Share This

Showing posts with label Information technology. Show all posts
Showing posts with label Information technology. Show all posts

Tuesday, November 18, 2014

China once again boasts world's fastest supercomputer

The Tianhe-2, a supercomputer developed by China's National University of Defense Technology, was named the world's top supercomputer for the fourth consecutive time by the TOP500 project. [Photo/Xinhua]

The Tianhe-2, a supercomputer developed by China's National University of Defense Technology, was named the world's top supercomputer for the fourth consecutive time by the TOP500 project.

The Tianhe-2 relegated the US-developed Titan to second spot with a performance of 33.86 petaflop (quadrillions of calculations per second) in a standardized test designed to measure computer performance.

IBM's Sequoia rounded out the top 3 in the TOP500 list.

The TOP500 project, started in 1993, issues a list twice a year that ranks supercomputers based on their performance.

There was little change in the top 10 in the latest list and the only new entry was at number 10 – the Cray CS-Storm, developed by Cray Inc, which also developed the Titan.

The United States was home to six of the top 10 supercomputers, while China, Japan, Switzerland and Germany had one entrant each.

The United States remained the top country in terms of overall systems with 231, down from 233 in June and falling near its historical low.

The number of Chinese systems on the list also dropped to 61 from 76 in June, while Japan increased its number of systems from 30 to 32.

- China Daily/ Asia News Nework

 Related:

Friday, September 13, 2013

Prevent ATM thieves and cyber crimes on the rise

Banks to arm machines with ink bombs to stain stolen notes


PETALING JAYA: Thieves who rob automated teller machines will be left with worthless pieces of paper if a Bank Negara proposal is put into place. Dye bombs are to be placed in the ATMs and if anyone tampers with the machines, the “bomb” goes off, leaving the notes stained in red and easily recognisable as stolen money.

Bank Negara, in its guidelines on Dye-Stained Banknotes dated Aug 26, is calling on both banks and Cash in Transit Companies to consider using the currency protection device (CPD) to deter ATM theft.

Local security company Extro Code Sdn Bhd demonstrated yesterday a CPD or dye pack which is already available in the market.

Its technical director Mohd Zaki Sulaiman said that once installed, the dye pack would be triggered when someone tries to break into the ATM.

“The device is like a smoke bomb which releases the ink onto the stacks of banknotes in the ATM,” he said.

Mohd Zaki said there’s no actual explosion but there is some heat when the CPD is triggered.“The actual triggering mechanism is a trade secret,” he added.

He said the ink called Disperse Red 9 was not harmful. He said the ink was imported but the actual CPD was developed and produced locally.

Mohd Zaki declined to reveal the cost of each dye pack and the installation cost. “Who pays for the device will depend on Bank Negara and the banks,” he said.

He said there are four ATM providers in the country but installing the dye-packs in the different machines should not be a problem.

The Bank Negara guidelines state that the CPD would emit a bright coloured dye by smoke, liquid or any other agent to stain the currency in the event ATMs are broken into.

This will enable authorities and the public to easily identify the defaced stolen currency and render them unfit for use.

The guidelines also sets out conditions under which these banknotes will be replaced. Among them:
  • > The ink has to be indelible by water, fuel, gas, bleach and detergent.
  • > It must be traceable to the ATM, to assist police investigations.
  • > It must stain at least 10% of each bank note.
  • > It can be detected and rejected by banknotes authentication machines used by banks such as Cash 

Deposit Machines. >It must be non-hazardous and non-toxic.

If banks retrieved the dye-stained currency, they can submit the banknotes to the central bank for assessment.
Tellers will also be trained to detect these banknotes.

The public and retailers will be advised not to accept dye-stained banknotes as they are likely to be stolen.

These measure, Bank Negara believes, will reduce ATM robberies.

In the United States, banks have dye bombs in vaults and any unauthorised person who tries to remove any money will trigger the bomb, leaving all the money – and the robber – stained in ink.


