Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Intel Increasing Supplier Audits

June 22, 2012 by  
Filed under Computing

Comments Off on Intel Increasing Supplier Audits

Intel has audited almost five times as many of its suppliers in 2011 than it did the previous year.

Chipzilla set itself a target of visiting 50 on-site, third-party audits of its suppliers during the last year. It had that target last year as well, but missed it by only carrying out 49 audits, while one had to be rescheduled.

In comparison Intel only carried out eight visits in 2010. The company also conducted 249 in-depth assessments and 289 self-assessments by suppliers.

But the findings were not that great. Intel found 426 priority and major findings, the highest class of non-compliance as defined by the company.

Most of the non-compliance related to management systems such as a lack of documentation and systems for CSR, inadequate communication with workers or suppliers and a lack of audits. But there were also 112 instances of labour abuse, which included working hours of more than 60 hours per week, and workers not being given at least one day off a week. There were also 28 issues relating to ethics, such as not having an anonymous reporting line for employees to raise issues or concerns through.

The report was interesting because it must have covered Foxconn, which has been the subject of criticism over its treatment of workers. During 2011, Intel carried out audits at three Foxconn facilities and found them about as bad as others in the region. Most of the breaches of rules were in the areas of labour conditions, safety systems, and management systems.

Source…

AMD, ARM And Others Form HSA Chip Foundation

June 21, 2012 by  
Filed under Computing

Comments Off on AMD, ARM And Others Form HSA Chip Foundation

AMD, ARM, Imagination Technologies, Mediatek and Texas Instruments have signed up to create the Heterogeneous System Architecture Foundation (HSAF).

AMD has been pushing its vision for heterogeneous computing, where CPUs and GPUs can share system resources such as memory allowing developers to treat any processing core as a black box. Now the firm has managed to rope in ARM, Imagination Technologies, Mediatek and Texas Instruments to create the non-profit HSAF.

According to AMD, HSAF will try to define a hardware specification for developers to standardise upon, which should make development quicker and easier.

Phil Rogers, HSAF president and AMD corporate fellow said, “HSA [heterogeneous system architecture] moves the industry beyond the constraints of the legacy system architecture of the past 25-plus years that is now stifling software innovations. By aiming HSA squarely at the needs of the software developer, we have designed a common hardware platform for high performance, energy efficient solutions. HSA is unlocking a new realm of possibilities across PCs, smartphones, tablets and ultrathin notebooks, as well as the innovative supercomputers and cloud services that define the modern computing experience.”

AMD has scored something of a coup by getting big names such as ARM, Imagination and Texas Instruments to back its vision of a heterogeneous system architecture. Although the company has been struggling in outright performance terms against Intel, the idea of a combining CPU and GPU resources and making them appear as one to the application is something that will help it leverage its GPU compute capability against Intel.

Source…

USA In Danger Of Cyber Experts Shortage

June 20, 2012 by  
Filed under Computing

Comments Off on USA In Danger Of Cyber Experts Shortage

Leading cyber experts warned of a shortage of talented computer security experts in the United States, making it extremely difficult to keep corporate and government networks safe at a time when attacks are on the rise.

Symantec Corp Chief Executive Enrique Salem told the Reuters Media and Technology Summit in New York that his company was working with the U.S. military, other government agencies and universities to help develop new programs to train security professionals.

“We don’t have enough security professionals and that’s a big issue. What I would tell you is it’s going to be a bigger issue from a national security perspective than people realize,” he said on Tuesday.

Jeff Moss, a prominent hacking expert who sits on the U.S. Department of Homeland Security Advisory Council, said that it was difficult to persuade talented people with technical skills to enter the field because it can be a thankless task.

“If you really look at security, it’s like trying to prove a negative. If you do security well, nobody comes and says ‘good job.’ You only get called when things go wrong.”

The warnings come at a time when the security industry is under fire for failing to detect increasingly sophisticated pieces of malicious software designed for financial fraud and espionage and failing to prevent the theft of valuable data.

Moss, who goes by the hacker name “Dark Tangent,” said that he sees no end to the labor shortage.

