Sigurnost Apple Platforme Proljeće 2020

Total Page:16

File Type:pdf, Size:1020Kb

Sigurnost Apple Platforme Proljeće 2020 Sigurnost Apple platforme Proljeće 2020. Sadržaj Uvod u sigurnost Apple platforme 5 Obveza za sigurnost 6 Sigurnost hardvera i biometrija 8 Pregled sigurnosti hardvera 8 Secure Enclave 9 Dedicirani AES modul 10 Touch ID i Face ID 12 Hardversko isključivanje mikrofona u Macu i iPadu 17 Express Card kartice sa štednjom energije u iPhoneu 17 Sigurnost sustava 18 Pregled sigurnosti sustava 18 Generiranje nasumičnih brojeva 18 Sigurno podizanje sustava 19 Sigurnosna ažuriranja softvera 28 Integritet sustava OS u sustavu iOS i iPadOS 29 Integritet sustava OS u sustavu macOS 31 Sigurnost sustava watchOS 37 Enkripcija i zaštita podataka 40 Pregled enkripcije i zaštite podataka 40 Kako Apple štiti osobne podatke korisnika 40 Uloga Apple sustava datoteka 41 Zaštita podataka u sustavu iOS i iPadOS 42 Enkripcija u sustavu macOS 48 Šifre i lozinke 54 Autentikacija i digitalno potpisivanje 56 Zbirke ključeva 58 Sigurnost Apple platforme 2 Sigurnost aplikacija 61 Pregled sigurnosti aplikacija 61 Sigurnost aplikacija u sustavu iOS i iPadOS 62 Sigurnost aplikacija u sustavu macOS 67 Sigurnosne značajke u aplikaciji Bilješke 70 Sigurnosne značajke u aplikaciji Prečaci 71 Sigurnost usluga 72 Pregled sigurnosti usluga 72 Apple ID i Upravljani Apple ID 72 iCloud 74 Upravljanje šiframa i lozinkama 78 Apple Pay 85 iMessage 97 Dopisivanje s poduzećem 100 FaceTime 101 Pronalaženje 101 Kontinuitet 105 Sigurnost mreže 109 Pregled sigurnosti mreže 109 Sigurnost TLS mreže 109 Virtualne privatne mreže (VPN-ovi) 110 Sigurnost Wi-Fi mreže 111 Sigurnost Bluetootha 114 Ultra Wideband tehnologija 116 Jednostruka prijava 116 Sigurnost značajke AirDrop 117 Dijeljenje lozinke za Wi-Fi 118 Vatrozid u sustavu macOS 118 Kompleti alata za developere (“Developer Kits”) 119 Pregled kompleta alata za developere 119 HomeKit 119 HealthKit 125 CloudKit 127 SiriKit 127 DriverKit 128 ReplayKit 128 Camera i ARKit 130 Sigurnost Apple platforme 3 Sigurno upravljanje uređajima 131 Pregled sigurnog upravljanja uređajima 131 Model uparivanja 131 Upravljanje postavkama šifre i lozinke 132 Provođenje konfiguracije 133 Upravljanje mobilnim uređajem (MDM) 134 Automatizirana prijava uređaja 135 Apple Configurator 2 136 Nadzor uređaja 136 Ograničenja uređaja 137 Zaključavanje aktivacije 137 Mod izgubljenog uređaja, udaljeno brisanje i udaljeno zaključavanje 139 Dijeljeni iPad 140 Vrijeme uporabe zaslona 141 Sigurnost Appleovih proizvoda i certifikati o privatnosti 144 Pregled sigurnosti Appleovih proizvoda i certifikata o privatnosti 144 Appleovo sigurnosno jamstvo 145 Pojmovnik 148 Prethodne revizije dokumenta 153 Sigurnost Apple platforme 4 Uvod u sigurnost Apple platforme Apple dizajnira sigurnost u jezgru svojih platformi. Gradeći na iskustvu izrade najnaprednijeg svjetskog mobilnog operativnog sustava, Apple je izradio arhitekture sigurnosti koje rješavaju jedinstvene zahtjeve mobilnih uređaja, satova, stolnih računala i doma. Svaki Apple uređaj kombinira hardver, softver i usluge dizajnirane da rade zajedno za maksimalnu sigurnost i transparentan doživljaj korisnika radi postizanja krajnjeg cilja održavanja osobnih informacija sigurnima. Prilagođeni sigurnosni hardver pokreće ključne sigurnosne značajke. Zaštite softvera rade na čuvanju sigurnosti operativnog sustava i aplikacija drugih proizvođača. Usluge pružaju mehanizam za sigurna i pravovremena ažuriranja softvera, pokreću sigurniji ekosustav aplikacija, sigurne komunikacije i plaćanja i pružaju sigurnije iskustvo na internetu. Apple uređaji štite ne samo uređaj i njegove podatke, nego i čitavi ekosustav, uključujući sve što korisnici rade lokalno, na mrežama i s ključnim internetskim uslugama. Jednako