Articles about Context

Li-Fi D-Light

Fridge hacked. Car hacked. Next up, your LIGHT BULBS

Those convinced that the emerging Internet of Things (IoT) will become a hackers' playground were given more grist for their mill with news on Friday that security researchers have discovered a weakness in Wi-Fi/mesh networked lightbulbs. Researchers at Context Information Security discovered that LED light bulbs from …
John Leyden, 07 Jul 2014
Doom printer hack

Infosec geniuses hack a Canon PRINTER and install DOOM

Security researchers have demonstrated a hack that allowed them to get into the web interface of a Canon Pixma printer before modifying its firmware to run the classic 90s computer game Doom. The proof-of-concept demo by security researchers at Context Information Security, which involved remotely accessing the web interface on …
John Leyden, 15 Sep 2014

Retailers toast welcome return of Back2School notebook biz

The Back2School sales fest that deserted the retail notebook industry a year ago has returned with a bang… sort of. According to distie sales numbers crunched by Context, shipments across Western European wholesalers jumped 12.5 per cent in the first two months of Q3 and were up 17.5 per cent in the UK. The sales are flattered …
Paul Kunert, 12 Sep 2014

Microsoft stands on shore as tablet-laden boat sails away

The good citizens of Britain are still giving Windows 8 and 8.1 fondleslabs a wide berth, official figures from disties has confirmed. More than 596k slate tabs were shipped out to UK resellers and retailers in Q2, up 27.8 per cent year-on-year with the vast majority of them (nearly 406k) were running on Google’s Android …
Paul Kunert, 30 Jul 2014
The tag in question

Shove over, 2FA: Authentication upstart pushes quirky login tech

Security upstart LiveEnsure is trying to shake up the authentication market with technologies that verify users by device type, location and user behaviour, as an alternative to established authentication systems. The firm is pushing its smartphone-based services as an alternative to security tokens, biometrics, one-time- …
John Leyden, 07 Nov 2014
Stained glass angels

Gods of tech distribution smile on Blighty in Q1

Distributors in almost half of the countries across Western Europe failed to register sales growth during Q1 but those with ops in Blighty were not among them. Sales out data from Context reveals UK market revenues climbed 12.4 per cent in the three months to €2.5bn, making it the largest sector in the region for the past four …
Paul Kunert, 06 May 2014
ITU logo

ICT ministers mark out net-regulation patch ahead of ITU plenipot

The ITU has kicked off three weeks of wrangling over the future of the Internet – the 2014 Plenipotentiary – with a ministerial statement that's likely to spark concerns about the direction of the coming summit. The Busan Declaration, issued at the close of the Busan ICT ministerial meeting, is filled with high-minded language …

Hackable intercom lets you SPY on fellow apartment-dwellers

Kiwicon Kiwi hacker Caleb "alhazred" Anderson has popped a video intercom device that could have allowed him to spy on the 700 apartments in his building. The GrandStream GXV3175 intercom unit has been patched after Anderson - who by day serves as Context Information Security's lead consultant - began the attack while "inspired" by a …
Darren Pauli, 12 Dec 2014
Facebook privacy image

Facebook cosies up to ESET for malware detection

Facebook, which earlier this year started partnering with F-Secure and Trend Micro for malware detection, has added Slovak vendor ESET to its suite of security products. The previous tie-ups, detailed here, are worth noting to put the new partnership in context. F-Secure and Trend both pointed Facebook users at their free online …

Brit enterprises still wolfing down PCs post-XP support death

Tech disties feasted on a relative PC sales banquet in Q2 as businesses and to a lesser extent consumers made a belated dash to rid themselves of systems running on Windows XP. Abacus stroker Context collated the sale-out figures from wholesalers and found more than 844k desktops, notebook and PC workstations were adopted by UK …
Paul Kunert, 15 Jul 2014