Related stories:
9000 machines nationwide to have CPD
Cops welcome currency protection device proposal

Cyber crimes on the rise - millions of ringgit being lost annually to scams
Public awareness: (From left) Ambank deputy managing director Datuk Mohamed Azmi Mahmood, Khalid and AmIslamic Bank Berhad CEO Datuk Mahdi Morad at the launch of the Scam Alert campaign in Bukit Aman. 
Public awareness: (From left) Ambank deputy managing director Datuk Mohamed Azmi Mahmood, Khalid and AmIslamic Bank Berhad CEO Datuk Mahdi Morad at the launch of the Scam Alert campaign in Bukit Aman 

KUALA LUMPUR: Fraud and cyber crimes in the country have risen unchecked due to the lack of public awareness, while victims are hesitant to report the crime, the police said.

Millions of ringgit have been lost annually to crimes like sms scams and parcel scams, which have mostly gone unnoticed in the public eye.

In a bid to stop such crimes, the police has launched an awareness initiative on the various types of scams in the country.

Inspector-General of Police Tan Sri Khalid Abu Bakar said the initiative, under the National Blue Ocean Strategy, comprised cooperation with the Association of Banks in Malaysia (ABM) and the Association of Islamic Banking Institutions Malaysia (AIBIM).

The public would be informed and educated on the different types of fraud and cyber crime scams being used by today’s criminals.

“We are posting a list of the various methods and modus operandi used in these scams at our official police website at www.rmp.gov.my.

“This will be linked to the websites of all banks in the country so that anyone can easily access the information which will be regularly updated,” he said after launching the initiative at Bukit Aman yesterday.

Khalid said RM98.6mil in losses was recorded last year in cases involving cyber crimes, including Internet banking fraud as well as sms and parcel scams.

“So far this year, such losses have reached RM80.7mil, which shows that such cases and losses are increasing,” he said.

He added that losses to sms scams had jumped from RM5.8mil last year to RM39.2mil so far this year.

- The Star/Asia News Network

Sunday, May 19, 2013

Online banking Trojans going after your money!


Online banking users in Malaysia need to be wary of sophisticated Trojans. 

IMAGINE a burglar hiding in your house and slowly cleaning out your valuables, bit by bit, without you even realising it.

According to security firm Symantec, that is the common modus operandi of banking Trojans today, which have grown so sophisticated that they are almost impossible to detect and very difficult to get rid of.

As its latest white paper the World of Financial Trojans reveals recently, malware (short for malicious software) attacked over 600 financial institutions worldwide last year.

With this growth, bank hold-ups or ATM robberies, the bank heist of choice in Malaysia these days will soon be a thing of the past.

The phenomenon is no doubt partly due to the growing trend of online banking. As banks move online to make their transactions fast, easy and convenient for customers, cyber criminals are also finding the digital route the faster, easier and more convenient mode for looting.

A big threat, the report highlights, is the rate at which banking Trojans are now developed: with state-of-the-art mechanisms to circumvent the more complex security systems and exploit their weaknesses.

“Trojans have indeed evolved and the attackers have become more specialised and sophisticated,” Symantec Corporation (Malaysia) Sdn Bhd director (systems engineering) Nigel Tan concurs.

Most worrying, is that while the United States and Japan remain top of their target list, the banking Trojans are increasingly targeting emerging economies with high Gross Domestic Products (GDP) in Asia and the Middle East like Malaysia.

Tan notes, “Malaysia is on the radar of these cyber criminals and our financial institutions experienced attacks out of the 600 reported globally last year. We are not in the top 10 of countries attacked but the threat for Malaysia is no less dangerous.”

Internet banking has grown steadily in Malaysia since it was first launched in June 2000, and is now offered by 29 banks in Malaysia. As of September last year, there were 12.8 million registered users, rising from 3.2 million in 2006 and eight million in 2009.

Predictably, cyber crimes in Malaysia have also increased, with some RM2.75bil losses recorded over five years, from 2005 to 2010, especially in the financial sector.

The fact that cyber criminals are starting to eye Malaysian banks means we need to be more vigilant and tighten up our cyber security, says Tan.

