Monday, February 29, 2016

Airport software knows leap not – stranded 1200 Suitcase – Heise Newsticker



The software of the baggage handling system at Düsseldorf Airport was obviously not adjusted to today’s leap day: Around 1,200 suitcases remained because of ongoing disturbances are

at Düsseldorf airport are lie close stay on Monday about 1,200 suitcases. The reason: The software of the baggage-handling system had allowed the leap bring out the clock. “The plant has 29 February not recognized as a day,” said an airport spokesman, confirming media reports. There have been repeated interference.

The airport had to park several employees, the suitcases sorted by hand, reported the Rheinische Post . Around noon, the problem was finally resolved by a software update. At Düsseldorf Airport, the third largest in Germany, 25000-50000 luggage are handled daily. “We hope that we do better in four years,” the spokesman said. The Airport advised travelers not to pack important things like drugs in the suitcase, but basically take in hand luggage. (the With Material dpa ) / (axk)

LikeTweet

License Management: software leasing models as tripping hazard – funkschau

"2016-02-29 14:49:55" pubdate = "pubdate">
         02/29/2016
        of
       
           
               Author: Carsten Wemken / editors: Diana Artist
             
                           
     
   


            For many companies, software leasing models are an attractive alternative to buying licenses. Avoid businesses resulting in high cost and do not have their resources long-term commitment. Software subscriptions or subscription licenses, thereby increasing the flexibility. But leasing models have their pitfalls. Thus also are the processes for software asset management to the test – because the next software audit is determined .
       



                 
             
                  Source: © Jan Schumann / fotolia.com
             
             
         

According to the Business Software Alliance (BSA), the trade association for the software maker, is in Germany almost a quarter of the used software licensed wrong. License audits are now standard of the major manufacturers such as Microsoft, IBM, Oracle or SAP. Without software asset management (SAM), it is difficult for many companies hard to prove that the software used does not exceed the acquired amount of usage rights. Under time pressure is resorted to extrapolations and assumptions – a temporary solution with high risks. Because with false licenses that compensation is often estimated at criminal impacts of copyright.

Rent is trendy
Against this background, many companies welcome an intensifying trend towards software leasing models. They believe so automatically compliant and to be protected from audits. Rental Systems wide mainly for two reasons rapidly from: The major manufacturers have increasingly turned against the conventional purchase license from. Secondly, many start-up companies use for their products from the start exclusively on subscription models.

Many license programs are already mature and user adoption increases. Not surprisingly, since the development has advantages for both sides. Based on the contracts, the producer knows exactly when he gets how much money. He can also check if the licenses are still valid and more difficult as the customer under licensing through Internet-based mechanisms. The user companies on the other hand regularly pay small amounts and no longer need to make such a high one-time investments to license the beginning. The biggest change concerns the right to use: With a purchase license application in the acquired version or edition may be used indefinitely. The only challenge is to know the license terms that may differ from application to application, – a typical task of license management. In contrast, ends with a rental or subscription license the right to use, once the contract expires. Often an online query regularly checks the validity of the licenses. Once the manufacturer database notifies the rental end, the software provides its operation and all functionality can no longer be used.


             
  1. http://www.comparex-group.com/web/de/de/services/software-asset-management/managed-services-sam2go/managed-services-sam2go.htm
  2.                  
                 

Part 1
                 
                     of 4
                 
                 
             


             
             
                  Next
             
         

             

LikeTweet

DGAP-News: Klöckner & Co agreed cooperation with software provider Sage … – Finanztreff

Klöckner & amp; Co agreed cooperation with software provider Sage

DGAP-News: Klöckner & amp; Co. SE / Key word (s): Alliance Klöckner & amp; Co agreed cooperation with software provider Sage

02.29.2016 / 10:05 The issuer is solely responsible for the content of the message verantwortlich.

