cross pond high tech
159.8K views | +6 today
Follow
cross pond high tech
light views on high tech in both Europe and US
Your new post is loading...
Your new post is loading...
Scooped by Philippe J DEWOST
Scoop.it!

LG appears to pull out of money-losing smartphone business

LG appears to pull out of money-losing smartphone business | cross pond high tech | Scoop.it

LG Electronics appears to have decided to pull out of its money-losing smartphone business and entered into a transition process to relocate its mobile communications employees to other business units.

After suffering operating losses since 2015, LG attempted recently to sell its mobile communications unit, which oversees the smartphone business. The company has reportedly been in negotiations with various interested buyers, including Vietnam's Vingroup, but failed to reach an agreement with any of them.

LG Electronics has considered selling parts of its operations or pulling out of the smartphone business altogether. But it decided recently to pull out of the smartphone business altogether.

"LG has considered various options such as a sale, split sales or pulling out of the smartphone business, but decided recently to pull out of the business," according to industry sources, Thursday, adding that the company will make an official announcement at its board meeting on April 5.

When asked to address such prospects, an LG Electronics official said, "There's nothing to comment on."

"All we can say is that every possibility is open. Although we cannot confirm that right now, we will announce the specific direction of our mobile communications business," the official said.

The possibility of LG pulling out of the smartphone business surfaced in January when LG Electronics CEO Kwon Bong-seok acknowledged that the company was reviewing the direction of its mobile communications business with all possibilities open.

Industry watchers expected an official comment from the company at its shareholders' meeting on March 24, but its Chief Financial Officer Bae Doo-yong only reiterated the company's aforementioned position that "all possibilities remain open."

While the company has struggled with the smartphone business, LG's stock value has been reevaluated with soaring demand for its cutting-edge home appliances and TVs, as consumers have spent an increasing amount of time at home due to the COVID-19 pandemic.

Furthermore, LG has been expanding its presence gradually in emerging sectors such as electric vehicles (EVs) and vehicle components. Last December, the company announced the establishment of a joint venture with automotive parts maker Magna International to manufacture electric motors, inverters and onboard chargers used in EVs.

Magna had been involved in Apple's EV-manufacturing business under Project Titan. The announcement drove LG Electronics shares to their 30 percent daily limit on the day the news broke as investors hoped the joint venture could potentially join Apple's EV business. The iPhone maker announced recently that it plans to roll out its first EVs in 2024 or later.

Although LG has not made any comments regarding the joint venture's participation in the manufacture of Apple's EVs, Magna International CEO Swamy Kotagiri said at a recent automotive association event that the company is ready to produce vehicles for Apple or any other carmaker. The CEO added that Magna is willing to expand its manufacturing plant if necessary to manufacture Apple-designed cars.

Philippe J DEWOST's insight:

Life is (no longer) Good ...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple emprunte à son tour la "Verticale du Fou" et abandonne Intel.

Apple emprunte à son tour la "Verticale du Fou" et abandonne Intel. | cross pond high tech | Scoop.it

Apple emprunte à son tour la "Verticale du Fou" et abandonne Intel. 3 fois plus performant par Watt dissipé, le processeur "maison" #M1 — annoncé le 10 Novembre dernier — semble confirmer à quel point l'architecture #ARM a réussi à rattraper puis à dépasser l'architecture #X86 du géant de Santa Clara.

Les 16 milliards de transistors du M1 sont en effet gravés en 5 nanomètres, là où Intel ne parvient toujours pas à maîtriser ni 10 ni 7 nanos.

Un excellent article de Tom's #Hardware montre l'étendue de la menace qui pèse désormais sur Intel ; ce n'est pas tant la part de marché du Mac (à peine 9%) que celle de ses développeurs (30%) qui vont de plus en plus exclusivement basculer dans l'architecture ARM.

Philippe J DEWOST's insight:

L'intégration verticale est la tendance "Tech" du moment...

No comment yet.
Rescooped by Philippe J DEWOST from pixels and pictures
Scoop.it!

With Computational Photography, 95% of what you shoot is no longer captured but generated

With Computational Photography, 95% of what you shoot is no longer captured but generated | cross pond high tech | Scoop.it

Capturing light is becoming a thing of the past : with computational photography it is now eclipsed by processing pixels.
iPhone 11 and its « Deep Fusion » mode leave no doubt that photography is now software and that software is also eating cameras.

Philippe J DEWOST's insight:

Software is eating the world, and yesterday's Apple keynote shows that cameras are in the menu.

Philippe J DEWOST's curator insight, September 11, 2019 5:52 AM

Software is eating the world, and yesterday's Apple keynote shows that cameras are in the menu.

Scooped by Philippe J DEWOST
Scoop.it!

Leadership - Adrian Perica

Leadership - Adrian Perica | cross pond high tech | Scoop.it

As noticed by Bloomberg,

" Apple Inc. on Wednesday added mergers and acquisitions head Adrian Perica to its executive leadership page online, a promotion that suggests the technology giant is more focused on deals.

Perica joined Apple in 2009 and was instrumental in deals such as the 2014 purchase of Beats and the investment in China-based ride hailing service Didi Chuxing. He’s an under-the-radar operator who oversees the acquisition and integration of companies that Apple acquires as well as strategic investments.

Apple’s website describes Perica as the vice president of corporate development and lists him as reporting directly to Chief Executive Officer Tim Cook. That title is old, but reporting to the CEO is a move up in the company’s hierarchy. Previously, Chief Financial Officer Luca Maestri oversaw M&A.

The change comes as some Wall Street analysts are calling for Apple to consider larger acquisitions than it has in the past. Apple bought 18 companies in 2018, with none of them crossing the billion-dollar threshold.

"Cook knows it is time to get the deal engine ready," said Dan Ives, an analyst at Wedbush Securities, who has predicted that Apple will do a major media acquisition this year.

"They have to accelerate non-existent M&A going forward as we believe they can spend up to $100 billion on M&A over the next few years," Ives added. "Cook is taking much more oversight of deals and retail, and this is just another tea leaf."

An Apple spokesperson didn’t respond to a request for comment.

Perica is now one of fewer than 20 executives who report directly to the CEO. That group includes Chief Operating Officer Jeff Williams, Chief Design Officer Jony Ive and Maestri. Mike Fenger and Doug Beck, sales vice presidents, report to Cook despite not being featured on Apple’s executive leadership website."

-- https://www.bloomberg.com/news/articles/2019-04-03/apple-m-a-chief-now-reporting-to-cook-as-calls-grow-for-big-deal

Philippe J DEWOST's insight:

imsense was one of the first deals lead by Adrian Perica. We met a couple of times through the acquisition process and I was impressed with the way he handled the asymmetry of the transaction. 9 years laters, it seems that time has come for him to shoot big.

( What Bloomberg does not outline is why Adrian was hired by Steve Jobs from Goldman Sachs : at the time there was no organized M&A structure nor process and business chiefs were operating on an ad hoc manner, leading to missing the $750 M AdMob acquisition to Google -- more at http://bit.ly/adrian-perica-apple )

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple blocked Facebook then Google from running their internal iOS apps

Apple blocked Facebook then Google from running their internal iOS apps | cross pond high tech | Scoop.it

Apple shut down Google’s ability to distribute its internal iOS apps earlier today. A person familiar with the situation told The Verge that early versions of Google Maps, Hangouts, Gmail, and other pre-release beta apps stopped working alongside employee-only apps like a Gbus app for transportation and Google’s internal cafe app. The block came after Google was found to be in violation of Apple’s app distribution policy, and followed a similar shutdown that was issued to Facebook earlier this week.

TechCrunch and Bloomberg’s Mark Bergen reported late Thursday that the apps’ functionality had been restored; Apple appears to have worked more closely with Google to fix this situation. “We are working together with Google to help them reinstate their enterprise certificates very quickly,” an Apple spokesperson earlier told BuzzFeed.

APPLE BLOCKED FACEBOOK AND THEN GOOGLE
Apple’s move to block Google’s developer certificate comes just a day after Google disabled its Screenwise Meter app following press coverage. Google’s private app was designed to monitor how people use their iPhones, similar to Facebook’s research app. Google’s app also relied on Apple’s enterprise program, which enables the distribution of internal apps within a company.

