Thursday, March 27, 2014

WD unveils a truly portable Thunderbolt drive for performance junkies


More Engadget here...

WD unveils a truly portable Thunderbolt drive for performance junkies

BY JON FINGAS @JONFINGAS MARCH 27TH 2014,


There are already a few portable hard drives that take advantage of Thunderbolt's brisk performance, but they have to plug into a wall outlet -- not very convenient when you're in the field. Western Digital is fixing that discrepancy today by unveiling the My Passport Pro, the first dual-drive Thunderbolt storage that takes its power solely from Intel's high-speed port. 

The drive isn't the fastest we've seen at about 233 MB/s, but it's still quick on its toes; it can copy that giant video project to your MacBook Pro in roughly half the time it would take on USB 3.0. If you're the sort who would rather not go hunting for power sockets while editing outside of the office, you can grab the My Passport Pro right now for $300 with 2TB of capacity, or $430 in 4TB form.

Tuesday, March 25, 2014

Colorado CH4

Simple Fixes Could Plug Methane Leaks from Energy Industry, Study Finds


In Colorado, where this natural gas drilling rig is located, new regulations require controls on methane leaks. (Photograph courtesy EnergyTomorrow, Flickr)

Almost all of the climate-affecting methane leaks from the oil and gas infrastructure could be reduced at relatively little expense, often by simply tightening bolts or replacing worn seals, suggests a new study by the Boston-based Clean Air Task Force released today. (See related story: “Green Fracking? 5 Technologies for Cleaner Shale Energy.”)

The report noted that unintentional leaks account for 30 percent of the methane emitted by the oil and gas industry, which after agriculture is the second biggest source of the potent greenhouse gas. (The bulk of the emissions is intentionally vented into the atmosphere, to regulate the extraction, processing and transmission of the fuels.)

Energy companies could recoup the cost of plugging 90 percent of those leaks in as little as a year’s time, by selling natural gas that otherwise would have escaped into the atmosphere, according to the report. (The U.S. Environmental Protection Agency has estimated that the typical natural gas processing plant loses natural gas emissions worth about $230,000 each year.)

But beyond immediate repairs, an ongoing effort to monitor and actively curb methane would end up costing the companies money, because they would have to conduct monthly or quarterly inspections of well sites, using infrared cameras to scrutinize equipment for methane missions. As a result, most oil and gas facilities would end up spending slightly more than they saved, with companies shelling out as much as $2,500 per well and up to $8,000 per gas plant annually.

Even so, the cost of doing such inspections would amount to a tiny fraction of the revenue that natural gas producing companies generate, said David McCabe, an atmospheric scientist for the task force. In Colorado, which in February became the first state to require methane inspections new regulations , McCabe said that the tests will cost about $18 million annually—three-tenths of a percent of the $6 billion in income generated by natural gas in the state.

“Regularly inspecting oil and gas facilities is an inexpensive and logical way to reduce methane emissions,” McCabe said.

The study is based on data gathered by inspectors who used infrared cameras to scrutinize 4,000 well sites, gas compressor stations and processing plants, about 90 percent of them in Canada with the remainder located in the U.S. The inspectors found more than 58,400 individual pieces of equipment—an average of 13.6 per facility—that were emitting methane. Nearly 40,000 of those pieces of equipment had unintentional leaks, most of which could be fixed with simple repairs. The median cost of the fixes was just $50.

Although there’s widespread concern about the environmental risks of fracking, the study found that most of the total methane emissions actually come from plants and compressor stations rather than wells. And only 17 percent of the emissions from well sites are accidental leaks, with the rest being vented intentionally. (See related, “Methane Emissions Far Worse Than U.S. Estimates.“)

While detecting and fixing leaks would make a significant dent in methane emissions, curbing intentional venting clearly would have much more dramatic impact. According to Ben Ratner, an policy expert in methane control for the Environmental Defense Fund, that would require upgrading equipment. The conventional pumps used to inject fracking chemicals into wells, for example, utilize the pressure of natural gas in the well as a power source, and vent it to regulate themselves. Switching to another power source, such as solar-generated electricity, would eliminate nearly 6 billion cubic feet of methane emissions annually.

EDF recently released its own report analyzing potential opportunities for reducing methane emissions in the oil and gas industry, emissions that EDF estimates will amount to 404 billion cubic feet for onshore production in 2018.

Ratner said that while many companies are voluntarily moving to curb their methane output, stricter government regulation akin to Colorado’s new rules was needed. “The good news is that some companies are leading the way, but we need strong policy to level the playing field. We have thousands of gas producers, which means that we need protective rules that are strongly enforced.” (See related, “Air Pollution From Fracked Wells Will Be Regulated Under New U.S. Rules.”)