End-users need to keep abreast with what security measures there are. - Nigel Tan End-users need to keep abreast with what security measures there are. - Nigel Tan
“They need to look at the malware threats they are risked to and look for measures to mitigate them because any organisation will face these threats.”

However, one problem is that many of these institutions cannot keep up with the constantly evolving sophisticated attacks. Another is the gap in the ability of certain organisations to detect threats on customers systems, according to the report.

Tan concedes that the security of our financial institutions can be improved.

Another challenge is that the Trojans are beginning to work out which banks have less security, and going after them, he warns.

“There is a difference in quality between the different banks in terms of how much of the protection and fraud detection methods they put in place.

“And if you are a robber trying to decide between two houses one big house with full security or one smaller house with minimal security; it is secured with only a padlock and chain which one will you target?” Tan quizzes.

As the report sums it, banking Trojans now “enter through the backdoor, strike with clinical precision, and have evolved to a degree of sophistication that allows attackers to conduct high-value transactions while evading traditional fraud-detection measures.”

It is not that banks have been unaware of this growing threat. Since online banking was first introduced in 1994, cyber criminals have looked for various ways to attack them. By 2003, around 20 distinct banking Trojans have existed including simple keylogging Trojans and phishing, said the report.

In response, the banks bolstered their security and fraud detection capabilities.

The problem is, the cyber criminals started adapting, until most security systems and measures were neutralised.

Tan calls these cyber criminals a specialised hacking community that is no longer searching for notoriety and fame, but is in it for the money.

“Hackers now are less noisy than five years ago, but just because there is less noise right now, it does not mean that they are not there. Trojans now stay in your computer as quiet and as long as possible to steal as much money as possible,” Tan cautions.

As mentioned, an attack technique increasingly used is called “man-in-the-browser” which basically involves an application hooking into the browser and manipulating data before it is displayed.

Sophisticated thievery

The report explains, the users will not be able to detect any malicious activity but the Trojan will intercept their transactions and inject a form in the browser requesting sensitive information. Once the user submits the requested personal information, it steals the data for future thievery.

The more sophisticated Trojans can automatically execute transactions in the background, the report highlighted.

What makes it difficult to notice with the naked eye, says Tan, is that “the domain is legitimate and the security page is accurate. It is your computer that is affected, so it can steal your personal data or attack your bank.”

One thing that makes it difficult to clamp down on the attackers behind these Trojans is that it is not easy to pin the crime on them.

“Just writing malware is not an offence. It is hard to pin it as a crime, as long as the writer does not go out and sell it,” Tan points out.


It also does not help that they are reportedly organised underground groups who are not only experts at scripting and automating attacks, but are also knowledgeable about the sophisticated global financial industry and supported by a service industry of widely available malware.

It is akin to organised crime, he opines.

As the report puts it, “The financial fraud marketplace is also increasingly organised. It is a service industry where a wide variety of financial Trojans, webinjects, and distribution channels are bought and sold. Services being offered are dedicated to each aspect of a financial fraud campaign. These offerings will improve effectiveness of established techniques.”

The Top Three of the “Most Wanted” malware list in 2012 were the Zeus Trojan, also known as Zbot (+ Gameover), having compromised more than 400,000 computers worldwide; followed by Cridex at more than 250,000 computers compromised and Spyeye at more than 50,000.

Symantec also points to third-party remote webinjects which can circumvent security countermeasures, targeting a large number of financial companies “concurrently and intelligently” as posing a threat to financial companies.

According to the report, it is not only the main financial organisations like commercial banks that are high on the list of targets, but also organisations that perform online financial transactions such as automated clearing house payments systems and payroll systems.

It is thus crucial for the “good guys” to be alert all the time. They can't slip up and must put in place adequate security mechanisms and take strong measures to deter attackers from targeting these institutions, Tan urges.

Ultimately, users cannot leave the responsibility for security solely to the institutions, he warns.

“End-users need to raise their awareness of the threats out there as at the end of the day, the criminal will go through the end-user to attack the financial institutions.”

The best measure, he stresses, is not to get infected in the first place, so installing a good anti-malware programme on your personal devices is crucial.

