Samsung's Knox to be Tightly Integrated with BlackBerry's BES12

Samsung's Knox to be Tightly Integrated with BlackBerry's BES12

Fights common enemy Apple with new partnership.

Samsung's Knox to be Tightly Integrated with BlackBerry's BES12
Under-pressure BlackBerry is fighting back, announcing a tie-up with Samsung that will bring the firm's BlackBerry Enterprise Service 12 (BES 12) security to Android handsets running the South Korean vendor's Knox containerisation system.
Knox has already boosted Samsung's Android enterprise credibility when it comes to security so what will BlackBerry's new unified platform, due for release early in 2015, add to this?
The core is familiarity and maturity. BES has been around for years and is being pitched as the best enterprise mobility management (EMM) system for large organisations to look after not only Android devices but those running iOS, Windows Phone 8 and of course BlackBerry.
Knox is promoted as the best Android device security technology, managed using a system many firms will already be familiar with. Other EMM systems are available to manage Knox, so this is really about BlackBerry's multi-platform prowess.
Being backed by Samsung also implies tight integration, which could give BlackBerry an edge over rivals.
"BlackBerry has developed a very close partnership with Samsung and we're committed to deepening the interaction between our engineering and product development teams for the long-term," said BlackBerry president of Global Enterprise Services, John Sims.
"It is a natural progression in our path to providing our customers with more alternatives to meet their evolving mobile needs. Samsung KNOX offers a number of hardware and software security features and our partnership allows us to tightly integrate these capabilities with BES12."
Features will include, protection against application security bypasses and software flaws, improved kernel-level security, a better user experience so that security features wouldn't get in the way of productivity and, of course, strict separation of work and personal devices usage, he said.
In an industry in which partnerships aren't always equal of particular significant, this looks like a match of equals. Samsung sells a lot of high-end smartphones but could do with selling more to businesses and security is essential to that push; BlackBerry just needs to make itself relevant in any way it can and a cross-platform strategy gives it more purchase.
When it launches early next year, Samsung will resell BES12 to joint customers while BlackBerry will offer KNOX to its Gold BES12 subscribers. Pricing will be announced at launch, BlackBerry said.

Uber's a Disruptive Tech Player, Not a Mere Taxi Service

Uber's a Disruptive Tech Player, Not a Mere Taxi Service

Here’s how Uber—a taxi company that came into India just a year ago—is successfully challenging local market leaders to lower their prices through astute tech play.