Samsung for Army - everything but radios



The Army is rolling out thousands of Samsung smartphones as part of its Nett Warrior system.


Specifically, the Army purchased about 7,000 Samsung Note II smartphones, which will be used as chest-mounted devices, according to The Wall Street Journal.

Last July, the Army announced it was fielding the Net Warrior system and outfitting soldiers, team leaders and others with situational awareness on the battlefield via Samsung smartphones. At the time, the system displayed locations of fellow soldiers, enabled text messaging and other capabilities.

Army officials also said most of the communications capabilities on the device are disabled before the phones are integrated into a Net Warrior system, including the cellular antennas, the Wi-Fi capability, and the Bluetooth capability. Instead, the devices communicate via the USB connection with a soldier's hip-mounted Rifleman Radio. The radio provides network connectivity to the system.

The devices run a version of the Android operating system approved by the National Security Agency, according to the Army.

Those devices are different from the commercial devices being rolled out under the Defense Department’s mobile strategy, said Rick Walsh, the Army CIO G/6 mobility team lead. “A lot of them are actually display devices,” providing information for the user but doing little else, Walsh said.

Walsh said the commercial devices being managed under DoD’s new mobile device management capability are being embraced out of the box. While certain features may be disabled, the Army is not going to change the hardware or completely retrofit the phone.

BYOD Enterprise Geography

BYOD: It's not dead yet 

New NIST guidance offers mobile security solutions


charles m walling, aado kommendant, ivo kommendant

The bring-your-own-device movement has taken off in the private sector, but in the government and the Defense Department, it remains just out of reach as leaders wrestle with ongoing security and privacy concerns.

Managers and CIOs with strapped budgets see the promise of savings through BYOD, but decision-makers and IT leaders worry about data leaks and the ramifications of security breaches.

“A big legal issue for us is spillages,” said James Craft, deputy director of information enterprise management at the Defense Department’s Joint Improvised Explosive Device Defeat Organization. “If we get a certain kind of information spilled on a piece of equipment, the way it’s usually cleaned up for us is usually with a blowtorch, or with a sledgehammer, then a blowtorch, depending on the information. So how you handle that when it’s people’s personal devices, especially if they’re not a government employee, becomes very complicated.”

Craft, who says his IT budget declined by 62 percent this year, is not alone. The search for savings is on across the federal government, and it’s fueling a growing body of research and policy regarding ways to securely allow employees to connect their own smartphones, tablets and other devices to their office networks and tools.

An important recent development is the release of draft guidelines from the National Institute of Standards and Technologies. NISTSpecial Publication 800-52 outlines practices for using derived credentials, a way of securing phones and authenticating user identity without the use of external personal identification verification (PIV) cards, such as DoD’s Common Access Card, required under 2005’s Federal Information Processing Standard 201.

“At the time that FIPS 201 was first published, logical access was geared toward traditional computing devices [such as desktop and laptop computers], where the PIV card provides common authentication mechanisms through integrated readers across the federal government,” the authors of NIST’s SP 800-52 wrote. “With the emergence of a newer generation of computing devices, and in particular with mobile devices, the use of PIV cards has proved challenging.”

Today, the required two-factor authentication, combined with the lack of an integrated smart card reader found on traditional computers, means that DoD users must have a separate CAC “sled,” or card reader — an additional cost that bulks up the device and can drain battery life, among other drawbacks. The guidelines under SP 800-52 provide for derived credentials that allow for both pieces of the two-factor identification to be stored on the phone — either internally or through something that connects to the device, such as an approved USB — and secured separately.

The goal is that the recommendations build on previous standards from NIST and are flexible enough to still apply as technology, and the resulting policies quickly move ahead, according to one NIST official.

“As technology evolves, these controls are still applicable,” said Ron Ross, an NIST fellow and computer scientist specializing in information security and risk management. “Sometimes, you have to tweak them a little bit, but the important thing is that you can go through the list to make sure that you are well-protected. Our controls are policy- and technology-neutral.”

Derived credentials present a promising option for secure mobility. But those in the thick of BYOD efforts note that much more is needed if the government is serious about a future that fully capitalizes on mobility. Before BYOD can ever become a reality inside the government, requirement processes and supply-chain management must be addressed. Smart policies that govern use and combat high-tech adversaries also must be created.

“The problem with technology now is they’re switching out the devices so fast that we do not have the throw weight and systems engineering to assess and integrate the device securely,” Craft said.

“It isn’t just the operating system, it’s the hardware — what is the supply chain for the hardware? And that’s an issue the country has backed off,” he said. “We’ve offshored so much of our engineering and so much of our industrial base that we don’t necessarily have a clear window into the systems engineering that went into it, and we’ve seen for the last five years there is immense research and development being done [in foreign countries] to exploit devices they manufacture.”Another NIST publication due out in July, SP 800-160, will address best practices in security throughout the life cycle, including systems engineering, Ross said.

