Intel creates Automated Driving Group
After announcing that it would supply Mobileye and Delphi with chips to power their autonomous driving systems, Intel has announced that it has created a new group that will focus solely on designing self-driving solutions.
Intel's Automated Driving Group (ADG) will be led by Doug Davis who will move from its Internet of things (IoT) group to act as senior vice president and strategic lead. Kathy Winter from Delphi will work under Davis, handling day-to-day operations and will act as the VP and GM of the new group.
SUSE buys HPE's Cloud Foundry and OpenStack assets
SUSE has announced that it will acquire OpenStack and Cloud Foundry from Hewlett Packard Enterprise (HPE) in a move to accelerate the company's growth and entry into new markets.
The German company will integrate the assets of OpenStack infrastructure-as-a-service (IaaS) into its own SUSE OpenStack Cloud. SUSE will use Cloud Foundry and its platform-as-a-service (PaaS) assets to help it bring a certified, enterprise-ready solution to market for all of the customers and partners currently using its ecosystem.
BMW will invest €500 million in automotive startups
BMW Group has announced that its i Ventures division will be investing €500 million over the next 10 years on new car technologies in an effort to bolster its progress in developing autonomous vehicles.
The company's i Ventures division will use the money to invest in startups working on technologies such as autonomous driving and mapping that will allow BMW to improve its cars by making them both more intelligent and efficient.
Mesh Networking: An alternative internet?
Currently, in order to exchange information on a computer or smartphone, we transfer it over the internet. This may take many different forms -- a web browser, email client, app or cloud storage -- but at the end of the day, you’re sending packets of information to another computer via the now-ubiquitous internet. Since we interact with this system all of the time, we no longer think about "going online". For many people, it’s just a natural state.
If you step back a little bit, you’ll remember that the internet isn’t the only way to transfer computer information. Disks, CDs and other physical media once dominated this space, and the term "sneakernet" was even coined to refer to physically transferring media from place to place. There were phone-based communication systems known as bulletin boards (BBSes), and larger endeavors like America Online or CompuServe, which used phone modems. These were limited to a maximum of 56 kilobits per second (kbps) over telephone lines and had a limited number of simultaneous users.
The 'age of automation' can benefit the security landscape
Artificial intelligence (AI), machine learning and automation are technology trends dominating discussions in many different industries at the moment and cyber security is no exception.
As cyber criminals become more advanced and the threat landscape continues to develop, businesses are looking to new technologies that can help secure their organization in a more proactive way.
C programming language showing signs of weakening in 2016
Created in 1972 by Dennis Ritchie, C is a dinosaur among computing languages. It’s large, powerful, and has dominated the programming ecosystem for over three decades. Technology changes every few years, and today there are hundreds of programming languages. It’s remarkable that one language has been able to remain so popular over the years, and there’s a reason for that.
Software developer Daniel Angel Munoz Trejo sums up C’s benefits well when he writes, "its closeness to the hardware, great portability and deterministic usage of resources make it ideal for low-level development for such things as operating systems kernels and embedded software. Its versatility, efficiency and good performance make it an excellent choice for high complexity data manipulation software...C is still unsurpassed when performance is the priority".
AWS could become Amazon's biggest business
Holiday sales from Black Friday and Cyber Monday could very well help Amazon hit its target of $134 billion in annual sales, and Amazon Web Services (AWS) could make up for $12 billion of it
The company began offering web services to its customers over 10 years ago and in recent years this division has grown from a small to significant portion of the online retailer's business. AWS currently operates in 38 availability zones within 14 geographic locations and large companies such as Netflix, Adobe and Spotify have turned to the company for hosting and operating their websites and services.
Deutsche Telekom hack affects 900,000 customers
German telecommunications giant and T-Mobile parent company Deutsche Telekom was the victim of a cyber-attack over the weekend, which left some 900,000 users affected, the company confirms in a blog post.
This weekend, a hacker (or more likely, hackers) infiltrated the company, and tried to infect users' home routers with malware. Deutsche Telekom said its network was not affected "at any time".
The cloud can be a driving force for your startup
Amazon Web Services (AWS) turned ten earlier this year and posted some pretty impressive figures to go with it (which have continued to impress in subsequent quarters). The public cloud provider revealed it is on course to generate more than $10bn in 2016, which highlights the success of the public cloud.
Organizations from all over the world are tapping into this success, but could it also be the driving force behind successful start-ups? If so, what can enterprises learn from start-ups flourishing in the cloud?
Mitigating the risks of third-party access to your data
If your office was broken into, you would fear what the intruders might take. Being so concerned about the possibility, you fit all the right locks and alarms and have good door and window security. However, do all the service providers that access your office do the same? If they’re not as security conscious, and they get broken into, the intruders could get hold of the access card or key to your office and then they’re in.
It would be galling because, despite having done all the right things to protect your company’s assets, your defenses were still breached. There was a weakness but it wasn’t your security. You gave a vendor the means to access your business to do you a service, and that access was exploited by someone with the skills to take advantage of their weak security.
Two factor authentication is not enough
The general consensus appears to be that two-factor authentication (2FA) is the answer to our authentication needs. Be that from usage of consumer sites in our personal lives or as part of our daily requirements when signing into enterprise infrastructure and applications at work.
However the cyber-attack on Three's customer upgrade database is yet another example of how 2FA is not enough. Organizations must move away from relying solely on usernames and passwords, as once again access was gained with a stolen employee login.
Samsung considering advice to split in two
Samsung is currently deciding whether or it not it should follow the advice of the US hedge fund management firm Elliott Management that has proposed that the company split its business in two, with one holding company for ownership and another for operations.
Elliott first proposed the split in October with the aim of boosting shareholder value. However, this move would also benefit the Lee family that owns Samsung as it would grant them tighter control over the company.
The benefits of thin clients for IT administrators
IT administrators should no longer be shackled to the desktop, trapped in permanent rounds of helpdesk visits, security patches and upgrades. The future could be an estate of efficient and remotely managed desktops and mobile devices; freeing IT administrators to focus on deploying IT innovation for competitive advantage.
For many IT administrators the feeling of being shackled to the desktop will be all too familiar. An endless round of responding to helpdesk tickets raised by users, running security patches and rolling out upgrades. "Surely there must be more to life than this?", they ask as they trudge off to solve another user issue. And thank goodness there is.
UK businesses unprepared for virtualization security challenges
For UK companies with at least 1,000 PCs, virtualization is a "strategic priority", however, they are yet unprepared for all the different security challenges this approach brings. This is according to a new report by Bitdefender.
Surveying 153 IT decision makers in the UK, working in such companies, the report says hybrid infrastructures are the major common architecture in enterprise environments, as CIOs all over the world being to increasingly adopt them. The report sheds some light on the biggest fears and concerns IT decision makers have with the new infrastructure approach.
Security tips for 2017
In an increasingly digital world, criminals have the information and the means to ensure that high profile security breaches, involving major household names, continue to make the headlines.
As technology evolves, so do the threats being developed by hackers who have a whole host of motivations for wanting to disrupt businesses of all sizes. It’s a constant battle but thankfully one that has resulted in increasingly sophisticated security tools coming to the market.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.