Source…

1 In 5 U.S. PCs Have No Antivirus Protection

June 8, 2012 by  
Filed under Computing

Comments Off on 1 In 5 U.S. PCs Have No Antivirus Protection

Nearly a fifth of Windows PCs in the U.S. lack any active security protection, an antivirus vendor stated on Wednesday, citing numbers from a year-long project.

“The scale of this is unprecedented,” argued Gary Davis, the director of global consumer product marketing for McAfee, talking about the scope of his company’s sampling of PC security.

McAfee took measurements from scans of more than 280 million PCs over the last 12 months, and found that 19.3% of all U.S. Windows computers browsed the Web sans security software. Owners of those systems downloaded and used McAfee’s free Security Scan Plus, a tool that checks for antivirus programs and enabled firewalls.

Globally, the average rate was 17%, putting the U.S. in the top 5 most-unprotected countries of the 24 represented in the scans.

Of the unprotected PCs in the U.S., 63% had no security software at all, while the remaining 37% had an AV program that was no longer active. The latter were likely trial versions of commercial antivirus software that had expired.

Antivirus trials are a fact of life in the Windows world. Most new machines come with security software that runs for a limited time. Some new Dell PCs, for example, come with a 30-day trial of McAfee’s Security Center program.

Source…

Adata Outs 40MB/s UHS microSD Card

June 7, 2012 by  
Filed under Computing

Comments Off on Adata Outs 40MB/s UHS microSD Card

Adata has launched a 32GB UHS-1 microSD card offering 40MB/s write bandwidth.

Adata, which recently has been making a big push in the solid-state disk (SSD) drive market, has announced its first microSD cards that support the UHS-1 specification. The firm’s Premier Pro cards come in 8GB, 16GB and 32GB capacities with the firm citing read bandwidth of 45MB/s and all important write bandwidth of 40MB/s.

The SD Card Association defined the UHS-I specification as part of its SD Version 3.01 standard, and while Adata’s new cards boast impressive speeds there is a lot of headroom left, with UHS-1 supporting bandwidths up to 104MB/s. Adata’s cards, roughly translated to the ‘X’ speed rating used on a number of memory cards, come out at 266X.

Ray Chu, product manager at Adata said, “These cards have the best read and write performance among all comparable products offered by the industry’s key players. When that is combined with the aggressive pricing options in store for this line, the result is going to be a bonanza for our customers worldwide.”

Source…

Microsoft’s Vista Infection Rates Climb

June 1, 2012 by  
Filed under Computing

Comments Off on Microsoft’s Vista Infection Rates Climb

Microsoft said last week that an uptick in more security exploits on Windows Vista can be attributed to the demise of support for the operating system’s first service pack.

Data from the company’s newest security intelligence report showed that in the second half of 2011, Vista Service Pack 1 (SP1) was 17% more likely to be infected by malware than Windows XP SP3, the final upgrade to the nearly-11-year-old operating system.

That’s counter to the usual trend, which holds that newer editions of Windows are more secure, and thus exploited at a lower rate, than older versions like XP. Some editions of Windows 7, for example, boast an infection rate half that of XP.

Tim Rains, the director of Microsoft’s Trustworthy Computing group, attributed the rise of successful attacks on Vista SP1 to the edition’s retirement from security support.

“This means that Windows Vista SP1-based systems no longer automatically receive security updates and helps explain why there [was] a sudden and sharp increase in the malware infection rate on that specific platform,” said Rains in a blog post last week.

Source…

SecureID CRACKED?

May 31, 2012 by  
Filed under Around The Net

Comments Off on SecureID CRACKED?

An analyst has come up with a technique that clones the secret software token that RSA’s SecurID uses to generate one-time passwords.

Sensepost senior security analyst Behrang Fouladi said that the discovery has important implications for the safekeeping of the tokens. Fouladi demonstrated another way determined attackers could circumvent protections built into SecurID. By reverse engineering software used to manage the cryptographic software tokens on computers running Windows, he found that the secret “seed” was easy for people with control over the machines to locate and copy. He provided step-by-step instructions for others to follow in order to demonstrate how easy it is to create clones that mimic verbatim the output of a targeted SecurID token.

Source…

Seagate Gobbles Up Lacie

May 30, 2012 by  
Filed under Computing

Comments Off on Seagate Gobbles Up Lacie

Seagate has signed a deal to buy consumer storage vendor Lacie that values the firm at $186m.

