The fortune tellers at Juniper Research have looked into their crystal ball and project that the number of annual shipments of tablet devices will reach 81 million by 2015.
The assumption is based on the fact that more consumer electronics and handset manufacturers will enter the market.
It claimed that Android is allowing both new and existing device manufacturers to enter the market and products have been launched already by companies such as Dell with the Streak, Maylong’s M150 and Samsung’s Galaxy Tab.
Anthony Cox, senior analyst at Juniper Research said that competition for Apple is likely to arrive in earnest in 2011.
Earnest may be a small town in Hicksville USA. Cox thinks that by then Jobs’ and Co. will have launched another version of the iPad and will still be upping the bar.
Apple, as first to market with its compelling hardware and content combination, will maintain its market lead for the medium term, Cox said.
Products using QNX for Blackberry smartphones, Windows Phone 7 and MeeGo will come to market in 2011 and of course the netbook market will be pressured. However Juniper thinks that netbooks will remain resilient in the business market. Read more….
Tags: 4G, 60606, 720p, advantages of using a consultant, android, apple, best Internet Phone Service, Blackberry, Cellular, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computing, data, data centers, Dell, Dell Streak, electronics, email services, Galaxt Tab 10.1, Galaxy tab, Gaming, Google, Help Desk Services, HP, HP Slate, internet, iOS, ipad, IT Audits, IT Outsourcing, Juniper Research, Lenovo LePad, linksys routers, Maylong, MeeGo, Microprocessors, Microsoft, Motorola Xoom, Network routers, Nokia, OS, PC, PC repairs, QNX, RIM, Routers, Security, Slate 500, smartphones, Software, tablet, technology, Telcom Audits, telephone auditing review, The Syber Group, TouchPad, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, WiFi, Windows Technician, Wireless, Wireless Internet, Xoom
At a time when technology is supposed to be getting simpler, less complex and easier to manage, more people are calling help desks for assistance than ever before, according to a new report. That’s one of the findings that HDI, formerly known as the Help Desk Institute, revealed in its recently released 2010 study of help desk trends.
What HDI found is that the number of incidents reported to help desks via chat, e-mail, telephone, self-help systems, social media, the Web and walk-ins is rising, with 67% of all help desk operations experiencing increases in 2010. That’s roughly the same percentage who reported an increase in 2009.
In recent years, many organizations have moved to centralize their help desk operations and establish a single point of contact for workers, said Roy Atkinson, an analyst at HDI, whose members represent a help desk community of about 50,000 people.
Those centralization efforts have improved incident data collection, which helps to explain the spike in reports. Moreover, creating a single point of contact, and offering multiple ways for people to reach the help desk, encourages users to seek assistance, Atkinson said.
While centralization and better record-keeping may explain much of the increase in reported calls, it doesn’t completely explain it. Atkinson said another part of the explanation could be the fact that IT complexity is actually increasing, especially as users seek to connect multiple devices, including mobile phones, tablets and laptops to corporate networks. Read More…….
Tags: 60606, advantages of using a consultant, applications, assistance, best Internet Phone Service, browsers, budget-cutting, calls, chat, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Economics, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, conversions, corporate networks, Cyber Group Help Desk, data centers, data collection, desktop, email services, emails, HDI, help desk community, Help Desk Services, help desks, high-quality support, incidents, infrastructure, internet, IT, IT Audits, IT Managers, IT Outsourcing, laptops, linksys routers, mobile phones, multiple devices, Network routers, organizations, PC repairs, PC's, phone systems, product changes, recession, reduced staff, research firms, Routers, self-help web, tablets, Tech Support, Tech Support Services, technical support, technology, Telcom Audits, telephone auditing review, The Syber Group, trends, upgrades, Virtual Computers, Virtualization, VoIP, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, Windows Technician, Wireless Internet
In what appears to be the year of the tablet, Chinese PC maker Lenovo announced plans to sell its LePad tablet worldwide in June, but will first launch the device in China at the end of March, a company spokesman said on today.
The LePad, Lenovo’s first tablet computer, was unveiled in January during the Consumer Electronics Show in Las Vegas. The device is built with 10.1-inch screen that runs the Android 2.2 OS on a 1.2GHz Qualcomm Snapdragon processor. (See a video report on LePad’s CES unveiling on YouTube.)