—————————————————————————

Duisburg, February 29, 2016 – As part of the digitization of the entire supply chain and performance, Klöckner & amp crosslinked; Co for electronic data exchange increasingly with its partners and customers. An important component of this strategy is the direct connection to the ERP systems of Klöckner-customer with interfaces to e.g. electronic access to the extensive product catalog of Klöckner & amp; simplify Co and so automate ordering processes. For this, the internationally operating steel and metal distributor is now in Germany a cooperation with one of the market leader for integrated accounting, payroll and payment systems, Sage Software (www.sage.de), received. The aim is to promote cooperation with the software company a specially preconfigured on steel and metal processing variant of the accounting and ERP solution “Sage Office Line”

Gisbert Rühl, Chairman of Klöckner & amp. Co SE: “The cooperation has great potential Klöckner customers can control professionally with solving their business on attractive terms while getting out of the system on-line access to our wide range of steel and metal products..”

Andreas Zipser, Managing Director of Sage: “Medium-sized processors of steel and metal products are for us an important customer segment, in which we want to continue to grow with our new solution, we help companies to digitize their business stronger and characterized. to be even more successful with Klöckner & amp;.. Co we have found a renowned partner, the one hand, has the necessary knowledge of the industry and the other, on a high digital literacy “

After several months of development phase in which the requirements of Klöckner customers analyzed and have been incorporated into the software, the solution is currently implemented in the first test customers. The joint sales start – in which Klöckner & amp; Co and Sage Hand will work in hand – is planned for the first half of 2016.

About Klöckner & amp;. Co: Klöckner & amp; Co is one of the largest producer-independent steel and metal distributor and one of the leading steel service center companies. Through its distribution and service network of some 220 locations in 15 countries, the company serves more than 150,000 customers. In addition to companies in the construction and the mechanical engineering industry adds Klöckner & amp; Co customers in the automotive and chemical industries, the shipbuilding and in the fields of household appliances, consumer goods and energy. Currently Klöckner & amp; Co around 9,600 employees. In fiscal 2014 the group achieved sales of approximately EUR 6.5 billion

The shares of Klöckner & amp. Co SE are admitted to the Frankfurt Stock Exchange for trading on the regulated market with additional post-admission obligations (Prime Standard). Klöckner & amp; Co shares are listed in Deutsche Börse’s MDAX (R) index

ISIN:. DE000KC01000; WKN: KC0100; Common Code: 025808576

Contact Klöckner & amp;. Co SE: Christian Pokropp – Press Officer Head of Investor Relations & amp; Corporate Communications Phone: +49 (0) 203-307-2050 Fax: +49 (0) 203-307-5025 E-mail: christian.pokropp@kloeckner.com

About Sage Sage is a leader integrated accounting, payroll and payment systems and supports the ambitions of entrepreneurs worldwide. 30 years ago, Sage began in Britain even as a small business. Today 13,000 employees in 23 countries support this million companies, to drive the global economy. Sage invents the new corporate governance and simplifies it with smarter technology. For Sage works closely with a growing community of entrepreneurs, business owners, accountants, partners and developers. As FTSE 100 Company is Sage is aware of its social responsibility. The company helps at its sites local organizations and needy through the house foundation, the Sage Foundation

For more information visit the website:. Www.sage.de

Contact Sage Software GmbH Sage software GmbH, Jörg Wassink, Tel .: 069-50007-1130, e-mail: presse@sage.de

—————————————————————————

29.02.2016 Release of a Corporate News / Financial News, transmitted by DGAP – a service of EQS Group AG. The content of the message The issuer / publisher is solely responsible.

DGAP’s Distribution Services include Regulatory Announcements, Financial / Corporate News and Press Releases. Media archive at and http://www.dgap-medientreff.de http://www.dgap.de

—————————————————————————

Sprache: German
companies: Klöckner & amp; Co. SE
Am Silberpalais 1
47057 Duisburg Germany

Phone: +49 (0) 203 / 307-0
Fax: +49 (0) 203 / 307-5000
email: info@kloeckner.com
Internet: www.kloeckner.com
ISIN: DE000KC01000
WKN: KC0100
stockmarkets: regulated dealing in Frankfurt (Prime Standard);
Freiverkehr in Berlin, Dusseldorf, Hamburg, Hanover,
Munich, Stuttgart; EUREX