In an earlier statement over Facebook’s certificate removal, Apple did warn that “any developer using their enterprise certificates to distribute apps to consumers will have their certificates revoked.” Facebook’s internal iOS apps have since resumed functioning, as the social network said this afternoon that Apple had restored its enterprise certificate.

Apple is clearly sticking to its rules and applying them equally to Facebook, Google, and likely many other companies that get caught breaking Apple’s rules in the future.

There’s growing evidence that a number of companies are using Apple’s enterprise program to distribute apps to consumers. iOS developer Alex Fajkowski has discovered that Amazon, DoorDash, and Sonos all distribute beta versions of their apps to non-employees. Apple may be forced to take action against these apps, or to even revamp its entire enterprise program in the future.

Update 1/31, 5:45PM ET: Article updated with comment from Google, Apple, and details on other companies using Apple’s enterprise program to distribute apps.

Update 1/31: 6:18PM ET: Updated with the news that Apple has resumed letting Facebook use internal iOS apps.

Update 1/31: 10:30PM ET: Updated with the news that Apple has restored functionality to Google’s apps.

Philippe J DEWOST's insight:

Apple sends Facebook and Google a real, serious warning when it comes to mixing enterprise and consumer iOS app deployment.

May this be the next step in Apple's crusade against "the consumer is the product" giant proponents ?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple Developing Modem as Chip Efforts Expand

Apple Developing Modem as Chip Efforts Expand | cross pond high tech | Scoop.it
For some time, Apple has been serious about building more wireless components for its own devices, putting its own Bluetooth and Wi-Fi chips into the latest Apple Watches and AirPod earbuds.

 

Now Apple has provided the clearest evidence yet that it is working on one of the most complicated and expensive hardware ingredients in its devices: a cellular modem. In a job listing posted a week ago, which hasn’t previously been reported, the company said it is looking for a cellular modem systems architect to work in its San Diego office.

 

And a person briefed on Apple’s plans confirmed that the company, indeed, has an an active project to build its own cellular modem chip, which connects Apple’s phones to the networks of wireless carriers. Due to the complexity of the chip, it could take Apple as long as three years to ship iPhones with them, analysts said.

Philippe J DEWOST's insight:

Apple's vertical integration continues as its hardware efforts intensify #HardwareIsNotDead

No comment yet.
Rescooped by Philippe J DEWOST from Digital Sovereignty & Cyber Security
Scoop.it!

Supermicro stock fell 50 percent after a bombshell Bloomberg report on How China Used a Tiny Chip to Infiltrate nearly 30 U.S. Companies

Supermicro stock fell 50 percent after a bombshell Bloomberg report on How China Used a Tiny Chip to Infiltrate nearly 30 U.S. Companies | cross pond high tech | Scoop.it

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

(from Bloomberg Business Week through Clément Epié)

-----------How the Hack Worked, According to U.S. Officials

① A Chinese military unit designed and manufactured microchips as small as a sharpened pencil tip. Some of the chips were built to look like signal conditioning couplers, and they incorporated memory, networking capability, and sufficient processing power for an attack.

② The microchips were inserted at Chinese factories that supplied Supermicro, one of the world’s biggest sellers of server motherboards.

③ The compromised motherboards were built into servers assembled by Supermicro.

④ The sabotaged servers made their way inside data centers operated by dozens of companies.

⑤ When a server was installed and switched on, the microchip altered the operating system’s core so it could accept modifications. The chip could also contact computers controlled by the attackers in search of further instructions and code.
-------------------------------------------

"In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA.

To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China.

This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.

There are two ways for spies to alter the guts of computer equipment. One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs. Still, to actually accomplish a seeding attack would mean developing a deep understanding of a product’s design, manipulating components at the factory, and ensuring that the doctored devices made it through the global logistics chain to the desired location—a feat akin to throwing a stick in the Yangtze River upstream from Shanghai and ensuring that it washes ashore in Seattle. “Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a hardware hacker and the founder of Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s almost treated like black magic.”

But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies.

One official says investigators found that it eventually affected almost 30 companies, including a major bank, government contractors, and the world’s most valuable company, Apple Inc. Apple was an important Supermicro customer and had planned to order more than 30,000 of its servers in two years for a new global network of data centers. Three senior insiders at Apple say that in the summer of 2015, it, too, found malicious chips on Supermicro motherboards. Apple severed ties with Supermicro the following year, for what it described as unrelated reasons.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting. “It’s untrue that AWS knew about a supply chain compromise, an issue with malicious chips, or hardware modifications when acquiring Elemental,” Amazon wrote. “On this we can be very clear: Apple has never found malicious chips, ‘hardware manipulations’ or vulnerabilities purposely planted in any server,” Apple wrote. “We remain unaware of any such investigation,” wrote a spokesman for Supermicro, Perry Hayes. The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

The companies’ denials are countered by six current and former senior national security officials, who—in conversations that began during the Obama administration and continued under the Trump administration—detailed the discovery of the chips and the government’s investigation. One of those officials and two people inside AWS provided extensive information on how the attack played out at Elemental and Amazon; the official and one of the insiders also described Amazon’s cooperation with the government investigation. In addition to the three Apple insiders, four of the six U.S. officials confirmed that Apple was a victim. In all, 17 people confirmed the manipulation of Supermicro’s hardware and other elements of the attacks. The sources were granted anonymity because of the sensitive, and in some cases classified, nature of the information.

One government official says China’s goal was long-term access to high-value corporate secrets and sensitive government networks. No consumer data is known to have been stolen.

The ramifications of the attack continue to play out. The Trump administration has made computer and networking hardware, including motherboards, a focus of its latest round of trade sanctions against China, and White House officials have made it clear they think companies will begin shifting their supply chains to other countries as a result. Such a shift might assuage officials who have been warning for years about the security of the supply chain—even though they’ve never disclosed a major reason for their concerns.

Back in 2006, three engineers in Oregon had a clever idea. Demand for mobile video was about to explode, and they predicted that broadcasters would be desperate to transform programs designed to fit TV screens into the various formats needed for viewing on smartphones, laptops, and other devices. To meet the anticipated demand, the engineers started Elemental Technologies, assembling what one former adviser to the company calls a genius team to write code that would adapt the superfast graphics chips being produced for high-end video-gaming machines. The resulting software dramatically reduced the time it took to process large video files. Elemental then loaded the software onto custom-built servers emblazoned with its leprechaun-green logos.

Elemental servers sold for as much as $100,000 each, at profit margins of as high as 70 percent, according to a former adviser to the company. Two of Elemental’s biggest early clients were the Mormon church, which used the technology to beam sermons to congregations around the world, and the adult film industry, which did not.

Elemental also started working with American spy agencies. In 2009 the company announced a development partnership with In-Q-Tel Inc., the CIA’s investment arm, a deal that paved the way for Elemental servers to be used in national security missions across the U.S. government. Public documents, including the company’s own promotional materials, show that the servers have been used inside Department of Defense data centers to process drone and surveillance-camera footage, on Navy warships to transmit feeds of airborne missions, and inside government buildings to enable secure videoconferencing. NASA, both houses of Congress, and the Department of Homeland Security have also been customers. This portfolio made Elemental a target for foreign adversaries.

Supermicro had been an obvious choice to build Elemental’s servers. Headquartered north of San Jose’s airport, up a smoggy stretch of Interstate 880, the company was founded by Charles Liang, a Taiwanese engineer who attended graduate school in Texas and then moved west to start Supermicro with his wife in 1993. Silicon Valley was then embracing outsourcing, forging a pathway from Taiwanese, and later Chinese, factories to American consumers, and Liang added a comforting advantage: Supermicro’s motherboards would be engineered mostly in San Jose, close to the company’s biggest clients, even if the products were manufactured overseas.

Today, Supermicro sells more server motherboards than almost anyone else. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems. Its motherboards can be found in made-to-order server setups at banks, hedge funds, cloud computing providers, and web-hosting services, among other places. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China.

