Did Intel Kill Bay Trail?
Intel has decided that some of its budget Bay Trail parts have been out evolved and flung them into a tar pit. According to CPU World the parts first appeared in September. Intel released budget Bay Trail systems on a chip for mobile and desktop markets, under Celeron and Pentium brands.
They were manufactured on 22nm technology, and featured such enhancements as greater number of CPU cores, higher clock speeds, beefed up graphics unit, not to mention an out-of-order microarchitecture, that improved per-clock CPU performance by up to 30 per cent faster compared to their predecessors. With this performance goodness it is a little surprising the Intel has decided that all the all Bay Trail SoCs will be discontinued in a matter of a few months. Details of the planned discontinuation were published this week by Intel in several Product Change Notification documents.
The Desktop Pentium J2850, along with mobile Celeron N2810 and Pentium N3510 are already End of Lifed and its last orders will be in two weeks, on February 11. The chips will ship until April 25, 2014. Also retired are mobile Celeron N2806, N2815, N2820, N2920, and Pentium N3520. Their EOL date is April 11, 2014, and they will ship until May 30, 2014. On August 22, 2014, Intel is going to discontinue Celeron J1750, J1850, N2805 and N2910. The “J” models are desktop processors, and the “N” are mobile ones. There is no word on Z-series Bay Trail-T parts, none appear to be EOL’d at this time.
Furthermore, on the same date Intel will retire Core i7-3940XM Extreme Edition, and boxed and tray versions of Core i7-3840QM and i7-3740QM CPUs. The last shipment date for the Celerons and Core i7s is February 6, 2015.
LinkedIn DropS BWP API
February 18, 2013 by admin
Filed under Around The Net
Comments Off on LinkedIn DropS BWP API
LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connections among users of the business-oriented social networking site.
The service was designed to allow LinkedIn users to anonymously search for people in their LinkedIn network who would be interested in meeting up for casual sex.
“We all had a good laugh,” the founders of Bang With Professionals said on last Friday on the website, less than a month after its launch. “We all knew it was a matter of time before our API key was revoked.”
LinkedIn said it shut off API (application programming interface) access for the free site, which was intended to work on all desktops and mobile devices, because it violated the social network’s terms of use in a manner that was “inconsistent with the goals of our developer program.”
Among other things, API access isn’t allowed for any application that contains or displays adult content.
Data about the site’s 6,000 subscribers is safe and all their user IDs have been deleted, the founders said. The only thing that remains now is the site’slanding page.
The origins of Bang With Professionals are not unique in the fast-paced social networking landscape. The site was built “by two guys in three days,” the landing page says. The total launch cost was US$57: $40 for stock images, $12 for the domain name and $5 for an account on the server CloudFlare.
The Twitter handle for the site has since been deactivated, but at press time, the Bang With Professionals blog on Tumblr was still accessible.
IBM Sued Over Disaster
IBM has been hit with a multimillion-dollar lawsuit by chemical products manufacturer Avantor Performance Materials, which alleges that IBM lied about the suitability of an SAP-based software package it sells in order to win Avantor’s business.
In 2010, Avantor decided to upgrade its ERP (enterprise resource planning) platform to SAP software, according to the lawsuit, filed Thursday in U.S. District Court for the District of New Jersey.
“Seizing upon Avantor’s decision — and fully aware that, given the competitive pressures of Avantor’s industry, and the specialized demands of its customers, Avantor could not tolerate any disruptions in customer service — IBM represented that IBM’s ‘Express Life Sciences Solution’ … was uniquely suited to Avantor’s business,” the lawsuit states. “The Express Solution is a proprietary IBM pre-packaged software solution that runs on an SAP platform.”
But Avantor discovered a different truth after signing on with IBM, finding that Express Life was “woefully unsuited” to its business and the implementation brought its operations to “a near standstill,” according to the suit.
IBM also violated its contract by staffing the project with “incompetent and reckless consultants” who made “numerous design, configuration and programming errors,” it states.
In addition, IBM “intentionally or recklessly failed” to tell Avantor about risks to the project and hurried towards a go-live date, the suit alleges.
“To conceal the System’s defects and functional gaps, IBM ignored the results of its own pre-go-live tests, conducted inadequate and truncated testing and instead recommended that Avantor proceed with the go-live as scheduled — even though Avantor had repeatedly emphasized to IBM that meeting a projected go-live date was far less important than having a fully functional System that would not disrupt Avantor’s ability to service its customers,” the suit states.
The resulting go-live, which occurred in May, “was a disaster,” with the system failing to process orders properly, losing some orders altogether, failing to generate need paperwork for U.S. Customs officials and directing “that dangerous chemicals be stored in inappropriate locations,” the suit states.
Avantor has suffered tens of millions of dollars in monetary damages, as well as taken a hit to its reputation among partners and customers, the suit states.
Oracle Wants More Money From SAP
Oracle is appealing the damages awarded from SAP that it was granted and is pushing for more.
The news has disappointed SAP, according to a German newspaper, and the firm is worried that the appeal will draw out the five year long legal battle even longer.
“We are disappointed that the lawsuit Oracle pulls further out,” said a SAP spokesman to the German newspaper Mannheimer Morgen.
“We had agreed on a sensible arrangement, because we believe that this case has gone on long enough. We remain committed to bring this dispute to an end.”
Neither firm has commented yet, but the appeal follows SAP’s admission of liability in the Tomorrownow affair.
SAP pleaded guilty last year and acknowledged that its Tomorrownow subsidiary had done wrong. Tomorrownow was accused of downloading information belonging to Oracle, including software and customer information related to Peoplesoft users.