“We’ve worked with NSA and industry to take an engineering standard and infuse security into every stage of process development. Everything from operations to sustainment,” he said. “The strength of mechanisms we need to have and the resiliency that we need to have, that doesn’t come from putting up a firewall. We know how to do this; we just have to have the will to do it.”

But also lacking is the strong leadership that many feel is necessary to reach a BYOD security standard across both the public and private sectors. By comparison, Ross pointed out that at one point, airbags were features offered on cars for an additional cost, but today they are standard; security is no longer considered an “extra” when it comes to vehicle safety. He hopes the same will become true when it comes to the security needed for government mobility.

One option that DoD officials are considering is the use of mobile carriers to manage devices to help achieve that security standard in a way that is cost-efficient.

“I think there’s a policy ecosystem that has to be put in place that doesn’t exist yet, at least not in execution,” Craft said. “Who has the engineering throw weight to actually pull it all together? I think the answer is the mobile carriers.

“There are a limited number of mobile carriers; they’re large organizations; there would be a market incentive for them,” he said. “They would make money if they could sell phones or a type of mobile service that is secure … and they have enough interaction and power to deal with the federal government.”

There are BYOD pilot programs, such as in the Marine Corps, that are testing out new approaches to an adaptive mobility option that yields the kind of flexibility today’s government workers expect from employers. But it is probable broader policy discussions will need to take place before there is a large-scale adoption of BYOD, officials noted.

“We are moving down the road with technology so rapidly, and I’m wondering if we actually have internalized yet what it means, how much exposure we’re bringing into our organizations with these devices,” Ross said.

“These are very powerful end points. I think we have to have a national dialogue; maybe the [recently released NIST] cyber framework is going to be the organizing construct to have a dialogue,” he said. “We have to ask ourselves as a society, how much are we willing to risk before we’re going to engage with this problem?”

Drone 3D Mapping...

eBee drones create 3D model of the Matterhorn

Megan Treacy
Technology / Gadgets
October 21, 2013

 
© senseFly



The possible applications for drones are growing every day. From watching out for poachers in wildlife parks in Africa to delivering textbooks to students, the autonomous flying machines are tackling problems both big and small. The ability for the drones to have onboard sensors and HD cameras makes them ideal tools for mapping and surveillance.

Taking that idea to the extreme, engineers from senseFly, partnered with Drone Adventures, Pix4D and Mapbox, were able to create a digital model of the Matterhorn with a 20-cm resolution in three dimensions. Two teams took the company's eBee drones to the mountain with Team 1 hiking to the summit and launching the devices to fly around the top of the peak. Team 2 launched eBees from the bottom of the mountain to cover the lower parts of the mountain.



© senseFly

SenseFly says, "The main challenges successfully overcome were to demonstrate the mapping capabilities of minidrones at a very high altitude and in mountainous terrain where 3D flight planning is essential, all the while coping with the turbulences typically encountered in mountainous environments."

For the project, 11 flights were made totaling 340 minutes. The drones took 2,188 photos and created an HD point-cloud with 3 million datapoints. The company's eMotion2 software provided the ground control for the flights, automatically creating flight paths for the multiple drones.
© senseFly

You can watch a video about the project below and see how the mapping and flight planning took place.
Tags: Gadgets | Maps | Technology

Sunday, March 23, 2014

Full Motion Video GEM Editors...

Saving Terrabytes of Streaming Bandwidth.. Google struggles on

MARCH 23RD, 2014 AT 1:23AM ET



We all want the internet to be faster, right? Well, Google is hoping to make that happen one YouTube thumbnail at a time. Its leaner WebP image format has been used on the Play store for some time now, and Mountain View's latest venue for the faster-loading files its video service. The outfit says that the switch has resulted in up to 10 percent speedier page-loads, and overall it's shaved tens of terabytes off its internal data transfer rates every day. The Chromium Blog says that this should help lower bandwidth usage for users as it rolls out, and, what's more, that there's a test-version of WebP running in Chrome's beta channel that's faster yet. How much so? It drops image decode speeds by 25 percent. If that means faster access to super hero videos and pictures of lazy dogs, sign us up.

Sunday, March 16, 2014

CamioCAM



CamioCam Turns Any Web Or Video Camera Into A Smart, Cloud-Based Monitoring Device

What if you could get an alert to your phone anytime someone left a package on your doorstep? Or, if you could track whether your elderly parent took her medication in a given day? CamioCam’s intelligent, video-monitoring service wants to be able to accomplish these tasks and more. The startup, which is launching at the LAUNCH conference today, turns any connected camera in your home (a tablet, smartphone, computer) into a cloud-based monitoring experience.