The company’s pitch to customers hinges on unmatched customization, made possible by hundreds of full-time engineers and a catalog encompassing more than 600 designs. The majority of its workforce in San Jose is Taiwanese or Chinese, and Mandarin is the preferred language, with hanzi filling the whiteboards, according to six former employees. Chinese pastries are delivered every week, and many routine calls are done twice, once for English-only workers and again in Mandarin. The latter are more productive, according to people who’ve been on both. These overseas ties, especially the widespread use of Mandarin, would have made it easier for China to gain an understanding of Supermicro’s operations and potentially to infiltrate the company. (A U.S. official says the government’s probe is still examining whether spies were planted inside Supermicro or other American companies to aid the attack.)

With more than 900 customers in 100 countries by 2015, Supermicro offered inroads to a bountiful collection of sensitive targets. “Think of Supermicro as the Microsoft of the hardware world,” says a former U.S. intelligence official who’s studied Supermicro and its business model. “Attacking Supermicro motherboards is like attacking Windows. It’s like attacking the whole world.”

Well before evidence of the attack surfaced inside the networks of U.S. companies, American intelligence sources were reporting that China’s spies had plans to introduce malicious microchips into the supply chain. The sources weren’t specific, according to a person familiar with the information they provided, and millions of motherboards are shipped into the U.S. annually. But in the first half of 2014, a different person briefed on high-level discussions says, intelligence officials went to the White House with something more concrete: China’s military was preparing to insert the chips into Supermicro motherboards bound for U.S. companies.

The specificity of the information was remarkable, but so were the challenges it posed. Issuing a broad warning to Supermicro’s customers could have crippled the company, a major American hardware maker, and it wasn’t clear from the intelligence whom the operation was targeting or what its ultimate aims were. Plus, without confirmation that anyone had been attacked, the FBI was limited in how it could respond. The White House requested periodic updates as information came in, the person familiar with the discussions says.

Apple made its discovery of suspicious chips inside Supermicro servers around May 2015, after detecting odd network activity and firmware problems, according to a person familiar with the timeline. Two of the senior Apple insiders say the company reported the incident to the FBI but kept details about what it had detected tightly held, even internally. Government investigators were still chasing clues on their own when Amazon made its discovery and gave them access to sabotaged hardware, according to one U.S. official. This created an invaluable opportunity for intelligence agencies and the FBI—by then running a full investigation led by its cyber- and counterintelligence teams—to see what the chips looked like and how they worked.

The chips on Elemental servers were designed to be as inconspicuous as possible, according to one person who saw a detailed report prepared for Amazon by its third-party security contractor, as well as a second person who saw digital photos and X-ray images of the chips incorporated into a later report prepared by Amazon’s security team. Gray or off-white in color, they looked more like signal conditioning couplers, another common motherboard component, than microchips, and so they were unlikely to be detectable without specialized equipment. Depending on the board model, the chips varied slightly in size, suggesting that the attackers had supplied different factories with different batches.

Officials familiar with the investigation say the primary role of implants such as these is to open doors that other attackers can go through. “Hardware attacks are about access,” as one former senior official puts it. In simplified terms, the implants on Supermicro hardware manipulated the core operating instructions that tell the server what to do as data move across a motherboard, two people familiar with the chips’ operation say. This happened at a crucial moment, as small bits of the operating system were being stored in the board’s temporary memory en route to the server’s central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.

Since the implants were small, the amount of code they contained was small as well. But they were capable of doing two very important things: telling the device to communicate with one of several anonymous computers elsewhere on the internet that were loaded with more complex code; and preparing the device’s operating system to accept this new code. The illicit chips could do all this because they were connected to the baseboard management controller, a kind of superchip that administrators use to remotely log in to problematic servers, giving them access to the most sensitive code even on machines that have crashed or are turned off.

This system could let the attackers alter how the device functioned, line by line, however they wanted, leaving no one the wiser. To understand the power that would give them, take this hypothetical example: Somewhere in the Linux operating system, which runs in many servers, is code that authorizes a user by verifying a typed password against a stored encrypted one. An implanted chip can alter part of that code so the server won’t check for a password—and presto! A secure machine is open to any and all users. A chip can also steal encryption keys for secure communications, block security updates that would neutralize the attack, and open up new pathways to the internet. Should some anomaly be noticed, it would likely be cast as an unexplained oddity. “The hardware opens whatever door it wants,” says Joe FitzPatrick, founder of Hardware Security Resources LLC, a company that trains cybersecurity professionals in hardware hacking techniques.

U.S. officials had caught China experimenting with hardware tampering before, but they’d never seen anything of this scale and ambition. The security of the global technology supply chain had been compromised, even if consumers and most companies didn’t know it yet. What remained for investigators to learn was how the attackers had so thoroughly infiltrated Supermicro’s production process—and how many doors they’d opened into American targets.

Unlike software-based hacks, hardware manipulation creates a real-world trail. Components leave a wake of shipping manifests and invoices. Boards have serial numbers that trace to specific factories. To track the corrupted chips to their source, U.S. intelligence agencies began following Supermicro’s serpentine supply chain in reverse, a person briefed on evidence gathered during the probe says.

As recently as 2016, according to DigiTimes, a news site specializing in supply chain research, Supermicro had three primary manufacturers constructing its motherboards, two headquartered in Taiwan and one in Shanghai. When such suppliers are choked with big orders, they sometimes parcel out work to subcontractors. In order to get further down the trail, U.S. spy agencies drew on the prodigious tools at their disposal. They sifted through communications intercepts, tapped informants in Taiwan and China, even tracked key individuals through their phones, according to the person briefed on evidence gathered during the probe. Eventually, that person says, they traced the malicious chips to four subcontracting factories that had been building Supermicro motherboards for at least two years.

As the agents monitored interactions among Chinese officials, motherboard manufacturers, and middlemen, they glimpsed how the seeding process worked. In some cases, plant managers were approached by people who claimed to represent Supermicro or who held positions suggesting a connection to the government. The middlemen would request changes to the motherboards’ original designs, initially offering bribes in conjunction with their unusual requests. If that didn’t work, they threatened factory managers with inspections that could shut down their plants. Once arrangements were in place, the middlemen would organize delivery of the chips to the factories.

The investigators concluded that this intricate scheme was the work of a People’s Liberation Army unit specializing in hardware attacks, according to two people briefed on its activities. The existence of this group has never been revealed before, but one official says, “We’ve been tracking these guys for longer than we’d like to admit.” The unit is believed to focus on high-priority targets, including advanced commercial technology and the computers of rival militaries. In past attacks, it targeted the designs for high-performance computer chips and computing systems of large U.S. internet providers.

Provided details of Businessweek’s reporting, China’s Ministry of Foreign Affairs sent a statement that said “China is a resolute defender of cybersecurity.” The ministry added that in 2011, China proposed international guarantees on hardware security along with other members of the Shanghai Cooperation Organization, a regional security body. The statement concluded, “We hope parties make less gratuitous accusations and suspicions but conduct more constructive talk and collaboration so that we can work together in building a peaceful, safe, open, cooperative and orderly cyberspace.”

The Supermicro attack was on another order entirely from earlier episodes attributed to the PLA. It threatened to have reached a dizzying array of end users, with some vital ones in the mix. Apple, for its part, has used Supermicro hardware in its data centers sporadically for years, but the relationship intensified after 2013, when Apple acquired a startup called Topsy Labs, which created superfast technology for indexing and searching vast troves of internet content. By 2014, the startup was put to work building small data centers in or near major global cities. This project, known internally as Ledbelly, was designed to make the search function for Apple’s voice assistant, Siri, faster, according to the three senior Apple insiders.

Documents seen by Businessweek show that in 2014, Apple planned to order more than 6,000 Supermicro servers for installation in 17 locations, including Amsterdam, Chicago, Hong Kong, Los Angeles, New York, San Jose, Singapore, and Tokyo, plus 4,000 servers for its existing North Carolina and Oregon data centers. Those orders were supposed to double, to 20,000, by 2015. Ledbelly made Apple an important Supermicro customer at the exact same time the PLA was found to be manipulating the vendor’s hardware.