Oracle was initially awarded $1.3bn in damages but this was knocked down to $306m by a judge who told it that it had two options, accept that sum or take SAP back to court.
Chase Building 1/2 Billion Dollar Data Center
August 24, 2012 by admin
Filed under Around The Net
Comments Off on Chase Building 1/2 Billion Dollar Data Center
The enthusiastic backer of Enron and serial over charger of mortgage payers, JPMorgan Chase has just splashed out on a new $500 million data center.
CEO Jamie Dimon announced the move which practically everyone in the IT industry finds a bit strange. While Chase is the US’s largest bank, the new facilities are a little big by anyone’s standard. It is about the same about of money that Google and Microsoft in their largest data centres for their cloud networks.
Dimon cited the figure as one of the advantages of being a big size. It can afford to invest cash in this way. Size lets Chase build a $500 million data centre that speeds up transactions and invest billions of dollars in products like ATMs and apps that allow your iPhone to deposit cheques, he enthused.
JPMorgan Chase operates two large data centres in Delaware and a 400,000 square foot facility. It also acquired data centres in its deals for distressed rivals Bear Stearns and Washington Mutual in the early days of the 2008 financial crisis. So why it needs a huge new one is anyone’s guess.
Cisco Lends A Hand In Fighting Fraud
Cisco released an API at the Interop 2012 Conference this week for its branch routers designed to enable third-party developers to write applications to beef up the security of phone calls over the router network.
The Cisco UC Gateway Services API is a Web-based programming interface that allows customers and developers access to call information over a Cisco ISR G2 router at the edge of a voice network, such as signaling and media. This information can be used to detect and help prevent malicious activity such as social engineering and identity theft scams, contact center account takeover fraud, unauthorized network and service use, and denial-of-service attacks.
Applications written to the API can then apply appropriate action to terminate, redirect or record the call.
Cisco, citing data from the Communications Fraud Control Association, says global telecom fraud losses are estimated to be $40 billion annually.
Symantec’s Virus Code Hacked
Symantec is looking into an Indian hacking group’s claims that it accessed source code used in the company’s flagship Norton Antivirus program.
A spokesman for the company on Thursday said that one claim by the group was false, while another is still being investigated.
Meanwhile, the Indian group, which calls itself Lords of Dharmaraja, has threatened to publicly disclose the source code very soon.
On Wednesday, the group posted on Pastebin what it claimed was confidential documentation related to Norton AntiVirus source code. A review of the material showed what appears to be a description of an application programming interface (API) for Symantec’s AV product.
The group also posted what it claimed was the complete source code tree file for Norton Antivirus. That document appears to have been taken down.
‘Yama Tough,’ the hacker who posted the documents, released at least two more on Google+ allegedly related to Symantec source code. One of the documents appears to be a detailed technical overview of Norton Anti-Virus, Quarantine Server Packaging API Specification, v1.0. The other document, from 2000, describes a Symantec Immune System Gateway Array Setup technology.
.
Yahoo Messenger Flaw Exposed
December 10, 2011 by admin
Filed under Around The Net
Comments Off on Yahoo Messenger Flaw Exposed
An unpatched Yahoo Messenger vulnerability that allows hackers to change people’s status messages and possibly perform other unauthorized functons can be exploited to spam malicious links to a large number of users.
The flaw was discovered in the wild by security researchers from antivirus vendor BitDefender while investigating a customer’s report about unusual Yahoo Messenger behavior.
The flaw appears to be located in the application’s file transfer API (application programming interface) and allows attackers to send malformed requests that result in the execution of commands without any interaction from victims.
“An attacker can write a script in less than 50 lines of code to malform the message sent via the YIM protocol to the attacker,” said Bogdan Botezatu, an e-threats analysis & communication specialist at BitDefender.
“Status changing appears to be only one of the things the attacker can abuse. We’re currently investigating what other things they may achieve,” he added.
Victims are unlikely to realize that their status messages have changed and if they use version 11.5 of Yahoo Messenger, which supports tabbed conversations, they might not even spot the rogue requests, Botezatu said.
This vulnerability can be leveraged by attackers to earn money through affiliate marketing schemes by driving traffic to certain websites or to spam malicious links that point to drive-by download pages.
Apple Website Is Ripe For Hacking
July 4, 2011 by admin
Filed under Around The Net
Comments Off on Apple Website Is Ripe For Hacking
According to the Ethical Hacking group YGN, Apple’s website for developers is virtually wide open and gives the opportunity for hackers to introduce malware such asphishing attacks to gain access to subscriber’s vital personal information.
One group known as Networkworld identified three holes on Apple’s website that arbitrary URL redirects, cross-site scripting and HTTP response splitting. That said, these holes could allow hackers to arbitrarily redirect to other websites and make phishing attacks against developers login credentials more successful.
Download Defense Added To Chrome Browser
Comments Off on Download Defense Added To Chrome Browser
Google has updated Chrome to version 12, adding a new feature that warns users when they’ve downloaded files from dangerous Web sites.
New to Chrome 12 is a tool that flags questionable files pulled from the Web. Chrome now shows an alert when users download some file types from sites that are on the Safe Browsing API (application programming interface) blacklist, which Google maintains.
The messages reads: “This file is malicious. Are you sure you want to continue?” If they wish, users can ignore the warning and install the file on their system’s hard drive.
“This warning will be displayed for any download URL that matches the latest list of malicious websites published by the Safe Browsing API,” said Google last April when it debuted the feature in an earlier edition of Chrome.
Safe Browsing already identifies suspicious or unsafe sites, then adds them to a blacklist. Chrome, Mozilla’s Firefox and Apple’s Safari all tap into Safe Browsing to warn users of risky sites before they actually visit them.