Custom Search

Kamis, 22 Januari 2009

Palit Launches GeForce GTX285 with NVIDIA PhysX and CUDA


Graphic Cards | Just Announced

Manila, Philippines -- Palit Microsystems announces the Palit GeForce GTX285. Armed with NVIDIA PhysX and NVIDIA CUDA technology, the GeForce GTX285 is ready to enable a total new class of physical gaming interaction!

The Palit GeForce GTX285 features a core speed of 648MHz and 2.5GHz on its 1GB of GDDR3 memory with a 512bit interface. It supports the latest NVIDIA PhysX technology providing real-time physics simulations in leading edge PC and console games. With up to 50% more performance than prior generation GPUs, GeForce GTX 285’s GPUs tear through complex DirectX 10 environments and cinematic effects at blazing frame rates in extreme HD resolution!

Palit’s GeForce GTX285 also supports NVIDIA CUDA technology, unlocking the power of the GPU’s processing cores to accelerate the most demanding system tasks (such as video transcoding) to deliver up to 20x the performance over traditional CPUs.

The Palit GeForce GTX285 graphics card with NVIDIA CUDA technology not only provides a world-class gaming experience, it also delivers Graphics Plus. Experience jaw-dropping NVIDIA PhysX gaming effects, stereoscopic 3D, and lightning fast video and image processing all accelerated by the GPU!

source : www.hardwarezone.com

GIGABYTE Announces GeForce 7800 GT VGA Card


Graphic Cards | Just Announced

Taipei, Taiwan 11th August 2005 – GIGABYTE launched the GV-NX78T256V-B, yet another high definition next generation GIGABYTE Gaming VGA solution based on the NVIDIA GeForce 7800GT graphics processor. Following close on the heels of several remarkable VGA card innovations from GIGABYTE, such as the proprietary 3D1 series of dual GPU cards, innovative fanless thermal designs that use Silent-pipe cooling technology and the famous GIGABYTE Turbo Force performance tuner, the new GV-NX78T256V-B introduces an incredible 20 pixel pipeline in what is arguably the industry’s powerful and technically advanced graphics accelerator card. The new high-end VGA card from GIGABYTE also supports a host of industry wide technological advancements such as Microsoft DirectX 9.0C and OpenGL 2.0, and is fully compatible with 64-bit operating systems.

The NVIDIA GeForce 7800GT GPU featured on the new GV-NX78T256V-B boasts NVIDIA’s top-three mainstream architectures, the Power of 3, which comprise Shader Model 3.0, HDR (High dynamic-range), and SLI technology. The GeForce 7 series is fitted out a fourth generation graphics engine that streamlines the creation of complex visual effects through features such as the CineFX 4.0 engine that allows developers to create unique 3D game features and effects in both game animation and high-definition video; moreover, the specialized engine possesses full support for Microsoft DirectX 9.0 Shader Model 3.0, that provides infinite program command length creating photorealistic scenes and environments in games. Additionally, the video accelerator card also supports HDR (High dynamic-range) rendering technology, which takes advantage of subtle light, texture, and color intricacies to creative incredibly realistic environments by representing color and intensity values with higher levels of precision. Naturally, NVIDIA SLI technology is featured on the GV-NX78T256V-B, which delivers powerful, elegant and super-rich graphics for games and other graphics-intensive applications. What’s more, for discerning PC gamers, the GV-NX78T256V-B incorporates Intellisample™ 4.0 that delivers Transparency Supersampling technology to improves the quality of finely detailed environments that may otherwise be aliased and blocky when rendered by traditional means.

In addition to NVIDIA’s industry leading 3D gaming technologies, the GV-NX78T256V-B also incorporates PureVideo technology that ensures support for new video formats, while its motion estimation engine (MEE) allows the card to record and play video files simultaneously without interrupting system performance. An added value the GV-NX78T256V-B provides is its high-definition MPEG-2 and WMV HD hardware accelerator that take on much of the heavy lifting during playback of Hi-Def video. Other video playback enhancements include a unique color correction mechanism that will help to create a home theater from a PC.

The GV-NX78T256V-B is equipped with video in and out (VIVO), HDTV, DVI-I, D-SUB output, and comes bundled with an impressive range of software, including Cyberlink PowerDirector 3.0 ME, PowerDVD 6.0, Spell Force, and Xpand Rally. The GV-NX78T256V-B is expected to be available on the shelf in end of June. For more details, please visit the official GIGABYTE VGA website: http://tw.giga-byte.com/VGA.

Acer Announces New Ergonomic Monitors for Business

by Kathy Yakal

Acer has announced the introduction of two new models in its Business Series (B Series) monitor line for professionals. The new Acer B Series monitors - B233HU bmidhz and B273HU bmidhz - feature a stylish ergonomic design and state-of-the-art features, making them perfect for the office.

The new 23-inch and 27-inch Acer B Series monitors feature a stylish dark grey bezel with a sturdy, black base. Control buttons on the front panel allow easy and intuitive use, while enhancing the monitors' sleek looks.

Both new monitors feature flexible height adjustment, tilt and swivel, to optimize the best viewing angles. Users can tilt the monitors 15 degrees up or 5 degrees down, swivel 35 degrees to the right and left, and adjust the height up to 11 cm. These new viewing angles are not only great for a single user, but excellent for multiple people viewing content on the monitors, such as presentations or videos.

The new displays boast a 16:9 aspect ratio and a 2048x1152 resolution, providing excellent high-definition picture quality and the ability to multitask. The ultra-high 2048x1152 resolution allows the monitors to display two pages at the same time, presenting twice the length of a web page on a 1024x768 resolution monitor. The 16:9 aspect ratio allows professionals to view high-definition digital content without the image distortion that arises from incompatible aspect ratios.

Acer's newest displays are available through authorized resellers and online retailers. The B233HU bmidhz display is available for an MSRP of $289 and the B273HU bmidhz display is available for an MSRP of $409.

Originally posted at the PCMag @Work blog.

source : www.pcmag.com

Minggu, 18 Januari 2009

Update: EU hits Microsoft with new antitrust charges

Regulators object to Microsoft's bundling of IE with Windows
By Gregg Keizer

January 16, 2009 (Computerworld) Microsoft Corp. confirmed today that European Union regulators have formally accused the company of breaking antitrust laws by including the company's Internet Explorer (IE) browser with the Windows operating system.

"Yesterday, Microsoft received a Statement of Objections from the Directorate General for Competition of the European Commission," the company said in a statement on Friday. "The Statement of Objections expresses the Commission's preliminary view that the inclusion of Internet Explorer in Windows since 1996 has violated European competition law."

According to Microsoft, the EU claimed that "other browsers are foreclosed from competing because Windows includes Internet Explorer."

The Norwegian browser maker that first filed a complaint with about Internet Explorer applauded the EU's move. "We commend the Commission for taking the next step towards restoring competition in a market that Microsoft has strangled for more than a decade," said Jon von Tetzchner, the CEO of Opera Software ASA. "[This] demonstrates that the Commission is serious about getting Microsoft to start competing on the merits in the browser market and letting consumers have a real choice of browsers."

In December 2007, Norwegian browser maker Opera Software ASA filed a complaint with the EU that argued Microsoft stifled competition by bundling IE with Windows, and that the U.S. developer hindered interoperability by not following accepted Web standards.

In its December 2007 complaint to the EU, Opera argued that Microsoft stifled competition by bundling IE with Windows, and that the U.S. developer hindered interoperability by not following accepted Web standards.

At the time, the Competition Commission said it would "study this complaint carefully." Later, when it announced an official investigation, it credited Opera's complaint for jump-starting its action.

Several months earlier, the EU's second-highest court had ruled against Microsoft's appeal of a landmark 2004 antitrust ruling, and reaffirmed record-setting fines. Within a month, Microsoft caved on all counts, saying it would not appeal further and would slash licensing prices for Windows protocols.

Closing that case, however, did not mean that the EU would back off. In February 2008, after the EU levied a final $1.3 billion fine on Microsoft for the 2004 violations, Neelie Kroes, the head of the Competition Commission, warned Microsoft that it faced further action. "This is about the 2004 decision only," Kroes said in 2007, talking about the latest fine, "and not about any of Microsoft's other actions."

Investigations announced a month before, including one based on Opera's complaint about IE, would continue, she said. "There are lessons I hope Microsoft will learn," she added at the time.

The EU is also investigating a complaint that involves Microsoft's Office suite. That complaint was filed by the European Committee for Interoperable Systems, a trade group whose members include many of Microsoft's rivals, including Adobe Systems Inc., IBM, Oracle Corp. and Sun Microsystems Inc., and deals with Office 2007's native file format, Open XML.

Today, Microsoft said it is "committed to conducting our business in full compliance with European law," phrasing that it has used in the past when responding to EU antitrust actions. It said it would respond to the charges within the next two months, as it is allowed by law, and left open the door to requesting a hearing, as is its right.

The EU Completion Commission was not available for comment Friday.

source : www.computerworld.com

AMD to Cut 1,100 Jobs

by Reuters

NEW YORK - Advanced Micro Devices Inc said on Friday it would take a $622 million charge related to its ATI acquisition, and cut 1,100 jobs and reduce salaries.

AMD, which trails Intel Corp in computer chips and was criticized for overpaying for its $5.4 billion 2006 purchase of graphics chip maker ATI, also announced the impairment of another $62 million of intangible assets in a document filed with regulators on Friday.

The $622 million impairment charge comes after an $800 million impairment charge for ATI recorded in the company's June quarter.

As part of its cost cuts it said Chairman Hector Ruiz and Chief Executive Dirk Meyer will temporarily take 20 percent salary cuts, while U.S. and Canadian executives at the level of vice president and higher will take 15 percent cuts.

North American employees who are not eligible for overtime pay will take 10 percent cuts, while overtime-eligible employees will see their pay reduced by 5 percent. It is also implementing voluntary pay reduction measures for employees outside North America.

In addition, AMD is suspending matching company contributions to 401(k) employee retirement plans.

It said the job cuts will reduce its product company workforce, excluding foundry workers, by 9 percent and will come from attrition, divesting its handheld business, and the elimination of another 900 positions.

In an emailed statement, AMD did not say how much money it expects to save from the actions.

© Thomson Reuters 2008. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Reuters. Reuters and the Reuters sphere logo are registered trademarks or trademarks of the Reuters group of companies around the world.

source : www.pcmag.com

What your computer's drive will look like in 5 years


Hard disk drives may soon be replaced by solid-state disk (SSD) drives
By Lucas Mearian

January 16, 2009 (Computerworld) As solid-state disk (SSD) technology closes in on hard disk drive (HDD) capacity and price, experts say it may not be long before spinning disks are a thing of the past and a computer's storage resides in flash memory on the motherboard.

By making the drive part of a system's core architecture -- instead of a peripheral device -- data I/O performance could initially double, quadruple or more, according to Jim McGregor, chief technology strategist at market research firm In-Stat.

"Instead of using a SATA interface, let's break that and instead of making it look like a disk drive, let's make it look like part of the memory hierarchy," McGregor said. "Obviously, if you break down that interface, you get more performance."

Currently, Serial Advanced Technology Attachment (SATA) is the bus used to transfer data between a computer and storage devices, be it HDDs or SSDs in a 1.8-in., 2.5-in. or 3.5-in. disk drive form factor. SSD manufacturers have been fitting SSDs into a hard disk drive case to fit it into existing computer architectures.

Within three years, McGregor said SSDs with 256GB capacity -- already on the market -- will be close to the same price as hard drives. (A 256GB SSD for the new 17-in. MacBook Pro from Apple is a $900 build-to-order option, for instance. A 250GB HDD goes for about a tenth that price.) That will signal to manufacturers that it's time to consider an interface change. And, while SSDs will be lagging behind the 500GB to 1TB capacities of hard disk drives for some time to come, McGregor argues that users don't need that much storage anyway.

"We've already seen this trend in the netbook space, and we will see it more in the notebook platform. Storage will begin to look more like a memory module than a hard drive," said Dean Klein, vice president of Micron Corp.'s SSD group. "There's a move afoot to make it more like a card-edge connector, so the SSD would not have the cost of a mechanical connector. It would just have gold-plated fingers on the edge: No enclosure, just the circuit board."

Disk drive vendors are doubling the capacity of drives every 12 to 18 months, but In-Stat's data indicates that the average storage requirements of users increase in a more linear way. And, while HD video can drive a huge swing in storage requirements, the advent of online libraries and storage services tend to even out the trends, McGregor said.

According to In-Stat, SSD prices have been dropping 60% year over year. Currently, the price of consumer-grade SSD costs from $2 to $3.45 per gigabyte, with hard drives going for about 38 cents per gigabyte, according to Gartner Inc. and iSuppli Corp.

"Two years ago, SSDs cost $17.50 per gigabyte, so it's obvious that consumer NAND flash memory will soon be a true contender to hard disk drives -- it's just not there yet," Gartner analyst Joseph Unsworth said. "I think you need to get to 128GB for around $200, and that's going to happen around 2010. Also, the industry needs to effectively communicate why consumers or enterprise users should pay more for less storage."

Klein argued that using an SSD in its native state, as NAND chips on a board without an enclosure, will reduce cost, weight, power use and space.

In January last year, IBM launched the Lenovo ThinkPad X300, the industry's first mainstream notebook designed not to take a hard drive, but a 64GB SSD. Dell followed IBM with its all-SSD Latitude D420 ultra-mobile and D620 ATG semi-rugged notebooks.

"Moving forward people will design the entire notebook around SSD. You could spread SSD out over the mother board. So moving forward there will be a lot of custom notebooks with custom SSDs," said Brian Beard, marketing manager for Samsung's flash memory group.

Samsung, which sells laptops, not only manufactures and sells HDDs, but it's own line of SSD as well as selling flash memory to other vendors to resell.

Beard expects SSD penetration in the laptop market will only reach 30% by 2012, but he also believes around the same time HDD and SDD will reach price parity.

Within the next year, Micron expects to bring to market a high-end SSD that could achieve 1GB/sec. throughput by using a PCIe interface rather than traditional SATA or SAS. The transfer speed is four times that offered by Intel's newest, enterprise-class SSD, the X25-E.

In a video on Micron's blog site, Joe Jeddeloh, director of the vendor's Advanced Storage Technology Center, demonstrated the technology using a two-processor, eight-core Intel Xeon PC and a card with two SSDs and 16 flash channels. A blurry readout showed the SSD reaching 800MB/sec. throughput, with Jeddeloh claiming that it "will be hitting a bandwidth of 1GB/sec. and at least 200,000 IOPS," or I/O operations per second.

The card was directly connected to a PCI Express (PCIe) slot, bypassing SATA or Serial Attached SCSI interfaces. While PCIe has the same throughput as SATA II -- 3Gbit/sec. -- PCIe offers more channels.

Using file transfers ranging from 2KB to 2MB, Jeddeloh demonstrated 150,000 to 160,000 random reads per second in the video. "That's what flash can do when it's managed correctly," he said.

While Micron's SSD technology is aimed at high-end applications that would run on Fibre Channel SANs, such as transactional databases or streaming video, Klein said consumer-grade computers using SSDs directly connected to a PCIe bus with four lanes (x4 slots) could soon achieve similar results.

Physical PCIe slots may contain from one to 32 lanes of data. Currently, PCIe Generation 1 offers 250MB/sec. throughput per lane. The second generation of PCIe is expected out next year and will offer twice the throughput, or 500MB/sec. per lane. While SATA 3.0, expected out this year, also doubles throughput, it only offers one lane.

"Each lane of that x4 PCIe is as fast as a SATA 3.0's 6Gbit/sec. bus," Klein said. "So I can be four times as fast on that one slot as an SSD could be on a SATA 3.0 connection. That's really the direction things are going."

source : www.computerworld.com

WiMAX 20/20 Launches WiROI 2.0 Business Case Tool


By Rajani Baburajan
TMCnet Contributing Editor
WiMAX 20/20 announced the launch of its upgraded WiROI Business Case Tool.

First launched last year, WiROI Business Case Tool was the first to provide network operators and equipment manufacturers with a comprehensive analysis of the capital and operational expenses for deploying aWiMAX ( News - Alert) network. The tool helps them to develop comprehensive business cases, understand their financial requirements, and build a detailed 10-year income statement to gain funding from demanding financiers, the company said.

Equipment manufacturers also use WiROI as a marketing tool to show the tangible financial value-added benefits of using their equipment in an operator's deployment plans.

According to WiMAX 20/20, WiROI Business Case Tool has been upgraded incorporating an expanded dashboard-style Graphical User Interface (GUI), side-by-side vendor and technology comparison capabilities and enhancements, and the ability to model services such as voice over Internet Protocol (VoIP), video on demand (VOD) andIPTV ( News - Alert).

WiROI 2.0 Business Case Tool accepts a wide range of market data, technical parameters, and financial and service planning inputs that can be tailored to a particular geography. It can be used in all types of WiMAX deployments: both developing and developed markets, in small and large multi-city deployments, for rural, urban, and combination networks.

WiROI Tool allows operators to customize the model for their own particular market deployment, services strategy, and financial constraints. It can produce real-time sensitivity analysis based on certain input parameters for a particular deployment.

The new tool allows operators to do side-by-side comparisons of up to five vendors in the access and core network, providing in depth analysis of the capital expense requirements. It can simulate a WiMAX network deployment and operation using a variety of service plans and produces a detailed 10-year income statement, financial output graphs, and key financial metrics.

The dashboard-style GUI incorporates animated selectors, sliders and buttons, allowing the user to vary key input parameters and visualize the output immediately in a variety of animated financial output charts. Using these features, network operators and equipment manufacturers can quickly visualize and understand the critical issues that could affect their deployment or development plans.

Other important features of WiROI 2.0 tool include the ability to estimate the number of cell sites and various options for selecting a WiMAX network infrastructure required to support specific coverage and capacity requirements.

Since its launch, WiROI Tool has been used in more than 25 WiMAX deployments on five continents. The tool has proved its flexibility to accurately model a variety of deployment plans and service offerings.

According to Randall Schwartz, principal at WiMAX 20/20, the new tool, with its enhanced features such as the new GUI with improved analysis features and its ability to model advanced services, enhances the operator’s ability to analyze their business and show the full financial potential of their deployment plan.

"The challenge of securing financing in the current environment requires operators to use a tool like WiROI to build a bankable business case and get funded," said Schwartz.

Magnus Johansson, director of Broadband of Digicel (News - Alert) in Jamaica, said, "With WiROI, we've gained confidence in the financial outputs and operational modeling of our planned WiMAX networks and have analyzed various deployment scenarios with ease."

"We find the sensitivity analysis capability of the WiROI Tool particularly unique and useful," said Berge Ayvazian (News - Alert), chief strategy officer at the Yankee Group. "The WiROI Tool offers the ability to accurately model a WiMAX network and allows the user to visualize the financial impact of a variety of parameters and should be viewed as an invaluable tool to anyone deploying or designing a WiMAX network."

Telecommunications equipment vendor Redline Communications (News - Alert) has found WiROI as an effective tool to clearly demonstrate the potential return on investment for various WiMAX deployment scenarios. Kevin Suitor, VP of Marketing at Redline Communications, said the WiROI Tool helped them to model a Redline-based access network and compare it with a traditional implementation, enabling them to articulate the benefits of their technology to their customers as well as channel partners.

source : 4g-wirelessevolution.tmcnet.com

Europe charges Microsoft with abuse of monopoly again

By Paul Meller

January 17, 2009 (IDG News Service) Microsoft was formally charged with monopoly abuse by Europe's top antitrust authority, the European Commission, over the way it bundles the Internet Explorer browser with Windows.

The move follows an unsuccessful attempt by U.S. authorities nine years ago to strip Internet Explorer (IE) of its unfair advantage over competing browsers. European authorities were more successful in their prosecution of Microsoft over similar antitrust offenses five years ago, fining the company over €1.6 billion and ordering it to change the way it does business.

he Commission's charges were delivered to Microsoft's headquarters in Redmond, Washington, last Thursday in the form of a formal statement of objections. The company is studying the charges and will respond within the next two months, as is usual in European antitrust cases, it said.

The new charges are the first of many anticipated against the company in the wake of a failed court appeal by Microsoft last year against the original European antitrust ruling.

The latest statement of objections follows a relatively short investigation, one year long, sparked by a complaint from Opera Software, a Norwegian browser developer.

Opera CEO Jon von Tetzchner welcomed the Commission's decision to press charges. "It's clear they are taking this very seriously," he said in a phone interview on Saturday.

However, he still doesn't know if the Commission pursued both aspects of his company's complaint against Microsoft: In addition to complaining about the bundling of IE into Windows, Opera also pointed out that the software giant was undermining open software standards on the Internet.

"Its a problem for companies like ours if Microsoft doesn't support the open standards we all apply, because many Web sites are designed to work with IE, which means our browsers won't always work out of the box," he said.

IE is still the most widely used internet browser, although its market share dipped below 70 percent globally in 2008, according to Web analytics company Net Applications. In December, Opera's share was around 0.71 percent.

Von Tetzchner said he hopes the Commission doesn't apply the same remedy it did in its last ruling, when it ordered Microsoft to offer a second version of Windows alongside the regular version of the software, but without a bundled copy of Windows Media Player .

Microsoft complied with the ruling but no one bought the unbundled version, which was sold for the same price as the version with Windows Media Player included.

"That's not really what we are looking for as a remedy for the bundling of IE," von Tetzchner said, adding: "The only way to give users a genuine choice is to strip out IE from Windows and either replace it with a rival browser or offer users a list of browsers to choose from."

The latest antitrust charges against Microsoft almost certainly won't be the last.

At the same time it opened the investigation into the bundling of IE, the Commission also opened a separate probe to see whether Microsoft withholds information from companies that want to make products compatible with its Microsoft Office productivity suite.

It is also looking for interoperability problems with Windows server products and Microsoft's .Net software framework, following a complaint by the European Committee for Interoperable Systems (ECIS), a trade group representing companies including IBM, Sun Microsystems, Oracle, Red Hat and Opera.

This separate probe is ongoing, said Jonathan Todd, a spokesman for the Commission.

ECIS said Microsoft deliberately withholds interoperability information in order to put rival software companies at a disadvantage; and bases its complaint on the part of the earlier European antitrust ruling that found Microsoft guilty of withholding interoperability information about its Windows server operating system.

"There was a fear that the Commission might be moving on to other battles, having won a resounding victory over Microsoft already," said Thomas Vinje, legal counsel for ECIS, citing other powerful technology companies such as Intel that are the subject of escalating antitrust battles in Europe.

But the fact that the Commission is pushing ahead with the IE case "makes me more optimistic it will press charges in the interoperability case," he said.

The real fight with Microsoft is only just beginning, though. The remedies the Commission demanded in the first antitrust case against Microsoft were largely ineffectual, especially on the bundling side. The true value of that case lies in its power of precedence and can only really be appreciated by lawyers and judges, Vinje said.

The cases that follow, including the IE charges, the interoperability case and possibly others, will be much more significant for consumers and competitors than that first antitrust ruling.

On the bundling side, the Commission is unlikely to make the same mistake it made the first time, and will most likely demand that IE is stripped out of Windows entirely, instead of calling for two versions of the operating system as it did before.

Meanwhile, if the Commission presses charges in the new interoperability case championed by ECIS it could break down the biggest barriers preventing open source operating systems such as Linux from competing with Microsoft on personal computer desktops.

source : www.computerworld.com

Twitter as a news tool: A case study

by Mathew on August 16, 2008 ·

Examples continue to emerge of Twitter being used as a journalistic tool. And not just the “hey, there’s an earthquake” or “hey, my house is on fire” kind of tool, but an integral part of the reporting process. One of the more recent ones comes from the Chicago Tribune, which quite smartly has an official Twitter account that someone in the newsroom monitors. As Poynter Online describes it, people started noticing crowds in Daley Center, and overheard staff from offices there talking about some kind of danger, so they posted something on Twitter.

Eventually, someone contacted “Colonel Tribune” — the Trib’s official Twitter persona — to let them know, and whoever monitors the Twitter account let the news desk know, at which point the traditional reporting process took over. The paper then reported the results of its reporting (a bomb threat) on Twitter, and users re-posted it, spreading the story farther and faster than it might otherwise have gone.

It’s not like it was a huge story, but as Mike Masnick at Techdirt notes, the way it unfolded is an excellent example of how Twitter can be incorporated into the news process — and of how the feedback loop that is created when that happens can benefit traditional media. Another recent example, although somewhat different in execution, was the Brian Stelter story about getting around NBC’s Olympic blockages, which started on Twitter and wound up on the front page.

source : www.mathewingram.com

Senin, 12 Januari 2009

AMD Plans Graphics Supercomputer

January 9, 2009 - By Reuters

LAS VEGAS, Jan 8 (Reuters) - U.S. chip maker Advanced Micro Devices Inc, facing a slump in demand for personal computers, is hoping the old adage that entertainment is recession proof will prove true this year.

At the Consumer Electronics Show in Las Vegas on Thursday, AMD Chief Executive Dirk Meyer showed off new technology for advanced computer graphics in video games and films, in what the company called the convergence of the "cinematic and the interactive."

Meyer said AMD's new chips will help blur the lines between games and films, helping them look much more life-like.

He also announced plans to develop, along with software company OTOY, what he called the "fastest graphics supercomputer" in the world in the second half of 2009. The supercomputer could help film studios make movies more interactive and gaming companies increase realism, Meyer added.

But the upbeat tone of his presentation was at odds with the half-empty Las Vegas Hilton Theater and the chip industry's somber mood.

Just a day earlier, AMD's chief rival Intel Corp (INTC.O), the world's largest chip maker, stunned the market with its second revenue warning on the fourth quarter, saying demand for personal computers was even worse than it feared. Intel and AMD make nearly all the microprocessors for the world's 1 billion PCs.

Meyer said the consumer electronics industry is in the middle of a "sea change" and called the current economic situation "challenging," "volatile" and "unprecedented."

"Optimism has been a little more difficult to achieve these days," he said.

AMD laid off 600 workers in its most recent quarter from a total workforce of about 15,500 as the sector started to contract.

The company has posted losses for eight consecutive quarters, in part due to delays in rolling out new chips that resulted in AMD falling behind Intel technologically.

But AMD is hiving off its manufacturing plants into a joint venture with Abu Dhabi to cut costs and get a cash injection, and its last quarterly results were better than Wall Street had expected thanks to a new graphics chip.

In difficult times, Meyer said AMD can set itself apart because it is the only chipmaker that can deliver both x86 and graphics chips, which is the key to its Fusion chip platforms.

Fusion is AMD's name for technology that merges a graphics processing unit and central processing unit on a single chip. The effort springs from AMD's $5.4 billion purchase of graphics chipmaker ATI Technologies in 2006.

Meyer was joined on stage by executives from PC makers Hewlett-Packard Co and Dell Inc, video game publisher Electronic Arts Inc, and Lucasfilm movie company as they demonstrated new products based on Fusion.

Earlier this week, AMD's much-anticipated chip, the Athlon Neo, made its debut in HP's Pavilion dv2 ultra-portable notebook. Meyer said it will target consumers looking for something between a high-end notebook and a stripped down netbook. The dv2 will start at $699.

AMD also used CES to unveil its Dragon platform, which combines its new Phenom processor with an ATI Radeon graphics chip. Dell's XPS 625 desktop uses the technology.

Shares of AMD closed up 3.01 percent at $2.74 after falling on Wednesday due to the Intel warning. The stock remains far below its year-ago levels of around $8.

source : www.extremetech.com

Sabtu, 10 Januari 2009

Hands On with the Intel Convertible Classmate PC

by Cisco Cheng

LAS VEGAS—At CES 2009, Intel took the wraps off of its convertible Classmate PC, a tablet targeted at students from kindergarten through 12th grade.

The original Classmate PC reference design was sold in bulk, primarily to international countries that were willing to deploy a thousand of these at a time. With this new version, Intel has partnered up with three OEMs in the United States: CTL, a Portland-based company, will brand it as 2GoPC, M&A will brand it as the Companion PC, and Equus Computer System will have a product as well. This new student tablet is available immediately online, with prices starting at $499. If you're not a student, this netbook is not for you.

Intel added a new swivel, resistive touch screen to the convertible platform, and updated the innards with the Atom platform. The keyboard is small, roughly an 84-percent one, and Intel admitted that it was designed with the slender fingers of a student in mind. Meanwhile, the MSI Wind and the HP Mini 1000 boast 92% keyboards.

Though the new Classmate PC is technically a netbook, it will not compete in that space.

For one thing, it's considerably more expensive than netbooks like the Wind, the Acer Aspire One, and the Lenovo Ideapad S10. CTL's 2GoPC sells for $549, which is a considerable premium to pay for a student netbook with tablet capabilities. The reference unit weighs 3.2 pounds with the 6-cell battery (up to 5 hours, claims CTL); a 4-cell option brings the weight to 2.9 pounds, although CTL is not planning to sell one.

A nifty handle is part of a sleeve that is securely attached to the unit, so students can easily pick it up and go. The 8.9-inch touchscreen is not digitized, but it does come with a stylus, which can be used, along with your fingers, to navigate the screen. The latter method works, although I had to press firmly with my fingertips and drag them. The stylus is comfortable enough so that a student can use it for the course of a day. The unit has a built-in accelerometer as well, so that rotating the unit itself will automatically adjust the orientation.

The new Classmate PC's features are like the original: modest, at best. The new model comes with two USB ports, VGA-Out, and an Ethernet port. The built-in Wi-Fi chip supports 802.11abg and 802.11n wireless. The Classmate's storage has improved since its predecessor, though it will still be offering 2-GB to 16-GB SSD drives, for price-sensitive markets, and rotating drive of between 40 GB and 120 GB, for optimal capacity.

The original Classmate PC used an Intel Celeron M processor; the new convertible tablet moves to the Intel Atom platform, specifically the 1.6-GHz N270 processor and GMA 950 graphics. The tablet will use the XP Home or Professional operating system, with memory configurations expandable to 1 GB. Intel does not plan to support Windows Vista at this point, which is arguably a better environment for tablet users.

As a single unit, the Intel Convertible Classmate PC is overpriced. But in bulk, prices can significantly drop. This is not something that's tailored to adults, as the keyboard is severely undersized and features are limited. (We'd suggest the eeePC T101H, an adult-friendly convertible.) For kids, however, Intel developed an entire ecosystem of collaboration software for them and their teachers. And because of that, there is a market for it.

source : www.pcmag.com

OpenOffice 3.0


This free office suite packages an impressive set of editing tools inside a foolproof interface

by Dana Wollman on December 1, 2008

Despite the adage “You get what you pay for,” free doesn’t necessarily equal bad, and OpenOffice 3.0 makes the latest case. This open-source productivity suite lets you create and edit documents, presentations, spreadsheets, databases, and drawings, and even reads Microsoft Office 2007 files. If you can deal with its limited (nay, nonexistent) sharing functionality, this suite offers everything a student or road warrior could want.

Installation and Speed

Although OpenOffice is free, you’ll be prompted to make a donation when you download the install file. Downloading the 142MB file to our desktop using an Ethernet connection took 19 minutes and 1 second, and installation took 5 minutes and 54 seconds to install, a rather long wait.

With the previous version of OpenOffice, we were displeased by how slow the Java-based program was in daily use. In our hands-on experience with the current iteration, however, the different components (e.g., Writer, Draw, Impress) took a second to launch on an Intel Centrino 2–powered HP Pavilion dv5t. The program took about a second to open blank documents.

Simple Interface, Made to Customize

OpenOffice has most of the features you’d expect in a desktop office suite, and in contrast to Office 2007’s icon-packed Ribbon interface, which new users often find intimidating, they’re presented here in a foolproof UI. The task-oriented opening screen has icons for creating text documents, presentations, spreadsheets, drawing, formulas, and databases. There are also icons for choosing templates or opening documents that have already been created. In the lower right corner are smaller icons which let us add features and templates from Openoffice.org.

As with Office 2007, you can customize menus. You can choose which icons to display, as well as their order, and even decide which items appear under hierarchical menus, such as File, and rearrange their sequence. This is a level of customization not available in Microsoft Office.

More important, OpenOffice allows you to switch among the document, spreadsheet, and presentation programs within a single interface. Clicking File > New brings up a fly-away menu showing the different documents you can create. So, if you’re in the word processor, you can click New > Spreadsheet, whereas if you were working in Microsoft Word you’d have to launch Excel to begin working on a spreadsheet. Across most of the applications—documents, spreadsheets, presentations, and drawings—users can export their work as PDFs.

Word Processing


For anyone who has ever used Microsoft Office 2003, OpenOffice’s document creation interface is a cinch to master. Blank documents (or spreadsheets or presentations) sit atop a dark gray background. The hierarchical menus—including File, Edit, View, Insert, Format, Table, Tools, Window, and Help—will look familiar, as will the two rows of icons underneath it, representing common functions, such as spell check. When you roll over an icon with your cursor you’ll see a label explaining what it does.

When it comes to formatting text, OpenOffice has more options than its free online counterparts (Google Docs and Acrobat.com), including more text and background colors, and the ability to program macros and insert movies, sound, and objects, such as charts, into the copy. Best of all: it reads Office 2007 files, so if your colleagues send you DOCX files, you can open and edit them in OpenOffice.

Spreadsheets

OpenOffice’s simple two-row kitchen sink of icons is particularly handy with spreadsheets: it highlights the features and shortcuts you’re likely to use most, including sorting in ascending or descending order and adjusting the number of decimal places. Like Excel 2007, the formula bar autocompletes (so, if you type “=a”, Average will appear as a choice).

The one instance in which you might miss Excel is in OpenOffice’s lack of formatting options. For instance, there aren’t as many color or customization options when creating charts, whereas the Microsoft Office Suite, including Excel, offers Quick Style, from which users can apply a plethora of different color themes to charts or a whole document.

Presentations

When you first launch Impress, OpenOffice’s version of PowerPoint, you can either open a template (of which there are few), open an existing document, or walk through an on-screen wizard. This optional wizard, which prompts you to choose backgrounds and slide transitions, can be intimidating to users who don’t know precisely how they want their presentation to look.

A right-hand panel lets you choose master pages, layouts, table designs, custom animations, and slide transitions. At a glance you can select, say, a vertical bar graph with a title on top. As with PowerPoint, users can also insert pictures, movies, and sounds.

Although these features are helpful, OpenOffice doesn’t have any prepackaged templates; just these à la carte one-click edits, as well as a slew of backgrounds. To add templates, you’ll have to go to OpenOffice’s main screen and click the icon to add more templates; you’ll be brought to a Web site, which has more than nine pages worth of apps but only three pages of templates.

Sharing—or Lack Thereof


In an age where Acrobat.com, Google Docs, and Zoho Docs all allow users to collaborate on documents online, OpenOffice’s biggest weakness is that it has too few sharing options. Even Microsoft Office lets users publish their documents directly to blogs and shared workspaces and store presentations and slides in a Slide library.

Just as OpenOffice allows users to download additional templates and features, it requires them to add collaborative functionality through third-party apps (such as 03spaces.com, which is free for individual users). That’s not so bad, but given the trend toward collaboration in productivity software—and given that OpenOffice itself is an open-source project—we wish these tools were baked in.

Verdict

With the exception of online collaboration, a feature OpenOffice doesn’t natively offer, this free productivity suite gets the job done. There’s no doubt that its robust feature package not only matches its pricey competitors, but it also trounces other free options, particularly Web-based services such as Google Apps and Acrobat.com. While business users might want to keep Office as their primary tool for its integration with Exchange Server, OpenOffice will do just fine for students—not to mention road warriors who don’t have a Microsoft Office license to spare.

source : www.laptopmag.com

Intel's Barrett Announces 'Small Things' Charity Challenge

by Chloe Albanesius

LAS VEGAS – Intel on Friday announced the launch of the Small Things Challenge, a one-year charity program intended to facilitate donations to Kiva.org and Save the Children.

"What we're doing is in fact coming up with a challenge for you – something called the Small Things Challenge – one step at a time," Intel chairman Craig Barrett said during his Consumers Electronics Show (CES) keynote.

Intel set up a Web site for the group at SmallThingsChallenge.com.

"What we're going to do is focus on … the Save the Children group and Kiva.org, education and economic development," Barrett said. "My company Intel will donate a nickel for ever click that happens, within limits."

People can contribute to the Small Things Challenge in three ways: donate to Save the Children's Rewrite the Future program, which helps children in war-torn countries receive an education; provide a micro-loan through Kiva.org, which helps entrepreneurs in developing countries get their businesses off the ground; or encourage friends and family to donate.

Send an e-mail encouraging someone to donate and for every person who clicks on the "we'll donate 5 cents for you" button on the Web site, Intel will donate another 5 cents, up to $300,000 in 2009. The funds will be split between Save the Children and Kiva.org.

There is no minimum donation necessary for Save the Children, but Kiva.org requires a minimum of $25.

The challenge is currently scheduled to run until December 31, 2009.

Musicians Adam Levine of Maroon 5 and Adam Duritz of Counting Crows joined Barrett onstage at his keynote to issue their support for the challenge.

"I think we feel it's our responsibility to [contribute]," said Levine. "We've been blessed with a lot of success and the least we can do is give back in any way we possibly can."

Kiva.org is "able to connect lenders to entrepreneurs in developing countries so a food vendor can open a shop, or a water carrier can purchase a new cart, which means more jobs in the village, which means more economic growth for their community," Levine said. "And they're not looking for a handout. They're looking for a way to better their lives, and you can help."

Levine helped Intel create a video explaining the Small Things Challenge, which will be featured on the site and YouTube, Barrett said.

"Each of these organizations … finds ways to empower and encourage people to step forward and take their place in a world that has always told them it has no room and no place for them," Duritz said. "We disagree. Through education the boundaries of our lives are shattered."

The bulk of Barrett's keynote was spent highlighting technology education and healthcare initiatives in which he and Intel have been involved.

Save the Children will soon be distributing Intel's Classmate PCs to 10 schools in Bangladesh, a program that will eventually expand to include 300 schools in the area, said Caroline Miles, chief operating office of Save the Children.

Barrett also highlighted a second-generation, portable device from OQO that Barrett said can help doctors remotely connect to patients' medical records from the field.

The $999 touchscreen OQO model 2+ runs the 1.86GHz Intel Atom processor, has 2GB of RAM, and 3G connectivity capabilities.

Barrett also showcased an upcoming game from Warner Bros. Interactive Games intended to teach young people about HIV/AIDS. It has been deployed in three test sites in Nairobi, Kenya and lets five kids play at once.

source : www.pcmag.com

Microsoft Delays Windows 7 Beta Due to Traffic

by Mark Hachman

Microsoft has delayed the Windows 7 public beta, due to traffic issues on the Microsoft Web site, according to a Friday afternoon post on the Windows Team blog.

"Due to very heavy traffic we're seeing as a result of interest in the Windows 7 Beta, we are adding some additional infrastructure support to the Microsoft.com properties before we post the public beta," Microsoft's Brandon LeBlanc wrote. "We want to ensure customers have the best possible experience when downloading the beta."

As of 4:55 PM, the main Windows 7 page was not showing a link to the beta. The TechNet page was also reporting that the beta had been delayed: "Thanks for your interest in the Windows 7 Beta," the site reads. "The volume has been phenomenal -- we're in the process of adding more servers to handle the demand. We're sorry for the delay and we'll re-post the Beta as soon as we can ensure a quality download experience.

It's for reasons like these that the BitTorrent protocol was invented. Why not let your customers share the bandwidth burden, Microsoft?

Originally posted on AppScout.

source : www.pcmag.com

BenQ Joybook Lite U101


The Joybook Lite has a compact and unique chassis, but this netbook's battery life and keyboard don't stand up to its peers.

by Joanna Stern on December 30, 2008

Editors' Note: The BenQ Joybook Lite we reviewed was imported from Taiwan. BenQ says that if the system were to be offered in the U.S. it would retail for around $499 (we paid the equivalent of $550). If the BenQ Joybook Lite U101 becomes available in the U.S., we will update this review.

When just about every 10-inch mini-notebook features the same processor, RAM, and operating system, competitors have to find some way of differentiating themselves. BenQ, the latest entrant into this crowded market, hopes to do so by adding a little visual flair. While the BenQ Joybook Lite U101 has the run-of-the-mill netbook specs, including an Intel Atom processor, 1.5GB of RAM, and Windows XP Home, spicing up the system is an interesting, artistic lid design and a 10-inch, 16:9 aspect ratio display (the first on a netbook to date). However, its cramped keyboard and short battery life will be a deal breaker for some.

A Unique Design

You can't blame BenQ for feeling that netbooks were starting to look all too similar, and it strives to ensure you won't forget the U101. The lid of this system has an emoticon design: Small light blue symbols (reminiscent of the Wingdings font) are printed on the blue (also available in white, black, and pink) glossy lid.

Upon close inspection, the diagonal pattern repeatedly spells out Joybook Lite. The artistic lid is undoubtedly unique and bound to attract some consumers, but others may be put off by its attention-grabbing pattern and prefer something more along the lines of the HP Mini 1000's subtle Imprint finish. According to BenQ, the cover has also undergone a special molding process to protect it from wear and tear.

The size and weight of the Joybook Lite is standard fare for a 10-inch system. At 10.2 x 7.4 x 1.3 inches and 2.6 pounds, it weighs the same as the Lenovo S10 and MSI Wind. While not as compact as the HP Mini 1000, it is shorter and narrower than both the MSI Wind and Samsung NC10. With a travel weight of 3.2 pounds with its AC adapter, the system felt almost nonexistent when we tossed it (inside the included neoprene sleeve) into a shoulder bag.

Three USB ports, VGA, Ethernet, headphone, and a microphone jack surround the Joybook Lite, and a 4-in-1 card reader is on the right side.

Quick Specs Full Specs :
CPU: 1.6-GHz Intel Atom N270
OS: Windows XP Home
RAM/Expandable: 1.5/2GB
Hard Drive Size/Speed: 160GB/5,400 rpm
Display/Resolution: 10.1 inches/1024 x 576
Price as Reviewed: $499

source : www.laptopmag.com

Kamis, 08 Januari 2009

HP Elitebook 2530P


Dec 25, 2008 by Carla Thornton, PC World

Pricey but worth it, the HP EliteBook 2530P lives up to its name, offering extras not ordinarily found on an ultraportable laptop.

There's so much to like about the HP EliteBook 2530P that it's hard to know where to start genuflecting. This little black and silver beauty meets all the basic expectations--great performance, full set of connections--and then piles on nifty extras such as two sets of pointing devices and a keyboard light. It's by no means cheap at $2499, but if you want your laptop to mean business (in this case Windows Vista Business), HP has a fairly desirable ultraportable for you.

Equipped with a 1.86-GHz Core 2 Duo SL9400 CPU and 3GB of RAM, the EliteBook notched a reasonably speedy WorldBench 6 score of 89. And don't forget the 80GB solid-state drive--it's skimpy capacity-wise and it's the main contributor to the machine's high price, but it also deserves some of the credit for the laptop's speed. (Want to save some bucks? 120GB and 160GB SATA hard drives are also options.)

The standard ultraportable disclaimer also applies here: This system can't play 3D games, because the video memory is integrated and the squeaky speakers sound pretty awful. Also, the EliteBook carries a standard DVD writer, not a Blu-ray high-definition drive. Otherwise, however, this little laptop should be able to handle just about any type of business or entertainment application. How does it compare with other ultraportables currently on the scene? Well, it outperforms and outspecs the HP Voodoo Envy 133 in just about every way except sex appeal. It solidly outperforms the Samsung X360 (an SSD-based notebook that scored a 64 in WorldBench 6) and lags a little behind Sony's pricey VAIO VGN-Z598U (which earned a 96).

The EliteBook comes with a big power pack that extends the back of the unit by about half an inch. The design isn't overly clunky, however, and the battery lasted a good, long time in our tests: 12 minutes shy of 7 hours. Most impressive, it outlasted most other laptops, save for the Samsung X360 and the Lenovo ThinkPad X200.

It even has an external power gauge, especially convenient for checking battery life when the unit is turned off. Just 3.8 pounds, the EliteBook would be perfect for stuffing in a briefcase or backpack and then working offsite all day, without needing to lug along the power adapter. And the 12.1-inch, 1280-by-800-pixel, wide-aspect screen is glossy and bright but not annoyingly reflective--one of the benefits of using a backlit LED panel.

The keyboard is a cut above. The stroke is short and hard, but the layout is elegant and includes two pointing devices, not only a touchpad but an eraserhead embedded among the keys. The eraserhead tip is wide and concave, with tactile nubs that make getting the hang of maneuvering the pointer easy. Each pointing device has its own dedicated set of mouse buttons, both exceptionally comfortable thanks to a soft rubberized finish. Need to get work done in a dark room or on a plane? Pressing a small black button at the top of the screen pops out a nearby keyboard light, an LED mounted in a tiny hood that shines a pale white glow on the keys.

The standard laptop connections are well covered. The EliteBook has Bluetooth and Wi-Fi wireless capabilities, gigabit ethernet, an ExpressCard/54 slot, a separate SD Card slot, and a Firewire port, not to mention both modem and network jacks. Hate remembering a bunch of passwords? A fingerprint reader is provided in the lower-right quadrant of the wrist rest. You can communicate face-to-face with the built-in 2-megapixel Webcam, too. Though the machine has only two USB ports, one is powered. (If you need more, HP's $109 docking station for the EliteBook provides four USB ports.) The unit even has a plastic sheath on the bottom for slipping in a business card to quickly identify you as the owner.

One thing that isn't standard: This corporate raider can take a beating. While we can't vouch for dunking it in a fish tank or dropping it in the desert, it does look like it can handle a desk-to-floor drop--and maybe a splash from a small latte.

We do have one design complaint worth mentioning, however. The futuristic touch-sensitive membranes that a lot of laptops now incorporate as quick-launch panels have been a mixed bag, and the EliteBook's is no exception. It was responsive to taps and included an on/off for the touchpad, which is always nice, but the volume gauge needed recalibrating. It didn't always respond, even to repeated swipes.

But, really, the lack of an easy way to control volume is not much of a drawback on an ultraportable. In all other ways the EliteBook lives up to its name. If you have the money, it has all the panache you could want in a light, fast, and easy-to-use portable.

source : www.pcworld.com

HP Mini 2140


Jan 6, 2009 by Darren Gladstone, PC World

The HP Mini 2140 netbook improves on the earlier Mini 2133, but it retains its predecessor's awkwardly positioned mouse buttons.

The HP Mini 2140, the latest entry in Hewlett-Packard's 2100 series of netbooks, is what the company's Mini 1000 aspires to be when it grows up. But it carries a grown-up price as well: $529 for our test unit's midlevel configuration.

Like the Mini 1000, the Mini 2140 has a fairly large keyboard (92% the size of a full-size QWERTY keyboard) with wide, flat buttons. The mouse configuration remains the same, too: The right and left mouse buttons flank the mousing surface instead of sitting below it, which makes navigating and editing documents more difficult. But at least the mouse buttons on the 2140 are rubberized and rise above the surface, improving the mouse's manageability.

The 2140 has a few other things in common with the Mini 1000--and with the rest of the netbook market. The base-level, $499 version of the 2140 comes with Intel's Atom 1.6-GHz processor, 1GB of RAM, a 160GB hard drive (which spins at 5400 rpm), a three-cell battery, and Windows XP. For an extra $30, you can bump up the configuration (as we did) to include a six-cell battery, or you can cough up the maximum $629 asking price for a three-cell unit that has 2GB of memory and a 7200-rpm, 160GB hard drive. Even then, the Mini 2140 is smaller and less expensive than the Asus N10Jc.

We're still waiting for final results of the PC World Test Center's performance and battery life tests; when those numbers are available, we'll update the story and assign the netbook an overall PCW Rating. HP suggests that the Mini 2140 will last 4 hours with the three-cell battery and just over 8 hours with the six-cell unit.

In my informal hands-on testing of the 2140, the 10.1-inch backlit LED display stood out. Colorful and crisp, this screen has a native resolution of 1024 by-576 pixels. (An optional high-definition 1366-by-768-pixel display will be available in February.) Like the display on the Mini 1000, the one on the Mini 2140 carries glossy coating that makes it a little tougher--but not impossible--to view outdoors.

The unit's rugged frame and aluminum lid make it a little on the meaty side. It weighs 2.6 pounds with the three-cell battery in place, compared to the Mini 1000's 2.25 pounds; but the Mini 2140's remain notably svelte, at 1.05 by 10.3 by 6.5 inches. The metal alloy hinges are recessed, for durability. And both the spill-resistant keyboard and the 3D DriveGuard that parks the hard-drive head during a sudden movement (such as a drop on the airport floor) enhance this model's ruggedness for the road.

The 2140 supports 802.11n, and Bluetooth 2.0 is optional. HP claims that the netbook can recharge up to 90 percent of capacity in about 90 minutes. And for the $629 flavor of the 2140, you can get "Genuine Windows Vista with downgrade to Genuine Windows XP Professional custom installed." Don't go looking for more software, though: You're just getting the basics here. If Windows isn't your thing, you can request FreeDOS or SuSE Linux Enterprise Desktop 10 with your unit.

Even though it's a business-class machine, the Mini 2140 puts on a reasonable audio show. Its speakers, parked in the hinge between the display and the keyboard, performs on the same scale as the Mini 1000 (it sounds a bit tinny, but good enough to fill an office or hotel room).

The only major downer involves a limited capacity to accommodate external devices. The machine has a few handy ports such as an SDHC flash card reader, VGA-out, an ethernet jack and two USB ports. But the USB ports are located on either side of the device, creating a potential problem if you want to plug in an external hard drive that requires a spare USB port to power the device. This issue isn't unique to the 2140, but it is something to keep in mind if you're a big-time data jockey.

HP has assembled a compelling package that could go toe-to-toe with the Asus N10Jc. But like Asus's heavyweight netbook, the Mini 2140 in its premium configuration bears a price tag that approaches what you'd expect to find on a good all-purpose machine like the Sony VGN-NR485 ($800).

source : www.pcworld.com

Apple Laptops Extend Their Lead in Reliability

Jeff Bertolucci, PC World
Jan 7, 2009 5:20 am

In our annual survey of the most reliable laptops, Apple leads, HP bleeds, and Lenovo significantly recedes.

