Daily Video: Apple Reportedly Eyeing Electric Car Production

 
 
By eWEEK Staff  |  Posted 2015-02-23 Print this article Print
 
 
 
 
 
 
 

Apple reportedly eyeing electric car production; Apple Watch 'premium' versions could get pricey; EMC adds new options for navigating data lakes; and there's more.

 
SAP Rebrands Cloud Platform; Supports iOS Enterprise App Development

DAILY VIDEO: SAP goes all in with new public cloud platform, iOS dev tools; Amazon, Lenovo Motorola...

Apple Investigating Recent Battery Fire in iPhone 7 Plus

DAILY VIDEO: Apple trying to permanently resolve iPhone 6 and 7 battery faults; Researchers from...

Apple's 'Spaceship' Headquarters Schedule to Open in April

DAILY VIDEO: Apple's futuristic new HQ Set to open doors in April; UPS tests delivery trucks equipped...

Cisco Extends Network Security Portfolio With Firepower 2100 Series

DAILY VIDEO: Cisco provides more firepower to security portfolio; Google to allow independent audit...

Harris Poll Shows Samsung Reputation Hurt by Note7 Smartphone Recall

DAILY VIDEO: Samsung's reputation hurt in latest Harris poll after Note7 debacle; Kubernetes...

New LG G6 Smartphone to Feature Side-by-Side FullVision Display

DAILY VIDEO: LG G6 smartphone getting side-by-side FullVision display; Azure SQL database threat...

Verizon, Yahoo Agree to Reduce Buyout Price to $4.55 Billion

DAILY VIDEO: Verizon negotiates down to $4.55B for Yahoo transaction; Congressional staffers see...

Google Tells RSA Show Audience How it Secures a Billion Android Users

DAILY VIDEO: How Google secures over a billion Android users; Amazon moves into teleconferencing...

Oracle Appeals Ruling in Java Infringement Dispute With Google

DAILY VIDEO: Oracle revives Java copyright infringement dispute with Google; Apple to Mark Smartphone...

Trump Administration Holds Back Executive Order on Cyber-Security

DAILY VIDEO: White House withholds cyber-security order for further revision; Cortana to help Windows...



Read more about the stories in today's news:

 
 
 

Apple is looking to diversify its business into electric car production, possibly by as soon as 2020, as the company explores new business opportunities outside of its core consumer technology and PC, tablet and smartphone businesses.

The New York Times reported that Apple has been recruiting about 200 people from both inside the company and from competitors like Tesla to help them develop new electric cars.

The Apple Watch is priced at $349, which sounds reasonable compared to the prices of competing watches from LG, Sony, Motorola and other manufacturers.

However, premium versions of the Apple Watch— which could sell for as much as $5,000 or $8,000 or more— are being touted in some industry reports. This is leading some to wonder if there is a market for such pricey watches and if these premium versions will be worth the cost.

Data lakes are the newest hot-button term in the IT business world. These are massive, easily accessible, centralized repositories of large volumes of structured and unstructured data. EMC has had its own Data Lake Foundation strategy for several months, and recently made a few announcements about it.

For example, the new Isilon HD400 allows customers to scale their data lakes to 50 PB within a single cluster. Also, EMC announced a new version of its OneFS operating system, v7.2, which supports newer and more current versions of Hadoop protocols.

Organizations around the world have deployed a wide range of technologies to protect network infrastructure and endpoints from security risks.

Technology, however, isn't the only risk that needs to be secured. A new report from Intel Security, titled "Hacking the Human Operating System," explained the role of social engineering within cyber-security. Intel Security explains that there are two main types of social engineering attacks: hunting and farming.

In hunting attacks, the culprits are looking to gain information and exploit the user with minimal interaction while. In farming attacks, the malicious hackers seek to build a relationship with the victim and then extract information over time. Email is a leading culprit in attack vectors for all types of social engineering.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel