News


view:  full / summary

All in One: Fujitsu Lifebook 2013

Posted by Administrator Bermor on December 25, 2012 at 11:15 PM Comments comments (0)


The Fujitsu Lifebook 2013 is a concept device designed by Prashant Chandra. It’s the result of a competition the company ran in 2011. The Transformer of tech gadgets, the Lifebook 2013 features a digital camera, smart-phone and a tablet – all of which can be detached and used individually. Each component has its own CPU and could run on the same operating system. No one is sure if Fujitsu will make these in 2013, but a lot of people are hoping so.

Lenovo Expects Convertible PCs to Overtake Tablets

Posted by Administrator Bermor on November 11, 2012 at 1:25 PM Comments comments (0)


BEIJING - Lenovo's CEO said on Thursday he expects the market will gradually move away from entertainment-focused tablets in favor for convertible PCs, which he said can strike a balance between the functions of touch-based tablets and the productivity of a laptop.

 

"From our competitor's recent earnings announcement, you can find that the emotional attachment to tablets has gone down," said Lenovo CEO Yang Yuanqing in a Thursday conference call.

 

While he did not name the specific company, Yang appeared to be referring to Apple and how it sold 14 million iPads in the last quarter, a figure well below Wall Street's projections.

 

During the quarter, Apple also saw its tablet market share drop to 50.4 percent, according to research firm IDC. But Apple's iPad sales are expected to pick up with the release of the iPad Mini and the fourth-generation iPad, IDC added.

 

Lenovo's CEO, however, questioned whether consumers would continue buying tablets. In another apparent reference to Apple, Yang said people would think seriously about buying a tablet from an expensive brand with less innovation than before when they could buy a more powerful convertible PC.

 

"I think the market will become more realistic in the future," he added.

 

With the arrival of Microsoft's touchscreen-friendly Windows 8, Lenovo is launching two convertibles under its IdeaPad Yoga family and the devices work as laptop/tablet hybrids. "I still believe the Yoga type of convertible is more usable, more user-friendly," Yang said. "Definitely that's the better product. That will be the future of the PC."

 

But at least in the short-term, PC convertibles are expected to be priced higher than tablets, according to analysts. Lenovo's IdeaPad Yoga 13 starts at US$999.

 

Outside the PC market, Lenovo is seeing success selling smartphones in its home market of China. The company sold 7 million smartphones in the previous quarter, with its market share in China reaching second place behind Samsung, according to research firm Canalys.

 

Last quarter, Lenovo began launching smartphones in the emerging markets of India, Indonesia, Philippines and Vietnam. After expanding into emerging markets, Lenovo will then move on to sell handsets in mature market including the U.S. and Europe, Yang said.

 

Yang noted that its smartphone business in China has yet to make a profit. "Our strategy is to achieve a critical share first, and then drive profitable growth," he said. "I believe in just a couple of quarters, (Lenovo's) smartphone business in China will also reach that stage." 

 

-Computerworld

Published on Friday, 09 November 2012 08:00

Written by Michael Kan - IDG News Service (Beijing Bureau)


Should the Internet be Regulated?

Posted by Administrator Bermor on October 29, 2012 at 10:45 AM Comments comments (0)

Imagine your spouse’s dismay when his or her Facebook network of former classmates, friends, and relatives is no longer accessible. How can that network continue to connect and exchange information? Think of the shock of the startup entrepreneur who intended to use the Internet to attain visibility for his or her unique product or service internationally when consortia of international telecom firms start charging for the data the entrepreneur distributes.

 

And consider the impact on the Philippines’ fast-growing IT-BPO industry when those same consortia begin assessing fees for data and voice communications transmitted over their infrastructure, rather than just access fees. Imagine the accounting and administrative costs that will be passed on to the industry on top of those new fees. Finally, consumer and political watchdogs could be muzzled when government officials say their activities are detrimental to the state when the actual intended target is corrupt or inefficient bureaucracy.

 

Far-fetched? Not really. According to the officials of the local chapter of the Internet Society (IS) and the InfoComm Technology Association of the Philippines (ITAP), in December a group of governments will meet in Dubai at the World Conference on International Telecommunications to work on a treaty that could severely impact how the Internet and networks of the future evolve.

 

In a document released to media, these officials said that, “Based on leaked documents, we understand that countries like China and Russia are proposing sweeping changes that would give governments greater control over the Internet, and change the commercial model of the Internet.” They argue that a vocal group of nations that are concerned with the way the Internet empowers users is seeking to restrict freedom of information by limiting freedom of the Internet.