Lenovo said the device would be priced between $399 and $449. But at the time, the company was still unsure whether it would sell the product outside of China.
While Lenovo now plans on selling the tablet overseas, company spokesman Jay Chen couldn’t say which markets will be targeted. Read More…
Tags: 1.2GHz, Acer, advantages of using a consultant, android, Android 2.2, best Internet Phone Service, business units, Cellular, CES, Cheap Business Internet, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, China, Chinese market, cloud computing, Cloud Computing Chicago, competitive pricing, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Consumer Electronics Show, data centers, Dell, Desktop Services, developing technology products, devices, email services, gadgets, Gartner, Google, Help Desk Services, Hewlett-Packward, HP, internet, IT Audits, IT Outsourcing, Las Vegas, Lenovo, Lenovo LePad, LePad, Lepad Coming In June, linksys routers, market domination, Network Design, Network Optimization, Network routers, Operating System, OS, PC maker, PC repairs, PC's, Qualcomm, reports, research firm, Routers, Server Management, shifting strategies, smartphones, Snapdragon processor, tablet pricing, tablets, targeted markets, technology, Telcom Audits, telephone auditing review, The Syber Group, video, video report, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, Windows Technician, Wireless, Wireless Internet, worldwide market, YouTube
About eight out of every ten internet browsers run by consumers are vulnerable to attack by exploits of already-patched bugs, a security expert said today.
The poor state of browser patching stunned Wolfgang Kandek, CTO of security risk and compliance management provider Qualys, which presented data from the company’s free BrowserCheck service Wednesday at the RSA Conference in San Francisco.
“I really thought it would be lower,” said Kandek of the nearly 80% of browsers that lacked one or more patches.
BrowserCheck scans Windows, Mac and Linux machines for vulnerable browsers, as well as up to 18 browser plug-ins, including Adobe’s Flash and Reader, Oracle’s Java and Microsoft’s Silverlight and Windows Media Player.
When browsers and their plug-ins are tabulated together, between 90% and 65% of all consumer systems scanned with BrowserCheck since June 2010 reported at least one out-of-date component, depending on the month. In January 2011, about 80% of the machines were vulnerable. Read more….
Tags: 60606, Adobe Flash, Adobe Reader, advantages of using a consultant, already-patched bugs, anti-virus, apple, applications, best Internet Phone Service, browser updates, BrowserCheck, Bugs, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, Chrome, cloud computing, Cloud Computing Chicago, compliance management, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, consumer systems, data, data centers, Desktop Services, email services, Firefox, Google, Help Desk Services, IE, internet, Internet Explorer, IT Audits, IT Outsourcing, Java, laptops, linksys routers, Linux machines, MAC, Mozilla, Network Design, Network Optimization, Network routers, new patches, Online, Oracle, out-of-date-components, patches, PC repairs, PC's, plug-ins, Qualys, QuickTime, reader, Routers, RSA Conference, Security, security experts, security risk, security scans, self updating, Server Management, Silverlight, statistics, Telcom Audits, telephone auditing review, The Syber Group, unpatched, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, vulnerable browsers, web, Windows, Windows Media Player, Windows Technician, Wireless Internet
Nvidia finally debuted its first quad-core Tegra processor, codenamed Kal-El, and the new chip will probably lead to much more powerful tablets and high-end smartphones.
Nvidia’s Senior VP Phil Carmak of Mobile Business announced that the new processor will deliver a five-fold graphics performance increase over the current Tegra 2 dual-core. The chip is supposedly capable of driving 2560×1600 displays. It is thought that the new chip could power much more serious products than current tablets.
“You’ll have full photo editing, video editing, writing of documents, browsing the Web, all sorts of stuff,” Phil Carmak announced. Read more….