As he puts it, anti-malware solutions can stop the malware, even if you were already infected, shares Tan.

“The scanning will pick it up and delete it off your system.”

Tan also emphasises ongoing education in security, as the threats are constantly evolving.

“There will not be a point where you can say this is it. This is what everyone should do. End-users need to keep abreast with what security measures there are.”

Good practice needs to be adopted such as reading the message box or running an anti-virus before downloading anything from a website.

“Most of the time when people get a pop-up to say that you have a malware, they just cancel it or click it close, or when it says your computer is infected, they just ignore it.”

Significantly, Tan says this is not a call to say that Internet banking is bad.

“Quite the contrary. Internet banking has a lot of benefits.

“But as we embrace any new technology or media, we just have to be aware of what the threats are on the Internet. As long as we take adequate protection, we will be safe.”

By HARIATI AZIZAN sunday@thestar.com.my

Saturday, March 16, 2013

Information innovator

Information technology (IT) is all about innovation. Vish Iyer can’t agree more.

Mobility, social media and big data are all hot-button topics. Cloud computing frees up people from the desk, so an IT system can be managed even on the road. “For a bank, it could be payment via Internet banking or mobile phone,” says the high-flying corporate executive, dapper in a light purple shirt.

Vish Iyer: 'There is no advantage in having 20 or 30 years of experience unless you are ...very merit-driven and work-driven'.



“For an insurance company, it could mean enabling an agent to get quotations and conduct transactions on his or her mobile.” For an airline, pilots no longer carry huge bags with heavy operating manuals. “We put that on an iPad,” he adds.

Few would believe the president for Asia Pacific at Tata Consultancy Services (TCS) has neither training in IT nor a background in engineering. He learns by doing.

Born and raised in Kolkata around the time when India’s first computer arrived, Iyer graduated from St Xavier’s College, one of the city’s best-known educational institutions with a major in taxation and economics.

Now the head of the largest service provider in the Asia-Pacific region based in Singapore, he manages 10,000 employees in 13 countries including Australia, Japan, China and South Korea.

The 45-year-old Indian company, whose clients include Microsoft and ING Group, is the provider of IT services and business solutions, with a turnover exceeding $12 billion and market capitalization of $45 billion on the Bombay Stock Exchange.

It is part of the Tata group, India’s largest conglomerate in seven sectors including communications, engineering and energy, with a revenue of more than $100 billion in the fiscal year 2011-12.

As a certified accountant, Iyer moved on from the financial field to other areas including human resources, marketing, strategy, mergers and acquisition. “I have been a chief financial officer many times,” he tells China Daily Asia Weekly at the TCS Hong Kong office.

But that didn’t stop him from venturing into new fields after three and a half decades. Midway through his career, he moved into a new-born industry in India.

His rationale is: “What matters is how you put your basic training to use and how you quickly learn from the surroundings. You can do anything as long as you have a will to do it, and you are determined to work hard enough.”

He spent a decade at IBM, where he was director of corporate development. IT has since become his longest stint.

He has witnessed the birth of the industry along with the ups and downs. “The IT industry is very fascinating. Every two to three years are completely different. In that sense, everybody got to continuously learn,” he says.

In the IT world, experience doesn’t necessarily give you an edge over the younger generation. Two-thirds of the company’s workforce has about three years of experience and the average age of a TCS employee is just 28.

“There is no advantage (in) having 20 or 30 years of experience unless you are … very merit-driven and work-driven,” Iyer says.

“This is the industry across the world (where) everything looks the same. There is no different standard in the US or Japan. Once you are inside IT, it is the same. It talks the same language and (has the same) quality level.”

The capability to locate young talent matters for the industry. To Iyer, the Chinese mainland not only has a staggering domestic market but also vast trained manpower resources.

TCS is among the first Indian companies to enter the Chinese mainland as the first wholly-owned foreign enterprise. The IT consultancy commenced its operations in Shanghai in 2002, then established a development center in Hangzhou in Zhejiang province in October of the same year. Its banking products are used by Bank of China in more than 40 provinces.