Apple's ratings for reliability and service, though stellar among laptop manufacturers, fell slightly from last year's results. Survey participants again rated the MacBook maker better than average in six of nine categories--by far the best showing achieved by any notebook vendor--but they also reported a higher-than-average incidence of problems with failed components.

Acer, Dell, and Sony did well overall, too, though not at Apple's level. Acer and Sony laptops earned praise for their reliability, and readers reported that Dell did a better job of resolving customer problems in 2008 than in previous years. Dell's efforts to reduce hold times for phone support seem to be paying off as well: The company's score on this measure rose to average from worse than average. On the other hand, Dell needs to do a better job of replacing failed parts, according to our readers.

Lenovo, which last year challenged Apple for the top spot, posed less of a challenge this year. Its only high mark came in overall reliability; last year it earned five better-than-average grades, mostly for aspects of its service.

At the other end of the spectrum, HP repeated last year's dismal last-place finish with six subpar marks, plus another one for its Compaq brand. In fact, HP's 2008 grades are even worse than its 2007 marks, which included two ahead-of-the-pack scores for reliable components. The good news this year? Well, HP says that it has been working to shorten phone-support hold times--and our readers noticed the difference. The world's biggest PC vendor rose to average from worse than average in that area.

Another interesting survey finding: One-third of our respondents reported experiencing one or more significant hardware or software problems with their laptops. Desktops caused just as many headaches, but other peripherals--except printers--were much more dependable.

source : www.pcworld.com

SecuriKey Enlists in Boot Camp

Philip Michaels, Macworld.com
Tuesday, January 06, 2009 7:40 AM PST

If you're a mobile Mac user who frets about the chance that someone might swipe your laptop and make off with all the important data stored in side, there's at least one option open for consideration: look into investing in GT SecuriKey's SecuriKey Professional Edition for the Mac. The hardware-software combo serves as a kind of key for your laptop--install the software and insert a USB key into the port on your Mac to make it run. No key? Then, no one can access your data, with or without a password.

Ah, but what happens if you're a mobile Mac user who not only frets about the possibility of laptop theft but also uses Leopard's built-in Boot Camp feature to run Windows on your MacBook? That USB key would lock up your Mac data, but anything on the Windows partition would be fair game for a laptop thief.

GT SecuriKey has you covered there, too. On Monday, the company released the SecuriKey Pro Boot Camp Bundle. The new security offering features SecuriKey software for both Mac OS X and Windows and two software licenses. Like other SecuriKey products, the Boot Camp Bundle comes with two USB keys--one of them's a spare key in case you lose the first one. But a single USB key unlocks both the OS X and Windows partitions on your laptop.

"It leverages everything good about the MacBook, regardless of which platform you're using," GT SecuriKey Bennett Griffin said.

The SecuriKey Pro Boot Camp Bundle supports both XP and Vista partitions (and works with OS X 10.5, obviously). It costs $180.

source : www.pcworld.com

Digital Gangster Takes Credit for Twitter Hacks

Ian Paul, PC World
Jan 6, 2009 11:56 pm

Members of the online forum Digital Gangster may have been behind yesterday's Twitter hack. On Monday, hackers gained access to, and posted messages from, 33 Twitter accounts including those of Bill O'Reilly, Britney Spear and CNN's Rick Sanchez.

According to this thread, a hacker named GMZ gained access to Twitter login information and then posted a different thread--that has since been removed--calling on other DG members to email him for credentials to individual accounts. At least another four members then claim to have been part of yesterday's Twitter hack.

The hack included several prank posts from Twitter users such as Fox News, Facebook and president-elect Barack Obama. The strange thing about some of these messages is that they included affiliate links--a common marketing program that pays the creator of the link for driving traffic to another Web site such as Amazon--according to reports. That may make finding the culprits easier as the affiliate programs in question should have a virtual paper trail leading back to the payee.

While DG members are taking credit for this exploit, it's important to remember that it may be all talk. Hacker forums often contain inane threads where members make things up or simply "trash talk" with their online buddies. For example, a user named Craig claims to have had access to Barack Obama's Twitter account. It seems unlikely that a hacker would admit this online knowing that federal investigators would have to get involved with anything involving the president-elect.

That being said, the DG forum members seem to be the most likely culprits at the moment. Considering how quickly authorities were able to track down the Palin e-mail hacker, we should have more to report on the Twitter pranksters soon.

source : www.pcworld.com

The Five Most Dangerous Security Myths: Myth #2

Erik Larkin
Jan 7, 2009 1:42 am

Sure, the Web is today's Wild West, with digital guns blazing and no sheriff in sight. But as long as you use a good antivirus program, you're completely safe, right?

Wrong. A good security program will help a good deal, but no program can catch everything. Antivirus companies are locked into a constant battle with the bad guys, who put all their effort into staying one step ahead of antivirus detection with a flood of new techniques and programs. Security software can often deflect those threats. But sometimes, the bad guys get the upper hand.

Antivirus apps have to scramble most when faced with highly customized 'targeted attacks.' Crooks put a good deal more time into crafting these attacks, with smooth social engineering (ie. con job techniques) to fool the recipient into opening an e-mail attachment, for instance, and careful prep work to ensure the payload can evade antivirus protection. These targeted attacks aren't common, but they represent a major challenge to security apps.

And then you have the vast numbers of non-targeted, run-of-the-mill malware. The bad guys spew out ridiculous numbers of variants, sometimes on the fly, to try and stay ahead of antivirus signatures. Security companies have an easier time squaring off against this technique with proactive protections that don't require a full signature, and also (for some) with new features that can send signatures of suspicious files to online servers with larger, and more up-to-date, signature databases than can be stored on your PC. But this flood also represents a challenge to antivirus.

So don't let your guard down just because you have a good antivirus app installed. You still need a layered defense, where the most important layer consists of knowing the threats--and dispelling the five most dangerous myths.

source : www.pcworld.com

The Five Most Dangerous Security Myths: Myth #3

Erik Larkin
Jan 7, 2009 1:50 am

When the Web was young and blink tags abounded, it wasn't hard to avoid the bad stuff online. You could generally tell by looking at a site if it was unsavory or even dangerous, and if you were careful with your surfing and your e-mail, you could generally have gone without antivirus.

Not anymore. These days crooks like nothing more than to find a security flaw in a benign but vulnerable site and use the flaw to insert hidden attack code. Once in place, that hidden snippet will scan for security flaws on your PC any time you view the page. If it finds one, it will attempt a "drive-by-download," which surreptitiously downloads and installs malware onto your computer.

Sites large and small, from personal pages to big-name company sites, have been hacked in this way. You won't notice anything out of place if you view a hacked page, though if you know what to look for you might recognize an inserted 'iframe' if you view the page's source code.

The same theme holds for e-mail as well. Your trained eye can likely spot the majority of e-mail attacks, and you may even get a good chuckle out of some of the clumsy grammar and spelling. But not every attack e-mail is easy to spot. The targeted attacks mentioned for myth #2 in particular are difficult to catch, and even net-cast-wide blasts can often use good social engineering hooks.

This iron man myth needs to go the way of those godawful blink tags for two reasons: First, so you'll know to keep your PC secure so that if you're unlucky enough to happen across a hacked site, or accidentally open that well-crafted e-mail, the drive-by-download or e-mail payload won't snare you. Second, if you run your own site, you'll know to keep an eye on it to make sure it hasn't been hacked to attack your visitors. In particular, make sure you keep blogs and any other Web application up-to-date.

If you read the previous security myth-buster, you know antivirus by itself isn't enough. And now, you know that your good sense, while critical, isn't enough either. So sayonara, myth three.

source : www.pcworld.com

CheckFree Warns 5 Million Customers After Hack

Robert McMillan, IDG News Service
Tuesday, January 06, 2009 5:40 PM PST

CheckFree and some of the banks that use its electronic bill payment service are notifying more than 5 million customers after criminals took control of several of the company's Internet domains and redirected customer traffic to a malicious Web site hosted in the Ukraine.

The Dec. 2 attack was widely publicized shortly after it occurred, but in a notice filed with the New Hampshire Attorney General, CheckFree disclosed that it was warning many more customers than previously thought.

That's because CheckFree is not only notifying users of its own CheckFree.com Web site of the breach, it is also working with banks to contact people who tried to pay bills from banks that use the CheckFree bill payment service.