Project delays and early performance problems meant that around 7,000 Supermicro servers were humming in Apple’s network by the time the company’s security team found the added chips. Because Apple didn’t, according to a U.S. official, provide government investigators with access to its facilities or the tampered hardware, the extent of the attack there remained outside their view.

American investigators eventually figured out who else had been hit. Since the implanted chips were designed to ping anonymous computers on the internet for further instructions, operatives could hack those computers to identify others who’d been affected. Although the investigators couldn’t be sure they’d found every victim, a person familiar with the U.S. probe says they ultimately concluded that the number was almost 30 companies.

That left the question of whom to notify and how. U.S. officials had been warning for years that hardware made by two Chinese telecommunications giants, Huawei Corp. and ZTE Corp., was subject to Chinese government manipulation. (Both Huawei and ZTE have said no such tampering has occurred.) But a similar public alert regarding a U.S. company was out of the question. Instead, officials reached out to a small number of important Supermicro customers. One executive of a large web-hosting company says the message he took away from the exchange was clear: Supermicro’s hardware couldn’t be trusted. “That’s been the nudge to everyone—get that crap out,” the person says.

Amazon, for its part, began acquisition talks with an Elemental competitor, but according to one person familiar with Amazon’s deliberations, it reversed course in the summer of 2015 after learning that Elemental’s board was nearing a deal with another buyer. Amazon announced its acquisition of Elemental in September 2015, in a transaction whose value one person familiar with the deal places at $350 million. Multiple sources say that Amazon intended to move Elemental’s software to AWS’s cloud, whose chips, motherboards, and servers are typically designed in-house and built by factories that Amazon contracts from directly.

A notable exception was AWS’s data centers inside China, which were filled with Supermicro-built servers, according to two people with knowledge of AWS’s operations there. Mindful of the Elemental findings, Amazon’s security team conducted its own investigation into AWS’s Beijing facilities and found altered motherboards there as well, including more sophisticated designs than they’d previously encountered. In one case, the malicious chips were thin enough that they’d been embedded between the layers of fiberglass onto which the other components were attached, according to one person who saw pictures of the chips. That generation of chips was smaller than a sharpened pencil tip, the person says. (Amazon denies that AWS knew of servers found in China containing malicious chips.)

China has long been known to monitor banks, manufacturers, and ordinary citizens on its own soil, and the main customers of AWS’s China cloud were domestic companies or foreign entities with operations there. Still, the fact that the country appeared to be conducting those operations inside Amazon’s cloud presented the company with a Gordian knot. Its security team determined that it would be difficult to quietly remove the equipment and that, even if they could devise a way, doing so would alert the attackers that the chips had been found, according to a person familiar with the company’s probe. Instead, the team developed a method of monitoring the chips. In the ensuing months, they detected brief check-in communications between the attackers and the sabotaged servers but didn’t see any attempts to remove data. That likely meant either that the attackers were saving the chips for a later operation or that they’d infiltrated other parts of the network before the monitoring began. Neither possibility was reassuring.

When in 2016 the Chinese government was about to pass a new cybersecurity law—seen by many outside the country as a pretext to give authorities wider access to sensitive data—Amazon decided to act, the person familiar with the company’s probe says. In August it transferred operational control of its Beijing data center to its local partner, Beijing Sinnet, a move the companies said was needed to comply with the incoming law. The following November, Amazon sold the entire infrastructure to Beijing Sinnet for about $300 million. The person familiar with Amazon’s probe casts the sale as a choice to “hack off the diseased limb.”

As for Apple, one of the three senior insiders says that in the summer of 2015, a few weeks after it identified the malicious chips, the company started removing all Supermicro servers from its data centers, a process Apple referred to internally as “going to zero.” Every Supermicro server, all 7,000 or so, was replaced in a matter of weeks, the senior insider says. (Apple denies that any servers were removed.) In 2016, Apple informed Supermicro that it was severing their relationship entirely—a decision a spokesman for Apple ascribed in response to Businessweek’s questions to an unrelated and relatively minor security incident.

That August, Supermicro’s CEO, Liang, revealed that the company had lost two major customers. Although he didn’t name them, one was later identified in news reports as Apple. He blamed competition, but his explanation was vague. “When customers asked for lower price, our people did not respond quickly enough,” he said on a conference call with analysts. Hayes, the Supermicro spokesman, says the company has never been notified of the existence of malicious chips on its motherboards by either customers or U.S. law enforcement.

Concurrent with the illicit chips’ discovery in 2015 and the unfolding investigation, Supermicro has been plagued by an accounting problem, which the company characterizes as an issue related to the timing of certain revenue recognition. After missing two deadlines to file quarterly and annual reports required by regulators, Supermicro was delisted from the Nasdaq on Aug. 23 of this year. It marked an extraordinary stumble for a company whose annual revenue had risen sharply in the previous four years, from a reported $1.5 billion in 2014 to a projected $3.2 billion this year.

One Friday in late September 2015, President Barack Obama and Chinese President Xi Jinping appeared together at the White House for an hourlong press conference headlined by a landmark deal on cybersecurity. After months of negotiations, the U.S. had extracted from China a grand promise: It would no longer support the theft by hackers of U.S. intellectual property to benefit Chinese companies. Left out of those pronouncements, according to a person familiar with discussions among senior officials across the U.S. government, was the White House’s deep concern that China was willing to offer this concession because it was already developing far more advanced and surreptitious forms of hacking founded on its near monopoly of the technology supply chain.

In the weeks after the agreement was announced, the U.S. government quietly raised the alarm with several dozen tech executives and investors at a small, invite-only meeting in McLean, Va., organized by the Pentagon. According to someone who was present, Defense Department officials briefed the technologists on a recent attack and asked them to think about creating commercial products that could detect hardware implants. Attendees weren’t told the name of the hardware maker involved, but it was clear to at least some in the room that it was Supermicro, the person says.

The problem under discussion wasn’t just technological. It spoke to decisions made decades ago to send advanced production work to Southeast Asia. In the intervening years, low-cost Chinese manufacturing had come to underpin the business models of many of America’s largest technology companies. Early on, Apple, for instance, made many of its most sophisticated electronics domestically. Then in 1992, it closed a state-of-the-art plant for motherboard and computer assembly in Fremont, Calif., and sent much of that work overseas.

Over the decades, the security of the supply chain became an article of faith despite repeated warnings by Western officials. A belief formed that China was unlikely to jeopardize its position as workshop to the world by letting its spies meddle in its factories. That left the decision about where to build commercial systems resting largely on where capacity was greatest and cheapest. “You end up with a classic Satan’s bargain,” one former U.S. official says. “You can have less supply than you want and guarantee it’s secure, or you can have the supply you need, but there will be risk. Every organization has accepted the second proposition.”

In the three years since the briefing in McLean, no commercially viable way to detect attacks like the one on Supermicro’s motherboards has emerged—or has looked likely to emerge. Few companies have the resources of Apple and Amazon, and it took some luck even for them to spot the problem. “This stuff is at the cutting edge of the cutting edge, and there is no easy technological solution,” one of the people present in McLean says. “You have to invest in things that the world wants. You cannot invest in things that the world is not ready to accept yet.”

Bloomberg LP has been a Supermicro customer. According to a Bloomberg LP spokesperson, the company has found no evidence to suggest that it has been affected by the hardware issues raised in the article."

Philippe J DEWOST's insight:

Though the story is apparently still developing, a few conclusions may already be drawned :

 

1/ We (re)discover that China makes 90% of the world's PC

2/ As they learn fast and well, they gain not only understanding on how what they manufacture works, but also how to make it work differently by designing their own components (including processors in order to lower their dependency to Intel and US Tech)

3/ This revalidates that hardware design is a core industrial sovereignty constituent

4/ Europe has retreated very early from the field so we have absolutely no clue about what the technology we import actually does (beyond what it is supposed to do)

 

The only way out is to open source hardware and firmware excactly as it happened to Operating Systems. The proof that such option is viable came from Europe ; we need a Linus for hardware !

