June 29, 2012 by admin
Filed under Uncategorized
Rumour has it that Nvidia has the best drivers and might be close to fine tuning its Windows RT platform, but we are sure Qualcomm and Texas Instruments aren’t far behind.
The Asus Transformer series has set a new trend by providing tablet users with a keyboard dock with some extra ports and an additional battery. This is definitely the way to go as you get the best of both worlds in a single package Windows 8 RT is finally bringing Microsoft in the ARM market and needless to say there will be many systems to be ready for launch.
Nvidia with Tegra, Texas Instruments with OMAP and Qualcomm with S4 are getting ready to embrace tablets as well as hybrid notebooks based on Windows 8 RT. The Asus Transformer 600 is just the first of many to come and there will be at least a few more similar designs to launch this year with Windows 8 RT, so we have no doubt that we will see quite a few convertible Windows tablets.
Dell is set to buy Quest software for $2.5 billion. The move trumps the bid by Insight Venture Partners and was done on the quiet.
The No. 2 U.S. personal computer maker kept its name out of the limelight when Quest disclosed on Thursday that it had received an offer from a “strategic bidder” of $25.50 per share. Quest’s shares rose more than 9 percent to finish at $26.06 on Thursday.
Dell has been actively buying companies to expand its offerings to business and diversify away from personal computers. It told investors its focus on the hardware and software needs of corporate customers was gaining momentum. Quest could help Dell’s businesses in data management and protection and Windows server management.
The U.S., once again, is home to the world’s most powerful supercomputer after being kicked off the list by China two years ago and then again by Japan last year.
The top computer, an IBM system at the Department of Energy’s Lawrence Livermore National Laboratory, is capable of 16.32 sustained petaflops, according to the Top 500 list, a global, twice a year ranking, released Monday.
This system, named Sequoia, has more than 1.57 million compute cores and relies on architecture and parallelism, and not Moore’s Law, to achieve its speeds.
“We’re at the point where the processors themselves aren’t really getting any faster,” said Michael Papka, Argonne National Laboratory deputy associate director for computing, environment and life sciences.
The Argonne lab installed a similar IBM system, which ranks third on the new Top 500 list. “Moore’s Law is generally slowing down and we’re doing it (getting faster speeds) by parallelism,” Papka said.
U.S. high performance computing technology dominates the world market. IBM systems claimed five of the top ten spots in the list, and 213 systems out the 500.
Hewlett-Packard is number two, with 141 systems on the list. Nearly 75% of the systems on this list run Intel processors, and 13% use AMD chips.
Intel on Monday spent US$375 million to purchase nearly 1,700 wireless networking patents from subsidiaries of digital communications company Interdigital.
Intel will get patents that cover a range of 3G, LTE and Wi-Fi technologies from Interdigital. The patents should boost Intel’s product mobile product portfolio as the company establishes a presence in the smartphone and tablet markets, which is currently ruled by ARM.
Intel has said it will integrate 3G and 4G LTE capabilities along with its Atom microprocessor in devices like smartphones and tablets. Intel made its first entry into the smartphone market earlier this year with its Atom chip code-named Medfield, which is being used in handsets from Lenovo, Orange and Lava International.
Intel later this year will release a dual-core Atom Z2580 processor with 3G, 4G and LTE capabilities. Intel’s upcoming Atom chip for tablets, code-named Clover Trail, will also come with mobile broadband options.
Intel started building its wireless business following the acquisition of Infineon Wireless for $1.4 billion, which was completed last year.
Wireless is a fast-changing market, and the company is making this investment to support the business, according to Chuck Mulloy, an Intel spokesman.
“This was an opportunity to add some value to our patent portfolio. That’s over and above what we have,” Mulloy said.
June 25, 2012 by admin
Filed under Around The Net
An Illinois woman has filed a $5 million lawsuit against LinkedIn Corp, claiming that the social network violated promises to consumers by not having better security in place when more than 6 million customer passwords were stolen.
The lawsuit, which was introduced in federal court in San Jose, California, on June 15 and seeks class-action status, was filed less than two weeks after the stolen passwords turned up on websites frequented by computer hackers.
The attack on Mountain View, California-based LinkedIn, an employment and professional networking site with more than 160 million members, was the latest massive corporate data breach to have attracted the attention of class-action lawyers.
A federal judicial panel last week consolidated nine proposed class-action lawsuits in Nevada federal court against online shoe retailer Zappos, a unit of Amazon.com, over its January disclosure that hackers had siphoned information affecting 24 million customers.
The LinkedIn lawsuit was filed by Katie Szpyrka, a user of the website from Illinois. In court papers, her Chicago-based law firm, Edelson McGuire, said LinkedIn had “deceived customers” by having a security policy “in clear contradiction of accepted industry standards for database security.”
.
Due to the constant barrage of high profile data network intrusions (e.g, LinkedIn, Nissan, Global Payment Systems, VeriSign and Subway), many firms have rightly started to focus their efforts on better securing their infrastructure. But are the efforts enough to sufficiently ward off eager cybercriminals who are deploying far more sophisticated methods to infiltrate business networks? Having solid Security Controls in place would go far in addressing most companies concerns to mitigate RISK. Do you know if your IDS/IPS is working properly?
