By
Debra KaufmanApril 18, 2016
At Avid’s third annual Avid Connect event, over 1,000 people gathered prior to the official opening of NAB 2016 to hear the company’s chief executive Louis Hernandez Jr. “We’re the most open, extensible company here,” claimed Hernandez. “We invite everyone to join the open movement. We can solve this connectivity problem once and for all.” Proof of this boast was the news that Avid and rival Adobe have collaborated to tightly integrate Adobe’s Premiere Pro editing toolset into Avid’s MediaCentral Platform. Continue reading Avid Debuts Integration with Adobe Premiere, NEXIS Storage
By
Rob ScottApril 14, 2016
In a 21-page petition, a group comprised of the NAB, America’s Public Television Stations, the Consumer Technology Association and the AWARN Alliance is asking the FCC to authorize use of the new ATSC 3.0 transmission standard — what the collective refers to as “Next Generation TV” — in order to improve delivery of 4K broadcasting, streaming to smartphones and tablets, personalization features and IP-based services. ATSC 3.0 “will create the bedrock for continuing innovation by the television industry for decades to come,” claims the petition. Continue reading ATSC 3.0: NAB Calls on FCC to Authorize Next Generation TV
By
Rob ScottApril 14, 2016
Washington and Silicon Valley are poised to clash again in the ongoing debate over encryption technology in relation to data privacy, law enforcement and national security. Senate Intelligence Committee chair Richard Burr (Republican, NC) and Dianne Feinstein (Democrat, CA), the panel’s vice chair, have introduced proposed legislation that would require companies to unlock encrypted devices when served a court order. Congress has been working on a balance between security and privacy regarding encryption, especially in the wake of the recent iPhone case. Continue reading Proposed Encryption Bill Faces Opposition from Silicon Valley
By
Debra KaufmanApril 4, 2016
Since the FBI broke the encryption of the iPhone 5C belonging to terrorist Syed Rizwan Farook, most likely with the help of the Israeli office of the Japanese mobile phone security firm Cellebrite Mobile Synchronization, it has been testing the method on other iPhone versions. It will not, however, disclose the phone’s flaw or the information found on Farook’s phone. European cases regarding locked phones are heating up, with France and England considering fines for companies that don’t help crack their phones’ encryption. Continue reading FBI Tries to Unlock More iPhones, Debate Continues in Europe
By
Debra KaufmanApril 4, 2016
Intel just introduced the Xeon E5-2600 v4 chip family, which includes up to 22 calculating engines on each chip (up from a maximum of 18) and has built-in features to encrypt data more quickly, thus potentially improving security of cloud computing. Dell, HP and Cisco Systems will use the chips to make new servers. Intel also revealed its collaboration with CoreOS and Mirantis whose technologies are aimed to make it easier for companies to move data between different cloud services or their own data centers and the cloud. Continue reading Intel Debuts Chips, Partnerships for Next-Gen Cloud Computing
By
Rob ScottMarch 29, 2016
The Justice Department revealed it has learned a way to unlock Syed Rizwan Farook’s iPhone without help from Apple. Farook was a gunman in the San Bernardino shooting that killed 14 people. The announcement stalls the legal standoff between the federal government and Apple; the Justice Department will withdraw its efforts to enlist the tech company’s help in the investigation. While the news suspends the privacy vs. security debate, at least temporarily, law enforcement’s ability to open the device without Apple’s assistance raises new concerns. Continue reading Government Says iPhone Unlocked, Apple No Longer Needed
By
Debra KaufmanMarch 29, 2016
As the issue of digital encryption versus privacy roiled in the U.S. over the FBI’s demand that Apple unlock the iPhone of a mass murderer in California, recent violence in Brussels and Paris has brought those same issues to the fore in Europe. Although privacy is enshrined as a basic right in much of Europe, lawmakers in some countries are considering proposals that would give greater powers to law enforcement to access personal digital data. But privacy advocates in those same countries are fighting back. Continue reading Europe Divides in Battle Between Privacy, Digital Decryption
By
Debra KaufmanMarch 29, 2016
