasn't moved forward in 20 years in terms of what technology can do and how it works," he told the E-Commerce Times.

The analogy between what the FBI was asking of Apple and searching bank records is misguided, Harris contended.

"They want Apple to write custom code," he said. "Once you do that, that's not at all the same as supplying records from a database."

If Apple does what the FBI wants done, it will set a dangerous precedent, maintained Nathan Leamer, policy analyst at the R Street Institute.

"You're compelling a company to create out of thin air an FBI OS to enable access to a phone. I'm not sure how you limit that," he told the E-Commerce Times.

Upsetting Delicate Balance


The San Bernardino case -- however it's resolved -- could have a significant ripple effect.

"There are 15 other cases where the FBI wants Apple's help to break into other iPhones," observed Amit Sethi, principal consultant for mobile security at Cigital.

"If Apple helps in this one case, it will have to help in those 15 cases as well. Then what about other law enforcement agencies and foreign governments?" he asked.

"It's a bad precedent," Sethi told the E-Commerce Times, "because while it may seem like a one-off case, it's really not."

Forcing Apple to cooperate with the FBI could upset a delicate balance in society, noted Suzanne Nossel, executive director of the PEN American Center.

"We're concerned that the careful balance between security and liberty plays out differently when a counterterrorism investigation is involved," she told the E-Commerce Times."Our concern is that by complying with this request, Apple is going to compromise the privacy not just of these individuals who are associated with this terrible crime but the privacy of millions of others."


Source by: http://www.technewsworld.com
Apple Motion Seeks to Block Feds From Acquiring 'Dangerous Power'

Apple Motion Seeks to Block Feds From Acquiring 'Dangerous Power'

6:45 AM Add Comment
xl-2016-encryption-3

Apple last week filed a motion to vacate a federal order requiring the company to create a tool or code to unlock the iPhone of one of the San Bernardino, California, shooters.


The order would set a dangerous precedent and release a powerful means to breach security on potentially millions of phones around the world, Apple argued.

It transcends one phone and would empower government to make private companies compromise the security of all their users whenever it sees fit, the company said.

"This is not a case about one isolated iPhone. Rather, this case is about the Department of Justice and the FBI seeking through the courts a dangerous power that Congress and the American people have withheld: the ability to force companies like Apple to undermine the basic security and privacy interests of hundreds of millions of individuals around the globe," the motion says.

Signature Required


Apple already has tools that could compromise the security of millions of people, so the implication that this code is any different from similar capabilities the company possesses is baseless, according to Stewart Baker, partner at Steptoe & Johnson.

Furthermore, Apple has security in place to protect itself and its users from data breaches, he told TechNewsWorld.

"The code that they're so worried will get out is no different than any of the other codes they write, in that if it gets out, then bad things will happen. Apple already protects its code very aggressively because they don't want that to happen, so there's no super-burden to protecting this code, Baker noted.

"This is particularly true because in order to install this code on the phone that is the target it is going to be necessary for Apple to sign the code with their super-secret signature," he added.

"What would happen is that Apple would send this signature to the phone, which will identify itself back to Apple, which means Apple almost certainly has to be right in the middle of any such transaction. It's not like you can just steal the code and walk off and use it -- because you also have to have Apple's signature, Baker said.

"If Apple's signature is compromised, it's the end of security for everyone, and they're already in a position where they have to protect that aggressively," he added.

The case is a matter of getting information that's imperative to an ongoing investigation, according to Paul Charlton, a partner at Steptoe & Johnson.

"What we can say with absolute certainty is that if you think about this as something other than a technology company -- if you think about this in terms of Apple being the landlord that holds within its building evidence of terrorist activity -- there wouldn't be any doubt in anyone's mind that the government should be allowed, with the appropriate court authority, ... to go in and take what they need," he told TechNewsWorld.

FBI director James Comey "has made it very clear that what he's interested in is not a back door, not a wide open door into this apartment complex, if you will, but entry into a specific apartment ... to grab this specific piece of information. That seems narrowly tailored and wholly reasonable to me," Charlton said.

Uninted Consequences


Creating the code the government is asking for would open a Pandora's box of unforeseen consequences, according to Christopher Maurer, assistant professor of information technology and management at the University of Tampa.

"We see time and time again that there are really good intentions. There might be a real problem and government is not addressing the underlying issue and instead is creating other issues in the form of loopholes or unintended side effects," he told TechNewsWorld.

One such side effect would be a precedent allowing other law enforcement agencies to order phones to be unlocked, noted Chris Calabrese, vice president for policy at the Center for Democracy & Technology.

"In terms of the idea that this is no different and that this back door doesn't create a vulnerability is just not true. What we're talking about is a precedent that will not just be for the FBI but will almost certainly be for those state and local law enforcement, of which there will be tens of thousands across the country. They're all going to encounter iPhones. They're all going to want them to be unlocked," he told TechNewsWorld.

A back door would be a potentially hazardous tool if it fell into the wrong hands, Calabrese added.

"There's going to have to be an entire process in place on unlocking iPhones somehow, which is to say subverting their security. That's a giant process designed to be exploited by bad guys. And you just can't say somehow that this is a one-off," he said.

Congressional Action Ahead


Congress eventually will have to answer the larger privacy question, Steptoe & Johnson's Charlton noted.

"We are constantly weighing our rights to privacy versus our need for security. That's why we have a Fourth Amendment. That's why we have to get search warrants before we conduct searches on individual's homes," he said.

"Here, that's exactly what happened. The FBI obtained a valid court order after showing probable cause to believe that there's evidence of terrorist activity on this phone, and right now that court order is still in place, absent the lawyers from Apple being able to reverse that order they're going to have to turn that information over," Charlton added.

However, incentives already are in place to ensure that customer data is secure, the Center for Democracy & Technology's Calabrese maintained, citing the Sony hack.

"There are a lot of incentives to want to build devices that are private and secure. There are reputational harms, potential liability, the requirement that they do a data breach notice if the information gets out," he said.

"We've all seen, for example, what happened with Sony and the devastating result of not having good security in their systems," Calabrese said.

The National Institute of Standards and Technology has published standards for good security and cryptology, he noted. "There are guidelines in place that help people know what they need to do. There are best practices out there that have nothing to do with legislation."

On the other hand, rigid mandates might freeze the development of security technology, Calabrese added.

"You don't want to say you must do the following six things to secure a phone when in three years those things could be totally out of date but you still have a legal requirement to do them," he said.

"There's a push pull when it comes to whether you should mandate security," Calabrese added. "Our view is that you need baseline security standards, and you need to let people know what best practices are and then create incentives to get people to meet those best practices without mandating anything in particular."


Source by: http://www.technewsworld.com
Apple Event Date Nudges Court Showdown

Apple Event Date Nudges Court Showdown

6:39 AM Add Comment
apple-court-order

Apple has changed the date for the launch event for its 4-inch iPhone and new iPad Air from March 15 to March 21, according to news reports.

If the rumor is correct, Apple will be holding the event the day before it appears in a federal court in California to contest a controversial court order. Apple has filed a motion to vacate the order requiring it to comply with the U.S. Justice Department's request for assistance in accessing data on an iPhone used by one of the San Bernardino terrorists.

"The timing seems to be a miscalculation on Apple's part," said John Carroll, a mass communications professor at Boston University.

"They're stepping on their own story because the focus on the following day's new coverage is going to be all about the FBI," he told the E-Commerce Times.

Worse yet, the whole event could backfire on Apple in a bad way.

"If their product rollout gets any kind of coverage, it's possible it will be covered as an attempted smokescreen to divert attention away from the FBI issue," Carroll added.

Trial Balloon


On the other hand, the date change could be a calculated move by a company known for its marketing acumen.

"It's possible the rumor is a trial balloon from Apple to see what kind of reaction it gets," Carroll said. "If the reaction is skeptical enough or critical enough, that's their signal to pull back."

Although just a rumor, the March 21 date "makes sense," noted Patrick Moorhead, founder and principal analyst at Moor Insights and Strategy.

"Apple has reasons to refresh their lineup to be more competitive in emerging regions and to help turnaround declining iPad sales," he told the E-Commerce Times.

Grief Over Shipping


If Apple did indeed change the date of the event, "maybe it's because they want the announcement to be made closer to when the products are going to ship," suggested Bob O'Donnell, chief analyst at Technalysis Research.