End of News DGAP News-Service
—————————————————————————

440911 02/29/2016

Source: AFX

LikeTweet

Sunday, February 28, 2016

Buying used Windows software and COA: initial suspicion of money laundering – anwalt.de


  ( 2 reviews)
  5.0
  5.0
 

Who purchased through eBay in the past inexpensive (used) Windows software and an associated certificate of authenticity, against could possibly inter alia a prosecution pending investigation be operated because of the initial suspicions of money laundering (!). What sounds like a bad joke, has unfortunately become reality. My firm represented recently a corresponding unsuspecting eBay buyers in such a preliminary investigation against the prosecutor Koblenz (Az. 2050 Js 78318/15) .

Fake COA from Asia

The client acquired in 2011 a used Windows XP version in addition to authenticity gehörigem time certificate from a commercial eBay seller with over 37,000 positive reviews at a price of 20.00 euros. Against the seller was operated by the public prosecutor in Frankfurt / Oder, a criminal proceeding, as the COA (certificate of authenticity), which he mitverkaufte, came from Asia and to be fake.

offenses tacitly accepted

the Frankfurt / Oder prosecutor reached during the procedure to the conclusion that purchasers of this software and COA should have noticed that the normal market price would not be at 20.00 euros, but in about 60 , 00 Euro. A suspected acquiring unauthorized software would have to impose the buyers, so the prosecution. The purchaser would have at least taken violations of § 106 of the Copyright Act and to § 261 of the Criminal Code (money laundering) thus approvingly accepted. Measure of the market price in that regard, the platform “comparison”, where reference prices from the buyers could be found.

37,000 positive reviews of this seller

prosecutors Frankfurt / Oder and Koblenz shoot so far over the top. The views of authorities are to be regarded as absurd, absurd and unrealistic. None buyers on eBay can be expected to first have to make a comparison of the items offered on eBay. It is also known for bargain just eBay. If one also acquires as a buyer to a seller, which has more than 37,000 likes, one may initially assume that everything is fine with your purchased item. Who takes a different view, so automatically criminalized any unsuspecting and innocent eBay users.

Representation to investigation useful

Allen eBay buyers, against the investigation for money laundering, copyright infringements or stolen goods is operated, is suggested to be represented by counsel already in proceedings against the respective prosecutor. Firstly because only an attorney may apply for access to the file and thus to establish the facts. Secondly, because a lawyer for the authority the nonsense of the investigation then rather convey. And the last, because with each successive stage of the procedure increases the chance of possibly very costly condemnation of the buyer.

Against our clients the investigations were set. If necessary, we advise you nationwide and pleased to hear from you.

Tobias Kläner, Lawyer

“6”


Rate this right Tip:

Recommend this right Tip:

LikeTweet

Saturday, February 27, 2016

Apple vs. FBI: software as “free speech” – Heise Newsticker



(Picture: Brandt Luke anger / Wikimedia)

<- rspeak_start ->

The! litigation between Apple and the FBI, it’s not just about encryption and national Security. An important role is played by the fundamental question: When is software protected by the First Amendment

The demands of the FBI to Apple also raises the legal question of whether a person can be forced to write software , In the dispute over the access to the encrypted data in the iPhone a terrorist, the FBI Apple had requested the deployment of an update. Apple cites in its application to have the appropriate disposal of the Federal District Court in California, on the protection of the granted First Amendment right to free speech. This also covering the right to remain silent.

Basically, be clarified, that software can be protected as “speech” by the First Amendment, commented A. Michael Froomkin, law professor at the University of Miami, told the Wall Street Journal. What matters here whether a judge programming as a “talking” action look like writing a song or a book, which would mean a high level of protection, or whether he regarded it only as a functional, mechanical process. This was the 9th Circuit Court of Appeals, which also appeals from Apple would land, already held in the so-called Amber Case 1999th

The mathematician Daniel J. Bernstein had in 1990 an encryption method names “Snuffle” developed and written an application to do so. When he wanted to offer his work overseas, the US State Department Snuffle declared war material for which applies an export ban. The 9th Circuit Court of Appeals concluded that the source code of the program is a form of scientific expression that could not restrict the government. However, that is not generally for any kind of software. In each case, the court must decide whether a software is protected by the First Amendment, and if so, how far that protection goes. (nb)

LikeTweet

Monitoring software for Egypt – Heise Newsticker



According to a report by Privacy International to Hacking Team and
 have supplied Nokia software and hardware of the Egyptian intelligence service.