kao što svoje proizvode dizajniramo da budu jednostavni, intuitivni i sposobni, tako ih dizajniramo i da budu sigurni. Ključne sigurnosne značajke, poput enkripcije uređaja temeljene na hardveru, ne mogu se greškom onemogućiti. Ostale značajke, kao što su Touch ID i Face ID, poboljšavaju iskustvo korisnika čineći zaštitu uređaja jednostavnijom i intuitivnijom. A budući da je mnogo ovih značajki standardno omogućeno, korisnici ili IT odjeli ne moraju stvarati opsežne konfiguracije. Ova dokumentacija daje detalje o načinu na koji se sigurnosna tehnologija i značajke implementiraju u okviru Apple platformi. Također pomaže organizacijama da kombiniraju sigurnosnu tehnologiju i značajke Apple platforme kako bi se ispunile njihove specifične sigurnosne potrebe. Sadržaj je organiziran u sljedeće teme: • Sigurnost hardvera i biometrija: hardver koji predstavlja temelj sigurnosti na Apple uređajima, uključujući Secure Enclave, dedicirani AES kriptografski modul, Touch ID i Face ID. • Sigurnost sustava: integrirane hardverske i softverske funkcije koje omogućuju sigurno podizanje, ažuriranje i kontinuirani rad Apple operativnih sustava. • Enkripcija i Zaštita podataka: arhitektura i dizajn koji štiti podatke korisnika ako se uređaj izgubi ili bude ukraden ili ako ga neovlaštena osoba ili proces pokuša koristiti ili izmijeniti. • Sigurnost aplikacija: softver i usluge koje osiguravaju siguran ekosustav aplikacija i omogućuju aplikacijama da se pokreću sigurno i bez ugrožavanja integriteta platforme. • Sigurnost usluga: usluge društva Apple za identifikaciju, upravljanje lozinkama, plaćanja, komunikaciju i pronalaženje izgubljenih uređaja. Sigurnost Apple platforme 5 • Sigurnost mreže: protokoli umrežavanja koji su industrijski standard te koji osiguravaju sigurnu autentikaciju i enkripciju podataka koji se prenose. • Kompleti alata za developere (“Developer Kits”): okviri za sigurno i privatno upravljanje domom i zdravljem, kao i proširenje mogućnosti Apple uređaja i usluga na aplikacije drugih proizvođača. • Sigurno upravljanje uređajima: načini koji omogućuju upravljanje Apple uređajima, sprječavaju neovlaštenu uporabu i omogućuju udaljeno brisanje ako se uređaj izgubi ili ukrade. • Certifikati o sigurnosti i privatnosti: informacije o ISO certifikatima, kriptografskoj provjeri, Certifikatima za zajedničke sigurnosne kriterije i Commercial Solutions for Classified (CSfC) programu. Obveza za sigurnost Apple se obvezao pomagati zaštititi klijente s vodećim tehnologijama sigurnosti i privatnosti dizajniranima da čuvaju osobne podatke i sveobuhvatnim metodama da pomognu zaštititi korporativne podatke u poslovnom okruženju. Apple nagrađuje istraživače za rad koji obavljaju u otkrivanju ranjivosti nudeći Apple nagradu za sigurnost. Detalje o programu i kategorijama nagrada možete pronaći na https://developer.apple.com/ security-bounty/. Imamo dedicirani sigurnosni tim za podršku svim proizvodima. Tim pruža sigurnosnu reviziju i testiranje za proizvode, kako one u razvoju, tako i već izdane. Apple tim također osigurava sigurnosne alate i obuku, te aktivno nadzire prijetnje i izvješća o novim sigurnosnim problemima. Apple je član Forum of Incident Response and Security Teams (FIRST). Apple nastavlja pomicati granice onoga što je moguće u sigurnosti i privatnosti. Primjerice, aplikacija Pronalaženje koristi postojeće osnovne elemente kako bi se omogućila revolucionarna mogućnost distribuiranog pronalaženja Mac računala koje nije na mreži bez izlaganja ikome, uključujući društvu Apple, identiteta ili lokacijskih podataka bilo kojih uključenih korisnika. Za poboljšanje sigurnosti firmvera Mac računala Apple je koristio ekvivalent tablica stranica za blokiranje neprikladnog pristupa iz perifernih uređaja, ali u toliko ranom trenutku procesa podizanja