Wednesday, October 19, 2016

Microsoft Ends Moore's Law, Builds a Supercomputer in the Cloud


A group of Microsoft engineers have built an artificial intelligence technique called deep neural networks that will be deployed on Catapult by the end of 2016 to power Bing search results. They say that this AI supercomputer in the cloud will increase the speed and efficiency of Microsoft’s data centers and that their will be a noticeable difference obvious to Bing search engine users. They say that this is the "The slow but eventual end of Moore’s Law."
"Utilizing the FPGA chips, Microsoft engineering (Sitaram Lanka and Derek Chiou) teams can write their algorithms directly onto the hardware they are using, instead of using potentially less efficient software as the middle man," notes Microsoft blogger Allison Linn. "What’s more, an FPGA can be reprogrammed at a moment’s notice to respond to new advances in artificial intelligence or meet another type of unexpected need in a datacenter."
The team created this system that uses a reprogrammable computer chip called a field programmable gate array (FPGA) that will significantly improve the speed of Bing and Azure queries. "This was a moonshot project that succeeded," said Lanka.
What they did was insert an FPGA directly between the network and the servers, which in bypassing the traditional software approach speeds up computation. “What we’ve done now is we’ve made the FPGA the front door,” said Derek Chiou, one of the Microsoft engineers who created the system. "“I think a lot of people don’t know what FPGAs are capable of."
Here is how the team described the technology:
The Cataputl Gen2 Card showing FPGA and Network ports enabling the Configurable Cloud
Hyperscale datacenter providers have struggled to balance the growing need for specialized hardware (efficiency) with the economic benefits of homogeneity (manageability).  In this paper we propose a new cloud architecture that uses reconfigurable logic to accelerate both network plane functions and applications.  This Configurable Cloud architecture places a layer of reconfigurable logic (FPGAs) between the network switches and the servers, enabling network flows to be programmably transformed at line rate, enabling acceleration of local applications running on the server, and enabling the FPGAs to communicate directly, at datacenter scale, to harvest remote FPGAs unused by their local servers.

We deployed this design over a production server bed, and show how it can be used for both service acceleration (Web search ranking) and network acceleration (encryption of data in transit at high speeds).
Hardware and Software compute planes in the Configurable Cloud


This architecture is much more scalable than prior work which used secondary rack-scale networks for inter-FPGA communication.  By coupling to the network plane, direct FPGA-to-FPGA messages can be achieved at comparable latency to previous work, without the secondary network.  Additionally, the scale of direct inter-FPGA messaging is much larger.  The average round-trip latencies observed in our measurements among 24, 1000, and 250,000 machines are under 3, 9, and 20 microseconds, respectively.   The Configurable Cloud architecture has been deployed at hyperscale in Microsoft’s production datacenters worldwide.

Qualcomm Reveals Its Latest Snapdragon Chipsets


It seems like the chip maker has a lot to announce today. Qualcomm has announced an upgrade to their existing entry level and midrange system-on- a-chip solutions, i.e. Snapdragon 425, Snapdragon 625 and Snapdragon 652. These chipsets will be succeeded by the Snapdragon 427, Snapdragon, 626 and Snapdragon 653 respectively.
Qualcomm’s upgrade to these chips is largely incremental as far as raw power is concerned however, quite a few features have been integrated here and there for an added incentive.
Common Upgrades:

The common feature/upgrade is that all three are getting is the X9 LTE modem. This will give these chips faster internet connection speeds over LTE in countries which offer speeds of that calibre. In addition to a better modem, all of these will also be getting Qualcomm’ Clear Sight dual camera technology and support for Quick Charge 3.0. The dual camera tech works similar to the way Huawei implemented it in the P9. One of the sensors captures in black and white for added contrast and light while the other captures colors as well.
Quick Charge 3.0 is the upgraded version of Quick Charge 2.0. The newer version charges up your phone upto 4 times faster than an ordinary charger. To use it you need a phone that supports Quick Charge 3.0 and a compatible charger as well.
Differences Between The Chips:
Here’s where the similarities end, at least for the Snapdragon 427. The other two chips, Snapdragon (SD) 626 and Snapdragon 653 are each getting a 10% boost in their overall performance. Both of the chips have the same core configurations as their predecessors (SD 652 = SD 653 and SD 625 = SD 626) but the newer chips feature a higher clock rate.
Snapdragon 653’s setup includes 4xA72 + 4xA53 core combination with the A72 cores now clocked at 1.95GHz. For Snapdragon 626 the chip setup is 8xA53 cores with the clock speed now boosted to 2.2 GHz.
It is interesting to see Qualcomm added the dual camera tech to the low end SD 427 because none of the low end phones feature a dual camera setup, yet. This move may result in OEMs making cheaper dual camera phones in the future, although its just a speculation for now and entry level phones generally come with pretty basic camera sensors.

Friday, October 14, 2016

Facebook Now Lets You Cast Videos To TV


You can now cast videos from your Facebook Newsfeed directly to your TV. This new feature allows streaming Facebook videos on your TV through AppleTV, Airplay devices, Google Chromecast and other Google Cast devices.


Available on iOS, Coming Soon to Android

For now this feature is available on the iOS version of the Facebook app. It will become available on Android soon. This could further increase video ad revenue for Facebook and also increasing usage time. Being able to view videos on your TV screen is always preferable to watching it on your phone.

How to Use It

To use this feature on the app, you just need to find a video to stream to your TV. Tap or click on the TV icon on the top right (works on the web version as well) and select the device you want to stream to.
While you’re streaming a video you can continue using Facebook as you please in the background. you can watch this video here:
https://www.facebook.com/fbmedia/videos/1216914131683337/

Late to the party?

The social media giant started testing the new streaming feature on Android back in May this year. The iOS version began testing likewise in August. This isn’t the first time Facebook has tested something related to streaming videos before. Back in 2011, they added an option to cast via Airplay from the iPad app.
Competitors like YouTube already have well established ways to stream content to TVs. Facebook is making sure it doesn’t stay behind in the race. Casting on YouTube also lets you queue videos to watch one after the other in a sequence, this could be a useful feature for Facebook’s casting options as well.
The key thing with Facebook is the fact that its everywhere, so allowing more platforms for streaming videos is an obvious thing. Nevertheless this is a welcome feature from Facebook and we would love to see it improve over time.

Thursday, October 13, 2016

Yahoo ! Disabled Email Forwarding - No way to go out


Yahoo! has disabled automatic email forwarding -- a feature that lets its users forward a copy of incoming emails from one account to another.

The company has faced lots of bad news regarding its email service in past few weeks. Last month, the company admitted a massive 2014 data breach that exposed account details of over 500 Million Yahoo users.


If this wasn't enough for users to quit the service, another shocking revelation came last week that the company scanned the emails of hundreds of millions of its users at the request of a U.S. intelligence service last year.

That's enough for making a loyal Yahoo Mail user to switch for other rival alternatives, like Google Gmail, or Microsoft's Outlook.


Yahoo Mail Disables Auto-Forwarding; Making It Hard to Leave


But as Yahoo Mail users are trying to leave the email service, the company is making it more difficult for them to transition to another email service.


That's because since the beginning of October, the company has disabled Yahoo Mail's automatic email forwarding feature that would allow users to automatically redirect incoming emails from their Yahoo account to another account, reported by the Associated Press.


All of a sudden it's under development? Here's what a post on the company's help page reads about the feature's status:


"This feature is under development. While we work to improve it, we've temporarily disabled the ability to turn on Mail Forwarding for new forwarding addresses. If you've already enabled Mail Forwarding in the past, your email will continue to forward to the address you previously configured."

In other words, only users who already had the feature turned ON in the past are out of this trouble, but users who are trying to turn ON automatic email forwarding now have no option.

Yahoo has shared the following statement about the recent move:


"We're working to get auto-forward back up and running as soon as possible because we know how useful it can be to our users. The feature was temporary disabled as part of previously planned maintenance to improve its functionality between a user’s various accounts. Users can expect an update to the auto-forward functionality soon. In the meantime, we continue to support multiple account management."

Yahoo is trying to save its Verizon Acquisition Deal


The move to turn off the email forwarding option could be an attempt to keep its customers’ accounts active because any damage to the company at this time is crucial when Yahoo seeks to sell itself to Verizon.


