According to Scott Lin, President of Acer Taiwan has said the PC supply chain still has at least three months worth of stock. That said, Lin stated that the Japan earthquake should not have an immediate will on impact on the PC market.
With PC manufacturers, brick and mortar each having at least one month’s worth of inventory, the supply should be fine for up to three months. Nevertheless, Lin did caution that Japan’s power infrastructure is an important factor and taking it online sooner rather than later will be crucial to whether the shortages become more serious. Read More…..
Tags: 4G, 720p, advantages of using a consultant, android, apple, applications, Atom Z670, Atom Z670 cost more than A9 processor, best Internet Phone Service, Blackberry, blade systems, brands, business, businesses, cars, Cellular, channel partners, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, competitive pricing, competitors, components, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Computing, connectivity, consumers, CoreMark, customers, data centers, Dell, devices, DRM prices go up because of Japan's Earthquake, Dual Core, Earthquake PC Supply, education, electronics, eMachines, email services, Endpoint Technologies, Energy Efficient, enterprises, Fast CPU for smartphones, Galaxy tab, Gaming, Gateway, Google, Green energy efficiency, GT 430, hard drives, HD 5570, HD 5670, Help Desk Services, Hewlett-Packard, hotspots, HP, HTPC card, Intel Core 2 Duo T7200, internet, iOS, iOS 4.2, ipad, iPhone, IT, IT Audits, IT Outsourcing, Japan Earthquake will hurt PC Supply, Kal-El, laptops, linksys routers, managing, manufacturers, market share, memory, Microprocessors, Microsoft, MiFi, Mobile, mobile internet, navigation, Network Attached Storage, Network routers, networks, notebooks, Nvidia has Quad Core Chip, Nvidia has Quad Core Microprocessor, Nvidia Kal-EL, Nvidia Tegra 2 more popular than Intels Oak Trail, Nvidia's Kal-El, options kits, organizations, Packard Bell, PC, PC repairs, PC's, phones, PlayBook, Power consumption, procs, products, Redwood, revenue, Routers, samsung, securing, Security, server products, servers, shipments, small-medium-sized businesses, Telcom Audits, telephone auditing review, The Syber Group, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, Windows Technician, Wireless Internet
Acer, the No. 4 PC maker in this country, has released a line of servers and storage products for the United States market.
The launch marks the company’s return, or reinvestment, in the U.S. as a server vendor. Acer sells consumer PCs and related devices under its own name, as well under Gateway, eMachines, and Packard Bell brands.
It had previously sold servers in the U.S., but it let that business dwindle over the last few years. The company said it has made a major investment in this market.
It said it has expanded its support and service capabilities, and will manufacturer its server products in the U.S. through third-party makers.
“I want to make sure that we can we build very, very quickly and deliver much faster than everyone else,” said Todd Mottershead, senior manager for servers and storage at Acer.
IDC ranked Acer No. 3 worldwide PC shipments in the fourth quarter of 2010, following Hewlett Packard and Dell. In the U.S., Acer is the fourth largest vendor; HP has 28.6% of the U.S. market; Dell about 22%; Toshiba, about 10%; and Acer 9%.
Acer has been selling servers outside the U.S.
For its U.S. reintroduction, Acer has released a tower rack, blade system, and systems especially designed for cloud computing, all with a number of configurations, as well as network attached storage products. Prices range from $721 for a tower to $10,499, for storage. Acer will be selling through channel partners. Read More…..
Tags: Acer, advantages of using a consultant, best Internet Phone Service, blade systems, brands, businesses, channel partners, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, competitive pricing, competitors, components, Computer Consultants, computer consultants chicago, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, consumers, customers, data centers, Dell, education, eMachines, email services, Endpoint Technologies, enterprises, Gateway, hard drives, Help Desk Services, Hewlett-Packard, HP, IT Audits, IT Audits chicago, IT Outsourcing, laptops, linksys routers, managed services, manufacturers, market share, memory, Network Attached Storage, Network Design, Network Optimization, Network routers, networks, options kits, Packard Bell, PC, PC repairs, Routers, server products, servers, small-medium-sized businesses, SMB, Software, storage IDC, technology, Telcom Audits, telephone auditing review, The Syber Group, third-party makers, Toshiba, total package options, tower rack, U.S.markets, various configurations, vendors, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, Windows 7 Migration, Windows Technician, Wireless Internet, worldwide PC shipments
A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.
“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.
Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.
To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said. Read More….
Tags: 60606, alogorithm, antivirus software, applications, attackers, attacks, AV, backgrounds, best Internet Phone Service, blogging, Bootlock Trojan, bypass technique, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, data centers, decrypt, demand money, desktop access, desktops, disable hard drives, documents, email services, file extensions, GPCoder.G, hard drives, Help Desk Services, images, infectiions, innovative technology, internet, IT Audits, IT Outsourcing, malware, master boot, Microsoft, Mobile, Music, offensive viruses, Online, PC repairs, pornographic images, premium-rate mobile phone number, private key, public key, random key, ransomware, recovery tools, restore desktop, restoring, RSA encryption, sensitive information, Stuxnet, Symantec, symmetric keys, technical help, Telcom Audits, video files, Virtual Computers, Virtualization, viruses, VoIP MPLS, Windows Technician, Wireless Internet
« Previous Page