Tags: 4G, 60606, 720p, advantages of using a consultant, android, apple, applications, best Internet Phone Service, Blackberry, business, businesses, cars, Cellular, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Computing, connectivity, consumers, CoreMark, customers, data centers, Desktop Services, devices, Dual Core, electronics, email services, Energy Efficient, enterprises, Fast CPU for smartphones, Galaxy tab, Gaming, Google, Green energy efficiency, GT 430, HD 5570, HD 5670, Help Desk Services, hotspots, HTPC card, Intel Core 2 Duo T7200, internet, iOS, iOS 4.2, ipad, iPhone, IT, IT Audits, IT Outsourcing, Kal-El, linksys routers, managing, Microprocessors, Microsoft, MiFi, Mobile, mobile internet, navigation, Network Design, Network Optimization, Network routers, notebooks, Nvidia has Quad Core Chip, Nvidia has Quad Core Microprocessor, Nvidia Kal-EL, Nvidia Quad Core Tegra, Nvidia Tegra 2 more popular than Intels Oak Trail, Nvidia's Kal-El, organizations, PC repairs, PC's, phones, PlayBook, Power consumption, procs, products, Redwood, revenue, Routers, samsung, securing, Security, Server Management, shipments, smartphones, Software, tablet, technology, Tegra, Tegra 3, Telcom Audits, telephone auditing review, The Syber Group, topics, Toshiba Tablet, Toshiba to enter the Tablet Market, Verizon, versions, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, webinars, wi-fi, WiFi, Windows Technician, Wireless, Wireless Internet
We have learned that Intel has finally launched its six-core Core i7-990X Extreme Edition Gulftown-based processor. Therfore, Intel went ahead and cut the price of its Core i7-970 and Core i7-960 models.
It is said that the six-core Core i7-990X runs at 3.46GHz and up to 3.73GHz on TurboBoost. It has six cores and twelve processing threads with Intel Hyper-Threading Technology. It packs 6×256kB of L2 cache, 12MB of L3 cache, features support for triple-channel DDR3-1066 memory, comes with an unlocked multiplier and has a 130W TDP. Read more….
Tags: 1080p, 28nm, 3G, 40-bit virtualization, 60606, 64-bit processor, 720p, advanced technology, advantages of using a consultant, ARM, best Internet Phone Service, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, Chip, Cinebench 10.0, cloud computing, Cloud Computing Chicago, components, computer, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computing, Core i7 990 x runs at 3.46 GHz X Core, Core i7-990X, Cortex-A15, data, data centers, devices, double patterning, email services, GPU, graphics, Help Desk Services, Intel, Intel Core i5 2400, Intel Core i5 2400 3.1GHz, Intel Core i5 2400 Benchmark Results, Intel cuts price on Core i7, Intel Sandy Bridge, internet, IT Audits, IT Outsourcing, linksys routers, manufacture, Microprocessor, Microprocessors, Microsoft, Mobile, nanometers, Network routers, networks, Oak Trail, OS, PC, PC repairs, PC's, processors, Routers, Sandy Bridge Processors, Security, semiconductor, SOC, Software, Stream TV, Sysmark, System on a Chip, TDP, technology, Telcom Audits, telephone auditing review, The Syber Group, transistors, TSMC, video, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, WiFi, Windows 7, Windows Technician, Wireless Internet
Intel has stated that they intend to start shipping their B3 stepping 6-Series chipset chips by February 14th (today). If you missed the headlines on this fiasco, I am speaking in reference to Intel’s chipset that is plagued by the now quite famous SATA 3Gbps bug.
Intel is still sticking to its original announcement that it will ship these products by the end of February. The new stepping has several updates including the change of revision ID from 04h to 05h, BIOS update to 1.1.4 and minor metal layer change improving lifetime wear and tear with no changes to functionality or design specifications (the one that fixes SATA 3.0Gbps issue). Read more…
Tags: 1080p, 28nm, 3D Steroscopic, 3G, 40-bit virtualization, 60606, 64-bit processor, 720p, Accelerated Parallel Processing, advanced technology, advantages of using a consultant, AMD, AMD 6800, AMD 6950 Unlockable via Bios, AMD Bio Hack, AMD HD3D, AMD releases a 1GB Version of the HD 6950, App, ARM, ATI, best Internet Phone Service, Blu Ray, Cheap, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, Chip, Cinebench 10.0, cloud computing, Cloud Computing Chicago, components, computer, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Computing, Core i5, Core i7, Cortex-A15, cpu, data, data centers, devices, Direct X, Direct3D, Dollars, double patterning, Drivers, electronics, email services, Gaming, Gb, GPU, GPU's, graphics, Graphics cards, GTX, GTX 460, HD 5000, Help Desk Services, Intel, Intel B3 6 Series, Intel B3 Sandy Bridge to Ship today, Intel Core i5 2400, Intel Core i5 2400 3.1GHz, Intel Core i5 2400 Benchmark Results, Intel Sandy Bridge, internet, IT Audits, IT Outsourcing, linksys routers, manufacture, Microprocessor, Microprocessors, Microsoft, Mobile, money, Motherboards, MSRP, nanometers, Network routers, networks, Nvidia, Nvidia’s GTX 560 Ti, Oak Trail, Open GL, OS, PC, PC repairs, PC's, Pricing, processors, Radeon HD 2000, Radeon Hd 6000, Raseon Graphic Card, Routers, Sandy Bridge B3, Sandy Bridge Processors, Security, semiconductor, SOC, Software, Stero 3D, Stream TV, Sysmark, System on a Chip, technology, Telcom Audits, telephone auditing review, The Syber Group, transistors, TSMC, video, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, WiFi, Windows, Windows 7, Windows Phone 7, Windows Technician, Wireless Internet, WMV HD
Intel released some benchmarks results of its Core i5 2400, one of the new Sandy Bridge processors with 6MB of cache 3.1GHz core clock and four cores and four threads. The Core i5 2400 also comes with a Turbo feature and can run at much higher clock-speed than the 3.1GHz that is advertised. Keep in mind this depends on Turbo 2 conditions and current thermal environment.