da se RAM još nije učitao. A kako napadači nastavljaju povećavati sofisticiranost svojih tehnika iskorištavanja, Apple dinamički kontrolira povlastice izvođenja memorije za iPhone i iPad, koristeći prilagođene CPU upute, koje nisu dostupne nijednom drugom mobilnom uređaju, za izbjegavanje kompromitiranja. Od podjednake važnosti kao i inovacija novih sigurnosnih mogućnosti, nove značajke izrađene su na način da je u središnju njihova dizajna privatnost i sigurnost. Kako bi se najbolje iskoristile sveobuhvatne sigurnosne značajke ugrađene u naše platforme, organizacije se potiču da pregledaju svoje IT i sigurnosne politike kako bi osigurale da koriste sve prednosti slojeve sigurnosne tehnologije koje ove platforme nude. Kako biste saznali više o prijavljivanju problema društvu Apple i pretplaćivanju na sigurnosne obavijesti, pogledajte Prijavljivanje sigurnosne ranjivosti ili ranjivosti privatnosti. Sigurnost Apple platforme 6 Apple smatra da je privatnost osnovno ljudsko pravo i implementira razne ugrađene kontrole i opcije koje korisnicima omogućavaju odlučivanje na koji način i u koje vrijeme aplikacije mogu koristiti njihove informacije, kao i odabir informacija koje se koriste. Za dodatne informacije o načinu na koji tvrtka Apple pristupa privatnosti, kontrolama privatnosti na Apple uređajima i pravilima privatnosti tvrtke Apple pogledajte https:// www.apple.com/hr/privacy. Napomena: Osim ako nije drugačije navedeno, ova dokumentacija odnosi se na sljedeće verzije operativnih sustava: iOS 13.4, iPadOS 13.4, macOS 10.15.4, tvOS 13.4 i watchOS 6.2. Sigurnost Apple platforme 7 Sigurnost hardvera i biometrija Pregled sigurnosti hardvera Sigurni softver zahtijeva temelj sigurnosti ugrađen u hardver. Zato Apple uređaji, s instaliranim sustavom iOS, iPadOS, macOS, watchOS ili tvOS, imaju mogućnosti sigurnosti dizajnirane u samom hardveru. One uključuju prilagođene mogućnosti procesora koje osnažuju sigurnosne značajke i hardver dediciran za sigurnosne funkcije. Najkritičnija komponenta je Secure Enclave koprocesor koji se pojavljuje na svim modernim iOS, iPadOS, watchOS i tvOS uređajima, te svim Mac
Recommended publications
  • Second Generation of TSMC's Integrated Fan-Out (Info
    Apple A11 Application Processor Second generation of TSMC’s inFO packaging PACKAGING report by Stéphane ELISABETH February 2018 – version 1 ©2017 by System Plus Consulting | Apple A11 with TSMC inFO Packaging 1 Table of Contents Overview / Introduction 4 o Application Processor 87 o Executive Summary Die Views, Marking & Dimensions o Reverse Costing Methodology Die Cross-Section Company Profile 8 Die Process Characteristics o Apple Physical Comparison 94 o Apple APE Portfolio o Apple’s APE Series: A9, A10, A11 o Fan-Out Packaging o APE’s PoP Technology: Standard PoP, MCeP, inFO o TSMC inFO Technology Manufacturing Process 98 o Apple iPhone 8 & X Teardown o APE Die Front-End Process & Fabrication Unit o Fan-Out Market o Deep Trench Capacitor Die Front-End Process Flow Physical Analysis 22 & Fabrication Unit o Summary of the Physical Analysis 23 o inFO Packaging Process Flow & Fabrication unit o Packaging 25 Cost Analysis 117 Package Views, Marking & Dimensions o Summary of the cost analysis 118 o Yields Explanation & Hypotheses 119 Package X-Ray o APE die 122 Package RDL Deprocessing Wafer & Die Front-End Cost Package Memory: X-Ray view & Opening Preparation Wafer Cost Package Opening o LSC die 126 Board Cross-Section: Via Frame, PCB, Dimensions Wafer & Die Front-End Cost Package Cross-Section: TiV, Adhesive, RDLs Frond-End cost per Process Steps Package Process o inFO Packaging 131 Summary of Physical Data inFO Wafer Cost o Land-Side Capacitor 65 inFO Front-End Cost per Process Steps Die Views & Dimensions Component Cost Die Deprocessing & Delayering Company services 136 Die Process Die Cross-Section Die Process Characteristics ©2017 by System Plus Consulting | Apple A11 with TSMC inFO Packaging 2 Executive Summary Overview / Introduction o Executive Summary • This full reverse costing study has been conducted to provide insight on technology data, manufacturing cost and selling price of o Reverse Costing Methodology the Apple A11.