According to a survey conducted by Ponemon Research on behalf of Juniper Networks, 90% of the respondents said their organizations’ computers had been breached at least once by hackers over the past 12 months. Unfortunately for the remaining 10%, it only is only a matter of time before they are breached too. Do you think your organization’s valuable information is secure? When was the last time your firm completed an Internal/External Vulnerability Assessment?
Larger companies have established Business Continuity Plans (BCP) or Data Recovery Plans (DRP) in place to address the fall-out from unauthorized network intrusions. Additionally, they are financially more capable of absorbing the costs and have more resources at their disposal to pursue the offenders. Thanks to The Syber Group, smaller firms are not without data security options. Staying ahead of the security game can mean the difference between keeping your business moving forward or being stuck trying to recover from the devastation caused by unauthorized hacking attacks, providing breach notifications mandated by law or trying to regain customer’s goodwill and restoring the reputation of your organization.
TSG
Intel has audited almost five times as many of its suppliers in 2011 than it did the previous year.
Chipzilla set itself a target of visiting 50 on-site, third-party audits of its suppliers during the last year. It had that target last year as well, but missed it by only carrying out 49 audits, while one had to be rescheduled.
In comparison Intel only carried out eight visits in 2010. The company also conducted 249 in-depth assessments and 289 self-assessments by suppliers.
But the findings were not that great. Intel found 426 priority and major findings, the highest class of non-compliance as defined by the company.
Most of the non-compliance related to management systems such as a lack of documentation and systems for CSR, inadequate communication with workers or suppliers and a lack of audits. But there were also 112 instances of labour abuse, which included working hours of more than 60 hours per week, and workers not being given at least one day off a week. There were also 28 issues relating to ethics, such as not having an anonymous reporting line for employees to raise issues or concerns through.
The report was interesting because it must have covered Foxconn, which has been the subject of criticism over its treatment of workers. During 2011, Intel carried out audits at three Foxconn facilities and found them about as bad as others in the region. Most of the breaches of rules were in the areas of labour conditions, safety systems, and management systems.
AMD, ARM, Imagination Technologies, Mediatek and Texas Instruments have signed up to create the Heterogeneous System Architecture Foundation (HSAF).
AMD has been pushing its vision for heterogeneous computing, where CPUs and GPUs can share system resources such as memory allowing developers to treat any processing core as a black box. Now the firm has managed to rope in ARM, Imagination Technologies, Mediatek and Texas Instruments to create the non-profit HSAF.
According to AMD, HSAF will try to define a hardware specification for developers to standardise upon, which should make development quicker and easier.
Phil Rogers, HSAF president and AMD corporate fellow said, “HSA [heterogeneous system architecture] moves the industry beyond the constraints of the legacy system architecture of the past 25-plus years that is now stifling software innovations. By aiming HSA squarely at the needs of the software developer, we have designed a common hardware platform for high performance, energy efficient solutions. HSA is unlocking a new realm of possibilities across PCs, smartphones, tablets and ultrathin notebooks, as well as the innovative supercomputers and cloud services that define the modern computing experience.”
AMD has scored something of a coup by getting big names such as ARM, Imagination and Texas Instruments to back its vision of a heterogeneous system architecture. Although the company has been struggling in outright performance terms against Intel, the idea of a combining CPU and GPU resources and making them appear as one to the application is something that will help it leverage its GPU compute capability against Intel.
Leading cyber experts warned of a shortage of talented computer security experts in the United States, making it extremely difficult to keep corporate and government networks safe at a time when attacks are on the rise.
Symantec Corp Chief Executive Enrique Salem told the Reuters Media and Technology Summit in New York that his company was working with the U.S. military, other government agencies and universities to help develop new programs to train security professionals.
“We don’t have enough security professionals and that’s a big issue. What I would tell you is it’s going to be a bigger issue from a national security perspective than people realize,” he said on Tuesday.
Jeff Moss, a prominent hacking expert who sits on the U.S. Department of Homeland Security Advisory Council, said that it was difficult to persuade talented people with technical skills to enter the field because it can be a thankless task.
“If you really look at security, it’s like trying to prove a negative. If you do security well, nobody comes and says ‘good job.’ You only get called when things go wrong.”
The warnings come at a time when the security industry is under fire for failing to detect increasingly sophisticated pieces of malicious software designed for financial fraud and espionage and failing to prevent the theft of valuable data.
Moss, who goes by the hacker name “Dark Tangent,” said that he sees no end to the labor shortage.
Qualcomm said it believes TSMC’s 28nm supply issues will continue until year end.
Qualcomm, which relies solely on TSMC for its 28nm chips, said it believes the supply of chips will improve, but the firm expects its 28nm supply not to be back to normal until the end of 2012.
Previously Qualcomm had poured scorn on TSMC by telling investors it is looking at rival wafer fabs to avoid supply issues in the future. Qualcomm’s CEO Paul Jacobs told Reuters once again that the firm is looking to other foundries for extra capacity, adding, “The goal is to get enough supply for everyone.”
TSMC’s 28nm process node has been tapped by a number of big name customers including AMD, Nvidia and Qualcomm, with the chip fab unable to meet demand. Since Qualcomm made the rare public admission that it wasn’t happy with the state of TSMC’s 28nm chip supply, the smart money has been on Globalfoundries picking up the slack, however nothing specific has been announced by either firm.
Comments