Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

AMD’s Trinity To Have Fewer Cores

April 11, 2012 by  
Filed under Computing

Comments Off on AMD’s Trinity To Have Fewer Cores

AMD’s soon to launch A10 5800K is a 100W quad-core Trinity 32nm CPU with 3.8 GHz base clock and 4.2GHz maximal clock possible with AMD turbo core dynamic overclocking technology.

The A10 5800K has 4MB of L2 cache, supports DDR3 1866, dual graphics configurations as well as AMD’s new FM2 socket. The fun part is new HD 7660D GPU that works at 800MHz and comes with 384 shader units. The current APU market leader A8 3870K that works at 3GHz has HD 6550 graphics with 400 cores running at 600MHz.

AMD claims that new Radeon cores from Trinity CPU including A10 5800K are more efficient and this is the main reason why you have fewer cores that can deliver superior performance. The other reason is that with 800MHz core clock they can probably process more data, meaning that HD 7660D of A10 5800K should end up quite a bit faster than the Llano A8 3870K.

All these Radeon cores are a key feature of the Vision Engine that accelerates GPU enabled applications. AMD also tells the world that Trinity is DirectX 11 compatible, supports Direct compute and the new A series of processors, including the A10 5800K all the way to dual-core A4 5300, should not have any issues playing Blu-ray 3D. The GPU part of Trinity supports AMD V, UVD3 as well as Open CL acceleration.

Source…

RIM Goes Non-BlackBerry

April 9, 2012 by  
Filed under Smartphones

Comments Off on RIM Goes Non-BlackBerry

Research In Motion on Tuesday launched software that will allow its large “enterprise” customers to manage Apple and other rival devices through the same servers as they use for the BlackBerry smartphone and Playbook tablet.

The new Mobile Fusion software, first announced in November, is an acknowledgement of sorts by RIM of a growing preference by many users inside big corporations and government to access professional communications over their personal devices, often the Apple iPhone or iPad, or devices running Google’s Android.

RIM, which long dominated the so-called enterprise market, has watched the BlackBerry’s market share steadily erode in recent years. Unable to arrest the trend, the company now aims to generate a fresh revenue stream from it. Mobile Fusion will cost $99 per user to license and $4 per user a month, with discounts available for bulk orders.

In a second announcement on Tuesday that highlights RIM’s eroding market position, it said its PlayBook tablet now boasts 15,000 applications – still just a tiny fraction of the number available on the iPad. One of the biggest complaints about RIM’s products is the dearth of content and applications.

A recent survey from Appcelerator and IDC showed less than 16 percent of developers were “very interested” in creating programs for RIM, compared with 90 percent for Apple and 80 percent for Android.

Source…

Microsoft Seizes Botnet Servers

April 2, 2012 by  
Filed under Computing

Comments Off on Microsoft Seizes Botnet Servers

Microsoft Corp scored a win in efforts to fight online banking fraud, saying it had seized several servers used to steal login names and passwords, disrupting some of the world’s most sophisticated cybercrime rings.

The software giant said on Monday that its cybercrime investigation group also took legal and technical actions to fight notorious criminals who infect computers with a prevalent malicious software known as Zeus.

By recruiting computers into networks called botnets, Zeus logs the online activity of infected machines, providing criminals with credentials to access financial accounts.

“We’ve disrupted a critical source of money-making for digital fraudsters and cyber thieves, while gaining important information to help identify those responsible and better protect victims,” said Richard Boscovich, senior attorney for the Microsoft Digital Crimes Unit, which handled the investigation in collaboration with the financial industry.

Microsoft’s Digital Crimes Unit is worldwide team of investigators, lawyers, analysts and other specialists who fight cybercrime. A year ago they helped U.S. authorities take down a botnet known as Rustock that had been one of the biggest producers of spam e-mail. Some security experts estimated that in its heyday Rustock was responsible for half the spam in junk email bins.

Source…

Are Cloud Services A Risk?

March 29, 2012 by  
Filed under Computing

Comments Off on Are Cloud Services A Risk?

Security experts have warned that the cloud could suffer the same kind of collapses that plague the financial system. Bryan Ford at Yale University in New Haven says that the full risks of this migration have yet to be explored. Complex systems, such as the Cloud, can fail in many unexpected ways and outlines various simple scenarios in which a cloud could come unstuck.