Iyer sees the potential to substantially increase China’s TCS workforce from its current number of 3,000 people, as the company’s sales growth in China outpaces that in the Americas. TCS now has relations with 20 colleges in China.

“Our business is all about people,” he says. “At the end of the day, we need to find out where are these talents available for serving our customers. China is very important from that point of view — as a pool of talent. It’s equally important for the size of the economy, too.”

“We are very bullish about China,” he said in a previous interview. “Its full potential has not yet been harnessed … We’re looking to leverage its position as an innovation center and a hub for the Northeast Asia region.”

TCS has started to provide a ground-breaking cloud-based service that enables smaller banks and credit unions to establish their own Internet, mobile and ATM facilities by paying a monthly fee. “A village bank need not have an IT department, but the same technology that empowers a (central bank) is now available to small and medium enterprises.”

The TCS pioneer project has found a home in the world’s second largest economy. iCity or the Intelligent City, utilizes smart technologies and collective intelligence to improve a city’s livability and sustainability.

These cities will be built on cloud infrastructure that makes them easy to run. Every citizen will own a personalized information page for health records and blood pressure measurements and even get health alerts and doctors’ advice.

Imagine buildings that glean energy from the sun and rain, reducing energy consumption, and embedded software in cars and traffic poles that automatically monitor local traffic. At the same time, healthcare and consumer services are dispensed to citizens at home, saving time, cost and valuable resources.

An iCity project in southern China’s port city of Guangzhou is slated for a soft launch later this year. More blueprints are on majors’ drawing boards in first- and second-tier Chinese cities, including Tianjin, Ningbo and Chengdu.

“The Indian IT industry over the last 20 years has done exceedingly well,” Iyer says. “Works of best quality are from this industry. There (has been) a lot of proud achievements — so it’s an exciting place to be in.”

But when asked about the most exciting moment in his life, the president’s answer has surprisingly nothing to do with his career. “The day when my daughter was born, and when I was holding her in my hands,” he says, with a gentle smile.

“Lots of people talk about work-life balance. I think each person has to find that balance himself … Family influence is a strong support for the profession I pursue, so there are no conflicts or contradiction.”

Looking back, Iyer has been with his two children — his 23-year-old daughter and 18-year-old son — through every important step of their life. “I (accompany) them through every exam, drop them off and pick them up after classes, and consult their teachers for college admissions. As long as you enjoy it, you’ll find time for doing it,” he adds.

Technology has been the savior for this family man with a hectic business schedule with long hours of frequent travel.

“I am on the road 50 or 60 percent of the time. Each month, I am outside my hometown for 20 days,” he says. “My children have grown up with me spending a lot of time at work. But this is a world of Facebook, email and Skype. That’s what we do now,” he says.

What makes his day? Iyer answers professionally without a second of hesitation: “To satisfy a customer in a meeting.”

Then comes the personal bit: “Followed by a relaxing dinner with my wife.”

By jennifer@chinadailyhk.com 

Vish Iyer
President of Tata Consultancy Services (TCS), Asia Pacific

Career Milestones:
2010: Becomes president of TCS Asia Pacific
2008: Serves as CFO of global business operations at TCS
2006: Takes up post as head of corporate strategy at TCS
1996: Becomes director of corporate development at IBM Global Services
1991: Joins Tata Elxsi as executive vice-president

QUICK TAKES:
Hobbies:
Playing golf. The question is not how well you play but whether you enjoy the time. Whatever I do, I enjoy. It’s a great opportunity to meet people.
Business philosophy:
I always believe in ... simple communication with the customer and the employee. There is no point promising things that you cannot deliver. Whatever you promise, you deliver. Whatever you don’t deliver, you don’t promise.
If you were to do one thing differently in life?
I can’t think of one thing. I do things that I enjoy doing.
How to kill time on the road:
I spend a lot of time watching movies on the plane. My favorite stars are Jackie Chan and Amitabh Bachchan, who hosted India’s version of the game show Who Wants to Be a Millionaire?