The human rights organization Privacy International has released a report (PDF file), consequently supplied the Italian firm Hacking Team in 2015 monitoring software to Egypt Has. Nokia is accused in the report to have come in 2011, a network for government communication in times of crisis. While Nokia denies the view, justified at Hacking Team’s spokesman Eric Rabe the deal: Egypt is a country which Europe also sell warplanes

According to the 20-page report by Privacy International there in Egypt a Technical. Research Department (TRD), which is headed by a woman with the code name “Layla” and the domestic intelligence service Mukhabarat Al-Al-Amm zuarbeitet. The TRD is therefore closely with two German-Egyptian company called Egyptian German Telecommunications Industries (EGTI) and Advanced German Technology (AGT) have collaborated who allegedly imported by 2015 in software and hardware to monitor the opposition. In addition, the TRD would have shopped in 2011 over EGTI, a joint venture between the former Nokia Siemens Network and an Egyptian State Holding, network technology to ensure the government communication independently of the public telephone network, according to the report.

In a letter to Privacy International confirmed Nokia, although the supply of components, but refers to an “inherited” equipment contract that Siemens had concluded in 2007 with the former Mubarak regime. After the completion of this contract you have entertained no further business to Egypt more. In the software that it looks from the now functioning again firm Hacking Team is different. Here defended company spokesman Eric Rabe selling software worth almost one million euros: “It is perfectly legal to run software to Egypt Egypt is an ally of the United States, many European countries and even from Israel … The use of.. monitoring software is for all of us in the fight against terror important “ (dWI)

LikeTweet

Opera Software announces “smart” browser – ZDNet.de

The Norwegian developer Opera Software has launched a new browser project. There Aim to change the basics of how a browser is used, said CEO Lars Boilesen on the Mobile World Congress in an interview with CNET.com. The development has been running since the end of 2015, the release of a first version is for the current year geplant.

‘);}googletag.cmd.push(function(){googletag.display(“div-gpt-ad-DESKTOP_IN_ARTICLE-0″);});document.write(‘

‘);}})(jQuery);

 Opera CEO Lars Boilesen at MWC 2013 (picture: News.com) Opera CEO Lars Boilesen on the MWC 2013 (picture: News.com) “I want to add additional smart features” Boilesen said. For example, should the browser automatically can detect whether the user is reading messages, emails gets or is in a social network on the go, and to offer appropriate functions. “When you’re in an online store, you get way as shown Recommended” Boilesen gives a concrete example. “We try to predict.”

For the name of the project, its director, Opera’s chief technology officer Håkon Wium Lie, would not express in Barcelona. “I call it Opera smart, but he likes not the name” Boilesen said. Lie said then that there were already too many projects and products with “smart” in the name.

Opera was one of the browser pioneers who challenged Microsoft’s Internet Explorer and evolving slowly browser from a boring technique for foundation all new, exciting ideas made – of Google Maps to Facebook . Its software is distinguished for a long time through innovative features and its own engine called Presto. The latter, however, the company announced in 2013 in favor of Google’s WebKit-Fork Blink on.

Today, browser games, especially on mobile devices, in view of apps on the many functions can be displayed without going through a Web site, only a minor Role. Most users stick to the big names like Google Chrome , Microsoft Internet Explorer Apple Safari and Mozilla Firefox. According to figures from NetApplications Opera comes only to a level of 0.64 percent.

 The new Opera logo (image: Opera software) recently, however, again some challengers have found who want to compete with the incumbent browser vendors. These include Brave Mozilla co-founder Brendan Eich, Vivaldi by former Opera CEO Jon von Tetzchner, the Yandex Browser from Google’s biggest rival Russia and UCWeb, a acquired from the Chinese Internet company Alibaba Mobile browser. Even Microsoft tried Internet Explorer users to move to switch to its Windows 10 browser Edge.