He said that a cloud could experience a full meltdown that could threaten any business. Ford said that while individual systems on a cloud might play nice, if you have other application providers in the same cause problems for another. He came up with a scenario were two conflicting load balancing programs operate with the same refresh period and when these periods coincide, the control loops start sending the load back and forth between the virtual servers in a positive feedback loop.

He said that “This simplistic example might be unlikely to occur in exactly this form on real systems—or might be quickly detected and “?xed” during development and testing—but it suggests a general risk.” Ford said that similar problems happened during ?nancial industry crashes.

Source…

AMD 7990 Specs Unveiled

March 28, 2012 by  
Filed under Computing

Comments Off on AMD 7990 Specs Unveiled

As we draw close to the official Nvidia GTX 680 Kepler GK104 launch day it is no wonder that we’ll hear more and more about AMD’s upcoming dual-GPU HD 7990 graphics card and Chinese site INPAI has shed some new light on the dual-headed beast. Apparently, the HD 7990 will pack two Tahiti XT chips squeezed together on one PCB.

According to the post at INPAI, the upcoming HD 7990 features two 28nm GCN Tahiti XT chips, same one found on the HD 7970 graphics card. This means that we are looking at a card that will have 2048 stream processors and 3GB of memory per GPU. Appearently, these two Tahiti chips will end up clocked at 850MHz while memory will work at 1250MHz (5GHz effective).

Source…

Did HP Really Need Intel?

March 27, 2012 by  
Filed under Computing

Comments Off on Did HP Really Need Intel?

Back in the day HP said it chose Intel to co-develop Itanium due to its process technology, as it didn’t have the cash to fund next generation fabs.

Intel has often been the butt of Itanium jokes, but HP invested as much, if not more into the enterprise. Kirk Bresniker, CTO of HP’s Business Critical Systems told The INQUIRER that HP needed Intel’s manufacturing capability. Bresniker said HP’s decision to partner with Intel was due to the firm realising it couldn’t afford the VLSI manufacturing process iteration needed for developing competitive chips.

Bresniker said, “It is really an extension of the CISC processor that led us to partner with Intel on the Itanium. We knew we weren’t going to be able to maintain the investment levels neccessary to continue to fund deep sub-micron fabs.”

Until HP’s foray with Itanium, the firm was known for its PA-RISC systems, some of which Bresniker designed himself back in the early 1990s. Bresniker said, “We got to the point of microprocessor development and more importantly the economics of fabrication environments and realised we were facing transition to the deep sub-micron [fabrication processes] and potentially writing billions and billions of dollars worth of cheques for fabrication, and part of the impetuous for us to partner with Intel on the Itanium design was that we wanted to have access to the world’s number one microprocessor silicon fabrication.”

While HP continued with PA-RISC chips well into the new millennium, HP’s decision to offload the work of actually producing chips onto Intel could be seen as shrewd move, and one that firms such as AMD did a decade later. The cost of process node iteration is getting ever higher, which is something that Intel itself admits.

Not surprisingly, Bresniker wouldn’t be drawn on the demise of Itanium, though HP did announce Project Odyssey late last year, which effectively mixes and matches the firm’s Itanium kit with Intel Xeon servers. He did admit that the firm had to go towards x86 in the mission-critical market, Bresniker was quick to point out that while Intel is porting more features from the Itanium chip, not everything will be moved over.

Source…

WordPress Attacked By Hackers

March 14, 2012 by  
Filed under Around The Net

Comments Off on WordPress Attacked By Hackers

Security outfit Websense said that more than 200,000 infected pages that redirect users to websites displaying fake antivirus scans have been created. The latest compromises are part of a rogue antivirus distribution campaign that has been going on for months, the Websense researchers said.

Cybercriminals gangs have switched to drive-by download attacks that exploit vulnerabilities in outdated browser plug-ins to automatically download and install their rogue software. The large number of infected Web pages seen in this campaign is an indication that these scams still work. Vulnerable websites are a rich source of opportunity for cybercriminals. More than 85 percent of the compromised sites were located in the US, but their visitors were geographically dispersed.