    [Show full text]
  • Nokia in 2010 Review by the Board of Directors and Nokia Annual Accounts 2010
    Nokia in 2010 Review by the Board of Directors and Nokia Annual Accounts 2010 Key data ........................................................................................................................................................................... 2 Review by the Board of Directors 2010 ................................................................................................................ 3 Annual Accounts 2010 Consolidated income statements, IFRS ................................................................................................................ 16 Consolidated statements of comprehensive income, IFRS ............................................................................. 17 Consolidated statements of financial position, IFRS ........................................................................................ 18 Consolidated statements of cash flows, IFRS ..................................................................................................... 19 Consolidated statements of changes in shareholders’ equity, IFRS ............................................................. 20 Notes to the consolidated financial statements ................................................................................................ 22 Income statements, parent company, FAS .......................................................................................................... 66 Balance sheets, parent company, FAS ..................................................................................................................
    [Show full text]
  • Nokia E5–00 User Guide
    Nokia E5–00 User Guide Issue 1.3 2Contents Contents Calendar 35 Clock 38 Multitasking 40 Safety 6 Flashlight 40 About your device 7 Network services 8 Make calls 40 About Digital Rights Management 9 Voice calls 40 Battery removing 10 During a call 41 Voice mail 42 Get started 11 Answer or decline a call 43 Keys and parts 11 Make a conference call 43 Insert the SIM card and battery 13 1-touch dial a phone number 44 Insert the memory card 16 Call waiting 44 Remove the memory card 17 Call forward 45 Wrist strap 17 Call restrictions 46 Charge the battery 17 Voice dialing 47 Lock or unlock the keyboard 19 Make a video call 48 Connect a compatible headset 19 During a video call 49 Switch the device on and off 20 Answer or decline a video call 50 Antenna locations 20 Video sharing 50 Nokia Switch 21 Log 54 Nokia Ovi Suite 24 Ovi by Nokia 25 Messaging 56 About Ovi Store 26 Messaging folders 57 Organize messages 57 Access codes 26 E-mail 58 Nokia Messaging 63 Basic use 27 Ovi Contacts 64 Home screen 27 Message reader 73 One-touch keys 29 Speech 73 Write text 30 Text and multimedia messages 74 Contacts 32 Special message types 79 Contents 3 Cell broadcast 80 File manager 108 Messaging settings 81 Quickoffice 109 About Chat 84 Converter 109 Set up Office Communicator 85 Zip manager 111 PDF reader 111 Connectivity 85 Printing 111 Data connections and access Dictionary 114 points 85 Notes 115 Network settings 86 Wi-Fi/WLAN connection 87 Positioning (GPS) 115 Active data connections 90 About GPS 115 Synchronization 90 Assisted GPS (A-GPS) 116 Bluetooth
    [Show full text]
  • TSMC Integrated Fan-Out (Info) Package Apple A10
