Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Both AMD And nVidia Preparing For 14nm

September 4, 2015 by  
Filed under Computing

Comments Off on Both AMD And nVidia Preparing For 14nm

AMD and Nvidia both appear to be certain to get their “14 nm” out next year.

According to TweakTown Nvidia is apparently dotting the “I” and working out where to put in the semi-colons for its Pascal GPU using TSMC’s 16nm FinFet node. AMD rumored has been wining and dining its old chums at GlobalFoundries to use its 14nm process for its Greenland GPU.

Although these sound like different technologies the “14nm and 16nm”  is difference how you measure a transistor. The outcome of both 14 and 16 should be a fairly same sized transistor with similar power features. TSMC calls its process 16nm FinFet, while Samsung and GloFo insist on calling it 14nm FinFet.

The dark satanic rumor mill suggests that the Greenland GPU, which has new Arctic Islands family micro-architecture, will have HBM2 memory. There will be up to 32GB of memory available for enthusiast and professional users. Consumer-oriented cards will have eight to 16GB of HBM2 memory. It will also have a new ISA (instruction set architecture).

It makes sense, AMD moved to HBM with its Fury line this year. Nvidia is expected to follow suit in 2016 with cards offering up to 32GB HBM2 as well.

Both Nvidia and AMD are drawn to FinFET which offers 90 percent more density than 28nm. Both will boost the transistors on offer with their next-generation GPUs, with 17 to 18 billion transistors currently being rumored.

Source- http://www.thegurureview.net/computing-category/are-both-amd-and-nvidia-readying-to-release-a-14nm-gpu.html

Web.com Latest Hacking Victim

September 1, 2015 by  
Filed under Computing

Comments Off on Web.com Latest Hacking Victim

Hackers gain unauthorized access to the computers of Internet services provider Web.com Group and stole credit card information of 93,000 customers.

According to a website set up by the company to share information about the incident, Web.com discovered the security breach on Aug. 13 as part of its ongoing security monitoring.

Attackers compromised credit card information for around 93,000 accounts, as well as the names and addresses associated with them. No other customer information like social security numbers was affected, the company said.

According to the company, the verification codes for the exposed credit cards were not leaked. However, there are websites on the Internet that don’t require such codes for purchases.

Web.com has notified affected customers via email and will also follow up with letters sent through the U.S. Postal Service. Those users can sign up for a one-year free credit monitoring service.

The company did not specify how the intruders gained access to its systems, but has hired a “nationally recognized” IT security firm to conduct an investigation.

Web.com provides a variety of online services, including website and Facebook page design, e-commerce and marketing solutions, domain registration and Web hosting. The company claims to have over 3.3 million customers and owns two other well known Web services companies: Register.com and Network Solutions.

Register.com and Network Solutions customers were not impacted by this breach unless they also purchased services directly from Web.com.

Source-http://www.thegurureview.net/aroundnet-category/web-com-latest-victim-of-credit-card-hacking.html

Microsoft Updates Yammer

August 28, 2015 by  
Filed under Around The Net

Comments Off on Microsoft Updates Yammer

Microsoft unveiled a bevy of improvements to its Yammer enterprise social network, focused on helping people connect more easily with their teams.

By default, people who access Yammer via their web browser will be taken to a new “Discovery” feed on the service’s home page that is supposed to better show them relevant content from their groups along with other public teams across their company’s network. It’s supposed to help keep people in closer touch with important discussions they may be missing on Yammer.

After users finish reviewing new content in one group, Yammer will display a pop up banner with a link to the next group they’re subscribed to that has new content. Yammer’s mobile apps will get similar functionality through a new Group Updates feed that lets users see a list of different conversations in various groups all on one screen. That way, they won’t have to look through individual groups to get the same information. That feature will begin rolling out on Android first before making it to Yammer’s iOS app.

In addition, Yammer is also tweaking the design of individual groups’ pages. Now, each group will have a full-width banner at the top of its page, and discussions within the group can now take up a wider space on the page to aid in lengthier discussions. The whole page has also been redesigned to focus users’ attention on important content.

Icons in the left-hand sidebar will show the users that are active in groups they are a part of, so they can stay up-to-date on where conversations are happening in real time. It’s a move that could make Yammer more competitive with popular chat solutions like Slack, which has been growing incredibly rapidly and was recently valued at $2.8 billion.

Yammer’s mobile app also gained support for attaching files from external storage services like OneDrive and Dropbox, inviting coworkers to a user’s network by email and mentioning people in comments.

There’s even more up Yammer’s sleeve on top of all these updates. The social network’s iPhone app will soon have a companion version for the Apple Watch that will let people interact with content from their coworkers.

The updates come at a time when Microsoft is putting more effort into improving its workplace collaboration tools.