Born: December 8 in a Year of the Snake

Friday, February 1, 2013

Facebook profit plunges 79%, revenues gain 40%

Facebook (Nasdaq: FB) reported a plunge in fourth-quarter profit on higher spending Wednesday, even while it made long-awaited progress luring advertisers eager to reach mobile- device users.

Net income fell 79 percent to $64 million last quarter as operating expenses jumped 82 percent, Facebook said. That outpaced a 40 percent revenue gain to $1.59 billion and raised concerns that margins will come under pressure.


The stock fell 2.8 percent in German trading, paring a drop of as much as 11 percent in late U.S. trading as investors weighed near-term lower profit against the prospect of future growth.

Still, the company delivered fourth-quarter results above Wall Street's expectations and sought to show that it has finally transformed into a "mobile company" after rising to dominance as a Web-based social network.

"Everything was slightly better than expected," said Wedbush Securities analyst Michael Pachter. "I don't see anything here that would make me want to sell the stock."

The world's largest social media company earned $64 million, or 3 cents per share, in the October-December period. That's down 79 percent from $302 million, or 14 cents per share, a year earlier when it was still a privately held company.

Revenue rose 40 percent to $1.59 billion from $1.13 billion, surpassing analysts' expectations of $1.51 billion.

Advertising revenue grew 41 percent to $1.33 billion, increasing at a faster clip than in the third quarter, when it climbed 36 percent to $1.09 billion.

Excluding special items, mainly related to stock compensation expenses, Menlo Park, Calif.-based Facebook earned 17 cents per share in the latest quarter. Analysts polled by FactSet expected lower adjusted earnings of 15 cents per share.

Nonetheless, Facebook's stock fell $1.11, or 3.6 percent, to $30.13 in after-hours trading following the earnings report.

Chief Executive Officer Mark Zuckerberg plans to increase expenses, excluding certain costs, 50 percent this year to hire staff and roll out new tools for advertisers. That’s more than the 33 percent increase projected by Pacific Crest Securities LLC, and it underscores the urgency of capturing a bigger slice of the $6.97 billion U.S. mobile-ad market. Done right, the added investment will translate to profit growth, said Adam Schneiberg, a portfolio manager at BTR Capital Management.

“Wall Street tends to be forgiving of higher spending during high-growth periods when new products are being built,” Schneiberg said. “As long as eyeballs tune in and revenue keeps growing, the Street will believe that at some point the company can flip the switch on profitability.”

Facebook shares had advanced 1.5 percent to $31.24 at the close in New York just ahead of the earnings announcement, leaving them up 76 percent from a record low close on Sept. 4.

Mobile-Ad Push

Facebook’s increased investment is designed to help the company grapple with rising competition from larger rivals in the U.S. market for mobile advertising, predicted by EMarketer Inc. to surge 82 percent this year. Google Inc. is projected to grab 57 percent of that market, and Facebook will remain a distant No. 2 with 12 percent, EMarketer estimates.

“More mobile revenue means way more spending on the operations of selling ads,” said Brian Wieser, an analyst at Pivotal Research Group LLC, who has a hold rating on the stock. “This is an expensive company to run.”

Mobile contributed 23 percent of total advertising revenue, or about $306 million, according to Facebook. That compares with 14 percent in the third quarter. Analysts at JPMorgan Chase & Co. predicted mobile would contribute $384.2 million, or 27 percent of ad revenue, in the latest quarter.

Facebook’s engineers are making improvements to mobile applications, including those for Google’s Android software, Zuckerberg said on a conference call. Better mobile services can boost user engagement, he said.

‘Big Transition’

“We made this big transition, where now there are more people using Facebook on mobile every day than on desktop,” Zuckerberg said. “More people are starting to understand that mobile is a great opportunity for us.”

Facebook is investing in new products to attract users and keep them on the site longer. Earlier this month, the company announced a revamp of its search service that lets members find information on people, places, photos and interests. The company also has upgraded its mobile applications with new versions for phones running Google’s Android software and Apple Inc.’s iPhone.

