Feeds

Articles about Context

Li-Fi D-Light

Fridge hacked. Car hacked. Next up, your LIGHT BULBS

Those convinced that the emerging Internet of Things (IoT) will become a hackers' playground were given more grist for their mill with news on Friday that security researchers have discovered a weakness in Wi-Fi/mesh networked lightbulbs. Researchers at Context Information Security discovered that LED light bulbs from …
John Leyden, 07 Jul 2014

Microsoft stands on shore as tablet-laden boat sails away

The good citizens of Britain are still giving Windows 8 and 8.1 fondleslabs a wide berth, official figures from disties has confirmed. More than 596k slate tabs were shipped out to UK resellers and retailers in Q2, up 27.8 per cent year-on-year with the vast majority of them (nearly 406k) were running on Google’s Android …
Paul Kunert, 30 Jul 2014
Stained glass angels

Gods of tech distribution smile on Blighty in Q1

Distributors in almost half of the countries across Western Europe failed to register sales growth during Q1 but those with ops in Blighty were not among them. Sales out data from Context reveals UK market revenues climbed 12.4 per cent in the three months to €2.5bn, making it the largest sector in the region for the past four …
Paul Kunert, 06 May 2014

Brit enterprises still wolfing down PCs post-XP support death

Tech disties feasted on a relative PC sales banquet in Q2 as businesses and to a lesser extent consumers made a belated dash to rid themselves of systems running on Windows XP. Abacus stroker Context collated the sale-out figures from wholesalers and found more than 844k desktops, notebook and PC workstations were adopted by end …
Paul Kunert, 15 Jul 2014
Intel PC Group General Manager, Mooly Eden

Intel laptop boss to make Ultrabooks context savvy

Pundits have been talking about building GPS and other sensors into notebooks for some years. Now it may actually happen. Optional for the moment, Intel is planning to mandate the addition of a variety of sensors into its Ultrabook spec. Speaking after his IDF keynote today, Intel's PC Group chief, Mooly Eden, said he wants …
Tony Smith, 14 Sep 2011
NSW_road_death_poster

More chance you came a cropper on a UK road than bought a Chromebook this year

Chromebooks aren't pouring cash into the coffers of European IT distributors – but, nonetheless, more Google-powered lappies are finding their way into the arms of cost-conscious schools and consumers. Some 45,000 Chromies each found a home across Western Europe in the first quarter of 2014, and 61.5 per cent of those purchases …
Paul Kunert, 20 May 2014
iPad Mail app

Tab for Xmas, Mr Consumer? Yes please. And Mr Busin... NOPE

The slab revolution in UK consumer land continued over Chrimbo but many biz customers are still struggling to justify wider deployments and most of those that did steered well clear of Windows 8. Disties shipped a total of 1.5 million tabs in Q4, a hike of 53.1 per cent on a year ago. Some 16.4 per cent of these went via biz …
Paul Kunert, 26 Feb 2014

Apache patch: Cisco catches up with ANCIENT Struts2 vuln

Cisco has issued a patch for a four-year-old Apache Struts2 vulnerability. The original issue, CVE-2010-1870, was originally reported in July 2010. The vulnerability arises out of how Apache Struts2 handles commands passed to the Object-Graph Navigation Language. As the Apache notification states, “The vulnerability allows a …

Careful with 'fibre speed record' hype: which record's been broken?

Last January, NASA's Energy Science Network (ESNet) ran a test that achieved 91 Gbps end-to-end data transfers. The test made belated news this week in another outlet that touted ESNet as a "shadow network" faster than Google fibre. Leaving aside the inappropriateness of that hype, it got El Reg thinking about the business of …
The Register breaking news

Big Data in Context

Big Data is an ‘umbrella’ term that is commonly used to refer to a number of advanced data storage, access and analytics technologies aimed at handling high volume and/or fast moving data in a variety of scenarios. These typically involve low signal-to-noise ratios, such as social media sentiment monitoring, or log file analysis …
Colin Beveridge, 16 Jan 2012
Nokia Car Mode

Xen to practice art of motor vehicle embedded development

The Xen Project has launched an “Embedded and Automotive Initiative” to take its virtualisation project under the hood. The idea seems to be that virtualisation will make life easier for those packing computing power into cars. Today, developers and auto-makers alike bemoan the fact that cars often require different systems for …
Simon Sharwood, 19 Aug 2014
Cortana China

Microsoft's Brit kid Cortana lands on UK WinPhone 8.1, but China's is the real cutie

Microsoft will be fine-tuning its virtual assistant Cortana in its first update to Windows Phone 8.1. The Siri rival is predicted to arrive on UK users' smartphones over the next few months. The preview pack for developers is already out, of course. Youtube Video Cortana will be coming to folks in Blighty and China as a beta …
This geometric figure illustrates the concept of magic states and their relation to contextuality. The triangular region contains quantum states that are not magic and do not exhibit contextuality. States outside the triangle do exhibit contextuality and may be useful as a resource in the magic-state model of quantum computing.

Boffins lay out 'practical requirements' of 'realistic' QUANTUM COMPUTER

Canadian boffins have brought quantum computers a step closer to reality, by identifying one feature that will be key to finally building one – "contextuality". Our computers use the binary system of 1 and 0s. Quantum computers use qubits (quantum bits), which can exist in "superposition", meaning that they're simultaneously 0 …
The Register breaking news

Unified communications in context?

We've seen from Reg research that a lot of you have considered and are exploring the notion of unified comms so we’ve been trying to do some work on your behalf. Last week we got a whole range of end users and experts in the field of unified comms to do a series of videos on the challenges, benefits and management of such …
Team Register, 25 May 2010
box_shifting_channel

UK channel firms rabbit-punch recession in Q4: Sales are HUGE

Blighty is again the largest tech sales territory in the European channels* after distributors reported a near double-digit growth spurt in Q4, fuelled by mobility, software and er... desktops. Numbers are in from Context, which tracks all major wholesalers' sales-out data - the kit that customers are actually buying - showing …
Paul Kunert, 27 Jan 2014
cloud

BizTalk-as-a-Service dog wags Microsoft's on-premises tail

Microsoft has signalled it will harmonise the feature set of the cloudy and on-premises versions of its BizTalk Server. Redmond's blogged announcement of the intention to have BizTalk Server and BizTalk Service may not look remarkable at first glance: hardly anyone jumps out of bed in the morning excited about their day working …
Simon Sharwood, 18 Aug 2014
Internet of Things

IoT: Industry snakeoil or one-way ticket to fame and riches?

Is the Internet of Everything (IoE) just another tech buzz word in an industry known for marketing bluster? It is doomed to go the way of Service Oriented Architectures and Web 2.0? If you think so, maybe you should take a peek around you. Cisco boss John Chambers said earlier this year it would have five to 10 times the impact …

Orwell chap snaps in Amazon paperback claptrap yap rap

Amazon is under fire from George Orwell's estate for referencing the Nineteen Eighty-Four author in its legal battle with publishers. The web bazaar, while mired in a war of words with Hachette over book prices, invoked Orwell's name and cited comments made by the author at the dawn of paperback books. According to Amazon, …
Shaun Nichols, 14 Aug 2014

Wi-Fi HYPEGASM: Huawei demos 10Gbps in lab test

Huawei has planted another flag in 802.11ax standardisation, claiming a demonstration of 10.53 Gbps Wi-Fi throughput in the 5 GHz band. The lab trial took place on the company's Shenzhen research campus. The 802.11ax standard is at the very beginning of the long march towards the market. The IEEE board approved the standard …

Evidence during FOI disputes can be provided in SECRET

Public bodies defending a decision to withhold information requested under freedom of information (FOI) laws can submit evidence to an information rights tribunal in secret, the Court of Appeal has ruled. The Court said that tribunal rules allow for closed evidence sessions to be conducted, meaning that neither the FOI requester …
OUT-LAW.COM, 05 Aug 2014

United Nations signs off on 'right to privacy in the digital age'

The United Nations (UN) has unanimously voted to adopt a resolution calling for online privacy to be recognised as a human right. The gesture is politically notable because it shows the world is willing to be seen to do something in the wake of The Year Of Snowden. The resolution extends the general human right of privacy to …
Simon Sharwood, 19 Dec 2013
Man walks on water like Jesus

PC makers REALLY need Windows 8.1 to walk on water - but guess what?