Uber's a Disruptive Tech Player, Not a Mere Taxi Service
Three months ago, The Association of Radio Taxis, that includes local market leaders like Meru cabs, Easy Cabs and Mega Cabs had joined hands to file a complaint against Uber in the Supreme Court of India for FEMA violations. The San Francisco-based company announced last week it has been granted a month-long extension by RBI to migrate to a new payment method to comply with Indian tax laws.
From a non-descript start-up five years ago to a phenomenal rise into global leadership, Uber’s success is hailed in some quarters and despised in others. But the fact remains that its disruptive business model has forced both Indian cab service operators and consumers to sit up and take notice of it.
[Read more: Sharing startups struck it big and struck out in 2013]
Where Uber Has Nailed It
Uber’s core competency is it allows customers to quickly hail cabs via its mobile app and pay with a credit card, taking seedy fare haggling with cabbies out of the picture. The app binds the user’s device with a geography and successfully displays point-to-point directions to the driver, making real-time cab tracking and seamless demand servicing a reality.
Apart from the credit card payment bit, Uber sounds uncannily similar to any other taxi service. Yet, Uber has been dramatically lowering its taxi fares sending the Indian cab market into a frenzy. Here’s why: Uber is a platform.
A platform is a business model that creates value by facilitating exchanges between two or more interdependent groups, usually consumers and producers. In Uber's case, it connects drivers with people who need a ride.
“Uber's disruption is brilliant in its simplicity,” says Manu Rekhi, director at Inventus Capital Partners that has invested in and works closely with a number of early stage companies in the eCommerce and transportation industries, like RedBus and Savaari. “Uber is leveraging technology to connect riders with people who have an underutilized asset—cars. Its effectiveness comes from connecting both supply and demand seamlessly.”
Less Risky - “A platform business is structured differently than Uber’s indigenous counterparts. What Ola and Meru Cabs operate on are basically once-dominant linear businesses of the 20th century,” says Nick Johnson, an expert from Applico, a company that helps platform businesses on strategy, design, and development. “Compared to a linear business, a platform faces much less risk of exposure - as defined by total fixed and quasi-fixed costs like payroll. A trait Uber proudly displays by allowing its drivers to partner with other cab operators if they want to.”
Lean Staff Strength- While Uber has about 25 employees in 10 cities, Ola has 11,000 cabs and 550 employees, and TaxiForSure has about 550 employees that service 5,000 cabs. Uber’s general expansion strategy includes hiring a three-member team comprising of a general manager, a community marketing manager, and a head of operations in every new city.
That's because platforms don't try to own one side of the transaction, the way traditional taxi companies do by employing drivers, says Johnson. Instead, Uber simply connects both sides using technology.
Quick Scaling- Uber doesn't need to scale by adding resources such as physical infrastructure (stores, factories, etc.) or additional inventory, the way traditional businesses do. Instead, it grows through its highly scalable number of drivers which is driven by network effects between its users and drivers.
Logarithmic Growth - So while a traditional taxi company's costs continue to rise as it grows (because it needs to buy more vehicles and employ more drivers), Uber's costs start to level off logarithmically when it reaches scale in any city. This ability to grow through ecosystems rather than resources allows it to scale to an extent that traditional businesses can't.
Surge Pricing and Tax Laws
Not all is rosy. The tech taxi provider is in the line of fire for many other reasons. Industry watchers would recall Uber and Lyft really go to war in the US over drivers. Whoever gets more drivers will be able to meet more demand, and ultimately make more money, was the rule.
[Also read: Are Uber's aggressive recruitment tactics legal?] 
The need to balance supply and demand is also the main reason behind Uber’s controversial ‘surge pricing’. That’s how a platform like Uber easily controls its business. When Uber raises the price with surge pricing, it does so because there are more requests coming in than there are drivers to take them. “Uber is willing to raise the price to consumers and price some of them out of the market if it will get more drivers on the road,” says Johnson
[Read: Uber won't surge-price you too much in emergencies]
Of course, another challenge is regulation. This challenge isn’t unique to Uber or other ride-sharing platforms. This legal trouble happens because platforms are a new, disruptive way of doing business in today’s world, but the laws are still oriented around the old ways of doing business.
As a result, these platforms often operate in a legal grey area. The usual strategy to counter this challenge is to get big really fast and then to try to use its popularity to legitimize itself. This only underlines how important expansion is to Uber. It needs to continue to grow in order to be able to have the popular support to convince local or national politicians to work with Uber and not against it.
[Airbnb, Uber and problems with the digital-sharing economy]
“The option that Uber is most likely to choose in India is partnering with a company that provides payment gateways or digital wallets. This way, Uber will still be able to accept online payments, and users will be able to pay in rupees through their cell phones, using the cash they have stored on their digital wallets,” says Jordan Perch, transportation analyst at DMV.com “Uber will have to integrate a digital wallet into their application and the two-step authentication requirement can also be met, since Uber will no longer use an international payment gateway.”
In a world where technology has made swift market disruption a reality, companies like Uber are increasingly exposing the ‘dinosaurs’ around us. With Uber also opening up non-credit card payment models in India, the most heartening news that emerges in all the confusion is that the last one laughing is the Indian consumer.
Timeline:
2013
August – Uber launches India Operations
December – Uber launches in India’s capital, New Delhi
2014
July – Uber teams up with Windows Phone in India
September – Ola and Meru Cabs launch in-app wallet
14th Oct – RBI asks Uber for tax-clarification
21st Oct – Uber slashes fares by 45 percent with UberX
30th Oct – Uber gets more time from RBI to meet Indian payment norms
10th  Nov – Uber launches vehicle financing programme with M&M, Maruti ,Tata Motors, and Toyota
Shweta RaoPrincipal Correspondent at CIO India and Computerworld Indiawrites on technology trends spanning both consumer and enterprise markets.  Send feedback to shweta_rao@idgindia.com. Follow her on twitter at @GeekSnuff

Your Coffee Shop Uses Cloud Computing

Your Coffee Shop Uses Cloud Computing
  Video for new technology in computer
Figure 2. The coffee shop with patterns applied. Numbers correspond to one of the five cloud application design
phases: (1) decomposition, (2) workload, (3) data, (4) component refinement, and (5) elasticity and resiliency. (Patterns
are derived from our previous work: www.cloudcomputingpatterns.org.)
 
In IT applications, we often find
a similar impact from workload,
where input complexity is similar for
all requests, but request handling in
the back end has higher complexity.
Assigning all the components of such
an application to one server and scal
-
ing the application by adding servers
is suboptimal under such conditions.
This would equate to building addi
-
tional coffee shops in warmer regions
to handle the higher demand for frozen
coffee products, rather than just adding
more blenders to one coffee shop.
Phase 3: Data (State)
As a prerequisite for later scalabil
-
ity and resiliency considerations, the
location where data are stored and
data consistency are extremely impor
-
tant. This is because the elastic scal
-
ing of resources and their replacement
in case of failures are significantly
affected by state information, which
might need to synchronize with newly
provisioned resources or could be lost
during a resource failure. We differen
-
tiate two types of state.
Session state
is the state of a user’s interaction with
an application — for example, a shop
-
ping basket in an online shop.
Appli
-
cation state
is the data an application
handles, such as the customer data, the
currently processed orders, and so on.
Two patterns characterize the means
by which an application handles these
state types
2
:
Stateful component.
Multiple
in
stances of a scaled‐out applica
-
tion component synchronize their
internal state to provide a unified
behavior.
 
Christoph Fehling, Frank Leymann, and Ralph Retter •
University of Stuttgart
IT applications and physical businesses often face similar challenges: customers
have to be served quickly; throughput and availability should be increased. Here,
the authors cover the architectural design phases of a cloud application and
describe common best practices relevant in each phase. To avoid IT complexity,
they use a coffee shop as a real-world analogy.
T experts have a long‐established relationship
with coffee and related products — you could
even call it love. Coffee shops making our
favorite products are places to relax and work,
but they can also inspire IT architectures.
1
We
can transfer a coffee shop’s efforts at increasing
the amount of processed orders while optimizing
resource use to IT application architectures.
Here, we examine cloud computing patterns,
2
capturing best practices for building and managing
cloud applications. We abstracted these patterns
from existing applications, architecture guidelines,
and documentation of cloud offerings to express
common, underlying architectural concepts. Each
pattern is a similarly structured and human‐read
-
able document describing an abstract solution
to address reoccurring architectural problems in
cloud applications. Patterns avoid provider‐ or
implementation-language‐specific terminology,
thus documenting design knowledge gained from
practice in a provider‐independent form.
Patterns and the Coffee
Shop Analogy
Patterns can describe the following:
cloud environments from different providers
and how they’re hosted;
the behavior of different cloud offerings and
when to use a certain offering; and
how to design applications using these offer
-
ings, and manage them at runtime.
Using patterns, IT architects can compare cloud
providers in terms of those patterns they support,
and can design applications without consider
-
ing the specific offering’s idiosyncrasies too early
in the design process. Furthermore, the design
knowledge captured in patterns can be more easily
applied to different cloud providers.
For fundamental cloud computing patterns, we
show that coffee shops similarly handle the five
design phases of cloud applications: decomposi
-
tion, workload, data (state), component refinement,
and elasticity and resiliency. In other words, you
can experience all the design phases first-hand by
buying a coffee.
Figure 1 shows the coffee shop we consider
as an analogy. Customers entering the shop form
a line waiting to place their orders at a set of
cash registers. Employees take the order, collect
the payment, and write the customer’s name and
desired product on a cup. They then place this cup
on a separate table, where it waits for processing
by baristas handling the coffee machine for regu
-
lar coffee products, such as drip coffee or espresso.
Baristas also operate a set of blenders for frozen
coffee products. After processing, a barista places
the finished product on a second table, where the
customer retrieves it; here, the information on the
cup is used as a correlation identifier.
3
Phase 1: Decomposition
By nature, clouds are large distributed systems pro
-
viding resources for computation, communication,
and storage.
4
Monolithic applications that com
-
prise one component and use a single server for
hosting do not benefit from this distributed envi
-
ronment. Instead, cloud application architectures
must distribute an application’s functions among
IC-18-05-VftC.indd 52
04/08/14 2:14 PM
Images can mislead the viewer by modifying, inserting or removing objects from the scene. Many photo editing applications include tools that can remove objects cleanly from their surroundings with a few clicks. This is known as inpainting.
An early method was to fill the void left in the image by smoothly interpolating inwards, based on sampling the pixels at the edge of the missing area. Other techniques include seam carving, content-aware image resizing in which an algorithm establishes the image's important areas in order to remove or expand sections around them without affecting the subject of the image.


Read more at: http://phys.org/news/2014-11-forging-photo-easy-fake.html#jCp
Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showing the MH17 airliner being fired upon by a jet fighter, may have convinced others.

Read more at: http://phys.org/news/2014-11-forging-photo-easy-fake.html#jCp
Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showing the MH17 airliner being fired upon by a jet fighter, may have convinced others.

Read more at: http://phys.org/news/2014-11-forging-photo-easy-fake.html#jCp
Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showing the MH17 airliner being fired upon by a jet fighter, may have convinced others.

Read more at: http://phys.org/news/2014-11-forging-photo-easy-fake.html#jCp
Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showing the MH17 airliner being fired upon by a jet fighter, may have convinced others.

Read more at: http://phys.org/news/2014-11-forging-photo-easy-fake.html#jCp