By
Debra KaufmanApril 4, 2016
Intel just introduced the Xeon E5-2600 v4 chip family, which includes up to 22 calculating engines on each chip (up from a maximum of 18) and has built-in features to encrypt data more quickly, thus potentially improving security of cloud computing. Dell, HP and Cisco Systems will use the chips to make new servers. Intel also revealed its collaboration with CoreOS and Mirantis whose technologies are aimed to make it easier for companies to move data between different cloud services or their own data centers and the cloud. Continue reading Intel Debuts Chips, Partnerships for Next-Gen Cloud Computing
By
Rob ScottMarch 29, 2016
The Justice Department revealed it has learned a way to unlock Syed Rizwan Farook’s iPhone without help from Apple. Farook was a gunman in the San Bernardino shooting that killed 14 people. The announcement stalls the legal standoff between the federal government and Apple; the Justice Department will withdraw its efforts to enlist the tech company’s help in the investigation. While the news suspends the privacy vs. security debate, at least temporarily, law enforcement’s ability to open the device without Apple’s assistance raises new concerns. Continue reading Government Says iPhone Unlocked, Apple No Longer Needed
By
Debra KaufmanMarch 29, 2016
As the issue of digital encryption versus privacy roiled in the U.S. over the FBI’s demand that Apple unlock the iPhone of a mass murderer in California, recent violence in Brussels and Paris has brought those same issues to the fore in Europe. Although privacy is enshrined as a basic right in much of Europe, lawmakers in some countries are considering proposals that would give greater powers to law enforcement to access personal digital data. But privacy advocates in those same countries are fighting back. Continue reading Europe Divides in Battle Between Privacy, Digital Decryption
By
Debra KaufmanMarch 29, 2016
Although other alternative currencies have tried to gain traction as Bitcoin struggles with internal divisions, none have succeeded in doing so — until now. A rival virtual currency, Ethereum, has gained the interest of a wide range of finance and technology behemoths, including JPMorgan, Chase, Microsoft and IBM. As a result, its value has shot up 1,000 percent over the last three months. Built on a blockchain in which every transaction is publicly recorded as is Bitcoin, Ethereum promises to do more. Continue reading Bitcoin Rival Ethereum Offers Online Markets, Smart Contracts
By
Rob ScottMarch 22, 2016
The FBI asked to postpone a hearing scheduled for today regarding the Apple encryption case. The Justice Department may no longer need the tech company’s help in opening an iPhone used by gunman Syed Rizwan Farook in the San Bernardino shootings. A third party has reportedly come forward with a technique to help unlock the phone, which is currently being tested. Judge Sheri Pym of the U.S. District Court for the Central District of California granted the Justice Department’s motion to postpone. The government is required to provide an update to the court by April 5. Continue reading FBI Tests Method to Unlock iPhone, Cancels Today’s Hearing
By
Debra KaufmanMarch 8, 2016
By now, everyone knows the general outline of the argument between Apple and the FBI, over the latter’s request for a backdoor into the San Bernardino shooter’s iPhone. Apple’s refusal to do so has sparked a war of words and legal actions between Apple and other proponents of data protection/digital privacy and the government, as well as others who believe national security trumps digital privacy. More recently, at the RSA Conference, an information security event, more nuances were revealed. Continue reading RSA Conference Reveals More Nuances in FBI-Apple Battle
By
Rob ScottMarch 1, 2016
Apple’s ongoing privacy battle with law enforcement received a boost yesterday when U.S. Magistrate Judge James Orenstein of New York’s Eastern District denied the federal government’s request that the company release data from an iPhone relevant to a New York drug case. The ruling could provide Apple with a leg up as it pushes forward with its defense of privacy concerns regarding its smartphones, and may impact other cases such as efforts by the FBI to compel Apple to open the iPhone related to last year’s mass shooting in San Bernardino, California. Continue reading Judge Sides with Apple in Closely Watched Encryption Case
By
Debra KaufmanFebruary 22, 2016
