Shares of NVIDIA Corporation (NASDAQ:NVDA) ended Friday session in red amid volatile trading. The shares closed down -0.07 points or -0.11% at $64.95 with 6,903,344 shares getting traded. Post opening the session at $65.10, the shares hit an intraday low of $64.66 and an intraday high of $65.29 and the price vacillated in this range throughout the day. The company has a market cap of $34.71 billion and the numbers of outstanding shares have been calculated to be 535.00 million shares.
On September 13, 2016 NVIDIA (NVDA) unveiled a palm-sized, energy-efficient artificial intelligence (AI) computer that automakers can use to power automated and autonomous vehicles for driving and mapping.
The new single-processor configuration of the NVIDIA® DRIVE™ PX 2 AI computing platform for AutoCruise functions — which include highway automated driving and HD mapping — consumes just 10 watts of power and enables vehicles to use deep neural networks to process data from multiple cameras and sensors. It will be deployed by China’s Baidu as the in-vehicle car computer for its self-driving cloud-to-car system.
DRIVE PX 2 enables automakers and their tier 1 suppliers to accelerate production of automated and autonomous vehicles. A car using the small form-factor DRIVE PX 2 for AutoCruise can understand in real time what is happening around it, precisely locate itself on an HD map and plan a safe path forward.
“Bringing an AI computer to the car in a small, efficient form factor is the goal of many automakers,” said Rob Csongor, vice president and general manager of Automotive at NVIDIA. “NVIDIA DRIVE PX 2 in the car solves this challenge for our OEM and tier 1 partners, and complements our data center solution for mapping and training.”
More than 80 automakers, tier 1 suppliers, startups and research institutions developing autonomous vehicle solutions are using DRIVE PX. DRIVE PX 2’s architecture scales from a single mobile processor configuration, to a combination of two mobile processors and two discrete GPUs, to multiple DRIVE PX 2s. This enables automakers and tier 1s to move from development into production for a wide range of self-driving solutions — from AutoCruise for the highway, to AutoChauffeur for point to point travel, to a fully autonomous vehicle.
Shares of Symantec Corporation (NASDAQ:SYMC) ended Friday session in red amid volatile trading. The shares closed down -0.04 points or -0.16% at $25.04 with 6,764,317 shares getting traded. Post opening the session at $25.14, the shares hit an intraday low of $24.91 and an intraday high of $25.25 and the price vacillated in this range throughout the day. The company has a market cap of $15.56 billion and the numbers of outstanding shares have been calculated to be 615.59 million shares.
Symantec Corporation (SYMC) on September 22, 2016 revealed new research demonstrating how cybercriminal networks are taking advantage of lax Internet of Things (IoT) device security to spread malware and create zombie networks, or botnets, unbeknownst to their device owners.
Symantec’s Security Response team has discovered that cybercriminals are hijacking home networks and everyday consumer connected devices to help carry out distributed denial of service (DDoS) attacks on more profitable targets, usually large companies. To succeed, they need cheap bandwidth and get it by stitching together a large web of consumer devices that are easy to infect because they lack sophisticated security.
More than half of all IoT attacks originate from China and the U.S., based on the location of IP addresses to launch malware attacks. High numbers of attacks are also emanating from Germany, the Netherlands, Russia, Ukraine and Vietnam. In some cases, IP addresses may be proxies used by attackers to hide their true location.
Most IoT malware targets non-PC embedded devices such as web servers, routers, modems, network attached storage (NAS) devices, closed-circuit television (CCTV) systems, and industrial control systems. Many are Internet-accessible but, because of their operating system and processing power limitations, they may not include any advanced security features.
As attackers are now highly aware of insufficient IoT security, many pre-program their malware with commonly used and default passwords, allowing them to easily hijack IoT devices. Poor security on many IoT devices makes them easy targets, and often victims may not even know they have been infected.