An updated Windows 8 from Microsoft will NOT be the "miracle cure" for traditional PC makers in need of a sales and profits injection. And that's according to IT biz analysts Context. This is the second technology distribution channel watcher in a week to warn that Redmond's touch-friendly operating system tweak, namely version …
Paul Kunert, 19 Jun 2013

Google CAN be told to delete sensitive data from its search results, rules top EU court

Google and other search engines can be held responsible for the type of personal data that appears on results pages it serves up, the European Union's Court of Justice ruled in a landmark case this morning. Its decision (PDF) is a rare example of the CoJ disagreeing with an earlier advocate general opinion from June last year, …
Kelly Fiveash, 13 May 2014
Evil Android

Android banking apps vulnerable to cash theft by CAS hole hackers

Hackers can swipe login credentials and other sensitive data from one in 10 Android banking apps, and about six per cent of all Android apps, IBM researchers warn. Users should avoid using the vulnerable apps, which were built using Apache Cordova up to version 3.5.0, until they have been updated to squash the bug. Big Blue's …
John Leyden, 06 Aug 2014

Oracle spoils your day with NEARLY 150 patches

Systems administrators who decided it would be a quiet week were wrong: Oracle has flicked out more than a hundred security patches, and when you're finished, it'll be time to round up any Blackberry useBs in the company and apply some patches for them. Let's start with Oracle, which among other things is taking another stab at …

Where do you stand on multi-function network appliances?

Best of breed versus integrated multi-function solutions – it’s a discussion that’s been going on in IT for about 3 decades. Whether the debates occur in the context of software suites, hardware/software appliances, or complete pre-engineered system stacks, there are always vigorous advocates arguing the case for each approach. …
Dale Vile, 06 Jun 2014

Black Box? LUN-fest? What does business centric storage really mean?

What – or who – defines your storage? Is your storage minded by a priestly case of LUN monglers who guard the sacred administration software fiercely? Is your storage "software defined"? Is it a black box, an API-driven thing controlled by devs or managed by the operations types through Puppet? Amidst this list of these common …
David Gordon, 13 Dec 2013

BT slapped down by BSkyB over O2 broadband 'switch off' porkies

A BT direct mail advertising campaign spectacularly backfired on the telco after it claimed BSkyB would switch off O2 users' broadband. Sky bought the consumer broadband and fixed-line biz of Telefónica UK-owned O2 in March last year. The telecoms giant had claimed in a shouty flyer posted through Brits' letterboxes that BSkyB …
Kelly Fiveash, 09 Jul 2014
register logo

Black Box? LUN-fest? What does business centric storage really mean?

What – or who – defines your storage? Is your storage minded by a priestly case of LUN monglers who guard the sacred administration software fiercely? Is your storage "software defined"? Is it a black box, an API-driven thing controlled by devs or managed by the operations types through Puppet? Amidst this list of these common …
David Gordon, 29 Nov 2013

Kevin Bacon avoids slapped wrist after TV pipe-fatness claims

EE has received a stern talking to from the Advertising Standards Authority for website claims of "superfast" connectivity, though when Kevin Bacon says the same thing on TV that's OK. The difference is the context: on TV Kevin's words are accompanied by numbers and comparisons to 3G, while the web ad just made the "superfast" …
Bill Ray, 31 Jul 2013
sea_hp_sink