Although other alternative currencies have tried to gain traction as Bitcoin struggles with internal divisions, none have succeeded in doing so — until now. A rival virtual currency, Ethereum, has gained the interest of a wide range of finance and technology behemoths, including JPMorgan, Chase, Microsoft and IBM. As a result, its value has shot up 1,000 percent over the last three months. Built on a blockchain in which every transaction is publicly recorded as is Bitcoin, Ethereum promises to do more. Continue reading Bitcoin Rival Ethereum Offers Online Markets, Smart Contracts
By
Rob ScottMarch 22, 2016
The FBI asked to postpone a hearing scheduled for today regarding the Apple encryption case. The Justice Department may no longer need the tech company’s help in opening an iPhone used by gunman Syed Rizwan Farook in the San Bernardino shootings. A third party has reportedly come forward with a technique to help unlock the phone, which is currently being tested. Judge Sheri Pym of the U.S. District Court for the Central District of California granted the Justice Department’s motion to postpone. The government is required to provide an update to the court by April 5. Continue reading FBI Tests Method to Unlock iPhone, Cancels Today’s Hearing
By
Debra KaufmanMarch 8, 2016
By now, everyone knows the general outline of the argument between Apple and the FBI, over the latter’s request for a backdoor into the San Bernardino shooter’s iPhone. Apple’s refusal to do so has sparked a war of words and legal actions between Apple and other proponents of data protection/digital privacy and the government, as well as others who believe national security trumps digital privacy. More recently, at the RSA Conference, an information security event, more nuances were revealed. Continue reading RSA Conference Reveals More Nuances in FBI-Apple Battle
By
Rob ScottMarch 1, 2016
Apple’s ongoing privacy battle with law enforcement received a boost yesterday when U.S. Magistrate Judge James Orenstein of New York’s Eastern District denied the federal government’s request that the company release data from an iPhone relevant to a New York drug case. The ruling could provide Apple with a leg up as it pushes forward with its defense of privacy concerns regarding its smartphones, and may impact other cases such as efforts by the FBI to compel Apple to open the iPhone related to last year’s mass shooting in San Bernardino, California. Continue reading Judge Sides with Apple in Closely Watched Encryption Case
By
Debra KaufmanFebruary 22, 2016
The Entertainment Technology Center@USC hosted a discussion on next-generation cloud workflows, featuring toolsets and specific technologies. Led by ETC’s cloud project lead Erik Weaver, the conversation began with the real-world case study for post production in the cloud implemented by Los Angeles post facility DigitalFilm Tree. That company’s CTO/managing partner Guillaume Aubuchon led the audience through the workflows put in place to handle productions taking place in “remote parts of Asia and Africa.” Continue reading HPA Tech Retreat: Next-Gen Cloud Workflows Hosted by ETC
By
Debra KaufmanFebruary 22, 2016
The battle between terrorism and privacy has been brewing for quite some time, and the tipping point was the iPhone belonging to Syed Rizwan Farook, who, with his wife, opened fire at an office party in December 2015, killing 14 people and injuring 22. The FBI has been trying to decrypt Farook’s phone, unsuccessfully, and asked Apple to create a “backdoor” code into the phone. Apple refused, and now a court order gives the Silicon Valley company five days to comply. Chief executive Tim Cook is holding firm. Continue reading Apple and U.S. Government Battle Over Privacy vs. Terrorism
By
Debra KaufmanJanuary 21, 2016
Intel unveiled Authenticate, a technology that introduces a new, heightened level of security and computing performance. Authenticate makes it easier for multifactor authentication by which users put in place up to four safeguards before they are able to log in to their computer. That could be any combination of a password, fingerprint, set of numbers on a touchscreen or presence of an authorized employee smartphone. Authenticate is already built into new versions of Intel’s Core chips, which are used in business PCs. Continue reading Intel Technology Debuts Multifactor Security for Business PCs
By
Meghan CoyleJanuary 18, 2016
Cisco released new data that shows some companies may not know the extent of their employees’ usage of external cloud computing services, instead of the employer’s in-house cloud services. The practice of using systems inside organizations without approval is called “Shadow IT.” According to Cisco, there is 70 percent more Shadow IT activity than there was six months ago. Cisco gathered the data by surveying CIOs and running software that could track cloud activity. Unauthorized cloud usage could pose serious security threats. Continue reading Cisco Reveals Unauthorized Cloud Usage Trend in Companies