"They caught a fair amount of grief for the big gap between the time of the announcement and shipping of the Apple watch," he told the E-Commerce Times. "That was an unusually long gap, so maybe they're trying to make a statement about being able to deliver products immediately after an event."

There's also the possibility that everything rumored to be announced at the event won't be announced there, remarked Carolina Milanesi, chief of research at Kantar Worldpanel ComTech.

"We have seen before when products are incremental, Apple will just put out a press release about them," she told the E-Commerce Times. "It could be we will not see everything, and some will just come out in a press release at a different date."

Maturing Market


Apple is expected to schedule an event to unveil an iPhone with a 4-inch display and upgraded components, as well as a new iPad Air that will have features similar to the iPad Pro.

"If you look around and see the other devices doing well, it's not tablets -- It's two-in-ones," O'Donnell said. "This new iPad looks like it will be another form of two-in-one because you can use a keyboard and pencil with it."

If the rumors prove true, Apple appears to be adjusting its product line to meet the demands of a maturing market.

"Overall, they're filling out their options in terms of screen sizes to address a wide range of interests," O'Donnell said. "That's how the world works now. As you get a more mature market, you need to have a few different buckets into which people can find a product that best meets their needs."

As for the event being overshadowed by Apple's tussle with the FBI, "from the consumer perspective, it doesn't matter," Milanesi observed. "What consumers think about when a new product is out is the new product."


Source by: http://www.technewsworld.com
Fed Judge Rules for Apple in Drug Case Involving Encryption

Fed Judge Rules for Apple in Drug Case Involving Encryption

6:36 AM Add Comment
xl-2016-apple-vs-fbi-2

A federal magistrate judge on Monday ruled that Apple did not have to unlock an encrypted iPhone used in a federal drug case.


The ruling gave the company a key victory against the Department of Justice in the midst of a legal struggle over an FBI request that the encrypted phone of one of the suspected shooters in the San Bernardino, California, massacre also be unlocked.

Federal Magistrate Judge James Orenstein ruled that the government failed to prove that it had the power under an 18th century law called the "All Writs Act" to force Apple to unlock the phone of the drug dealer.

Following a U.S. Drug Enforcement Agency search and seizure of mobile devices belonging to an alleged dealer -- a New York man named Jun Feng -- in June 2014, the government spent more than a year not doing anything to pursue what evidence there was on his phone, until getting a warrant in July 2015, the court noted.

The DEA was not able to get the information and sought help from the FBI, which was unable to get evidence off the password-protected device. They sought Apple's help two weeks after the expiration of the device warrant, and Apple said it would help if the government obtained a court order, consistent with its practice in 70 other instances.

Feng pleaded guilty in October. However, the government continued the request while it was pursuing additional evidence prior to sentencing and potentially to uncover evidence in related cases of coconspirators, according to court documents.

Apple last month filed documents seeking a review of the repeated requests by the government to unlock encrypted phones under the All Writs Act.

A federal magistrate judge on Monday ruled that Apple did not have to unlock an encrypted iPhone used in a federal drug case.


The ruling gave the company a key victory against the Department of Justice in the midst of a legal struggle over an FBI request that the encrypted phone of one of the suspected shooters in the San Bernardino, California, massacre also be unlocked.

Federal Magistrate Judge James Orenstein ruled that the government failed to prove that it had the power under an 18th century law called the "All Writs Act" to force Apple to unlock the phone of the drug dealer.

Following a U.S. Drug Enforcement Agency search and seizure of mobile devices belonging to an alleged dealer -- a New York man named Jun Feng -- in June 2014, the government spent more than a year not doing anything to pursue what evidence there was on his phone, until getting a warrant in July 2015, the court noted.

The DEA was not able to get the information and sought help from the FBI, which was unable to get evidence off the password-protected device. They sought Apple's help two weeks after the expiration of the device warrant, and Apple said it would help if the government obtained a court order, consistent with its practice in 70 other instances.

Feng pleaded guilty in October. However, the government continued the request while it was pursuing additional evidence prior to sentencing and potentially to uncover evidence in related cases of coconspirators, according to court documents.

Apple last month filed documents seeking a review of the repeated requests by the government to unlock encrypted phones under the All Writs Act.


Source by: http://www.technewsworld.com