Seagate, which recently completed the acquisition of Samsung’s hard disk unit and swiftly cut warranties on most of its drives to just one year, has now announced that it will buy hard drive packager Lacie. Seagate has signed an agreement with Philippe Spruch, Lacie’s chairman and CEO, to purchase his 63.5 percent stake in the company at $7.05 per share in cash, which values the firm at $186m.

According to Seagate the purchase should help the firm grow in Europe and Japan. The firm also announced that Spruch will be employed by Seagate and run its consumer products division.

Steve Luczo, Seagate chairman, CEO and president said, “Lacie has built an exceptional consumer brand by delivering exciting and innovative high end products for many years. This transaction would bring a highly complementary set of capabilities to Seagate, significantly expand our consumer product offerings, add a premium branded direct attached storage line, strengthen our network-attached storage business line and enhance our capabilities in software development.”

Lacie’s fancy portable hard drives are popular among those who like fancy cases wrapped around bog-standard consumer hard disks. Seagate’s purchase of Lacie should see the firm not only become the sole supplier of hard drives in Lacie products but make a renewed push in the consumer portable hard drive market following last year’s floods in Thailand that affected the three big hard drive manufacturers.

Seagate said the deal should be completed by the third quarter of 2012 pending regulatory approval in the US, France and Germany.

.

Source…

Is B.Y.O.D Proving To Be A Headache?

May 29, 2012 by  
Filed under Around The Net

Comments Off on Is B.Y.O.D Proving To Be A Headache?

IT managers trying to cope with the growing bring-your-own-device (BYOD) trend can expect to see an explosion in the number of smartphones and tablets used by employees in the next few years.

As a result, IT shops won’t be able to provide the security necessary to protect company data, says Gartner analyst Ken Dulaney.

“The number of devices coming in the next few years will outstrip IT’s ability to keep the enterprise secure,” he said, adding that IT workers are “going crazy” and “get into fights” over whether users should have upgrades.

To help IT cope, software vendors should create what Dulaney called “beneficial viruses” that could be embedded in corporate data carried on mobile devices. These software tools would require users to have licenses in order to access files, just as digital rights management technology does with music and video files.

Beneficial viruses would also “be smart enough” to delete the sensitive data if a device is lost or stolen, or if data winds up on an unauthorized device, Dulaney said, adding, “It’s time for the SAPs and Oracles to begin thinking about doing that, and it’s a lot harder than we think.”

Today, IT shops use mobile device management software to monitor which mobile users are authorized to access applications and whether they can access the data outside the corporate cloud.

Source…

AMD Officially Launches Trinity Mobile

May 22, 2012 by  
Filed under Computing

Comments Off on AMD Officially Launches Trinity Mobile

AMD has finally and officially lifted an NDA veil off its mobile Trinity A-series APU lineup based on the 2nd-gen Bulldozer CPU core, aka Piledriver, and VLIW4 Northern Islands GPU squeezed together on a 32nm SOI die.

Architecture-wise, AMD’s Trinity combines two to four Piledriver x86 cores combined with up to 384 VLIW4 Radeon cores on a 32nm die which ends up as a 246mm2 chip with 1.303B transistors, slightly more than Llano’s 228mm2/1.178B. Since it is made in the same 32nm manufacturing process as Llano, the greatest win for Trinity are actual CPU and GPU performance improvements as well as impressive power consumption improvements when compared to Llano APUs.

Same as the FX-series desktop parts based on the Bulldozer architecture, AMD’s Trinity CPU part has a 2+1 integer/floating point design where you get two integer cores that share a single floating point scheduler. Although it appears to the OS as two cores, each Piledriver module actually has less resources than traditional core design. But with Piledriver, those Bulldozer kinks got ironed out as much as possible, improving IPC (instruction per cycle), reducing leakage, reducing CAC and giving it a slight frequency uplift.

As far as the GPU is concerned, we are looking at quite familiar Northern Islands VLIW4 part, a same one that was behind Cayman Radeon HD 6970 graphics card. Of course, the GPU has been cut down to up to 384 stream processors (organized in 6 SIMDs) with 24 texture units and 8 ROPs. The clocks have also gone down to 497MHz base clock that can “turbo” up to 686MHz.

Source…

« Previous PageNext Page »