Philippe J DEWOST's curator insight, October 5, 2018 3:24 AM

Though the story is apparently still developing, a few conclusions may already be drawned :

 

1/ We (re)discover that China makes 90% of the world's PC

2/ As they learn fast and well, they gain not only understanding on how what they manufacture works, but also how to make it work differently by designing their own components (including processors in order to lower their dependency to Intel and US Tech)

3/ This revalidates that hardware design is a core industrial sovereignty constituent

4/ Europe has retreated very early from the field so we have absolutely no clue about what the technology we import actually does (beyond what it is supposed to do)

 

The only way out is to open source hardware and firmware excactly as it happened to Operating Systems. The proof that such option is viable came from Europe ; we need a Linus for hardware ! 

Scooped by Philippe J DEWOST
Scoop.it!

Apple confirms it uses Google cloud for iCloud

Apple confirms it uses Google cloud for iCloud | cross pond high tech | Scoop.it

A file that Apple updated on its website last month provides the first acknowledgment that it's relying on Google's public cloud for data storage for its iCloud services.

The disclosure is fresh evidence that Google's cloud has been picking up usage as it looks to catch up with Amazon and Microsoft in the cloud infrastructure business.

Some media outlets reported on Google's iCloud win in 2016, but Apple never provided confirmation.

Apple periodically publishes new versions of a PDF called the iOS Security Guide. For years the document contained language indicating that iCloud services were relying on remote data storage systems from Amazon Web Services, as well as Microsoft's Azure.

But in the latest version, the Microsoft Azure reference is gone, and in its place is Google Cloud Platform. Before the January update, Apple most recently updated the iOS Security Guide in March.

The latest update doesn't indicate whether Apple is using any Google cloud services other than core storage of "objects" like photos and videos. The document also doesn't make it clear when Apple started storing data in Google's cloud. Microsoft declined to comment. Apple didn't respond to a request for comment.

Philippe J DEWOST's insight:

Looks like there are no places left where Google is not, while remembering that the cloud means "my files on someone else's computer"...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Fiction: Who Killed Windows Phone?

Fiction: Who Killed Windows Phone? | cross pond high tech | Scoop.it

How could Microsoft’s Windows Phone licensing business model stand a chance against Google’s Free and Open Android? None of the Redmond giant’s complicated countermeasures worked, its smartphone platform is dead. And yet, inexplicably, Microsoft failed to use a very simple move, one we’ll explore today.

Just back from three weeks in the Country of Good Sin’s heartland, I see Microsoft’s fresh and well-received Fourth Quarter Fiscal Year 2017 Results. The numbers acknowledge what was already notorious: Windows Phone is dead.

“Phone revenue was immaterial and declined $361M.”

This doesn’t come as a surprise. Despite Microsoft’s strenuous efforts to breathe life into its smartphone platform and devices, Windows Phone had been on an inexorable downward slope for several years, confirming a Horace Dediu theorem[as always, edits and emphasis mine]:

“As far as I’ve been able to observe, any company in the mobile phone market that ended up losing money has never recovered its standing in terms of share or profit.”

Let’s recall that, in September 2010, Redmond employees held what CNET called a “tacky ‘funeral’” for iPhone and Blackberry. One wonders how they’ll memorialize Windows Phone.

The gross failure of what once was the most powerful and richest tech company on the planet led to a search for a platform killer. Detectives didn’t think they had to go far to nab a suspect: Android. Microsoft’s Windows Phone was murdered by Google’s smartphone OS. How could Redmond’s money-making software licensing business model survive against a free and open source platform? Case closed.

No so fast.

Microsoft’s smartphone troubles started well before the birth of Android. In a reversal of the famous dictum Victory Has Many Fathers But Defeat Is An Orphan, Windows Phone’s collapse seems to have had many progenitors deeply embedded in the company’s decades-old culture.

But before we look at facts, let’s engage in a bit of fiction, let’s imagine Microsoft decides to fight Android on Google’s turf. In this alternate reality, Microsoft easily kills Android with one simple headline:

Windows Phone Now Free

The rest of the pitch writes itself.

Philippe J DEWOST's insight:

"it's the culture, stupid" - Even if it is easier to explain the past than act in the present to shape or avoid a future, this excellent piece by JLG reminds us all of how blinding corporate culture can be. Remembering that, in 2007, Nokia was the star according to the famous MBA mantra known as the "BCG Matrix" (#1 with twice #2's market share in a 2-digit growing market), that everybody knew that handset design should be segmented, and that mobile handset manufacturing had required decades of mastership and could not be improvised by a consumer electronics newcomer...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

The iPhone Unsung Sine Qua Non

The iPhone Unsung Sine Qua Non | cross pond high tech | Scoop.it

The iPhone’s 10th birthday was a happy opportunity to look once again at Steve Jobs’ masterclass in storytelling and positioning, and to contemplate, with incredulous gratitude, the enormity of the consequences. As Horace Dediu, our nonpareil tech historian and poet, recently remarked with his trademark humor, The First Trillion Dollars is Always the Hardest [as always, edits and emphasis mine]:

“In its first 10 years, the iPhone will have sold at least 1.2 billion units, making it the most successful product of all time. The iPhone also enabled the iOS empire which includes the iPod touch, the iPad, the Apple Watch and Apple TV whose combined total unit sales will reach 1.75 billion units over 10 years. This total is likely to top 2 billion units by the end of 2018.

[…] iOS will have generated over $1 trillion in revenues for Apple sometime this year.

In addition, developers building apps for iOS have been paid $60 billion. The rate of payments has now reached $20 billion/yr.

No one saw it coming, Apple execs included. For their part, the high tech incumbents made many infelicitous statements, only to be steamrolled when the iPhone and, later, Android changed everything. The Smartphone 2.0 wasn’t just a one-to-one communication device, it influenced media creation and consumption, transformed everyday commerce with in-phone wallets and touch ID, turned social networking into a ubiquitous tool. It even forced Enterprise information systems to completely rethink and retool their infrastructure — this wasn’t simply a computer with a “smaller form factor”.

In retrospect, the ascendency of Smartphone 2.0 and the way it has shaped our culture seems obvious and natural. But the celebration and contemplation overlooks a crucial Sine Qua Non, a necessary (but not sufficient) condition: Unlocking the carriers’ grip on handset specifications, marketing, and content distribution.

Philippe J DEWOST's insight:

Fascinating Monday Note by Jean-Louis Gassée, reminding us that while much has been said about the original iPhone’s success factors (an innovative multi-touch interface, a never-seen-before combination of cell phone, iPod and Internet “navigator”) we are often missing one crucial element: removing the carrier’s control on the iPhone’s features and content.

Quoting Horace Dediu, “In its first 10 years, the iPhone will have sold at least 1.2 billion units, making it the most successful product of all time. The iPhone also enabled the iOS empire which includes the iPod touch, the iPad, the Apple Watch and Apple TV whose combined total unit sales will reach 1.75 billion units over 10 years. This total is likely to top 2 billion units by the end of 2018."
Amazed that iOS will have generated over $1 trillion in revenues for Apple sometime this year."

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

How Xiaomi lost $40bn: Where it all went wrong for the 'Apple of the East'

How Xiaomi lost $40bn: Where it all went wrong for the 'Apple of the East' | cross pond high tech | Scoop.it
It was just four days after Christmas 2014, and for Chinese smartphone company Xiaomi, the presents kept on coming as it announced a funding round of $1.1 billion (£850 million) at a valuation of $45bn. Just 18 months on from Xiaomi's last funding round, new analysis of its business suggests it is worth less than $4 billion. So what happened to the world's once most valuable startup?
Philippe J DEWOST's insight:
Oops. In french we have a saying about Le Capitole & La Roche Tarpéienne ...
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple Watch: Why Let Facts Cloud The Debate?

Apple Watch: Why Let Facts Cloud The Debate? | cross pond high tech | Scoop.it

The absence of official numbers for the Apple Watch leads to speculation that the device is a flop — why else would Apple hide the numbers? But the company’s penchant for secrecy shouldn’t prevent us from looking at a few facts, and from thinking about the company’s long game.