The company is founded by ex-Googler Carter Maslan who was director of product management for local Search, Maps, and Earth at the search giant. And CamioCam has raised over $1 million in funding from Freestyle, Marissa Mayer, Greylock, Floodgate, Ellen Levy, John Hanke, Box Group and others.

Here’s how it works. You can connect any Wi-Fi-connected phone, tablet, webcam or IP camera to CamioCam. The cameras upload video to CamioCam whenever there is motion and proprietary algorithms analyze the motion to figure out whether the motion should be marked — basically aiming to cut down hours and hours of video into small alerts. Users will get instant alerts on their phone or email, along with snippets of the concerning video so they don’t have to go through hours of video. Users can also search or filter through the most important events.

You can even get more specific alerts by selecting zones in your camera view, like a countertop in your kitchen or the baby’s crib, and you can choose which zones alert you of movement. You can have multiple zones for one camera (i.e. in a kitchen you could have a trashcan zone as well as a fridge zone).

As Maslan explains, CamioCam is fast, with near­ real-time alerts coming roughly 7x faster than traditional cameras, and the service uses 92 percent less bandwidth than streaming services. The startup also promises fewer false positives.

In terms of cost, you can use a web camera, using the CamioCam app in your browser or on an Android device for free. Beyond that, each additional camera is $9.90 per month.

At the heart of what CamioCam does is basically turn a browser camera into a motion detector camera, which is allowed in part via the WebRTC. For now the startup offers an Android and web app.
  
CamioCam will go head to head with Dropcam, a favorite for cloud-based video monitoring. But Maslan believes that CamioCam provides simplicity for users because they can use a browser within a phone or tablet and don’t necessarily have to purchase outside equipment.

Tuesday, March 4, 2014

Hard Android from Boeing

The Boeing Black Secure Android Smartphone Gets Official After Three Years In Development

Posted Feb 27, 2014 by Darrell Etherington (@drizzled)

Boeing’s secure smartphone has been fully detailed after an FCC filing revealed its imminent arrival yesterday, and the Android device seems like an unusual, and mission-specific gadget. With a 4.3-inch 960×540 display, LTE, a dual-core 1.2 GHz ARM Cortex A9 processor, Bluetooth 2.1 and SD expandability, it’s not going toe-to-toe with any flagship devices, but the point is security, not muscle.

Boeing told Reuters that it has been working on the Black for three years, and that the phone has now been offered up for sale to the aerospace company’s very select clientele (ordinary humans like us don’t get price or general availability information). Information about OEM partners manufacturing hardware, or networks offering service for the device are classified, as is much about the smartphone by design, since it’s entirely based around the idea that some customers need a smartphone where security features are not only present, but paramount.

In working with Boeing’s U.S. defense and security clients, the company realized that there was a need for devices that are designed from the ground up for the protection of sensitive data and transmissions. The Black is that, and offers a modified version of Android with additional built-in security features to accomplish that. A dual-SIM feature allows it to switch easily between general consumer and government-specific networks, and it features a modular design via a hardware expansion port.

This expansion port allows clients to add in various tech security devices, including biometric sensors for verifying identity, as well as add-ons that provide additional powers to the phone, like satellite antennas for remote connections, backup batteries or protective cases. There’s also a PDMI port, which can be used to connect to media devices and in-car systems.

It might seem like an odd device for Boeing to market, since it isn’t a jet or satellite, but the company actually has a great position from which to market the next generation of secure mobile devices, because of the nature of its client list. It also probably has a unique perspective on what those clients need in terms of secure communications capabilities. It’s early days for the Black project, but it’ll be interesting to see if this can encroach on BlackBerry’s dominant role in the U.S. Defense market.

TomTom offers 7 Inch Android with Hardened Features

TomTom rolls out 7″ Android tablet for fleets

TomTom Bridge Android tablet for fleetsTomTom has announced the Bridge, a 7″ ruggedized Android device for fleet managers. The tablet-like device will include an NFC chip, 5MP camera, Bluetooth, WiF, a 3G modem, rear camera compatibility, and a replaceable battery.
TomTom Bridge
Sample version customized for car rental agencies
The company is touting the device as ideal for a wide range of fleet-based businesses, taxis and car rental agencies.
The Bridge is slated to be available in Q2 2014. Initially I thought this might be a Europe-only release for the time being, but I have been assured that it is coming to the US shortly.
TomTom Bridge showing rear view camera interface
TomTom Bridge showing rear view camera interface

Sweet Deal $2,500


http://www.bhphotovideo.com/c/product/999010-REG/canon_eos_6d_dslr_camera.html