Cisco makes ACI control more programmable

Cisco has released a command-line toolkit for its Application Centric Infrastructure (ACI), freeing sys admins from the tyranny of the GUI. The company describes its ACI Toolkit as a combination of “an NX OS-like CLI and some custom Python scripts” that cover the most common daily configuration and admin tasks. The toolkit also …
Intel PC Group General Manager, Mooly Eden

Intel laptop boss to make Ultrabooks context savvy

IDF 2011 Pundits have been talking about building GPS and other sensors into notebooks for some years. Now it may actually happen. Optional for the moment, Intel is planning to mandate the addition of a variety of sensors into its Ultrabook spec. Speaking after his IDF keynote today, Intel's PC Group chief, Mooly Eden, said he wants …
Tony Smith, 14 Sep 2011

Security SEE-SAW: $3 MEEELLION needed to fight a $100k hack

It costs a whopping $3.1m to defend against a $100,000 advanced attack, a security duo claims. The imbalance - well-known to security pros - was illustrated in research presented by Microsoft security strategist Paul McKitrick and founder of security startup ICEBRG William Peteroy (@wepiv) at the Kiwicon hacker fest in …
Darren Pauli, 18 Dec 2014
Monopoly testing

You, El Reg and a doctor walk into a Monopoly Pubcrawl chinwag

Live Chat You've no doubt been enjoying El Reg's scintillating coverage of our magnificent 3G/4G data Monopoly pub crawl, so now's your chance to quiz GWS chief Dr Paul Carter on the whole shebang. On Friday 29 August, we held a live chat with the man himself, to explain the decisions that were made in testing and to look at some of the …
Simon Rockman, 25 Aug 2014

BEST EVER broadband? Oh no you DIDN'T, Sky – ad watchdog

The telecoms giant formerly known as BSkyB has been ordered to remove a "best ever" broadband ad after rival BT claimed it was "misleading". The Advertising Standards Authority (ASA) said the context of Sky's "BEST EVER broadband offer" in July had not been substantiated and was likely to mislead. Last week BSkyB ditched the …
Kat Hall, 21 Nov 2014
Image of HAL eye from 2001 movie with Chrome logo in eye

729 teraflops, 71,000-core Super cost just US$5,500 to build

Cycle Computing has helped hard drive giant Western Digital shove a month's worth of simulations into eight hours on Amazon cores. The simulation workload was non-trivial: to check out new hard drive head designs, the company runs a million simulations, each of which involved a sweep of 22 head design parameters on three types …

Orion hacker sends stowaway into SPAAAAACE

One of the 1.3 million names sent into space aboard NASA's Orion test capsule was a stowaway, uploaded to NASA's database by a security researcher who found and exploited a vulnerability. The name 'Payload1 Payload2' was one of three uploaded to the NASA Orion database that collected names to be later transferred to a chip …
Darren Pauli, 08 Dec 2014

Virgin Media's ad fibs EXPOSED by bitter rival BT

BT successfully convinced Britain's advertising watchdog to admonish rival ISP Virgin Media for "misleading" its customers with unsubstantiated savings claims. The cable company failed to defend itself against three separate complaints filed by BT, which had griped about five national press ads and one posted on Virgin Media's …
Kelly Fiveash, 10 Dec 2014

Parliament face-sit-in to spark mass debate on UK's stiff smut stance

The august members of Blighty's Parliament may have a rather unusual sight to see on Friday: glancing out of their office windows, they could cop an eyeful of pro-porn protesters staging a graphic demonstration of their ire. The rally, planned for 12pm GMT at the Old Palace Yard, concerns the Audiovisual Media Services …
Iain Thomson, 10 Dec 2014
The Register breaking news

Big Data in Context

Big Data is an ‘umbrella’ term that is commonly used to refer to a number of advanced data storage, access and analytics technologies aimed at handling high volume and/or fast moving data in a variety of scenarios. These typically involve low signal-to-noise ratios, such as social media sentiment monitoring, or log file analysis …
Colin Beveridge, 16 Jan 2012
Girl with panties off. Credit: Helga Weber

Brit smut slingers shafted by UK censors' stiff new stance

UK smut-makers will be bound by a new set of rules that bans some forms of sexual behavior – but only when viewed from servers in Blighty. From now on, porno-streaming services in the UK will have to follow the same guidelines as DVDs sold in adult stores across the Queen's realm, which means certain things are out of the …
Iain Thomson, 02 Dec 2014

Regcast followup: Identity management in a connected world

In our Regcast Managing identity to drive business, ForgeRock’s Daniel Raskin explained why the function of identity management is changing from basic security and a way to lower operational costs to a world in which identity transforms your relationships (and the outcome of those relationships) with your customers. Behind this …
Tim Phillips, 04 Dec 2014
The Register breaking news

Unified communications in context?

Webcast We've seen from Reg research that a lot of you have considered and are exploring the notion of unified comms so we’ve been trying to do some work on your behalf. Last week we got a whole range of end users and experts in the field of unified comms to do a series of videos on the challenges, benefits and management of such …
Team Register, 25 May 2010
management big_data4

The channel is changing – but if you're prepared, there's no need to fear

What keeps channel professionals awake at night? From resellers to distributors to vendors, they are all concerned about when “traditional IT” will finally shuffle off this mortal coil. The channel is a delicate ecosystem of various vested interests — alliances, partnerships and deals – where each individual player is trying to …

Cisco: Think we're a lawsuit-hurling villain? 'Complete garbage'

Anyone that paints Cisco as a sueball-slinging bully boy that flexes its legal eagles to stem rivals' innovation is talking “complete garbage”, or so says its president of development and sales. The denial comes after Cisco last week filed several lawsuits in the US to "stop" Arista's "repeated and pervasive copying of key …
Paul Kunert, 12 Dec 2014
NSW_road_death_poster

More chance you came a cropper on a UK road than bought a Chromebook this year

Chromebooks aren't pouring cash into the coffers of European IT distributors – but, nonetheless, more Google-powered lappies are finding their way into the arms of cost-conscious schools and consumers. Some 45,000 Chromies each found a home across Western Europe in the first quarter of 2014, and 61.5 per cent of those purchases …
Paul Kunert, 20 May 2014
iPad Mail app

Tab for Xmas, Mr Consumer? Yes please. And Mr Busin... NOPE

The slab revolution in UK consumer land continued over Chrimbo but many biz customers are still struggling to justify wider deployments and most of those that did steered well clear of Windows 8. Disties shipped a total of 1.5 million tabs in Q4, a hike of 53.1 per cent on a year ago. Some 16.4 per cent of these went via biz …
Paul Kunert, 26 Feb 2014
Brute force

Holey? COWL! Boffins build boxes to hold sketchy JavaScript libs

Researchers have developed what they say is a new web privacy system for Google Chrome and Mozilla Firefox: we're told it blocks dodgy JavaScript code from funneling sensitive information to crooks. The Confinement with Origin Web Labels (COWL) system tries to protect websites that rely on JavaScript libraries written by third …
Iain Thomson, 07 Oct 2014

Microsoft gets storage QoS and software-defined storage religion

Microsoft is starting to make a lot of noise about software-defined storage and the need for storage quality of service. The company's Cambridge UK lab has just released Microsoft Research Storage Toolkit, a tool said to enable “effective and accessible research in Software Defined Storage by adding I/O classification functions …
Simon Sharwood, 31 Oct 2014

Apache patch: Cisco catches up with ANCIENT Struts2 vuln

Cisco has issued a patch for a four-year-old Apache Struts2 vulnerability. The original issue, CVE-2010-1870, was originally reported in July 2010. The vulnerability arises out of how Apache Struts2 handles commands passed to the Object-Graph Navigation Language. As the Apache notification states, “The vulnerability allows a …

Careful with 'fibre speed record' hype: which record's been broken?