    Electronic Costing & Technology Experts 21 rue la Nouë Bras de Fer 44200 Nantes – France Phone : +33 (0) 240 180 916 email : [email protected] www.systemplus.fr September 2016 – Version 1 – Written by Stéphane ELISABETH DISCLAIMER : System Plus Consulting provides cost studies based on its knowledge of the manufacturing and selling prices of electronic components and systems. The given values are realistic estimates which do not bind System Plus Consulting nor the manufacturers quoted in the report. System Plus Consulting is in no case responsible for the consequences related to the use which is made of the contents of this report. The quoted trademarks are property of their owners. © 2016 by SYSTEM PLUS CONSULTING, all rights reserved. 1 Return to TOC Glossary 1. Overview / Introduction 4 – A10 Die Analysis 57 – Executive Summary – A10 Die View, Dimensions & Marking – Reverse Costing Methodology – A10 Die Cross-Section – A10 Die Process Characteristics 2. Company Profile 7 – Comparison with previous generation 65 – Apple Inc. – A9 vs. A10 PoP – Apple Series Application processor – A9 vs. A10 Process – Fan-Out Packaging – TSMC Port-Folio 4. Manufacturing Process Flow 70 – TSMC inFO packaging – Chip Fabrication Unit – Packaging Fabrication Unit 3. Physical Analysis 15 – inFO Reconstitution Flow – Physical Analysis Methodology – iPhone 7 Plus Teardown 17 5. Cost Analysis 81 – A10 Die removal – Synthesis of the cost analysis – A10 Package-on-Package Analysis 23 – Main steps of economic analysis – A10 Package View, Dimensions – Yields Hypotheses – A10 Package XRay View – Die Cost Analysis 86 – A10 Package Opening – Wafer Cost – A10 Package Marking – Die Cost – A10 Package Cross-Section – inFO Packaging Cost Analysis 90 – A10 Package Cross-Section – Adhesive & Passivation – Packaging Wafer Cost – A10 package cross-Section - TIVs – Packaging Cost per process Steps – A10 package cross-Section – Solder Balls – Component Cost – A10 package cross-Section – RDL – Land-Side Decoupling Capacitor Analysis 48 6.
    [Show full text]
  • Defendant Apple Inc.'S Proposed Findings of Fact and Conclusions Of
    Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 1 of 325 1 THEODORE J. BOUTROUS JR., SBN 132099 MARK A. PERRY, SBN 212532 [email protected] [email protected] 2 RICHARD J. DOREN, SBN 124666 CYNTHIA E. RICHMAN (D.C. Bar No. [email protected] 492089; pro hac vice) 3 DANIEL G. SWANSON, SBN 116556 [email protected] [email protected] GIBSON, DUNN & CRUTCHER LLP 4 JAY P. SRINIVASAN, SBN 181471 1050 Connecticut Avenue, N.W. [email protected] Washington, DC 20036 5 GIBSON, DUNN & CRUTCHER LLP Telephone: 202.955.8500 333 South Grand Avenue Facsimile: 202.467.0539 6 Los Angeles, CA 90071 Telephone: 213.229.7000 ETHAN DETTMER, SBN 196046 7 Facsimile: 213.229.7520 [email protected] ELI M. LAZARUS, SBN 284082 8 VERONICA S. MOYÉ (Texas Bar No. [email protected] 24000092; pro hac vice) GIBSON, DUNN & CRUTCHER LLP 9 [email protected] 555 Mission Street GIBSON, DUNN & CRUTCHER LLP San Francisco, CA 94105 10 2100 McKinney Avenue, Suite 1100 Telephone: 415.393.8200 Dallas, TX 75201 Facsimile: 415.393.8306 11 Telephone: 214.698.3100 Facsimile: 214.571.2900 Attorneys for Defendant APPLE INC. 12 13 14 15 UNITED STATES DISTRICT COURT 16 FOR THE NORTHERN DISTRICT OF CALIFORNIA 17 OAKLAND DIVISION 18 19 EPIC GAMES, INC., Case No. 4:20-cv-05640-YGR 20 Plaintiff, Counter- DEFENDANT APPLE INC.’S PROPOSED defendant FINDINGS OF FACT AND CONCLUSIONS 21 OF LAW v. 22 APPLE INC., The Honorable Yvonne Gonzalez Rogers 23 Defendant, 24 Counterclaimant. Trial: May 3, 2021 25 26 27 28 Gibson, Dunn & Crutcher LLP DEFENDANT APPLE INC.’S PROPOSED FINDINGS OF FACT AND CONCLUSIONS OF LAW, 4:20-cv-05640- YGR Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 2 of 325 1 Apple Inc.