 

The vehicle for this power grab is the International Telecommunications Union (ITU)—a 150-year-old organization which was originally the International Telegraph Union. As technology evolved,itshifted focus to radio spectrum management and telecommunications networks and settlement regimes. In other words, it provided the framework that enabled global telecom firms to charge exorbitant long-distance rates for voice calls for decades.

 

According to ITAP president Dondi Mapa, the ITU has little expertise in Internet governance and regulation, as the development of telecommunications networks and standards have very little in common with the development of Internet standards. ITU appears to be in search of a cause to justify its continued existence. If it has the impact on the Internet that it had on telecommunications, that’s bad news indeed for users.

 

In a briefing, Mr. Mapa and IS official Winthrop Yu cited three alarming scenarios that could result from ITU efforts to create a governance and regulatory role—with the support of generally non-democratic, authoritarian governments—for itself. They include increased costs for businesses, roadblocks to innovation, and the clear potential for censorship and human rights abuses.

 

The proposed treaty is being negotiated by governments, and the Philippines has a role. Mr. Mapa told me, “The Philippines has been a Council Member of the ITU for over 10 years. During the last round of elections in 2010, we just made it to the list, sliding in at last place with 97 votes, compared to 1998 where we came in at second place with 123 votes. If we want to continue to justify our place in the Council, we need to pull our weight, and show the thought leadership associated with the responsibilities that have been given to us.”

 

As Asia’s oldest democracy, the Philippines is in a unique position to demonstrate leadership in the treaty negotiations, which do not include the private sector, but will be binding on it nevertheless. The Philippines isalso a Steering Committee member of the Open Government Partnership which President Benigno S. Aquino III helped launch with U.S. President Barack Obama, a clear commitment to transparency and good governance.

 

However, Messrs. Mapa and Yu note that so far, the Philippine government has not demonstrated a leadership role in ITU meetings. “We need to be cognizant of the threat that some of these proposals might bring to a free and open Internet,” Mr. Mapa warned.

Information is power, and if the ITU and countries like Russia, China, and Iran have their way, that power will be taken from Internet users. And enterprise and innovation will take a backseat to regulation and increased costs of communications. The stakes are enormous.

WD ships 8TB My Book Thunderbolt

Posted by Kiryu on October 10, 2012 at 2:35 AM Comments comments (0)


WD announced today that its My Book Thunderbolt Duo now offers up to 8TB of storage space, up from the drive's initial cap of 6TB of when first released in March.

The My Book Thunderbolt Duo comes in the signature book shape, and with two Thunderbolt ports.

(Credit: Dong Ngo/CNET )

The My Book Thunderbolt Duo, which we've already reviewed, is WD's first Thunderbolt storage device. So far it's been the most affordable Thunderbolt storage device on the market in terms of cost per gigabyte. The new 8TB-capacity drive follows that tradition with a price of just $850, and it now comes with a Thunderbolt cable included.

The drive comes with two internal hard drives that are user-serviceable and can be set up in RAID 0 (default) or RAID 1 configurations. The My Book Thunderbolt Duo generally offers lots of storage space and decent performance. For much faster performance, WD has the higher-end My Book VelocityRaptor Duo with just 2GB of storage space.

WD also announced today a new My Book 4TB external hard drive. This is a single-volume external hard drive that supports USB 3.0 and costs $250.


Source: Cnet News

Cyberattacks on banking websites subside -- for now

Posted by Moderator Tom on October 3, 2012 at 10:20 PM Comments comments (0)



IDG News Service - The wave of cyberattacks against a half-dozen U.S. financial institutions has subsided this week, but the recent demonstration of force shows a careful honing of destructive techniques that could continue to cause headaches.

 

The attacks against Wells Fargo, U.S. Bancorp, PNC Financial Services Group, Citigroup, Bank of America and JPMorgan Chase succeeded in drawing ire from consumers trying to use the sites for regular banking.

 

But customer-facing websites are just a small part of very complicated banking systems consisting of sometimes thousands of back-end applications that are being prodded by attackers, said Scott Hammack, CEO of Prolexic, a company based in Hollywood, Florida, which specializes in defending against distributed denial-of-service (DDOS) attacks.

 

The attackers "have absolutely done their homework on these large companies," Hammack said. "They've found many, many weak spots, and their attacks are very focused on those weak links."

Prolexic is in a unique position to observe the attacks. The financial institutions victimized by the attacks last week are its customers, although confidentiality agreements with the banks prevent Prolexic from directly naming the companies, said Prolexic's president, Stuart Scholly.

 

The attacks have consumed up to 70Gbps of bandwidth, well beyond the 1Gbps to 10Gbps circuits that large companies tend to rent, Scholly said.

 

"There are very few companies that can afford to buy that kind of bandwidth," Scholly said.

