The Upload: Your tech news briefing for Monday, June 1

Intel, Altera said near a deal... Senate lets NSA dragnet expire... Asus promises 4-day smartwatch life

The ZenWatch 2, shown off on the fringes of Computex in Taipei June 1, could feature a four-day battery.

The ZenWatch 2, shown off on the fringes of Computex in Taipei June 1, could feature a four-day battery.

Once again, reports have Intel near a deal with Altera

Intel may announce a deal to acquire FPGA maker Altera on Monday, the Wall Street Journal reports, after the two companies returned to the bargaining table following a failure to come to terms earlier this year. The buy would strengthen Intel's already dominant hand in the server market at a cost of about $17 billion.

NSA surveillance powers expire as Senate delays vote

A controversial program allowing the U.S. National Security Agency to collect millions of domestic telephone records expired Sunday night after the Senate failed to vote on a bill to extend the authority for the surveillance. But senators moved closer to bringing the USA Freedom Act to a vote; that bill gives the agency limited power to obtain data on American residents under investigation. Some are still calling for more reform and better oversight.

Asus ZenWatch 2 could keep on ticking for four days

Asus showed off a preview of its next-gen smartwatch on the sidelines of Computex, and one of the highlights is a battery that could keep the device charged for up to four days. That's four times the staying power of the Apple Watch, whose design Asus echoes with the ZenWatch 2: It incorporates a metal crown and is designed to be a fashion accessory available in 49mm and 45mm sizes to suit men and women.

ARM aims to extend battery life of IoT devices

ARM is trying to resolve the thorny problem of battery life in Internet of Things devices with a new chip design that will significantly reduce the power consumed by processors, sensors and wireless chips. A design overhaul of low-power Cortex-M chips could almost double battery life, ARM executives said at Computex.

Microsoft says Windows 10 will be available July 29

Microsoft's much-hyped new OS will be available on July 29, the company said in a blog post on Monday. Over the weekend, online retailer tipped its hand to show some Windows 10 pricing as it began taking pre-orders, Computerworld reports. The listings were for versions aimed at homebrew PC makers and those who want to run the OS in a virtual machine or in a dual-boot configuration, and showed the consumer version at $109.99, and the professional version at $149.99.

Woman unwittingly recycles an Apple I, is owed $100K

A woman who dropped an Apple I at a Silicon Valley recycling center in April has $100,000 coming to her if she steps forward, the San Jose Mercury News reports. When the recycling firm went through the boxes she left, it discovered the vintage computer, which is one of 200 put together by the Apple founders in 1976. It sold it for $200,000 to a private collection, and now the center wants to give the mystery donor half of those proceeds.

Flaw in pre-2014 Macs could allow firmware attack

If you let your older Mac go to sleep rather than shutting it off when you walk away, you may be leaving it vulnerable to an attack that could modify the system's firmware, a security researcher says. Pedro Vilaca found it's possible to tamper with an Apple computer's UEFI (Unified Extensible Firmware Interface) on MacBooks made prior to mid-2014, because the UEFI code is unlocked when the system awakens from sleep mode.

Watch now

Review the past week's tech news on The Wrap: Google outlines its home automation strategy, the FCC wants to stop robocalls and Solar Impulse 2 is stuck in China.

One last thing

Automotive information systems that display on your windshield promise to keep your mobile phone out of your hands while driving. But do they distract you even more?

Join the CSO newsletter!

Error: Please check your email address.

Tags alteraconsumer electronicsMicrosoftsecurityU.S. National Security AgencygovernmentintelAsustek ComputerAppleArm Holdings

More about AlteraAppleARMComputexCortexFCCFreedomGoogleImpulseIntelMacsMicrosoftNational Security AgencyNewsNSAWall Street

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts