Featured Articles

Technology

All Stories
Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Wednesday, 18 March 2015

iPhone 6 and 6 Plus

With a record breaking four million handsets ordered in just 24 hours, it seems most Apple fans haven’t waited for the first reviews of the handset to buy.
However, after spending a week with the iPhone 6 and 6 Plus, it seems those who ordered early made the right decision.
The biggest (in every sense) part of the iPhone 6 launches were the bigger screen sizes - 4.7inch on the 6 and a whopping 5.5inch on the Plus.
Even though, as many detractors have pointed out, Apple is playing catchup with the Android market in terms of screen size, it's a move that could see more than a few defectors due to the exceptional build and screen quality of the iPhone - something no Android manufacturer has come close to matching.
Both handsets feel like they've been designed as big screen devices through and through, from the curved edges to make them easier to hold to tweaks to the software to allow one handed operation.
However, for the Apple user used to an iPhone 5, there’s no denying that Apple’s new iPhone 6 Plus is big - really big.
When you see it lying on a table, it dwarfs even its smaller 4.7inch brother, and really does look huge.
In fact, the first time you pick it up, it’s slightly off-putting - but the rounded edges really do make a difference.

It’s surprisingly light as well, and just about possible to hold comfortably in one hand.
Once you’ve got over the initial shock, and learn how to use the one handed mode (tap twice on the home button, and everything moves to the bottom of the screen so you can get to it easily), then one thing stands out - the screen.
The quality is superb, with bright, sharp colours, that make even the current screen on the iPhone look lackluster.

13:18 - By Big E 0

Apple Watches, people didn't know they wanted an iPod or a iPhone'

If has come under fire from critics as a useless gadget, but Apple's Tim Cook has revealed he is confident the Apple Watch will become as much of a success as the firms other written-off products - the iPhone and the iPad.
He claimed the Apple Watch, which goes on sale in April, with prices starting at $349, has already become a part of his life.
He also claimed it will be 'the first smartwatch that matters'
13:15 - By Big E 0

Tuesday, 3 March 2015

For STMicro, wireless business may be hidden key to reach margin goal

BARCELONA (Reuters) – STMicroelectronics said on Tuesday it expected a second year of growth in its wireless business in 2015, following years of losses, a resurgence that eventually could help Europe’s largest semiconductor maker hit overall profit margin improvement goals.
Speaking to financial analysts at the annual Mobile World Congress, executives of the Franco-Italian chipmaker spelled out its strategy for taking its wireless business to the same level of profitability as its other, healthier businesses.
The company’s wireless products are used in thousands of devices ranging from top smartphone brands to wearable devices like fitness monitors and even power chargers.
Overall, ST’s main business drivers include sensors and power management chips, automotive components and embedded processors. Those three lines, where ST has leading market positions, account for 70 percent of total revenue and each already delivers operating margins at or above 10 percent.
But wireless, a fragmented business unloved by investors since ST’s exit from its ST-Ericsson wireless joint venture in 2013, could prove decisive for the company’s medium-range target of reaching 10 percent operating margins for ST as a whole.
“Wireless remains a key element of our strategy,” Chief Financial Officer Carlo Ferro told the gathering of analysts and journalists. “We expect the ST wireless business to grow in 2015.”
Based on overall results, ST has some work to do: operating margin grew to 3.2 percent in 2014 from a negative 2.1 percent in 2013. It turned a tiny net profit of $128 million, reversing a loss of $500 million in 2013, when ST Ericsson was wound down.
Although ST executives did not give figures, they said the wireless business was profitable after years of product trimming.
It has been diversifying into a broader range of parts used not just in phones and wearable devices but also contactless payments. Major customers include the biggest device makers: Apple, Microsoft and Samsung.
The wireless businesses, which include sensors, microcontrollers, power management and imaging products, had about $1 billion in sales in 2014. But since wireless is spread across multiple divisions, it is hard for investors to measure progress on profit or sales targets.
Its best known wireless products are motion sensors used in phones and wearable devices to detect speed or orientation, but ST is now enjoying surging growth in newer areas such as mini microphones and touch sensors used in smartphones.
“We are going to accelerate again in order to gain (market)share,” Benedetto Vigna, general manager of ST’s Analog and Sensors division told the analyst meeting. “I think we have put a lot of things together in order to run faster.”
ST shipped 260 million microphone sensors in 2014, more than doubling that business over the prior year, executives said.
(Reporting By Eric Auchard. Editing by Jane Merriman)

13:16 - By Big E 0

Sensor-packed smartphones can read your mood, guard your data, and wreak havoc in the wrong hands