After its share of the browser market shrank and remained the mobile advertising business below expectations, had Opera Software to print its begun shareholders in August 2015 in order to look for a buyer. This was eventually found in the form of a Chinese consortium, which provides between 1.2 billion for all company shares. Its members include among others the online games developer Kunlun tech and security vendors Qihoo 360th Even the approval by the shareholders and the Chinese regulatory authorities is pending. According Boilesen previously next to the supervisory board about 35 percent of shareholders approved the deal. The management have been doing no big say because it does not possess a lot of play.

The sale would open Opera’s mobile advertising business for 500 million new users in China, may use the then Opera browser. Currently placed him world about 350 million people, which most of the speed-optimized mini version that works on smartphones and simple on slow networks.

[with material by Stephen Shankland, CNET.com]

Tip: Are you familiar with browsers? Test your knowledge – with 15 questions on ITespresso.de

.

LikeTweet

US overseer: carmakers fear exhaust fraud via software – Autohaus

The uncertainty among automakers is large. Some monitor internally continuously the limits of allowed software to make any mistakes.

The fear of illegal software like Volkswagen diesel vehicles is according to the US Environmental overseers not uncommon in the industry. “Two manufacturers, whose names I can not name, are approached me and explained to me how they try internally to prevent such situations, and has been for 25 years”, the Secretary of State for Transport and Air Quality said in the US Environmental Protection Agency , Christopher Grundler, the “Handelsblatt” (Friday). The EPA had the VW exhaust scandal around the forbidden engine programming ( “defeat device”) with uncovered.

Grundler said, one of the automakers have a committee which limits the allowable software on guard during the development phase of the motors. “Another producer told me that he shouldered his staff every year and every software developer carries a laminated card in his breast pocket, on the definition of ‘defeat device’ is what is allowed and what is not.”

In addition, announced the chief environmental overseer of the US auto industry that the EPA would cooperate more with international colleagues from other authorities: “It is my intention to create a global network of regulators to share information and us exchange. ” In the spring should a top-level meeting at the EPA take place, to which European authorities are invited.

To the still unclear recall plan for the VW diesels almost 600,000 affected in the US said Grundler: “We insist that the repair is durable and has no impact on the owners of vehicles What we say. now for five months. ” (Dpa)

LikeTweet

Friday, February 26, 2016

Tried: editing and archiving software DVR-Studio HD – FAZ – Frankfurter Allgemeine Zeitung

mediatheques out video portals ago – all online offerings despite there she still, the hunter-gatherers among television viewers. Why not? If theme days bring the complete works of Alfred Hitchcock or Alain Delon, the true cineaste makes a tick on the calendar and intersects with, and on the hard disk in the set top box threatens overcrowding. But what do you do with all those digital treasures? We propose: create order and archive the collected works on NAS hard drives or optical disks. There is an unprecedented tool: the cut and archiving software DVR Studio HD Ralf Haenlein. We know this running under Windows tool for many years, and because it is now available in a new, 4:03 that version, we have again looked more closely.

The DVR-Studio comes with all kinds of renditions deal in which digital receivers write the data streams of television on a hard drive. This is not self-evident: Some devices draw the DVB channels transmitted MPEG transport streams unchanged at (typical file extension: .TS), some package them into other container formats, for example in MPEG program streams (file extension .mpg), while others divide the videos in file segments.

advertising with image analysis cut out

But the DVR-Studio takes the videos as they come, and it is not difficult in the choice of interfaces. Virtually all set-top boxes, which somehow can connect to the PC via the home network (which includes a number of models of Technisat, Humax, Kathrein, Vantage, Dream Multimedia and other brands), learn from Haenlein program the necessary support. But the software also accepts files that originate from a connected set-top box or a TV USB HDD. The only condition: The records must be unencrypted. File segments adds the DVR-Studio seamlessly

A playback window in the middle of the program’s user interface supports navigation through the images. with various shortcut keys and the scroll wheel mouse succeed the handling of images and the Setting of cut marks as nimble as frame accuracy. Applies to advertising blocks cut out, so you can rely on in the new program version significantly improved image analysis: It recognizes the commercial breaks now reliable and can set automatic cut marks

relief for hard drive thanks to UPnP

<. p> also interesting are the improved possibilities for batch processing. The software can execute many shots automatically in sequence, and more recently the thing works particularly comfortable thanks to the support of the protocol UPnP, the program automatically detects all set-top boxes in the home network that have a corresponding server function. In one window, all shots of the receiving device, respectively; you can just download it to your work computer, and even if the first film is transferred, it can be edited. During the download process, the software will do the same fault and advertising analysis, that starts with not only, as before, when the whole film is on the computer. This relieves the hard drive and allows smoother navigating.

More about

In the last step of the post, the video taking very different forms, without any loss of quality. If you like, it burns directly to optical media -. Either on DVD or Bluray Disc Matching menus, the program offers to choose from. The conversion of HD recording in the standard resolution for a conventional DVD video is in the new program version also possible but the software can also be image files from Blurays or DVD -. For playback on a computer or for later burning

As an alternative, it offers the processing of edited videos to transport streams on, can be played with software players on PC; the multiplex formats .TS and .M2TS (the latter are also integrated into the video folder of Bluray discs) are available. And finally: Many set-top boxes, the finished cut videos via a network connection and copy it back to your hard drive again. The DVR-Studio she served in each matching data format. So this versatile program is located, with a price of 79.90 euros even-effective tool for all collectors and archivists.

LikeTweet

US overseer: Other carmakers fear exhaust scams via software – ABC Online

Friday , 02.26.2016, 11:15
Thank you for rating!

0

Report Error
You have an error found?

Please select the relevant words in the text. With just two clicks you report the error of the editors.

Fear of an illegal software as in Volkswagen’s diesel vehicles is according to the US environmental overseers not uncommon in the industry.

“Two manufacturers, whose names I can not name, are approached me and have told me how they try internally to prevent such situations, and has been for 25 years, “said the Secretary of State for transport and air quality in the US environmental Protection agency, Christopher Grundler, the” Handelsblatt “(Friday). The EPA had the VW exhaust scandal around the forbidden engine programming ( “defeat device”) with uncovered.

Grundler said, one of the automakers have a committee which limits the allowable software during the development phase of the engines oversee. “Another producer told me that he his staff trained every year and every software developer carries a laminated card in his breast pocket, on the definition of” defeat device “is what is allowed and what is not.”

In addition, the top environmental overseer of the uS auto industry announced that the EPA would cooperate more with international colleagues from other authorities: “It is my intention to create a global network of regulators to share information and exchange ideas.” In spring was to be held a summit meeting with the EPA, which also includes European authorities are invited

to the still unclear recall plan for the US nearly 600 000. concerned VW diesels said Grundler:. “We insist that the repair is durable and has no impact on the owners of vehicles. What we say now for five months. “

 

Thank you for rating!

0

LikeTweet

Thursday, February 25, 2016

BlackBerry builds software business with companies – General-Anzeiger

02.25.2016 Barcelona Barcelona (dpa) -. The Canadian smartphone pioneer BlackBerry aimed amid weak sales its mobile phones even more in the software business with companies. The company has announced the acquisition of the British company Encription known.

The Canadian smartphone pioneer BlackBerry aimed amid weak sales of its mobile phones even more on the software business with companies. The company has announced the acquisition of the British company Encription known.

Encription specializes in advising on cyber security. In the new BlackBerry range around 60 employees are to work, in charge of the operational business manager Marty Beard said at the Mobile World Congress in Barcelona.