The Entertainment Technology Center@USC hosted a discussion on next-generation cloud workflows, featuring toolsets and specific technologies. Led by ETC’s cloud project lead Erik Weaver, the conversation began with the real-world case study for post production in the cloud implemented by Los Angeles post facility DigitalFilm Tree. That company’s CTO/managing partner Guillaume Aubuchon led the audience through the workflows put in place to handle productions taking place in “remote parts of Asia and Africa.” Continue reading HPA Tech Retreat: Next-Gen Cloud Workflows Hosted by ETC
By
Debra KaufmanFebruary 22, 2016
The battle between terrorism and privacy has been brewing for quite some time, and the tipping point was the iPhone belonging to Syed Rizwan Farook, who, with his wife, opened fire at an office party in December 2015, killing 14 people and injuring 22. The FBI has been trying to decrypt Farook’s phone, unsuccessfully, and asked Apple to create a “backdoor” code into the phone. Apple refused, and now a court order gives the Silicon Valley company five days to comply. Chief executive Tim Cook is holding firm. Continue reading Apple and U.S. Government Battle Over Privacy vs. Terrorism
By
Debra KaufmanJanuary 21, 2016
Intel unveiled Authenticate, a technology that introduces a new, heightened level of security and computing performance. Authenticate makes it easier for multifactor authentication by which users put in place up to four safeguards before they are able to log in to their computer. That could be any combination of a password, fingerprint, set of numbers on a touchscreen or presence of an authorized employee smartphone. Authenticate is already built into new versions of Intel’s Core chips, which are used in business PCs. Continue reading Intel Technology Debuts Multifactor Security for Business PCs
By
Meghan CoyleJanuary 18, 2016
Cisco released new data that shows some companies may not know the extent of their employees’ usage of external cloud computing services, instead of the employer’s in-house cloud services. The practice of using systems inside organizations without approval is called “Shadow IT.” According to Cisco, there is 70 percent more Shadow IT activity than there was six months ago. Cisco gathered the data by surveying CIOs and running software that could track cloud activity. Unauthorized cloud usage could pose serious security threats. Continue reading Cisco Reveals Unauthorized Cloud Usage Trend in Companies
By
Don LevyJanuary 11, 2016
CES 2016 had its share of attention-getting products, but some of the most interesting aspects of the show were under the horizon. Companies are beginning to recognize, understand, and explore new opportunities, implications and alliances. Among emerging trends: in VR, there will be real competition. Content on televisions — more than television hardware — drives the market, but demand for UHD is also growing. Big data is a big discussion about use, privacy and security. As ETC prepares its complete report on CES, we’ve compiled a slide show with some highlights. Continue reading Snapshots of CES 2016 Reveal Leading Trends and Stories
By
Meghan CoyleJanuary 9, 2016
Edward Snowden, the former government contractor who famously leaked thousands of classified NSA documents, made an appearance at the Suitable Technologies booth during CES by way of a video chatting device on wheels. Snowden used a Beam telepresence device by Suitable to chat with founder of the Xprize Foundation Peter Diamandis about the future of technology and government surveillance. Snowden faces arrest if he returns the United States, so he touted the Beam technology as a way to stay connected. Continue reading Whistleblower Edward Snowden Virtually Attends CES 2016
By
Debra KaufmanJanuary 8, 2016
The IEEE (Institute of Electrical and Electronics Engineers), with more than 430,000 members in over 160 countries, has a pedigree in publishing technical literature and developing international standards. At CES 2016, its members are actively involved in the development and advancement of some of the hottest trends on the show floor. At an end-of-conference session, a group of IEEE members revealed what they found to be the most interesting technologies on display and how they’re working to improve them. Continue reading IEEE Picks Most Interesting Emerging Technologies at CES
By
Debra KaufmanJanuary 8, 2016
In case you think the Internet of Things is not yet real, Deloitte & Touche’s Craig Wigginton will set you right. “Ten to 20 billion things are connected today and that will grow to 40 to 50 billion things by 2020,” he said during a CES session. IoT is however, still growing. “Over 90 percent of things that could be connected are still not connected,” he noted. “There’s tremendous potential, with trillions of dollars at stake.” Risks are also at stake, including physical injuries and cyber crime, which costs companies $400 billion a year. Continue reading Risks and Rewards Grow with the Booming Internet of Things