Smartphones can already do pretty much everything, right? Actually, UAB computer scientists have a few more ideas. They're tapping into the accelerometers, proximity sensors and other environment-aware chips packed into modern phones to help users stay safe -- and keep ahead of the bad guys.
1. Watching your back
Most of us are very protective of our phones. Ragib Hasan, Ph.D., an assistant professor in the UAB College of Arts and Sciences Department of Computer and Information Sciences and director of SECRETLab, wants them to return the favor. He is developing software to turn a phone into a digital wingman, using information from its camera, microphone, accelerometer and other sensors to gauge a user's attentiveness and respond appropriately. When it detects that a person is driving, for example, it could silence all but the most important alerts. If it decides from the way that you're walking and talking that you are drunk, it could prevent you from making bank transactions. Hasan's code will also save important security warnings for times when you are alert, rather than groggy from sleep.
The project builds on a study by Munirul Haque, Ph.D., who recently completed a postdoctoral fellowship in Hasan's lab, and collaborators at Marquette University. The researchers found that a phone can do a remarkably good job at sensing mood. They parsed camera images to read facial expressions and accelerometer data to judge energy expenditure (anxious people tend to pace; inactivity is often a signal of depression). Their system was able to recognize six different "affective states": anger, disgust, fear, happiness, sadness and surprise.
2. Learning your style
You may be only one of millions of people with an iPhone, but the way you hold your phone -- and take pictures and send text messages -- may be unique. Nitesh Saxena, Ph.D., an associate professor in the CIS department and director of the SPIES lab, is a pioneer in "behavioral biometrics" security research. He's pulling together data from accelerometers, gyroscopes and proximity sensors to chart the characteristic gestures a user makes when answering a call or snapping a selfie. Once his software learns your moves, it could unlock your phone automatically -- and freeze when it detects that it is in the wrong hands. A system that taps into user interactions with multiple connected devices, such as Google Glass or the new Apple Watch, would be even more secure, Saxena says.
3. Replacing your password
Newer phones can measure temperature, humidity -- even barometric pressure. A combination of these readings could offer a secure way to log in to your computer and make passwords obsolete, according to research in Saxena's SPIES lab. "Zero-interaction" authentication systems operate much like the keyless entry and starting systems on some cars -- they rely on Bluetooth or other signals from a smartphone to grant a user access. But existing systems, such as the publicly available app BlueProximity, are vulnerable to relay attacks. A team of criminals -- one close to the user, the other near his or her computer -- can relay/eavesdrop on the verification process and defeat the system, Saxena says. His team has found that combining readings from multiple sensors, including GPS, audio, temperature and altitude, can thwart relay attacks. They have developed an Android-based app, called BlueProximity++, that uses these readings to instantly -- and securely -- unlock laptops and other devices as soon as the user's phone gets within range. This is a joint work with a team of researchers at the University of Helsinki and Aalto University in Finland.
4. Tracing your steps -- without sacrificing your privacy
The GPS sensors found in most smartphones are a great way to track location history -- where a person has been and when. That information could be a big help for people in many professions, including salespeople and insurance adjustors. But central tracking is unpopular with employees, and relying on an individual's own logs is equally problematic. All it takes to game the system is a $10 device that can alter GPS readings. Hasan's team has developed a middle way between these alternatives. Known as WORAL, or Witness Oriented Asserted Location Provenance, it relies on inexpensive WiFi routers and strong encryption methods that enable a user to check in at a designated location on the WORAL app and store that information securely on his or her own phone. That check-in is validated automatically by another WORAL user who is present in the same location, creating a collusion-resistant proof that the person actually was where he or she said she was. The technology, which was funded by a $583,000 grant from the Department of Homeland Security, could also be used to track products through a supply chain, Hasan notes. His team is now developing WORAL as a commercial product.
5. Protecting your payments
Apple Pay, Google Wallet and a host of competing mobile payment systems rely on near-field communications (NFC) technology, which is built into many Android phones and the latest version of Apple's iPhone. With NFC chips, users can make payments by tapping their phones against a reader at retail stores. The trouble is, NFC is vulnerable to "ghost and reader" attacks (a form of relay attack), where a criminal intercepts a user's credentials at one location and transmits them to a confederate waiting to make a purchase at another location. When an unsuspecting customer buys a burger at a restaurant, for example, the confederate may use the credentials to make a simultaneous purchase at a jewelry store. But Saxena's team has developed a countermeasure to verify that the payment request is actually coming from a user in the same location as the reader. Their system uses signals from a combination of sensors, including lists of nearby WiFi hotspots and their signal strengths, and short audio snippets captured by the phone's microphone. The NFC reader compares notes with the phone -- if the signals match, the payment is authorized.
6. Guarding your digits
Criminals have come up with plenty of ways to steal PINs from unsuspecting ATM users. The latest high-tech wrinkle, according to Hasan, involves heat-sensing cameras. Criminals read the buttons a customer has pressed immediately after he or she has walked away. Hasan's SECRETLab is devising a new way to beat the "shoulder surfing" problem: generating an extra set of randomized numbers that surround an accountholder's real PIN. All the customer would have to do is use his or her phone to snap a picture of a QR code that appears on the ATM screen. It would return a list of numbers, with spaces left blank for the actual PIN: 64_51_90_19_, for instance. The random numbers would change each time a customer uses an ATM, so even if criminals managed to get that password, they wouldn't be able to access the account. Banks could implement the system with minimal investment, Hasan adds; it would require only a simple software update and no new hardware.
7. Sensing danger
There's potential trouble in all these high-tech sensors, however. Researchers from the SPIES and SECRET labs found that they could hijack smartphone sensors to trigger previously implanted malicious code. Using messages hidden in music, videos, magnetic fields and vibrations, the researchers were able to take control of devices from as far as 55 feet away. These "context-aware" attacks could be used to create mass chaos by setting off alarms or even interfere with an aircraft's communications during landing. And such schemes would be "very hard to detect and even harder to prevent" with current security measures, the researchers say. They are now working on novel methods to block such attacks
.
13:09 - By Big E 0

© 2014 NewxPlus. WP Theme-junkie converted by NewxPlus
Powered by Blogger.
back to top