Philippe J DEWOST's insight:

You better Watch this enjoyable JL Gassée feature :-)

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple's $1 Billion Bet On Didi Chuxing, & 12 Big Questions About What's Next For Cars | F@stCompany

Apple's $1 Billion Bet On Didi Chuxing, & 12 Big Questions About What's Next For Cars | F@stCompany | cross pond high tech | Scoop.it

How widely and how quickly will autonomous cars be accepted? As hard as it might be for an urbanite to imagine, many people love their cars. And if early autonomous vehicles cause a few well-publicized accidents, fear of the unknown could slow the trend, even to a halt.

Is owning a car factory an advantage or a disadvantage? In the minds of many from Silicon Valley, "Detroit" is a euphemism for inept. They believe the most important part of a car is its software, and they're probably right. But isn’t a century’s worth of expertise worth something? And don’t get carried away about Tesla: Last year it delivered 50,580 cars, approximately one-quarter of one percent of Detroit's output.

Is ride-sharing a commodity product? In Brooklyn, I can use a car-hailing app to get Uber, Lyft, Juno, or a taxi. I don’t see any significant difference between any of the services, each of which arrive quickly, charge similar fares, and offer clean cars and knowledgeable drivers. Selling a commodity tends to be a pretty awful business.

How long can ride-sharing companies like Uber and Lyft take a loss on many of the rides they provide, in their race to garner riders and drivers? "There’s never been a market as subsidized as this," one venture capitalist told me. "We’ll only know the winners and losers after that settles down."

Will governmental regulations slow or speed this transition? The environmental benefits of electric vehicles and fewer cars on the road are clear. Yet cities like New York, Austin, Berlin, and Paris have at different times threatened to strangle car-sharing with regulations. Look at the airline business: governments like regulating travel, for better or for worse.

What kind of "driver" or "passenger" insurance will be required? The average American driver now pays a bit less than $1000 per year for auto insurance. But who is responsible when driverless cars collide?

Will we continue to personally own cars, or will we instead have monthly subscriptions to companies that will provide all the rides we need? Subscription services seem likely, but if my current subscriptions—to companies like Time Warner Cable and Verizon—are any model, quality suffers and prices creep up.

Why is it so difficult to design a driver-friendly dashboard? Mapping services and accurate engine diagnostics are welcome additions to the information a driver can see, but more data has resulted in cluttered screens using interactive controls designed for phones or laptops. Steve Jobs understood that the user interface was the most important part of any consumer technology. Can Apple solve this problem?

Are Uber and Lyft drivers employees or contractors? This is an issue of short-term importance, but is caught up in a broader societal concern: How to define those who participate in the so-called ‘gig economy.’

Who has the most important leverage? The company that designs a car's software? The manufacturer? Or is it Uber, whose app is used by so many consumers? As with any nascent transition, it's hard to know what will emerge as the most important bottleneck.

Can any ride-sharing company become a truly international brand, or will local services trump those ambitions? Uber is losing billions of dollars trying to snare a leading market share in Asian countries. No one know exactly how much resistance it will face from governments that prefer local providers.

How strong are the network effects that Uber gains by being such a well-funded first mover? Benchmark VC Bill Gurley likes to point to this tweet as a key reason that Uber will continue to thrive. But if car-sharing has as much subsidization and government interference as the airline industry, will those network effects hold true?

Philippe J DEWOST's insight:

Which of the 12 questions raised by Apple's investment in Didi do you favor ?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple plans to make a ~$3.6B strategic investment in South Korean carmaker Kia

Apple plans to make a ~$3.6B strategic investment in South Korean carmaker Kia | cross pond high tech | Scoop.it

[Google translated from local Donga website]

 

Apple invests 4 trillion won in Kia…

 

Promotion of a “Apple Car” cooperation agreement this month Prospects of building exclusive production facilities through investment Kia's Georgia plant targets production in 2024 100,000 units per year… Up to 400,000 units “Hyundai Glovis will take on a significant role” Hyundai Motor Group's “Apple Car (tentative name)” cooperation theory is heating up the industry with the start of the new year. Amidst various rumors and news coming out steadily, a puzzle about the cooperation of Apple Cars was put together, centering on the group's major affiliate, Kia.

 

As previously known, Kia takes over the Apple Car project and production takes place at the Kia Georgia plant in the United States. Both Kia and Apple are refraining from expressing their official positions, but it was confirmed that they have entered the contract process. Apple car development cooperation, which was full of rumors and speculation, is making progress.

 

Overall, Kia and Apple plan to sign a formal contract worth 4 trillion won for Apple car production this month. Practical coordination for a formal contract has been underway since last month, and a specific contract schedule has been set. Initially, the contract date was set at the beginning of February, but it was delayed once and the schedule was changed to February 17. However, it is reported that the contract schedule on February 17 may change depending on the internal circumstances of each company. In particular, on the day of the contract, Hyundai Motor Group Chairman Eui-sun Eui-seon said that the plan was scheduled to attend the contract ceremony. Recently, the news that Chairman Chung met a senior Apple official on a business trip to Singapore last month. The facts have not been confirmed.

 

The contract is expected to contain specific details related to the production of Apple cars. Apple is planning to invest 4 trillion won in Kia. With the aim of launching in 2024, the number of Apple cars produced by Kia is initially around 100,000 units per year, and can be expanded to a maximum of 400,000 units.

 

The 4 trillion won that Apple invests in Kia is expected to be used for building exclusive facilities for Apple car production and vehicle development. This large-scale initial investment is also a way Apple often uses in the process of driving major product production. When promoting the production of existing flagship products such as iPhone and iPad, Apple has invested trillions in LG Display (LGD) and supplied OLED panels produced in dedicated facilities. Likewise, Kia, which has attracted investment from Apple, is expected to build a dedicated line for Apple's electric vehicle production.

 

With Kia leading vehicle production in the Apple Car Project, attention is also being drawn to the role of Hyundai Glovis. An industry official said, "Glovis, which has several subsidiaries in the US, will play a significant role in the Apple Car business." Glovis operates 4 subsidiaries and 4 offices in the United States, including Glovis America and Georgia subsidiaries, Alabama subsidiaries, and GET subsidiary of local land transportation. In addition to logistics, which is its flagship business, the possibility of promoting electric vehicle-related businesses is predicting. According to the industry, from Apple's point of view, Hyundai Motor Group is the best partner for entering the electric vehicle market. It is analyzed that it is because it has its own electric vehicle platform (E-GMP), has a production facility in the United States, and has both the ability and requirements to actually produce new cars in accordance with the planned period (2024). The vision of the future proposed by Hyundai Motor Group, such as electric cars, hydrogen cars, and flying cars, may have been an attractive factor for Apple seeking innovation.

Philippe J DEWOST's insight:

Apple a fait l'impasse sur l'ensemble des constructeurs automobiles européens, et il serait intéressant de comprendre pour quelles raisons.

Pendant ce temps, Kia mérite de plus en plus son slogan "The Power to Surprise" !

No comment yet.
Rescooped by Philippe J DEWOST from Digital Sovereignty & Cyber Security
Scoop.it!

There's a Jailbreak Out for all Versions of iOS from 11 to 13.5, the current release.

There's a Jailbreak Out for all Versions of iOS from 11 to 13.5, the current release. | cross pond high tech | Scoop.it

Over the years, Apple has made it prohibitively difficult to install unapproved software on its locked-down devices. But on Saturday, a hacker group called Unc0ver released a tool that will "jailbreak" all versions of iOS from 11 to 13.5. It's been years since a jailbreak has been available for a current version of iOS for more than a few days—making this yet another knock on Apple's faltering security image.

Unc0ver says that its jailbreak, which you can install using the longtime jailbreaking platforms AltStore and Cydia (but maybe don't unless you're absolutely sure you know what you're doing), is stable and doesn't drain battery life or prevent use of Apple services like iCloud, Apple Pay, or iMessage. And the group claims that it preserves Apple's user data protections and doesn't undermine iOS' sandbox security, which keeps programs running separately so they can't access data they shouldn't.

"This jailbreak basically just adds exceptions to the existing rules," Unc0ver's lead developer, who goes by Pwn20wnd, told WIRED. "It only enables reading new jailbreak files and parts of the file system that contain no user data."