Source

More Details Uncovered On AMD’s ZEN Cores

August 27, 2015 by  
Filed under Computing

Comments Off on More Details Uncovered On AMD’s ZEN Cores

Our well informed industry sources have shared a few more details about the AMD’s 2016 Zen cores and now it appears that the architecture won’t use the shared FPU like Bulldozer.

The new Zen uses a SMT Hyperthreading just like Intel. They can process two threads at once with a Hyperthreaded core. AMD has told a special few that they are dropping the “core pair” approach that was a foundation of Bulldozer. This means that there will not be a shared FPU anymore.

Zen will use a scheduling model that is similar to Intel’s and it will use competitive hardware and simulation to define any needed scheduling or NUMA changes.

Two cores will still share the L3 cache but not the FPU. This because in 14nm there is enough space for the FPU inside of the Zen core and this approach might be faster.

We mentioned this in late April where we released a few details about the 16 core, 32 thread Zen based processor with Greenland based graphics stream processor.

Zen will apparently be ISA compatible with Haswell/Broadwell style of compute and the existing software will be compatible without requiring any programming changes.

Zen also focuses on a various compiler optimisation including GCC with target of SPECint v6 based score at common compiler settings and Microsoft Visual studio with target of parity of supported ISA features with Intel.

Benchmarking and performance compiler LLVM targets SPECint v6 rate score at performance compiler settings.

We cannot predict any instruction per clock (IPC improvement) over Intel Skylake, but it helps that Intel replaced Skylake with another 14nm processor in later part of 2016. If Zen makes to the market in 2016 AMD might have a fighting chance to narrow the performance gap between Intel greatest offerings.

Courtesy-Fud

Apple TV Service Delayed Again

August 26, 2015 by  
Filed under Consumer Electronics

Comments Off on Apple TV Service Delayed Again

Apple Inc will push back rolling out its live TV service to at least next year, Bloomberg reported, citing people familiar with the iPhone maker’s plans.

The company had planned to introduce the service, which is delivered over the Internet, this year.

Discussions with broadcasters such as CBS Corp and Twenty-First Century Fox Inc to license programming are progressing slowly, and lack of content has led Apple to scrap plans to announce the service at a Sept. 9 event, Bloomberg said.

Apple also lacked the computer network capacity to ensure a good viewing experience, Bloomberg said.

The company still plans to introduce a more powerful version of its Apple TV set-top box at the event, which will be held in San Francisco.

Apple was aiming to price the new service at about $30 to $40 a month, media reports have said.

Source

Dropbox Beefs Up Security

August 25, 2015 by  
Filed under Around The Net

Comments Off on Dropbox Beefs Up Security

Two-factor authentication is widely regarded as a best practice for security in the online world, but Dropbox has announced a new feature that’s designed to make it even more secure.

Whereas two-step verification most commonly involves the user’s phone for the second authentication method, Dropbox’s new U2F support adds a new means of authenticating the user via Universal 2nd Factor (U2F) security keys instead.

What that means is that users can now use a USB key as an additional means to prove who they are.

“This is a very good advancement and adds extra security over mobile notifications for two-factor authentication,” said Rich Mogull, Securosis CEO.

“Basically, you can’t trick a user into typing in credentials,” Mogull explained. “The attacker has to compromise the exact machine the user is on.”

For most users, phone-based, two-factor authentication is “totally fine,” he said. “But this is a better option in high-security environments and is a good example of where the FIDO standard is headed.”

Security keys provide stronger defense against credential-theft attacks like phishing, Dropbox said.

“Even if you’re using two-step verification with your phone, some sophisticated attackers can still use fake Dropbox websites to lure you into entering your password and verification code,” the company explained in a blog post. “They can then use this information to access your account.”

Security keys, on the other hand, use cryptographic communication and will only work when the user is signing in to the legitimate Dropbox website.

Dropbox users who want to use the new feature will need a security key that follows the FIDO Alliance’s Universal 2nd Factor (U2F) standard. That U2F key can then be set up with the user’s Dropbox account along with any other U2F-enabled services, such as Google.

Source

Has The iPhone Peaked in The U.S.?

August 21, 2015 by  
Filed under Smartphones

Comments Off on Has The iPhone Peaked in The U.S.?

Apple’s vice like grip in the US smartphone market is falling off as sales of the overpriced gadgets slump.

Research outfit Kantar Worldpanel ComTech said the 2.3 per cent drop in US sales had been covered by rises in China, Japan and Australia.

But the fact that Apple’s home ground is the US and that it has become increasingly dependent on its iPhone, this statistic does not bode well, particularly as the company depends on continual growth to maintain its share price the whole lot is starting become unstuck.

For the second quarter of 2015, iPhone sales grew by 2.1 percent from the same quarter last year across Europe’s five biggest markets, namely the UK, Germany, France, Italy and Spain. Growth was strongest in the UK at 5.5 percent and weakest in Italy at only 0.1 percent. Beyond Europe, iPhone sales surged by 9.1 per cent  in Australia, 7.3 percent in China and 2.7 percent in Japan.

It is worthwhile pointing that the European growth outside the UK, Australia and China is more indicative of a flat market rather than actual growth.

A possible reason for the fall in the US is better competition from Android where Apple’s Android rivals provided a tougher fight.

Carolina Milanesi, chief of research at Kantar Worldpanel ComTech, said in a press release. “In the U.S., as we forecasted last month, Android’s growth continued in the quarter ending June 30, with both Samsung and LG increasing their share sequentially. Forty-three percent of all Android buyers mentioned a ‘good deal on the price of the phone’ as the main purchase driver for their new device.”

“Android in the U.S. is undergoing its strongest consolidation yet, with Samsung and LG now accounting for 78 percent of all Android sales,” Milanesi added. “LG is the real success story of the quarter. Not only did it double its share of the US smartphone market once again, but it was also able, for the first time, to acquire more first-time smartphone buyers than Samsung.”

Screen size was the main driver for Android buyers across Europe, according to Dominic Sunnebo, business unit director at Kantar. Samsung and LG both sell big-screen “phablet” phones. Samsung’s Galaxy Note 4 sports a 5.7-inch screen, while LG’s G4 packs in a 5.5-inch screen.

Though the iPhone 6 Plus also uses a 5.5-inch display, iOS buyers are driven by a wider range of factors, Sunnebo said, including “phone reliability and durability, as well as the quality of the materials.”

Of course if you are member of Tame Apple Press you will forget to report the news and say the opposite and claim that the iPhone’s wonderful sales are a problem.

Source

AMD Coherent Data Reaches 100 GBs

August 20, 2015 by  
Filed under Computing

Comments Off on AMD Coherent Data Reaches 100 GBs

After a lot of asking around, we can give you some actual numbers about the AMD’s coherent fabric.

The inter-connecting technology already sounded very promising, but now we have the actual number. The HSA, Heterogeneous System Architecture MCM (Multi Chip Module) that AMD is working on can give you almost seven times faster score than the traditional PCIe interface.

Our industry sources have confirmed that with 4 GMI (Global Memory Interconnect) links AMD’s CPU and GPU can talk at 100GB/s. the traditional PCIe 16X provides 15GB/s at about 500 ns latency. Data Fabric eliminates PCIe latency too.

AMD will be using this technology with the next gen Multi Chip module that packs a Zeppelin CPU (most likely packed with a bunch of ZEN cores) and a Greenland GPU that of course comes with super fast HBM (High Bandwidth Memory). The Greenland and HBM can communicate at 500 GB/s and can provide highest performance GPU with 4+ teraflops.

This new MCM package based chip will also talk with DDR4 3200 memory at 100GB/s speed making it quite attractive for the HSA computation oriented customers.

Source

Malware Turns Computers Into Cellular Antenna

August 19, 2015 by  
Filed under Security

Comments Off on Malware Turns Computers Into Cellular Antenna

A team of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.

They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.

While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.

Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.

“If somebody wanted to get access to somebody’s computer at home — let’s say the computer at home wasn’t per se connected to the Internet — you could possibly receive the signal from outside the person’s house,” said Yisroel Mirsky, a doctoral student at Ben-Gurion University and study co-author.

The air-gapped computer that is targeted does need to have a malware program developed by the researchers installed. That could be accomplished by creating a type of worm that infects a machine when a removable drive is connected. It’s believed this method was used to deliver Stuxnet, the malware that sabotaged Iran’s uranium centrifuges.

The malware, called GSMem, acts as a transmitter on an infected computer. It creates specific, memory-related instructions that are transmitted between a computer’s CPU and memory, generating radio waves at GSM, UMTS and LTE frequencies that can be picked up by a nearby mobile device.

The GSMem component that runs on a computer is tiny. “Because our malware has such a small footprint in the memory, it would be very difficult and can easily evade detection,” said Mordechai Guri, also a doctoral student at Ben-Gurion.

Source

Did Microsoft Intentionally Delay The Surface Pro 4?

August 14, 2015 by  
Filed under Computing

Comments Off on Did Microsoft Intentionally Delay The Surface Pro 4?

The latest rumors suggest that Microsoft was waiting to jack the latest Intel Skylake processor under its bonnet.

Redmond seemingly wants the new Surface Pro to be state of the art and be a tablet which is useful. Skylake will give it better battery life and performance with current industry standards like Bluetooth 4.1, Cat6 LTE, WiDi 6.0, and A4WP wireless charging weaved into it.

Intel will support the tablets through compatibility with 3D cameras and audio processing software plus better stylus interaction.

There is no sign of confirmation of the rumors. Microsoft has been quiet so far about the Surface Pro 4. We had been expecting it to highlight some of the better features of Windows 10.

However if the rumors are true it will be a hell of a lot better than the MacBook Air 2015 because it will feature innovation, rather than just being thin.

Latest news about its release date suggests a 2016 launch.

Source

« Previous PageNext Page »