    [Show full text]
  • The Android App Store Developer Perspective Mobile and Ubiquitous Games ICS 163 Donald J
    Google Play: The Android App Store Developer Perspective Mobile and Ubiquitous Games ICS 163 Donald J. Patterson Android Market Source:Akamai Android Market Source: http://www.androidauthority.com/state-smartphone-industry-2014-527300/ Google Play vs Apple iOS • When counting installs there is a difference between OS installs and handset sales • Android separates the two • Android can be on many manufacturers devices • Apple unifies them • iOS is only on one manufacturer • Android is installed on many more devices • But Apple holds the most market share by manufacturer Android Market World wide Mobile OS Device Sales Market Share 90 Android 80 70 60 Android Symbian 50 iOS 40 RIM Percent Microsoft 30 Bada iOs Linux 20 Other 10 0 7/1/09 8/5/10 9/9/11 5/1/13 6/5/14 1/17/10 2/21/11 3/27/12 10/13/12 11/17/13 Source: Gartner Research, IDC Android Market Source:Akamai Android Market Source:Akamai Android Market Source: http://blog.nielsen.com/nielsenwire/online_mobile/who-is-winning-the- u-s-smartphone-battle/ Android Market Source: http://blog.nielsen.com/nielsenwire/online_mobile/two-thirds-of-new- mobile-buyers-now-opting-for-smartphones/ Android Market http://www.nielsen.com/us/en/newswire/2013/whos-winning-the-u-s- smartphone-market-.html Intro to Mobile Development Source: http://www.androidauthority.com/state-smartphone- industry-2014-527300/ Mobile Development Issues: • Stores • iTunes • Android • Blackberry • OVI • Microsoft Mobile Development Issues: • Stores • iTunes • Android • Blackberry • OVI • Microsoft Mobile Development Issues:
    [Show full text]
  • Ovi Maps for Mobile
    Ovi Maps for mobile Issue 1 2Contents Contents Navigation view 13 Get traffic and safety information 13 Walk to your destination 14 Maps overview 3 Plan a route 14 My position 4 Give feedback on Maps 16 View your location and the map 4 Map view 5 Report incorrect map information 17 Change the look of the map 5 Download and update maps 5 Use the compass 6 About positioning methods 6 Search 8 Find a location 8 View location details 8 Favourites 9 Save or view a place or route 9 View and organise places or routes 9 Send a place to a friend 10 Synchronise your Favourites 10 Check in 11 Drive and Walk 12 Get voice guidance 12 Drive to your destination 12 © 2010 Nokia. All rights reserved. Maps overview 3 Maps overview Some content is generated by third parties and not Nokia. The content may be inaccurate and is subject to availability. Select Menu > Maps. Welcome to Maps. Maps shows you what is nearby, helps you plan your route, and guides you where you want to go. • Find cities, streets, and services. • Find your way with turn-by-turn directions. • Synchronise your favourite locations and routes between your mobile device and the Ovi Maps internet service. • Check weather forecasts and other local information, if available. Some services may not be available in all countries, and may be provided only in selected languages. The services may be network dependent. For more information, contact your network service provider. Using the service or downloading content may cause transfer of large amounts of data, which may result in data traffic costs.
