IDG Contributor Network: The right way to tackle Amazon

There’s little question that Amazon has dominated e-commerce for much of its existence. But as it quietly boosts its physical presence in communities, it’s not really getting into the bricks-and-mortar business. All that it’s doing is perfecting its online operations, ever mindful that the final stage of e-commerce is getting the product to the shopper, a stage that can run into quite a few obstacles.

It’s those kinds of obstacles — age-restricted products such as alcohol, neighbors or opportunity thieves stealing packages from outside the front door, temperature-sensitive merchandise, etc. — that Amazon is focusing on. Have seen no plans at all for a true shopping cart warehouse effort from Amazon, other than a wacky friction-less warehouse scenario described in a patent from January.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

4 research projects that could double wireless bandwidth

Working in his research lab, Andrea Alù is focused on a single objective: Doubling wireless bandwidth. “The final goal is to realize a compact device that can enable full-duplex for wireless communications, transmitting and receiving at the same time on the same frequency channel,” says Alù, an associate professor of electrical and computer engineering at University of Texas at Austin.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more 0 Comments

KeyRaider malware stole over 225,000 Apple credentials from jailbroken iOS devices

If you have a jailbroken iOS device, then you are a target of a new malware that has successfully stolen credentials for over 225,000 Apple accounts. The malware was dubbed KeyRaider since “it raids victims’ passwords, private keys and certificates.”

Although KeyRaider malware only targets jailbroken iOS devices, it has resulted in the “largest known Apple account theft caused by malware,” according to Claud Xiao of Palo Alto Networks. KeyRaider is believed to have impacted users from 18 countries including China, United States, United Kingdom, Australia, Canada, France, Germany, Japan, Italy, Israel, Russia, Singapore, South Korea and Spain.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Rumors: Apple TV update super-spendy. Launch date 9/9 (at iPhone 6s bash)

The Apple TV 4 will cost $200 (or possibly $150, depending on who you believe). It’s now expected to be launched next week at Apple’s 9/9 iPhone 6s event, with a release date sometime next month.

Cupertino’s new set-top box had better be something special to command that sort of price premium.

A big part of that “special something” is said to be in the remote. However, the rumors point to Apple (ahem) magically copying features from the Amazon Fire and Nintendo Wii.

In IT Blogwatch, bloggers celebrate a slow news day. Not to mention: How does facial recognition work?

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Linux Foundation publishes security checklist to help sysadmins combat attacks

If you’re a Linux user, especially a systems administrator, the Linux Foundation has some security tips to share with you, and they’re quite good.

Konstantin Ryabitsev, the Foundation’s director of collaborative IT services, published the security checklist that the organization uses to harden the laptops of its remote sysadmins against attacks.

The recommendations aim to balance security decisions with usability and are accompanied by explanations of why they were considered. They also have different severity levels: low, moderate, critical, and paranoid.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Rumor: New Apple TV spendy. Launch date 9/9 at iPhone 6s bash

The Apple TV 4 will cost $200 (or possibly $150, depending on who you believe). It’s now expected to be launched next week at the 9/9 iPhone 6s event, with a release date sometime next month.

Cupertino’s new set-top box had better be something special to command that sort of price premium.

A big part of that “special something” is said to be in the remote. However, the rumors point to (ahem) magical copying of features from the Amazon Fire and Nintendo Wii.

In IT Blogwatch, bloggers celebrate a slow news day. Not to mention: How does facial recognition work?

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Qualcomm’s Snapdragon 820 processor gets technology to secure Android phones

Qualcomm is promising to improve security and privacy on high-end smartphones with Snapdragon Smart Protect, which uses on-device machine learning to help detect zero-day malware.

The popularity of smartphones has started to catch the imagination of hackers, resulting in the need for better protection. Qualcomm’s latest contribution is Snapdragon Smart Protect, which the company announced on Monday.

Smart Protect looks at what’s going on in the smartphone and warns about what it thinks are abnormal behaviors to protect users. At its most basic, that could be an application that takes a photo even though the display is off or an application sending an SMS without any user interaction. 

To read this article in full or to leave a comment, please click here

Read more 0 Comments