“We’re investing heavily because we see big opportunities ahead for the company,” David Ebersman, Facebook’s chief financial officer, said in an interview. “So, we’re trying to invest to build the most valuable company we can for the long term and to really invest in areas that can drive engagement.”

Narrower Margin

Zuckerberg also said that he expects to hire aggressively, causing expenses to grow at a faster rate than sales in 2013. The company had 4,619 employees at the end of last year, according to data compiled by Bloomberg.

Facebook’s fourth-quarter operating margin declined to 33 percent from 48 percent a year earlier, while costs rose to $1.06 billion from $583 million.

Facebook reached 1.06 billion users during the fourth quarter, up from 1.01 billion in the third quarter. The number of mobile users was 680 million, up from 604 million in the third quarter.

Analysts had been pushing up ratings amid growing optimism for accelerated revenue growth. The proportion of analysts covering Facebook with a buy rating has risen to 65 percent from 52 percent on Oct. 23, when Facebook posted third-quarter sales that beat estimates, according to data compiled by Bloomberg.

“A lot of these products are pretty new,” said Scott Kessler, an analyst at S&P Capital IQ, who rates the stock a hold. “It’s just going to take some time.”

- The AP and Bloomberg

Related posts:
 Facebook Tries to Monetize By Annoying; LinkedIn Adds 
Downside of Facebook

Thursday, September 13, 2012

iPhone 5 opens the door for Nokia, Samsung

There's no doubt that the iPhone 5 is going to be a great, fast-selling smartphone, but it's out-innovated by Nokia and Samsung.

  (Credit: Sarah Tew/CNET)
 


News flash: The iPhone 5 is not the end-all and be-all of the smartphone universe, a fact that should thrill Nokia and Samsung alike.

Here's what it is: a strong improvement to the iPhone 4S that offers up a larger screen, 4G LTE speeds, and a terrific camera. The iPhone 5 carries on the goodness that Apple excels at, like iTunes entertainment and cloud storage.

But however good the iPhone 5 is, it lacks the knockout, gasp-inducing feature that Apple followers have come to expect: perhaps double the battery life of any other phone on the market, or an innovative camera feature that lets you drag and drop subjects around the screen, or other far-out concepts come to life.

Instead, we see a lot of catching up: LTE support, panorama mode, and photo capture while a video records, maps with turn-by-turn navigation, and a slightly larger screen with the same pixel density as on the iPhone 4 two generations ago. And it still lacks certain other perks, like NFC, which is useful for mobile payments, and for sharing content from phone to phone.

For the first time in a long time, Apple has given its rivals room to bask in their own innovations.

Samsung Galaxy Note 2
Samsung's Galaxy Note 2 is the anti-iPhone.
(Credit: Jessica Dolcourt/CNET)
 
The Nokia's Lumia 920 offers wireless charging, for example, a capability it'll pilot in coffee shops and airline lounges. Its camera is literally surrounded by springs, and the screen uses a very smart display filter that could match or even surpass the iPhone 5's display (we have to wait to see them side by side.

Meanwhile, Samsung's Galaxy Note 2 offers up an enormous 5.5-inch screen and a truckload of tricks with its S Pen stylus, and a new camera feature that will compile the best of a handful of group photos, increasing the chances that everyone's smiling. Its phone/tablet hybrid is the antithesis of the smaller iPhone screen.

On the battery front, Motorola's new Motorola Droid Razr Maxx HD can't be beat; it features a powerful 3,300mAh battery that promises 21 hours of talk time to Apple's 8 hours of talk time over 3G on the iPhone 5.

Make no mistake that the iPhone 5 will sell like wildfire and bring delight to Apple fans everywhere -- in fact, I even think it makes for a great universal choice.

Yet its lack of a "gotcha" feature gives shoppers considering other powerful alternatives -- like the intriguing Lumia 920, the larger-than-life Samsung Galaxy Note 2, or even the won't-quit Motorola Droid Razr Maxx HD -- fewer reasons to stick with Apple.