HP the only PC maker to bleed distie sales in Blighty

Distributors in Blighty reported PC growth across all of the major vendor lines in Q2 with just one exception - HP posted a double-digit decline. The numbers came from channel researchers Context, which runs a quarterly European PC research tracker collating sales-out data from wholesalers on the gear that resellers (and hence …
Paul Kunert, 17 Jul 2013
management regulation2

Singapore decides 'three strikes' laws are too intrusive

Singapore's Ministry of Law has decided that a “three strikes” regime for online copyright infringement is too intrusive for Internet users, and has excluded such an approach from consultations over takedown mechanisms. The consultation, described in full here, is canvassing changes to that country's copyright act to deal with …

Teen girl arrested with 70-year-old man's four inch weapon inside her

A 19-year-old Tennessee girl cuffed earlier this week for allegedly driving with a suspended licence is in a spot more bother – after jail officers reportedly discovered a loaded .22 revolver in her vagina. Dallas Archer's police mugshot Pretty in pink: Dallas Archer's police mugshot Dallas Archer was pulled over in Kingsport …
Lester Haines, 24 Apr 2014
bug on keyboard

Microsoft spells out new rules for exiling .EXEs

Microsoft has updated the methodology it uses to define adware, a move designed to make it clearer just what the company considers worthy for removal by its malware tools. Redmond's new rules are simple: an application is adware if any of the following criteria are met: It breaks the “unwanted behaviour” rules (in more detail …

EU privacy A-Team tells Google: Get a grip and obey OUR laws

The EU's advisory panel on privacy and data protection has warned Google to comply with Europe's laws in an unusually strongly worded statement. The Article 29 Working Party vowed to investigate if Google refused to abide by the European Court of Justice (ECJ) ruling – Google Spain v Gonzalez et al – that decreed Google was not …
Andrew Orlowski, 09 Jun 2014
NSA parody T-shirt

Naughty NSA was so drunk on data it forgot collection rules

Declassified documents from America's Foreign Intelligence Surveillance Court (FISC) shows that even the NSA didn't know the limits of what it was supposed to collect, and overstepped its authorisations for years. The documents were released to the Electronic Privacy Information Centre in response to an FOI request, and record …
blackphone

Blackphone rooted at BlackHat

A security researcher at BlackHat has sparked a “did-he-didn't-he” Tweet-storm over the extent of an alleged “hack” of the “secure by design” Blackphone. The Twitter argument continues, with @TeamAndIRC first announcing that it only took five minutes to root the Blackphone* (see Bootnote); then backtracking on one claim because …
A fake tattoo on the leg of Canberra Raiders footballer Sandor Earl, sent by Huawei as an April Fool

US saves self from Huawei spying by spying on Huawei spying

Maybe this is why the US government is so certain Huawei is bad news: Snowdenistas at The New York Times and Der Spiegel have reported another communiqué from their source-in-exile – this time to the effect that the United States National Security Agency penetrated Chinese networking equipment vendor Huawei and monitored its …
Simon Sharwood, 23 Mar 2014
Cnidaria jellyfish

Twitter co-founder wraps tentacles around Q&A market, squirts out Jelly

Twitter co-founder Biz Stone launched a search app dubbed Jelly on Tuesday that he hopes will conquer the already packed-like-sardines online Q&A market. The concept behind the app appears to rely on Facebook and Twitter hive minds. Stone stopped short of calling it that, however, preferring instead to say that "Jelly is …
Kelly Fiveash, 08 Jan 2014
Man in black suit wearing neon

The rise of the humans: How to outsmart the digital deluge

Dave Coplin Dave Coplin, speaking at Business Transformed A few days ago, I heard an interesting keynote speech. The speaker was Dave Coplin, who in times past could have been called an anthropologist. Dave’s job title is in fact "chief envisioning officer" at Microsoft UK. The speech took place at Business Transformed, a …
Simon Rockman, 17 Jun 2014
Windows XP boot screen