Last January, NASA's Energy Science Network (ESNet) ran a test that achieved 91 Gbps end-to-end data transfers. The test made belated news this week in another outlet that touted ESNet as a "shadow network" faster than Google fibre. Leaving aside the inappropriateness of that hype, it got El Reg thinking about the business of …

Salesforce and Microsoft to unleash integrations ... next year

SaaS superpower Salesforce has revealed the details of its cloudy collaboration with Microsoft, and the main detail is that the fruits of the relationship won't be delivered until deep into 2015. Redmond's corporate veep for Windows marketing Tony Prophe appeared alongside Salesforce supremo Marc Benioff at the latter company's …
Simon Sharwood, 13 Oct 2014
Paypal vulnerability

PayPal takes 18 months to patch critical remote code execution hole

Paypal has closed a remote code execution vulnerability some 18 months after it was reported. The flaws reported earlier this month rated critical by Vulnerability Lab affected a core Paypal profile application. "A system specific arbitrary code execution vulnerability has been discovered in the official in the official PayPal …
Darren Pauli, 21 Nov 2014
The European flag

Europe may ask Herr Google: Would you, er, snap off your search engine? Pretty please

The European Parliament will reportedly consider pressuring, say, ad giant Google to snap off its search engine and move it away from its biz operations. A draft motion, seen by the Financial Times, calls for the "unbundling [of] search engines from other commercial services." The motion has the support of the two main blocs in …
Iain Thomson, 21 Nov 2014

Australian Government funds effort to secure wearable data pulses

Wearable health devices could feed Australians' health data into official databases to improve diagnosis under security research funded by the Federal Government. The researchers want to find ways to secure wearable consumer devices and validate the identity of users in order to enable health practitioners to trust data feeds. …
Darren Pauli, 02 Dec 2014
cloud

Sophos gulps down hot Mojave, will puff out more secure clouds

Sophos has slurped up the security firm Mojave Networks in a bid to develop the world's strongest and most secure cloud. You should probably now get excited about data security. "Mojave Networks is a young innovative company that has built a leading platform right at the intersection of three cutting-edge areas of security: …
Jasper Hamill, 08 Oct 2014
india

India's MOM Mars mission makes final course correction

India's Mars Orbiter Mission (MOM) has made its first course correction since June and is now on track to to arrive in orbit around the red planet on September 24th. Known to Indians as “Mangalyaan”, the craft is famous for having left the launchpad, and Earth, last November for the tiny sum of US$74m. The craft has since …
Simon Sharwood, 16 Sep 2014
Cortana China

Microsoft's Brit kid Cortana lands on UK WinPhone 8.1, but China's is the real cutie

Microsoft will be fine-tuning its virtual assistant Cortana in its first update to Windows Phone 8.1. The Siri rival is predicted to arrive on UK users' smartphones over the next few months. The preview pack for developers is already out, of course. Youtube Video Cortana will be coming to folks in Blighty and China as a beta …
Nokia Car Mode

Xen to practice art of motor vehicle embedded development

The Xen Project has launched an “Embedded and Automotive Initiative” to take its virtualisation project under the hood. The idea seems to be that virtualisation will make life easier for those packing computing power into cars. Today, developers and auto-makers alike bemoan the fact that cars often require different systems for …
Simon Sharwood, 19 Aug 2014
This geometric figure illustrates the concept of magic states and their relation to contextuality. The triangular region contains quantum states that are not magic and do not exhibit contextuality. States outside the triangle do exhibit contextuality and may be useful as a resource in the magic-state model of quantum computing.