    [Show full text]
  • Survey and Benchmarking of Machine Learning Accelerators
    1 Survey and Benchmarking of Machine Learning Accelerators Albert Reuther, Peter Michaleas, Michael Jones, Vijay Gadepally, Siddharth Samsi, and Jeremy Kepner MIT Lincoln Laboratory Supercomputing Center Lexington, MA, USA freuther,pmichaleas,michael.jones,vijayg,sid,[email protected] Abstract—Advances in multicore processors and accelerators components play a major role in the success or failure of an have opened the flood gates to greater exploration and application AI system. of machine learning techniques to a variety of applications. These advances, along with breakdowns of several trends including Moore’s Law, have prompted an explosion of processors and accelerators that promise even greater computational and ma- chine learning capabilities. These processors and accelerators are coming in many forms, from CPUs and GPUs to ASICs, FPGAs, and dataflow accelerators. This paper surveys the current state of these processors and accelerators that have been publicly announced with performance and power consumption numbers. The performance and power values are plotted on a scatter graph and a number of dimensions and observations from the trends on this plot are discussed and analyzed. For instance, there are interesting trends in the plot regarding power consumption, numerical precision, and inference versus training. We then select and benchmark two commercially- available low size, weight, and power (SWaP) accelerators as these processors are the most interesting for embedded and Fig. 1. Canonical AI architecture consists of sensors, data conditioning, mobile machine learning inference applications that are most algorithms, modern computing, robust AI, human-machine teaming, and users (missions). Each step is critical in developing end-to-end AI applications and applicable to the DoD and other SWaP constrained users.
    [Show full text]
  • Apple and Nokia: the Transformation from Products to Services
    9 Apple and Nokia: The Transformation from Products to Services In the mid- to late 2000s, Nokia flourished as the world’s dominant mobile phone – and mobile phone operating software – producer. Founded in 1871 originally as a rubber boots manufacturer, by 2007 Nokia produced more than half of all mobile phones sold on the planet, and its Symbian mobile operating system commanded a 65.6 percent global market share. 1 But within half a decade, Nokia would falter and be surpassed in the smartphone market not only by Apple’s revolu- tionary iPhone but also by competitors including Google and Samsung. And in September 2013, Nokia would sell its mobile phone business to Microsoft for $7 billion. 2 Apple literally came out of nowhere – it sold exactly zero mobile phones before the year 2007 (the year Nokia held more than half of the global market share) – but by the first quarter of 2013, Apple had captured almost 40 percent of the US smartphone market and over 50 percent of the operating profit in the global handset industry.3 In fiscal year 2013, Apple would sell five times more smart- phones than Nokia: 150 million iPhones compared to Nokia’s sales of 30 million Lumia Windows phones. 4 In contrast to Nokia, Apple real- ized it wasn’t just about the mobile device itself, it was about leveraging software to create a platform for developing compelling mobile experi- ences – including not just telephony but also music, movies, applica- tions, and computing – and then building a business model that allows partners to make money alongside the company (e.g., Apple’s iTunes and AppStore) and, in so doing, perpetuate a virtuous cycle of making the iPhone attractive to customers over multiple life cycles through ever-ex- panding feature sets.
    [Show full text]
  • Contrails Ejoa Summer 2018
    EJOA EDITION SETTING THE STANDARD CONTROLLING USE TAX ON YOUR AIRCRAFT PURCHASES FOR INNOVATION THE PRIVATE JET MAGAZINE SUMMER 2018 DRONES AND HURRICANES SOARING INTO HURRICANE SEASON SERIOUS ASTUNT STICK AND RUDDER FLYING S E T T I N G THE STANDARD A REVIEW OF THE LAST DECADE Embraer 18Q3.indd 1 8/5/18 9:17 PM NEW Now there’s a Bose aviation headset that’s just your type. AIRCRAFT SALES & ACQUISITIONS AEROCOR has quickly become the world's number one VLJ broker, with more listings and more completed transactions than the competition. Our success is driven by product specialization and direct access to the largest pool of light turbine buyers. Find out why buyers and sellers are switching to AEROCOR. UNPARALLELED Introducing the new Bose ProFlight Aviation ACCURATE INTEGRITY PRICING EXPOSURE Headset with features designed for airline and corporate aircraft fl ight decks. Proprietary market Honest & fair Strategic partnership tracking & representation with Aerista, the world's Designed for the professional pilot, the Bose ProFlight is the industry’s valuation tools largest Cirrus dealer smallest, quietest and most comfortable active noise cancelling communication headset and includes three user selectable levels of noise cancellation, a unique tap control for talk-through communication and quick release side-swappable boom microphone and down cable. CALL US TODAY! All engineered into a form factor unlike any other headset – a highly PROFLIGHT AVIATION HEADSET stable, in-ear confi guration without the usual intrusive deep-insert eartips. In-ear confi guration for pilots The new Bose ProFlight is FAA TSO and EASA E/TSO-C139a certifi ed.