Citrix, Google kick XP's still-twitching corpse

Citrix and Google have announced a cut-price deal to pipe legacy apps into Chromebooks. The pair chose April 8th, Windows XP death day, to announce the deal. There's not a whole lot that's truly new in the announcement, which explains how the XenApp HTML 5 viewer can now pipe legacy Windows apps in to Chromebooks and that …
Simon Sharwood, 09 Apr 2014
Microsoft OneDrive

Microsoft OneDrive tip-off leads to arrest over child abuse images

Microsoft's tip-off has led to the arrest of a Pennsylvania man subsequently charged with receiving and sharing child abuse images. The as-yet-unnamed suspect is alleged to have saved an indecent image involving a young girl to a OneDrive cloud storage account. Prosecutors allege in court documents that the suspect subsequently …
John Leyden, 07 Aug 2014

You are ALL Americans now: Europeans offered same rights as US folks in data slurp leaks

US Attorney General Eric Holder has raised a few eyebrows by announcing plans to give Europeans the same legal protections as US citizens when Uncle Sam's agents seek their private information. Holder claimed the Obama administration would put forth legislation to offer EU citizens the same data protection rights and access to …
Shaun Nichols, 25 Jun 2014

Pakistan mulls cyber security bill to keep NSA at bay

Pakistan’s Upper House this week began debating a new bill seeking to establish a National Cyber Security Council, an agency the nation feels is needed in the wake of Edward Snowden's myriad revelations about NSA surveillance. The Cyber Security Council Bill 2014 was presented by Senator Mushahid Hussain Sayed on Monday with the …
Phil Muncaster, 15 Apr 2014

Win 8 PC sales plunge as retailers, disties shave orders by HALF A MILLION in Q3

UK retailers and wholesalers were so busy waiting for Microsoft to release the Windows 8.1 upgrade that they apparently forgot to keep ordering PCs in Q3. Or is it - perhaps more likely - that these companies bought PCs more cautiously, based on inventory pile-ups that have occurred since the consumer market crashed three years …
Paul Kunert, 08 Nov 2013
Russia

Russia 'incompatible with the internet', cries web CEO 'axed by Putin'

Tech mogul Pavel Durov – dubbed Russia's "Mark Zuckerberg" for creating a Facebook-a-like website – has said he will never return home until corruption is quashed in his country. Durov was CEO of VKontakte, an online social network, but fled the Putin-led nation after allegedly spending months resisting Russia's Federal Security …
Jasper Hamill, 29 Apr 2014

Another day, another nasty Android vuln

The security researcher who last year sucked thousands of IDs out of Apple's Developer Centre site has turned his gaze onto Android and turned up a bug that Trend Micro says is exploitable. According to Ibrahim Balic, the bug causes memory corruption on Android 4.2.2 , 4.3 and 2.3 at least, but he suspects all Android versions …
A fresh horse dump

TalkTalk whips BT with riding crop over sport fibs in telly ad

Budget telco TalkTalk - whose boss Dido Harding probably knows a thing or two about sportsmanship having once competed as a jockey - has successfully challenged a BT advert for misleading television viewers. The Advertising Standards Authority upheld the company's complaint against an ad for BT Sport that featured presenter Jake …
Kelly Fiveash, 11 Jun 2014

Death of data retention directive: What it means for OTHER data laws

The Court of Justice of the European Union (CJEU) on Tuesday declared the Data Retention Directive (DRD) invalid. It has said that the DRD "entails a wide-ranging and particularly serious interference with the fundamental rights to respect for private life and to the protection of personal data, without that interference being …
OUT-LAW.COM, 10 Apr 2014
Facebook connection map

'Press Like for 1MB of data': Facebook picks up Pryte in-app data tech

Facebook has acquired the team behind in-app data payment software Pryte for an undisclosed sum as part of its plans to lower the cost of accessing its software in developing countries. The acquisition was disclosed by Helsinki-based Pryte on Tuesday. The software company's team indicated it will work with Facebook's internet …
Jack Clark, 03 Jun 2014