Philippe J DEWOST's insight:

The cat and mouse game around Apple's iOS closed garden has resumed and this time it means something again.

Philippe J DEWOST's curator insight, May 26, 2020 4:31 PM

Impressive exploit given Apple's increased fortress walls thickness. Yet (why) should you jailbreak ?

Scooped by Philippe J DEWOST
Scoop.it!

With 1 billion current users and $1 trillion cumulated sales, the iPhone is the most successful product of all times

With 1 billion current users and $1 trillion cumulated sales, the iPhone is the most successful product of all times | cross pond high tech | Scoop.it

Over 1.6 billion have been sold. The total iOS products sold is over 2.2 billion of which 1.5 billion are still in use.
There are about 1 billion iPhone users.

Economically speaking, iPhone sales have reached one trillion dollars.

Since the iPhone launched, Apple’s sales have totaled $1.918 trillion.

Philippe J DEWOST's insight:

Finally the underlying maths on how half a billion pictures are taken everyday and automagically enhanced by imsense's eye-fidelity™ technology. 

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple quietly makes billions from Google Search each year, and it's a bigger business than Apple Music

Apple quietly makes billions from Google Search each year, and it's a bigger business than Apple Music | cross pond high tech | Scoop.it
Google’s payment to Apple could be worth as much as 23% of Apple's services business.
Philippe J DEWOST's insight:
Google pays roughly $10 per active iPhone user and per year. Here is how.
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple reportedly developing custom cellular modem for iPhones in-house amid battle with Qualcomm

Apple reportedly developing custom cellular modem for iPhones in-house amid battle with Qualcomm | cross pond high tech | Scoop.it
Apple has been expanding its development and use of custom chips over the last few years. Last month we first heard that Apple was looking to poach employees from Qualcomm on its home turf of San Diego to potentially create custom radio chips. Today, a new report from The Information says that Apple is indeed …
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Keynote Open Hardware à l'Open CIO Summit

Keynote Open Hardware à l'Open CIO Summit | cross pond high tech | Scoop.it

La une de couverture de The Economist est tombée pile-poil à point pour ma keynote de demain !

Philippe J DEWOST's insight:

Amusante coïncidence ?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple is granted an iPod patent 9 years after filing : meet United States Patent: 9961792

An electronic device such as a media player is formed from electrical components such as integrated circuits, buttons, and a battery. Electrical input-output port contacts are used to play audio and to convey digital signals. Electrical components for the device are mounted to a substrate. The components are encapsulated in an encapsulant and covered with an optional housing structure. The electrical input-output port contacts and portions of components such as buttons remain uncovered by encapsulant during the encapsulation process. Integrated circuits are entirely encapsulated with encapsulant. The integrated circuits are packaged or unpackaged integrated circuit die. The substrate is a printed circuit board or is an integrated circuit to which components are directly connected without any printed circuit boards interposed between the integrated circuit and the components.

Philippe J DEWOST's insight:

Your delay may vary... who remembers now what an iPod is ?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

iPhone X: The Demo Gods Are Cheeky

iPhone X: The Demo Gods Are Cheeky | cross pond high tech | Scoop.it

The latest Apple product unveiling, with its overly-reported Face ID glitch, reminds us that the demo isn’t the product. That can be good or bad.

It’s Full Moon over Cupertino. iPhone X specs leaks ahead of the official presentation and kommentariat inmates howl in their cages. This isn’t new, we’ve long known how psychotoxic Apple products can be, but the phenomenon seems to be reaching a new paroxysm. A few choice examples, starting with the grand prize [no links, no feeding the master baiters]:

The iPhone X proves the Unabomber was right
Steve Jobs gave us President Trump
Apple’s Face ID Could Be A Powerful Tool For Mass Spying

But let’s not lament these and many similar howlers. For Apple, they have a positive side: They attest to the power of the brand, to the magnetism of its products. Well…most of them. I maintain a list of Apple products that remain unmagnetized and fantasize that someday I’ll have a quiet conversation with the DRIs (“Direct Responsible Individual” in Apple’s parlance) in charge of these warts.

But we’ll leave the somber jeremiad for a different day.

The sun is out here in Paris; tomorrow I head to Vézelay and the start of a two day walk along the Camino de Santiago (the pélerinage de Compostelle as it’s known here). So, let’s have fun with Craig Federighi’s iPhone X FaceID demo glitch and, more generally, with the Demo genre. (The full two-hour September 12th keynote video is here.)

Craig Federighi, Apple’s Senior VP of Software Engineering — affectionately known as Hair Force One — is an infectiously happy, eager demo-meister. But the demo gods challenged Federighi’s disposition and caused his first attempt to unlock the iPhone X with his face to fail, leaving him staring at the standard unlock code screen.

Fortunately, a back-up phone was at hand — a testament to Federighi’s lack of faith in his own work, or to years of demo hiccups. The stand-in phone worked as expected, and the demo proceeded without further divine retribution.

Philippe J DEWOST's insight:

Key Notes on Apple Keynotes

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Alexa, Stop Making Life Miserable for Anyone With a Similar Name!

Alexa, Stop Making Life Miserable for Anyone With a Similar Name! | cross pond high tech | Scoop.it
Amazon’s voice-controlled personal assistant is creating chaos for people called Alexis, Alex and Alexa; TV sitcom tried to order milk — Life has been complicated ever since Alexa Sussman and her parents started using Amazon's Echo and its built-in ‘Alexa’ assistant.“Alexa, stop!” Joanne Sussman screamed in her living room.Immediately, the computer living inside her Amazon Echo speaker stopped playing her favorite music station. Simultaneously, Mrs. Sussman’s 24-year-old daughter, Alexa, froze on the stairs.
Philippe J DEWOST's insight:
AI first collaterals : girls named "Alexa", "Siri", or "Cortana". Unless we (or the IA giants) do something, these names will disappear from the charts soon while existing humans wearing these names will experience a nightmare.The short term winner ? "OK Google" as no child has been given such name... yet.
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Apple joins SoftBank’s Vision Fund with $1-billion investment

Apple joins SoftBank’s Vision Fund with $1-billion investment | cross pond high tech | Scoop.it

Silicon Valley giant Apple Inc. on Wednesday confirmed that it is investing $1 billion (approximately Rs 6,793 crore) in Japanese telecom major SoftBank Group’s Vision Fund, an estimated $100-billion (approximately Rs 68 lakh crore) venture that will oversee the development of new technologies. Taiwanese electronics manufacturer Foxconn and the family of the Oracle corporation’s chairman Larry Ellison are also expected to invest in the fund, the Wall Street Journal reported.

Apple believes the move “will help ‘speed the development of technologies that may be strategically important” to it, company spokesperson Kristin Huguet said. Apple has rarely ever invested in venture capital companies before.

While SoftBank will itself invest approximately $25 billion (approximately Rs 17 lakh crore) in its Vision Fund, it will be back largely by the Saudi Arabian government. American telecom equipment company Qualcomm Inc is also expected to put in an investment.

The SoftBank Vision Fund is expected to close its fundraising efforts by mid-2017.

Philippe J DEWOST's insight:

When $1Billion buys you 1% of a funding round #OrderOfMagnitude

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

SoftBank is buying ARM for $32 billion — because everything’s a computer now

SoftBank is buying ARM for $32 billion — because everything’s a computer now | cross pond high tech | Scoop.it

Japan’s SoftBank is buying U.K.-based chip design firm ARM Holdings for about $32 billion, according to the FT.

Why? Everything is a computer now, and ARM has been one of the winners of the mobile revolution.

ARM designs chips — but doesn’t actually make them — for a huge variety of devices. It dominates the market for smartphones — Apple is a big client, as is Samsung — and its chips shows up in other consumer gadgets, as well as more-industrial-like devices and “internet of things” sensors.

The number of chips containing ARM processors reached almost 15 billion in 2015, up from about 6 billion in 2010.

The move is a big one for SoftBank CEO Masa Son after his would-be successor, former Google executive Nikesh Arora, stepped away from the company last month. (Talks presumably started while Arora was still there.)