Source…

Remote Access Tools Threatens Smartphones

March 7, 2012 by  
Filed under Smartphones

Comments Off on Remote Access Tools Threatens Smartphones

Malware tools that allow attackers to gain complete remote control of smartphones have become a major threat to owners around the world, security researchers say.

In a demonstration at the RSA Conference 2012 here Wednesday, former McAfee executives George Kurtz and Dmitri Alperovitch, who recently founded security firm CrowdStrike, installed a remote access tool on an Android 2.2-powered smartphone by taking advantage of an unpatched flaw in WebKit, the default browser in the OS.

The researchers showed an overflow audience how the malware can be delivered on a smartphone via an innocuous looking SMS message and then be used to intercept and record phone conversations, capture video, steal text messages, track dialed numbers and pinpoint a user’s physical location.

The tools used in the attack were obtained from easily available underground sources, Kurtz said. The WebKit bug, for instance, was one of 20 tools purchased from hackers for a collective $1,400.

The remote access Trojan used in the attack was a modified version of Nickispy a well-known Chinese malware tool.

Learning how to exploit the WebKit vulnerability and to modify the Trojan for the attack, was harder than expected, said Kurtz. He estimated that CrowdStrike spent about $14,000 in all to develop the attack.

But the key issue is that similar attacks are possible against any smartphone, not just those running Android, he said.

WebKit for instance, is widely used as a default browser in other mobile operating systems including Apple’s iOS and the BlackBerry Tablet OS. WebKit is also is used in Apple’s Safari and Google’s Chrome browsers.

Several mobile remote access Trojans are already openly available from companies pitching them as tools that can be used to surreptitiously keep tabs on others.

Source…

Did AMD Want nVidia Instead of ATI?

March 2, 2012 by  
Filed under Computing

Comments Off on Did AMD Want nVidia Instead of ATI?

While it is ancient history now, it seems that the story about the controversial buying of ATI by AMD was not an easy process.

Forbes has found a deep throat who has left AMD who has told it that AMD approached graphics processor designer Nvidia about an acquisition before snapping up Nvidia rival ATI in 2006. AMD leaders believed that shrinking transistors would create an opportunity to add new capabilities to the processors AMD and rival Intel designed for PCs and servers.

AMD Chief Executive Hector Ruiz decided to bet that AMD could get ahead of rival Intel by grabbing a piece of the market for GPUs. Fusing CPUs and GPUs would let AMD hit the PC market with something Intel wasn’t ready to offer. Initially AMD thought that Nvidia was the best bet but the deal was killed off because Nvidia Chief Executive Jen-Hsun Huang insisted on being chief executive of the combined company.

Ruiz decided it was better to buy Nvidia rival ATI in July of 2006 for $5.4 billion. Nvidia replied by unleashing several strong products, gobbling up market share. AMD has fought its way back, with a strong lineup of graphics processors, Nvidia pushed into mobile processors. Nvidia has a market capitalization of $9.7 billion.

Source…

Big Boys Sign Consumer Privacy Pact

March 1, 2012 by  
Filed under Internet

Comments Off on Big Boys Sign Consumer Privacy Pact

Six of the world’s top consumer technology companies have agreed to provide greater privacy disclosures before customers download applications in order to protect the personal data of millions of consumers, California’s attorney general said on Wednesday.

The agreement binds Amazon, Apple, Google, Microsoft, Research In Motion, and Hewlett-Packard — and developers on their platforms — to disclose how they use private data before an app may be downloaded, Attorney General Kamala D. Harris said.

“Your personal privacy should not be the cost of using mobile apps, but all too often it is,” said Harris.

Currently 22 of the 30 most downloaded apps do not have privacy notices, said Harris. Some downloaded apps also download a consumer’s contact book.

Google said in a statement that under the California agreement, Android users will have “even more ways to make informed decisions when it comes to their privacy.”

Apple confirmed the agreement but did not elaborate.

Harris was also among U.S. state lawmakers who on Wednesday signed a letter to Google CEO Larry Page to express “serious concerns” over the web giant’s recent decision to consolidate its privacy policy.

The policy change would give Google access to user information across its products, such as GMail and Google Plus, without the proper ability for consumers to opt out, said the 36 U.S. attorneys general in their letter.

Source…

« Previous PageNext Page »