Jessica Dolcourt

 by Jessica Dolcourt 

Newscribe : get free news in real time
Related: 

Apple's new iPhone 5  :

Apple iPhone 5: First impressions  

iPhone 5 vs. Galaxy S3 vs. Lumia 920   

Full coverage: The iPhone 5 arrives



Tuesday, December 13, 2011

Certification for Malaysian IT pros ?


The Register® — Biting the hand that feeds IT

Government seeks BOFH control By Natalie Apostolou

A proposal to introduce a bill to force all IT workers in Malaysia to be certified and registered via a single industry body has sparked agitation in the tech sector.

If the proposed legislation, the Board of Computing Professionals Malaysia Bill 2011 (BCPM), is passed, Malaysia will be the first country with a law which requiring IT professionals to be registered with a board before being allowed to practice.

Under the draft bill any professional registering with the board would have to pass examinations, possess professional experience and pay registration fees.

Those against the law claim that the talent pool may shrink if such stipulations are introduced and fear that the board will have too much control over who can be registered, or certified for lucrative government tenders.

The tech community has released a “Common Voice of ICT Professionals” response to the government proposal, stating that the industry is “alarmed” and “caught most of us off-guard”.

“We have not found any information and substantiation that suggests or concludes that the formation of the Board of Computing Professionals is the right and only answer to amicably resolve all matters that the Government perceive to be issues relating to the ICT profession, if such issues indeed do exist in the first place.”

Also under the draft of the proposed bill, unregistered IT professionals will not be allowed to “practice, carry on business or take up employment which requires him to carry out or perform the services of a Registered Computing Professional”. They are also forbidden from gaining any fees, charges, remuneration or other form of consideration for any professional technology services rendered. ®



Newscribe : get free news in real time 

MCA against listing IT pros under a regulatory body 

The Star 13/12/2011

MALACCA: MCA has voiced its objection against a proposed move by the Science, Technology and Innovation Ministry to register IT practitioners in the country under a regulatory body known as the Board of Computing Professionals.

Party president Datuk Seri Dr Chua Soi Lek said it was strongly against the proposed exercise embarked by the ministry.

“We will be made a laughing stock in the global arena if we go ahead with the proposed body. Nowhere else is there such a regulatory body,” he said after attending Kota Melaka 1MCA Medical Foundation dinner here last night.

He said the ministry should first seek feedback from IT practitioners before coming up with such a plan.
“The board is unnecessary because a code of conduct or guideline is more suitable.

“Furthermore, the fact is undeniable that most of the pioneer members of the local IT Industry are not those from IT background. Yet, they were able to soar,” he said, adding that he had expressed MCA's opposition against the board to Prime Minister Datuk Seri Najib Tun Razak.

On another matter, Dr Chua called on Opposition leaders, especially those from PAS, to understand the religions practised by the Chinese community such as Buddhism and Taoism before making baseless comments.

He claimed that PAS leaders had made derogatory remarks during their ceramah, labelling the Chinese as “praying to Datuk Kong and Pai Kong and later may worship King Kong”.

“MCA is willing to provide classes to PAS leaders if they don't understand the tenets and teaching of other religions,” he said.

New Bill will restrict IT users, says Pua

KUALA LUMPUR: There is no need to impose bureaucratic control over the information technology (IT) in Malaysia, said DAP national publicity secretary Tony Pua.

He said the proposed Computer Professionals Bill (CPB) 2011 would restrict those using IT, despite assurances by the Science, Technology and Innovation Ministry that there will not be any restrictions on computing services.

He added the Multimedia Super Corridor (MSC) Bill of Guarantees had promised “unrestricted employment of knowledge workers” and “no censorship of the Internet”.

“The information technology and computing industry has been operating without controversy, issues or impediment for the past decade.

“There is absolutely no bureaucratic requirement to restrict and control the industry, which will only bring adverse outcomes without any corresponding tangible benefit,” Pua said in a statement here yesterday.

IT professionals had raised a stink over the CPB 2011 since a copy of the Bill's draft was made available online on Thursday.

Related post:

 IT folk upset over draft Bill  Dec 10, 2011