One key question is whether other firms will let SoftBank purchase ARM or if there will be a bidding war. Apple, arguably ARM’s most important client, and Intel, which lost the mobile chip war to ARM, are both potential buyers.

The offer is already a generous multiple. As the FT notes, it’s some 70 times ARM’s net income last year. That’s around the same price-to-earnings ratio as Facebook stock.

Philippe J DEWOST's insight:

ARM takeover by SoftBank is the Tech Brexit of this summer.

This thunderstrike in a blue ocean (pardon me, sky) might trigger a war where we will all of a sudden remember how important it is having a war chest.

There are underlying geopolitics ongoing as evidenced by the progress made by the LongSoon chinese processor now powering world #1 Supercomputer.

It might also signal the beginning of the end of the ARM era, and should have more people focusing on open source silicon architectures such as RISC-V

Philippe J DEWOST's curator insight, July 18, 2016 3:58 AM

As Brexit has removed ARM from Europe, will it be left as the impotent witness of what we shall call an ARM's race ?

This news echoes the announcement of World's new #1 Supercomputer, that is chinese again, but more interestingly no longer features any Intel processor inside but domestic LongSoon chips.

The Silicon race is on its way to a US - Asia bipolar configuration, with Europe being left alone due to the combined effect of Brexit and ARMXit : time for investi(gati)ng (in) open source hardware architectures such as RISC-V ...

Scooped by Philippe J DEWOST
Scoop.it!

Apple R&D Reveals a Pivot Is Coming

Apple R&D Reveals a Pivot Is Coming | cross pond high tech | Scoop.it

People are focusing on the wrong thing when analyzing Apple's path forward in the face of slowing iPhone sales. Instead of debating how much Apple will try to monetize the iPhone user base with services (not as much as consensus thinks), the company is instead planning its largest pivot yet. There are only a handful of logical explanations for Apple's current R&D expense trajectory, and all of them result in a radically different Apple. In a few years, we are no longer going to refer to Apple as the iPhone company. 

As I pointed out last May, Apple's R&D expense saw a significant bump up beginning in mid-2014. It was clear Apple was up to something big. However, after looking at Apple's 2Q16 results, it appears I underestimated the situation. As depicted in Exhibit 1, Apple is now on track to spend more than $10 billion on R&D in 2016, up nearly 30% from 2015 and ahead of even my aggressive estimate. This is a remarkable feat considering that Apple was spending a little over $3 billion per year on R&D just four years ago.

One of the more interesting aspects of Apple's R&D expense trajectory in recent years is that the increase has been outpacing revenue growth. As seen in Exhibit 2, given my current iPhone sales expectations for FY16 and FY17, Apple is on track to approach a multi-decade record in terms of amount spent on R&D as a percent of revenue. 

Unusual R&D Perceptions

The most shocking aspect about the amount of money Apple is spending on R&D is how little attention it has garnered in Silicon Valley and on Wall Street. Other than my R&D post last year, there is rarely any mention of Apple's R&D, and this doesn't seem to make much sense.

I suspect most of this has been due to the fact that Apple does not draw attention to its product pipeline and long-term strategy, choosing instead to embrace secrecy and mystery. Now compare this to Mark Zuckerberg laying out his 10-year plan for Facebook. It is easy and natural for people to then label Facebook as innovative and focused on the future. The same principle applies to Larry Page reorganizing Google to make it easier for investors to see how much is being spent on various moonshot projects. Jeff Bezos is famous for his attitude towards failing often and in public view, giving Amazon an aura of being a place of curiosity and boldness when it comes to future projects and risk taking. 

Meanwhile, Tim Cook has remained very tight-lipped about Apple's future, which gives the impression that Apple isn't working on ground-breaking ideas or products that can move the company beyond the iPhone. Instead of labeling this as a mistake or misstep, Apple's product secrecy is a key ingredient of its success. People like to be surprised. Another reason Apple takes a much different approach to product secrecy and R&D is its business model. Being open about future product plans will likely have a negative impact on near-term Apple hardware sales. Companies like Facebook and Google don't suffer from a similar risk. The end result is that there is a legitimate disconnect between Apple's R&D trends and the consensus view of the company's product pipeline. Apple is telling us that they are working on something very big, and yet no one seems to notice or care. I find that intriguing.

Logical Explanations for Apple R&D

Even though Apple remains tight-lipped about its dramatic increase in R&D expense, there are three logical explanations for what may be happening.

1) Apple's expanded product line requires additional R&D. This theory represents the most straightforward explanation. Essentially, because Apple has grown significantly over the years, the company needs to spend more on R&D just to keep up with its more expansive product line and greater competition. The company is now invested in four hardware categories (iPhone, iPad, Mac and Apple Watch), not to mention various software and services initiatives. 

2) Apple plans on doing more. Keeping with another simple explanation, Apple's increased R&D spend could signal that the company is willing to try its hand at more things. The expectation would be that Apple will begin releasing a greater number of products in terms of hardware, software and services. 

3) Apple is looking to pivot. Apple is ramping up R&D because they have a few big bets that require a massive increase in investment. The two most logical areas for these bets are wearables and personal transport initiatives. In both cases, Apple is moving well beyond its comfort zone of selling pieces of glass that can be held in one's hand. Instead, Apple is literally building a new company with additional capabilities and strengths.

Philippe J DEWOST's insight:

Drowning by Numbers ; Apple might be surprising us again by opening entirely new product / service categories and they have the resources for doing so.

Martin (Marty) Smith's curator insight, May 15, 2016 2:12 PM

Apple Pivot, Will We Care
Agree. Apple is looking for another disruption not looking to milk iPhone / iPad sales. And this is an understatement:

"I suspect most of this has been due to the fact that Apple does not draw attention to its product pipeline and long-term strategy, choosing instead to embrace secrecy and mystery. "

Open vs. Closed
The bigger question, for us, is the OPEN vs. CLOSED question. Apple hasn't made friends in the developer community. Sure we bend, scrape, plead and cry to have apps accepted, but the taste left with us is sour and painful. 

Android is trying to tighten standards having played, "Come One, Come All" a tad too loudly, but Apple is fickle and a pain. Yes it is good to be KING, but no one is KING of anything lasting that doesn't also inspire loyalty, trust and love. 

Most of the developers I know, even the ones who are rich thanks to Apple's app store, don't look forward to wrestling with Apple again. Some have achieved "trusted" status now, but they remember the blood and tears it took to get there. 

So note to Google, never tighten to the point where your tightening feels or seems capricious and mean. Apple has seemed capricious and mean to several developer friends who requested to remain nameless. Were they scared Apple might make a horrible process even harder? You bet. 

Apple is testimony to the power of "insanely great". NO ONE jumps through the seemingly arbitrary hoops Apple is known for unless "insanely great" is attached. I'm a huge Apple fan and have been since buying the Apple II back in the day. 

Lately I've caught myself wondering if the OVER (what I gain by being an Apple supporter) is worth the UNDER (what it takes to remain loyal). That is a conversation NO BRAND wants their customers to begin EVER since all the negative things leaving brings follows. 

The watch left me cold. I rarely wear watches anymore, but when I do I want something from MoMA and their tiny phone on your wrist looked more Dick Tracy than cool watch (to me). I'm wearing a watch to dinner tonight and it won't be an Apple Watch. 

My updated AIR is nothing but a pain. It doesn't fit my hands, the keyword is impossible to tune, and the screen too small. I never use it preferring my old Air (from 6 years ago). I love my iMac with the huge screen (what I'm writing on now), but it too was a failure. 

We tried moving my 83-year-old father over to the big Mac screen but accessibility features were a torture and he is a Windows guy and will remain one. My Macbook I like, but it is getting long in the tooth and clunky. My iPad Pro I LOVE and that is taking the place of the new AIR (that I hate) and my MacBook. 

Long diatribe, but I share my journey as a note of growing Apple frustration. My new EXPENSIVE Air was a disaster I should have sent back, but I kept thinking it was me. I don't think that way anymore and that can't be good for Apple. 

Juan Ortega's curator insight, May 20, 2016 4:34 AM
Historia de Apple con número de unidades vendidas de cada producto