The Yahoo acquisition deal has not yet closed, and Verizon Communications has reportedly asked for a $1 Billion discount off of Yahoo's $4.83 Billion sales price.


As a workaround, you could switch on your vacation responder instead to automatically reply to emails with a note about your new email address.


Delete Your Yahoo Account Before It's Too Late


You can also forego the forwarding process and simply delete your Yahoo Mail account entirely, until and unless Yahoo disables that option, too.


As the Reg media reports that British Telecoms customers, whose email had been outsourced to Yahoo, have not been able to set up automatic email forwarding or even access the option to delete their accounts.

"Sorry, the delete feature is currently unavailable. This feature will become available by the end of September," the error message reads.

Hackers are spreading Malware through Fake Security Tools


Over the past few years, Internet users globally have grown increasingly aware of online privacy and security issues due to mass monitoring and surveillance by government agencies, making them adopt encryption software and services.

But it turns out that hackers are taking advantage of this opportunity by creating and distributing fake versions of encryption tools in order to infect as many victims as possible.


Kaspersky Lab has revealed an advanced persistent threat (APT) group, nicknamed StrongPity, which has put a lot of efforts in targeting users of software designed for encrypting data and communications.

The StrongPity APT group has been using watering-hole attacks, infected installers, and malware for many years to target users of encryption software by compromising legitimate sites or setting up their own malicious copycat sites.


Watering hole attacks are designed to lure specific groups of users to their interest-based sites that typically house malicious files or redirect them to attacker-controlled downloads.


The StrongPity APT group has managed to infect users in Europe, Northern Africa, and the Middle East and targeted two free encryption utilities in different attacks: WinRAR and TrueCrypt.


WinRAR and TrueCrypt are long popular within security and privacy conscious users. WinRAR is best known for its archiving capabilities that encrypting files with AES-256 crypto, while TrueCrypt is a full-disk encryption utility that locks all files on a hard drive.

By setting up fake distribution sites that closely mimic legitimate download sites, StrongPity is able to trick users into downloading malicious versions of these encryption apps in hopes that users encrypt their data using a trojanized version of WinRAR or TrueCrypt apps, allowing attackers to spy on encrypted data before encryption occurred.

"The problem with people depending on tools like this isn’t the strength of the crypto, but more about how it's distributed," says Kurt Baumgartner, principal security researcher at Kaspersky Lab. "This is that problem that StrongPity is taking advantage of."

Booby-Trapped WinRAR and TrueCrypt Downloads:


The APT group previously set up TrueCrypt-themed watering holes in late 2015, but their malicious activity surged in end of summer 2016.


Between July and September, dozens of visitors have redirected from tamindir[.]com to true-crypt[.]com with unsurprisingly almost all of the focus on computer systems in Turkey, with some victims in the Netherlands.


However, in WinRAR case, instead of redirecting victims to a website controlled by StrongPity, the group hijacked the legitimate winrar.it website to host a malicious version of the file themselves.


The winrar.it website infected users mostly in Italy, with some victims in countries like Belgium, Algeria, Tunisia, France, Morocco and Cote D'Ivoire, while the attackers controlled site, winrar.be, infected users in Belgium, Algeria, Morocco, the Netherlands, and Canada.

Top Countries infected with StrongPity APT malware:


According to Kaspersky, more than 1,000 systems infected with StrongPity malware this year. The top five countries affected by the group are Italy, Turkey, Belgium, Algeria and France.


The StrongPity APT's dropper malware was signed with "unusual digital certificates," but the group didn't re-use its fake digital certificates. It downloaded components include a backdoor, keyloggers, data stealers and other crypto-related software programs, including the putty SSH client, the filezilla FTP client, the Winscp secure file transfer program and remote desktop clients.


The dropper malware not only provides the hackers control of the system, but also allows them to steal disk contents and download other malware that would steal communication and contact information.


Therefore, users visiting sites and downloading encryption-enabled software are advised to verify both the validity of the distribution website as well as the integrity of the downloaded file itself.


Download sites that not use PGP or any strong digital code signing certificate are required to re-examine the necessity of doing so for the benefits of them as well as their own customers, explained Baumgartner.