Boffins lay out 'practical requirements' of 'realistic' QUANTUM COMPUTER

Canadian boffins have brought quantum computers a step closer to reality, by identifying one feature that will be key to finally building one – "contextuality". Our computers use the binary system of 1 and 0s. Quantum computers use qubits (quantum bits), which can exist in "superposition", meaning that they're simultaneously 0 …
cloud

SDN? More like $$$DN: Sales to soar from $1bn today to $8bn by 2018

Analyst outfit IDC has gazed into its crystal balls and decided software-defined networking (SDN) will bring US$8bn through the door in 2018, a fund-manager-gratifying increase over the $960m it will account for in 2014. The market-watcher says the $8bn will come as businesses buy more converged infrastructure, shift their …
Simon Sharwood, 22 Aug 2014
Evernote Android app screenshot

Evernote aims at corporate market with new chat feature

Note-taking, clip-loving Evernote is hoping to break into the corporate market with the release of a new chat feature. Work Chat will let people share editable notes while working on projects and also offers the chance to quickly drag a document they are working on into the chat window. The idea is that businesses will start to …
Kieren McCarthy, 03 Dec 2014
box_shifting_channel

UK channel firms rabbit-punch recession in Q4: Sales are HUGE

Blighty is again the largest tech sales territory in the European channels* after distributors reported a near double-digit growth spurt in Q4, fuelled by mobility, software and er... desktops. Numbers are in from Context, which tracks all major wholesalers' sales-out data - the kit that customers are actually buying - showing …
Paul Kunert, 27 Jan 2014
The Rugby Tuning Coil

The Information Age: A day out for grown-up children?

Exhibition Review The Science Museum's new Information Age gallery opened in October to great fanfare. Most of that fanfare, however, was concerned with an elderly lady having sent a tweet, rather than the substance of the exhibition itself. Youtube Video So, with the Christmas holidays upon us, and a pressing need to find things to fill up the …
Nigel Whitfield, 06 Dec 2014
Terror at 20,000 feet

'Everywhere I look ... it's bad': HP claims email shows Autonomy CFO panic, pre-buyout

In the latest court filing in HP's rancorous legal squabble with former Autonomy execs, the tech giant has revealed what it describes as a damning email from ex-Autonomy CFO Sushovan Hussain, prompting a spokesperson for the latter to again accuse HP of "smear tactics." HP is seeking to settle a lawsuit brought by its own …
Neil McAllister, 06 Sep 2014
iPhone forensics beaten image

Apple tells devs: NO slurping users' HEALTH for sale to Dark Powers

Apple is expected to unveil new products that will use the latest version of its iOS operating system, including new iPhones, on 9 September. But app developerswill be prevented from making sensitive user data available to third parties using the "HealthKit" platform. This is according to the latest version of the firm's licence …
OUT-LAW.COM, 01 Sep 2014
cloud

BizTalk-as-a-Service dog wags Microsoft's on-premises tail

Microsoft has signalled it will harmonise the feature set of the cloudy and on-premises versions of its BizTalk Server. Redmond's blogged announcement of the intention to have BizTalk Server and BizTalk Service may not look remarkable at first glance: hardly anyone jumps out of bed in the morning excited about their day working …
Simon Sharwood, 18 Aug 2014
Man walks on water like Jesus

PC makers REALLY need Windows 8.1 to walk on water - but guess what?

An updated Windows 8 from Microsoft will NOT be the "miracle cure" for traditional PC makers in need of a sales and profits injection. And that's according to IT biz analysts Context. This is the second technology distribution channel watcher in a week to warn that Redmond's touch-friendly operating system tweak, namely version …
Paul Kunert, 19 Jun 2013
Uber logo

Deutschland, Uber allowed (for now): Ban on taxi app lifted

A judge in Germany has scrapped a temporary injunction banning Uber's taxi service in the country. Today's decision by the Frankfurt Regional Court overturns an earlier ruling that put Uber's German operations on ice as it battles a legal challenge from the nation's taxi drivers. The injunction was made as Uber and Taxi …
Shaun Nichols, 16 Sep 2014

United Nations signs off on 'right to privacy in the digital age'

The United Nations (UN) has unanimously voted to adopt a resolution calling for online privacy to be recognised as a human right. The gesture is politically notable because it shows the world is willing to be seen to do something in the wake of The Year Of Snowden. The resolution extends the general human right of privacy to …
Simon Sharwood, 19 Dec 2013