In the benchmark observation Intel decided to compare current Core i5 650 3.2GHz core with 4MB of cache and two cores and four threads including Turbo to a new Sandy Bridge part. Read more….
Tags: 1080p, 28nm, 3G, 40-bit virtualization, 60606, 64-bit processor, 720p, advanced technology, advantages of using a consultant, ARM, best Internet Phone Service, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, Chip, Cinebench 10.0, cloud computing, Cloud Computing Chicago, components, computer, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computing, Cortex-A15, data, data centers, devices, double patterning, email services, GPU, graphics, Help Desk Services, Intel, Intel Core i5 2400, Intel Core i5 2400 3.1GHz, Intel Core i5 2400 Benchmark Results, Intel Sandy Bridge, internet, IT Audits, IT Outsourcing, linksys routers, manufacture, Microprocessor, Microprocessors, Microsoft, Mobile, nanometers, Network routers, networks, Oak Trail, OS, PC, PC repairs, PC's, processors, Routers, Sandy Bridge Processors, Security, semiconductor, SOC, Software, Stream TV, Sysmark, System on a Chip, technology, Telcom Audits, telephone auditing review, The Syber Group, transistors, TSMC, video, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, WiFi, Windows 7, Windows Technician, Wireless Internet
A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.
“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.
Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.
To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said. Read More….
Tags: 60606, alogorithm, antivirus software, applications, attackers, attacks, AV, backgrounds, best Internet Phone Service, blogging, Bootlock Trojan, bypass technique, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, data centers, decrypt, demand money, desktop access, desktops, disable hard drives, documents, email services, file extensions, GPCoder.G, hard drives, Help Desk Services, images, infectiions, innovative technology, internet, IT Audits, IT Outsourcing, malware, master boot, Microsoft, Mobile, Music, offensive viruses, Online, PC repairs, pornographic images, premium-rate mobile phone number, private key, public key, random key, ransomware, recovery tools, restore desktop, restoring, RSA encryption, sensitive information, Stuxnet, Symantec, symmetric keys, technical help, Telcom Audits, video files, Virtual Computers, Virtualization, viruses, VoIP MPLS, Windows Technician, Wireless Internet
Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.
Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers. The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software. Read more….
Tags: 60606, antivirus, antivirus software, applications, attacker, attackers, backdoor, bandwidth, best Internet Phone Service, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, component, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Conflicker Worm, Conflicker Worm still infecting computers, control center, critical data, data centers, databases, detection, developed, dll, email services, emails, encryption, espionage, Explorer, explorer.exe, extensions, files, FTP, GET, Google, Hackers, Help Desk Services, information, internet, IT Audits, IT Outsourcing, malware, monitor phone calls, netconf32.dll, Network, networks, number recognition, Operating System, operating systems, OS, overlay, PC repairs, PC's, PDF, phones, private, processes, remote server, researchers, screenshots, Security, sensitive data, server, settings, spying, stolen data, system32, Telcom Audits, threats, transmit data, Trojan horse, Trojan.Spy.Yek, upload data, users, Virtual Computers, Virtualization, VoIP MPLS, Windows, Windows 7, Windows 95, Windows Technician, Wireless Internet
« Previous Page