 

Within a few minutes of the start of an attack, DNS (Domain Name System) or BGP (Border Gateway Protocol) routing changes are used to direct malicious traffic through Prolexic's data centers in London; Hong Kong; San Jose, California; and Ashburn, Virginia. The bad traffic is scrubbed, while non-attack traffic is passed along to customers.

 

As exhibited by last week's problems, it doesn't mean in every case that a site's hiccups are immediately cured. The hackers are using between six and eight different types of attacks originating from small armies of compromised computers. Those botnets are often in the U.S. and China, which are countries with large numbers of computers without up-to-date patches, making those machines vulnerable to hackers to install DDOS toolkits.

 

Prolexic called out one of those toolkits, called "itsoknoproblembro," in a recent statement, but declined to say if that toolkit was used in last week's attacks.

 

The hackers are taking steps to make each attacking computer within those botnets look different. Prolexic tries to identify an attacking computer by its "signature," or a set of characteristics that make it look unique. But if those parameters vary over time, it's more difficult to block an attack.

 

The vast range of IP addresses used by banks also makes defense more difficult, as hackers try different attack techniques against applications and ports, testing for latency, or how long it takes the bank's systems to respond.

 

"It's not like protecting mom and pop's ABC hardware store with a single IP [address] and a couple of ports," Hammack said.

 

Prolexic executives won't speculate on the motivation for the attacks or what group may be responsible, but Hammack said he is "frustrated when people say this is a dumb attack by some kid in an apartment in Brooklyn."

 

Send news tips and comments to [email protected]

Source: Computerworld

This Year 2K12 Fastest Graphics Card

Posted by Administrator Bermor on October 1, 2012 at 4:25 PM Comments comments (0)



Engineered for incredible DirectX® 11 gaming, the AMD Radeon™ HD 7970 GHz Edition enables staggering performance in the most demanding games, like DiRT® Showdown™, Sniper Elite V2 and Nexuiz.

Think of it as turbo for the GPU. Get automatic overclocking on the fly for better performance in your favorite games with AMD PowerTune technology, now with Boost.2

Accelerate the applications you use every day. Get faster performance in Adobe® Creative Suite® 6, Corel WinZip® and GIMP with AMD App Acceleration on the AMD Radeon™ HD 7970 GHz Edition.3

The next generation of AMD Eyefinity technology is here, featuring all-new support for stereo 3D, universal bezel compensation and brand new display configurations for up to six monitors. Face it: the best just got better.4

Ready for the world’s highest-resolution displays: Featuring full support for HDMI® (with 4K) and DisplayPort 1.2 HBR2, the AMD Radeon™ HD 7970 GHz Edition is ready for displays up to 4096x2160.

Wireless Charging: One Step Closer to Reality

Posted by Administrator Bermor on September 23, 2012 at 11:50 PM Comments comments (0)


Even Captain Kirk would have raised an eyebrow at the prospect of wireless charging on board the Enterprise.

 

Today it’s a step closer to reality for all of us not zipping around the universe at warp speed. Demoed by Intel Labs for the first time way back in 2008, Wireless Charging Technology (WCT) by Intel literally lets you charge your smartphone wirelessly from your notebook PC. That’s right — no cables, no power cords. Of course Intel is no stranger to wireless technologies, launching Centrino mobile technology nearly a decade ago. Imagine a coffee shop without Wifi today?

 

Integrated Device Technology, Inc. (IDT) – a company with specialized expertise in wireless charging - announced it will develop and deliver chipsets for Wireless Charging Technology by Intel. IDT’s product is important and new because it leads to a solution that isn’t limited to inductive charging and ‘smartphone on a charging mat’ usage. Size and cost reductions are key to IDT’s solution, as is their differentiated “resonance wireless charging technology” that simplifies the way the PC charges the phone wirelessly. Intel is working with companies like IDT, peripheral vendors (from smartphone cases to printers and cameras), OEMs, and other ecosystem partners to deliver a cost-effective and simpler path to wireless charging.

 

Although we are not yet giving out timeframes for consumer products with WCT enabled, IDT has stated they will be delivering their full chipset solution for reference design work in early 2013. The ecosystem is already excited about this technology so we assume there will be a race to the finish line for sure.

 

Imagine, for example, this wireless charging solution in an Ultrabook of the future. How would it work? You are low on juice on your phone — you simply start the WCT detection software and place the smartphone close to your Ultrabook (about an inch or so). Coupling takes place between the two devices and energy begins to seamlessly and wirelessly flow from the Ultrabook to the smartphone. Within an hour, you have recharged your smartphone sufficiently to make it through the afternoon. No more wires or chargers.

 

Intel will be discussing specific plans and timelines at a later date, so stay tuned for more details on this innovation that’s one step closer from the labs to your home.


Source: Techno[email protected] Blog

Your PC may Come with Malware Pre-installed

Posted by Administrator Bermor on September 16, 2012 at 6:25 AM Comments comments (0)


It is rare to find a new PC that doesn’t come with additional bells and whistles in addition to the operating system itself. The “bloatware” that PC vendors add on often includes useful tools like third-party security software. It seems, though, that some PCs also come with something more insidious—pre-installed malware.

 

Microsoft researchers investigating counterfeit software in China were stunned to find that brand new systems being booted for the first time ever were already compromised with botnet malware right out of the box. Microsoft has filed a computer fraud suit against a Web domain registered to a Chinese businessman.

 

The suit alleges that the Nitol malware on the new PCs points the compromised systems to 3322.org. Microsoft believes the site is a major hub of malware and malicious online activity. Microsoft claims that site in question hosts Nitol, as well as 500 other types of malware. A Washington Post report states that it’s the largest single repository of malicious software ever encountered by Microsoft.

 

 

Most users—particularly most users of the Microsoft Windows operating systems—are aware of the many online threats. They’ve been conditioned to install antimalware and other security software, and update it frequently to ensure it can detect and block the latest, emerging threats. It’s a problem, though, if the PC is already compromised with malware before the antimalware software is even installed or enabled.

Part of the concern lies in how the pre-installed malware works, or how deeply embedded it is. Most malware can still be identified and removed by security software after the fact. However, malware threats that are planted at the kernel level of the operating system, or in the PC BIOS operate at a level that is too deep, and can avoid detection by most antimalware tools.

 

Malicious software is big business, and the criminals running the business are often quite clever and innovative when it comes to finding new ways to spread it. Planting malware in PCs, smartphones, or tablets before they’re even purchased and unboxed is certainly one way to go about it.

 

What can you do then to defend against these threats? For starters, buy your PC, tablet, or smartphone hardware from established, respected vendors. If you buy an HP, Dell, Acer, Sony, or other such brand name PC the odds of it being compromised with pre-installed malware out of the box are pretty low. If you buy an Apple iPad, Google Nexus 7, or Amazon Kindle Fire you will most likely get a device free of malware infections. But, if you go bargain shopping online and buy a PC or knock-off tablet from a shady, unknown site the risk is higher.

 

Regardless, don’t assume that just because your PC or mobile device is brand new that it must be safe and free from malware. And, you might not want to trust the pre-installed security software, either, since you can’t verify that it’s legitimate and free from malware itself. Make sure you install a reliable cross-device security tool to detect and identify malware that may already be present.


Source: PCWorld

Pirate Bay Co-Founder Sofftrid Svartholm Arrested

Posted by Administrator Bermor on September 10, 2012 at 6:15 AM Comments comments (0)


Pirate Bay co-founder Gottfrid Svartholm Warg was arrested by Cambodian police on Thursday in Phnom Penh, the city that he made his home several years ago. Svartholm, known online by his nickname Anakata, was sentenced to one year in jail for his involvement in The Pirate Bay but has been missing for some time. Svartholm was wanted internationally but exact details as to why he was arrested have not yet been made public. Gottfrid’s lawyer Ola Salomonsson thinks the arrest could be related to The Pirate Bay case, but this hasn’t been announced officially. “As far as I understand it is because he is on an international wanted list,” he said. While there is no extradition treaty between Cambodia and Sweden the lawyer believes his client could be transferred to his home country eventually.Pirate Bay, founded less than 10 years again in Sweden, made news over the past ten years for its controversial and generally illegal file-sharing practices. Specifically, Svartholm and his co-founder Fredrik Neij became the the whipping boys for the Motion Picture Association of America (MPAA) – among other media companies for copyright violations. Those copyright violation allegations eventually ended in a prison sentence and fees for Svartholm. Svartholm never showed up to serve his sentence and a warrant for his arrest has remained outstanding ever since. The most recent arrest happened in Cambodia at the request of Swedish authorities. This time, however, the arrest isn’t tied to Pirate Bay but to something more serious: Svartholm is alleged to have hacked a Swedish IT company and leaked thousands of tax ID numbers. That company, Logica, provides services to the major tax offices in Sweden. Two Swedes have already been identified as suspects and it would appear that Svartholm is the third. Svartholm currently sits in Cambodia awaiting next steps. It was initially unclear as to what might happen since Cambodia does not have an extradition treaty with Sweden; extradition is the legal transfer of an accused person from one jurisdiction to another. Sources have indicated, however, that Cambodia appears to be cooperating with Swedish authorities.


Rss_feed