    [Show full text]
  • The Ipad Comparison Chart Compare All Models of the Ipad
    ABOUT.COM FOOD HEALTH HOME MONEY STYLE TECH TRAVEL MORE Search... About.com About Tech iPad iPad Hardware and Competition The iPad Comparison Chart Compare All Models of the iPad By Daniel Nations SHARE iPad Expert Ads iPAD Pro New Apple iPAD iPAD 2 iPAD Air iPAD Cases iPAD MINI2 Cheap Tablet PC Air 2 Case Used Computers iPAD Display The iPad has evolved since it was originally announced in January 2010. Sign Up for our The iPad 2 added dual-facing cameras Free Newsletters along with a faster processor and improved graphics, but the biggest jump About Apple was with the iPad 3, which increased the Tech Today resolution of the display to 2,048 x 1,536 iPad and added Siri for voice recognition. The iPad 4 was a super-charged iPad 3, with Enter your email around twice the processing power, and the iPad Mini, released alongside the iPad SIGN UP 4, was Apple's first 7.9-inch iPad. Two years ago, the iPad Air became the TODAY'S TOP 5 PICKS IN TECH first iPad to use a 64-bit chip, ushering IPAD CATEGORIES the iPad into a new era. We Go Hands-On 5 With the OnePlus X New to iPad: How to Get The latest in Apple's lineup include the By Faryaab Sheikh Started With Your iPad iPad Pro, which super-sizes the screen to Smartphones Expert The entire iPad family: Pro, Air and Mini. Image © 12.9 inches and is compatible with a new The Best of the iPad: Apps, Apple, Inc.
    [Show full text]
  • Zacks Equity Research Zacks Equity Research
    September 3, 2019 Zacks Equity Research Zacks Equity Research www.zacks.com 10 S. Riverside Plaza, Suite 1600 - Chicago, Il 60606 Industry Outlook The Zacks Computer – Mini Computers industry comprises prominent companies like Apple (AAPL) and HP (HPQ) that offer devices including smartphones, desktops, laptops, printers, wearables and 3-D printers. Such devices primarily adopt a multi-operating system, multi-architecture strategies using Apple’s iOS, MacOS, Microsoft Windows, Google Chrome and Android operating systems. They predominantly use processors from Apple, Intel (INTC), AMD, Qualcomm (QCOM ), NVIDIA (NVDA), Samsung, Broadcom and MediaTek, among others. Here are the four major industry themes: Expanding screen size, better display and enhanced storage capabilities have been key catalysts driving rapid proliferation of smartphones. This has been well-supported by faster mobile processors from the likes of Qualcomm (Snapdragon-brand), NVIDIA (Tegra X1), Apple (A12 Bionic) and Samsung (Exynos 9609). Moreover, improved Internet penetration and speed along with evolution of mobile apps have made smartphones indispensable for consumers. Further, the improved graphics quality is making smartphones suitable for playing games like PUBG and Fortnite. This is expected to boost demand for high-end smartphones which open up significant opportunities for device makers. Personal computers (desktops and laptops), be it Windows or Apple’s MacOS-based, have been facing the risk of extinction due to rapid proliferation of smartphones and tablets. Shipment of Personal Computers (PCs) has also suffered due to inventory constraints of Intel’s CPU. Stiff competition from smartphones has compelled global PC makers to not only upgrade hardware frequently but also add apps and cloud-based services to attract consumers.
    [Show full text]