Blackberry had with its own operating system last, according to market researchers, only a fraction 0.2 percent of the smartphone business. After a first Android phone CEO John Chen did not rule out that BlackBerry could also completely change to Google’s system. It sets priority on software for IT security in companies. All current applications would develop the same for different platforms, said Beard. BlackBerry aspires to a strong position in secure networking technology in the Internet of Things, including the health sector and in cars. (Dpa)

LikeTweet

Apple CEO Cook vs. FBI: Software such as cancer, bad for America – Bayerischer Rundfunk

Anyone who knows Tim Cook of the well-rehearsed Apple product shows, could be surprised at how open he responded to the interviewer’s questions: whether he had ever thought to be at the center of such a crucial national debate asked David Muir. Tim Cook’s response:. No – and this is a very uncomfortable situation for Apple

Software on terror

It was Tim Cook’s first interview since it was revealed, that a California court has asked Apple to operate the FBI to write software, the investigators want to decrypt the iPhone one of the two assassins of San Bernardino. The FBI hopes to find in the phone additional information about the background of the fact – and perhaps evidence of further planned attacks or terrorist contacts the assassin. But with such software could easily overturn the numeric code which is intended to protect the contents of the iPhone.

“34” “We believe this is a very dangerous hour When the evil of this world knew that something exists -. all would want it this could penetrate into each iPhone. – something should not be created. “

Apple CEO Tim Cook

A software such as cancer

Tim Cook compared the software with cancer because they spread quickly and cause great harm could. The FBI argued against, were merely concerned with a single phone that a terrorist – and to possible further information related to the largest terrorist attack on American soil since September 11, 2001. Tim Cook countered Apple naturally protect not terrorists but the safety of its customers:

“In this case, it is not about a single phone. it is a question whether the government may force Apple to write software that would endanger the safety of hundreds of millions of customers around the world and trample on civil rights, which are the foundation of this country. “

Apple CEO Tim Cook

These are amazing words of criticism by American standards. Tim Cook sees a precedent for similar, further objectives of the Government. “If we, a court can force you to write this software, what they want next from us? An operating system for monitoring, in which the investigators can turn on the camera? I do not know where it all stops. But I know it should not happen in this country, “says Cook.

majority of the US population supports FBI

Cook tried the classic American values ​​to for Apple’s attitude advertise. He said that if Apple write the software, is the “bad for America”. Surveys show that at least half of his countrymen rather supports the side of the FBI. However, one must see that the subject is extremely complex and is often in the news very shortened or even misrepresented the possibility. Apple wants to bring the case, if necessary, until the highest American court. Tim Cook will present his arguments President Obama. It feels to no good, he said, contradicting their own government – and, moreover, in a case where Apple is insets for civil rights, which nevertheless actually should defend the government. This is a paradox.

LikeTweet

Tim Cook: “FBI’s Backdoor is the software equivalent of cancer” – Macerkopf – Apple News from Cupertino



"2016-02-25T08: 55: 58 + 01: 00" pubdate = "pubdate"> 25th February 2016 | 8:55 | 0 Comments

The dispute between Apple and the FBI are in full swing. The US investigating authority requires Apple, the manufacturer of Cupertino develop a custom iOS software so iPhones can be cracked under an investigation. However, Apple refuses and wants to protect the privacy of its customers. On the night of today Apple CEO Tim Cook ABC News gave an interview.

 abc_news_interview_cook

In the interview with David Muir explains Apple CEO’s attitude his Untenehmen to reject and to install no backdoor in iOS devices the demand of FBI’s. He goes on many other aspects that Apple has made known a few days ago with an open letter.

As Cook indicating wants the FBI to use software, with a brute force attack the passcode of the ” San Bernardino “-iPhone cracks. This is the software equivalent of cancer and würe hundreds of millions of Apple customers expose a risk

The only way to get information -. At least currently, the only way we know – would be to write a piece of software did we view as sort of the software equivalent of cancer. We think it’s bad news to write. We would never write it. We have never written it. And that is what is at stake here.

The demand of the FBI would lead to a precedent that weakens the software encryption. “If this court force to develop this software, imagine times to what they still could force us everything,” said Cook. “I do not know where this will end. I am of the opinion that this should not happen in this country. “

The Apple chief also stressed that his Untenehemn cooperating with the FBI and has provided all information ready. Cook would have appreciated it if the FBI at Apple had appealed before the AppleID password has been changed. So one could possibly. Can get at a younger Backuo. Apple heard from the press that the FBI has obtained a court order against Apple.



“We gave everything we had. We do not know thatthere’s any information on the phone. We do not know Whether there is or there is not. And the FBI does not know. What we do know is we passed all of the information did we have on the phone and to get additional information on it or at least what the FBI would like us to do now would expose dog reds of millions of people to issues. “

Cook explained that it is not just a smartphone, but the devices of all customers. If Apple would know a way to pass on only the information of a single device and not to bring hundreds-million customers in danger, it would Apple do

. – – Will you always be “up to date” when it comes to Apple news in the future? Then just follow us on Twitter or click the “like” button on the Macerkopf Facebook page. Of course, there may also be +1 for Google+. In App.net we are also represented. —

LikeTweet

Wednesday, February 24, 2016

IBM is working on software to distinguish refugees from terrorists – Gulli

The arrival of refugees from crisis areas to Germany and to other countries brings some problems. This also means that there is the possibility that terrorists could mix with these people in need, and then enter unnoticed.



Software should be able to distinguish terrorists from refugees

has the technology company IBM is reportedly developed a software with which you can sort on the border terrorists. According to a report by Defense One IBM software called i2 EIA is to collect information from various sources about the entering the country and on the basis of this is a kind of profile of the person created. So should be able to quickly recognize whether it is a really seeking help refugee or a terrorist in persons. As sources for the profile function on the one hand, the information provided by the refugees during the registration and data from their papers. All this is compared with a database in which various data sources together. Including about newspaper articles, texts from the Internet and information from sources such as underground markets, on which you can buy some fake IDs.

Out of all the data, a value is determined on the one at the border directly entry people could refuse. However, the software is still highly questionable, since all information is based on circumstantial evidence and it is actually no ironclad evidence is that someone is really a terrorist. If the software really be used, then many people would be screened out determines who are not terrorists. The final decision should always lie with the people who can use the software, and then determine whether someone is entitled to travel or not.

Allegedly already pushed the software on the interest of a Member State of the EU. It is contemplated, i2 EIA actually use … / from

LikeTweet

Police in Hesse cautions: Caution: Alleged candidate mails contain … – Frankfurter Neue Presse

With new methods try swindler with so-called ransomware to arrive at a “ransom”. In a new series, which particularly affected several companies in the area of ​​casting, the crooks sent their emails to companies who were looking for job mails. The fraudsters had provided the attachment of electronic mail with a malicious software. The aim was apparently to ask later for decryption or unblocking a sum of money.

“ransomware” there are programs that allow the perpetrators to encrypt data on the foreign computers or block. The perpetrators effectively acting mostly from abroad. So far, the letter fell on the fact that they were written in rather bad German.

For now reported cases has been found that the fraudsters apparently use a new and more suitable translation program. This and a now well matched optics suggested the victim that the emails obviously are “real”.

In the cases here last displayed reported the company employees that after the opening of the “Application” initially only times did nothing. After a prolonged period of time then all data on the company computers were encrypted with the ending “.trun”. To decrypt the PC again, the employees were asked to contact a certain address ending in “.ru”

This and other calls came fortunately nobody after., States in the Hesse police. Just last week, had been warned of the blackmailer virus “Locky”, which had paralyzed in Germany within hours thousands of computers.

Computer owners m & # xFC; watch lows: A blackmailer software called & quot; Locky & quot; spreading the hour rapidly in power.
computer owners, take note Trojans “Locky” locks PC – uncrackable

nightmare of all computer owners: A trojan spreads rapidly to an hour in the network – even with us! The ransomware encrypts files on the PC – uncrackable. The first German authority is already paralyzed.

clearing


Police warns because of the new ads from such emails and following tips:

– Do not open attachments from unknown – If in doubt at the sender to

-. Keep your system and installed programs, with regular updates and a virus program up to date. ” / p>

– If you are concerned, pay in no case the amount claimed. then a payment does not lead to activation of the computer

-. The data can be recovered usually by a specialist

-. If you are affected, inform the Police. Directions please contact the Criminal Investigation Department in Giessen on the phone 0641/7006 2555th

LikeTweet