"The 5 million people who were notified about the CheckFree redirection were a combination of two groups," said Melanie Tolley, vice president of communications with CheckFree's parent company, Fiserv, in an prepared statement. "1.) those who we were able to identify who had attempted to pay bills from our client's bill pay sites and minus those who actually completed sessions on our site; and 2.) anyone enrolled in mycheckfree.com."

Tolley wouldn't say what banks were affected by the hack, but the majority of these five million customers were CheckFree's own users, she said. In total, about 42 million customers access CheckFree's bill payment site, she said.

Customers who went to CheckFree's Web sites between 12:35 a.m. and 10:10 a.m. on the morning of the attack were redirected to a Ukrainian Web server that used malicious software to try and install a password-stealing program on the victim's computer.

The criminals were able to take control of several CheckFree Web domains after logging into the company's Internet domain registrar, Network Solutions, and changing the CheckFree DNS (Domain Name System) settings. This same technique was used by hackers one year ago, to take control of Comcast's Web site. It is not clear how the attackers were able to get CheckFree's Network Solutions password, but some security experts believe that CheckFree may have fallen prey to a phishing attack.

Looking at typical Web site traffic patterns, Fiserv guesses that about 160,000 consumers were exposed to the Ukrainian attack site, but not all of these customers would have been infected. For the attack to work, the victim would have to be a PC user without antivirus software who was also using an out-of-date-version of Adobe Acrobat. Because of these conditions, Fiserv believes that "a very small number" of people were affected, Tolley said.

However, because the company lost control of its Web domains, it doesn't know exactly who was hit. And so it must warn a much larger number of customers.

It could have been much worse. CheckFree processes bill payments for more than half of the banking institutions in the U.S., according to Gartner analyst Avivah Litan.

Although larger banks typically do not do this, some smaller banks simply turn their online bill payment services over to CheckFree, she said. "If they turn it over to CheckFree, chances are all those users were redirected to the CheckFree domain, but it was branded as the bank's domain."

CheckFree has deals to provide electronic bill payment services to banks such as Wachovia and Bank of America. It is not clear whether or not these banks were affected by the attack.

This kind of incident could also happen with fund transfer services, which are also frequently outsourced, Litan said. "Bank security is only a strong as its weakest link and the weakest links in banking are online payment and fund transfer [services]," Litan said.

source : www.pcworld.com

Data Breaches Rose Sharply in 2008, Says Study

Jeremy Kirk, IDG News Service
Wednesday, January 07, 2009 4:40 AM PST

More than 35 million data records were breached in 2008 in the U.S., a figure that underscores continuing difficulties in securing information, according to the Identity Theft Resource Center (ITRC).

The majority of the lost data was neither encrypted nor protected by a password, according to the ITRC's report.

It documents 656 breaches in 2008 from a range of well-known U.S. companies and government entities, compared to 446 breaches in 2007, a 47 percent increase. Information about the breaches was collected by tracking media reports and the disclosures companies are required to make by law.

Data breach notification laws vary by state. Some companies do not reveal the number of data records that have been affected, which means the actual number of data breaches is likely much more than 35 million.

"More companies are revealing that they have had a data breach, either due to laws or public pressure," the ITRC wrote on its Web site. "Our sense is that two things are happening -- the criminal population is stealing more data from companies and that we are hearing more about the breaches."

The data breaches came from a variety of mishaps, including theft of laptops, hacking, employees improperly handling data, accidental disclosure and problems with subcontractors.

BNY Mellon Shareowner Services, an investment bank based in New Jersey, reported the highest number of breached records: 12.5 million. A box of computer tapes containing names, Social Security and account numbers was lost in February 2008. A lock on the truck transporting the tapes was broken, and the truck had been left unattended, according to news reports. The tapes were not encrypted.

The business community had the most breaches, comprising more than a third of the 656 breaches, ITRC said. Government and military organizations came in at 16.8 percent, the second-highest tally. However, that's an improvement over 2006, when that sector comprised nearly 30 percent of all reported data breaches, the center said.

Some 15.7 percent of all breaches were attributed to insider theft, a figure that more than doubled between 2007 and 2008, ITRC said.

source : www.pcworld.com

Rabu, 07 Januari 2009

Microsoft applauds Chinese counterfeit software prison sentences

Author:Antony Savvas
Posted:11:59 05 Jan 2009
Topics:Software Piracy | Software Companies

Microsoft has applauded the Chinese government for clamping down on software pirates with prison sentences.

A court in Shenzhen, southern China, has handed down sentences to 11 ringleaders of what was described as the world's largest software counterfeiting syndicate.

The sentences, ranging from 1.5 to 6.5 years, include the longest sentences handed down for this type of crime in China's history.

Based in the southern China province of Guangdong, members of the syndicate were arrested by Chinese authorities in July 2007, following an international investigation led by China's Public Security Bureau (PSB) and the FBI. Microsoft and hundreds of Microsoft customers and partners also provided information which assisted in the investigation.

The 11 accused were part of a criminal syndicate responsible for manufacturing and distributing an estimated $2bn-worth of high-quality counterfeit Microsoft software.

The counterfeit software, found in 36 countries and on five continents, contained fake versions of 19 of Microsoft's most popular products and was produced in at least 11 languages.

"Microsoft greatly appreciates the work of China's PSB and the FBI in taking strong enforcement action against this global software counterfeiting syndicate," said David Finn, associate general counsel for Worldwide Anti-Piracy and Anti-Counterfeiting at Microsoft.

Fengming Liu, vice-president of Microsoft Greater China Region, said, "Software piracy negatively impacts local economic growth, stifling innovation, taking business opportunity away from legitimate resale channels and putting consumers and partners at risk. Enforcement of intellectual property rights is critical to fostering an environment of innovation and fair competition."

Microsoft launched the Genuine Software Initiative in 2006, and since then it has intensified its efforts to protect customers and channel partners from the risks of counterfeit software through an increased focus on education, engineering and enforcement.

source : www.computerweekly.com

Security risk in Windows 7 pirates

Author:Warwick Ashford
Posted:12:01 05 Jan 2009
Topics:Security | Operating Systems

Installing leaked copies of Microsoft's Windows 7 operating system is highly risky.

Pirate versions of an early build of Microsoft's latest operating system are available on file-sharing networks.

Windows 7 is under final developer testing ahead of an expected commercial release later this month.

But security firm Fortify Software says there is no way of knowing whether or not hackers have tampered with the 2.44Gbyte file.

Anyone downloading and installing the operating system could find their PC generating malware, denial of service attacks and spam, said Fortify.

It is highly unlikely that any IT security application will protect users from internally coded malware in the operating system, said Rob Rachwald, director product marketing at Fortify.
"Fall-out from using an unofficial version of the new operating system could be quite severe," he said.

Windows 7, which is based on the code in Windows Vista, offers built in support for touch-sensitive displays.

In addition, Microsoft has extended its Bitlocker encryption technology to support portable storage devices.

Microsoft said users will also be able to connect securely to Windows Server 2008 networks without the need for a VPN.

source : www.computerweekly.com

Secure operating systems

Main article: Secure operating systems

One use of the term computer security refers to technology to implement a secure operating system. Much of this technology is based on science developed in the 1980s and used to produce what may be some of the most impenetrable operating systems ever. Though still valid, the technology is in limited use today, primarily because it imposes some changes to system management and also because it is not widely understood. Such ultra-strong secure operating systems are based on operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operating environment. An example of such a Computer security policy is the Bell-LaPadula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel. This forms the foundation for a secure operating system which, if certain critical parts are designed and implemented correctly, can ensure the absolute impossibility of penetration by hostile elements. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Ordinary operating systems, on the other hand, lack the features that assure this maximal level of security. The design methodology to produce such secure systems is precise, deterministic and logical.

Systems designed with such methodology represent the state of the art of computer security although products using such security are not widely known. In sharp contrast to most kinds of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and power. Secure operating systems designed this way are used primarily to protect national security information, military secrets, and the data of international financial institutions. These are very powerful security tools and very few secure operating systems have been certified at the highest level (Orange Book A-1) to operate over the range of "Top Secret" to "unclassified" (including Honeywell SCOMP, USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation, and therefore there are degrees of security strength defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security functionality and assurance level (such as EAL levels), and these are specified in a Protection Profile for requirements and a Security Target for product descriptions. None of these ultra-high assurance secure general purpose operating systems have been produced for decades or certified under the Common Criteria.

In USA parlance, the term High Assurance usually suggests the system has the right security functions that are implemented robustly enough to protect DoD and DoE classified information. Medium assurance suggests it can protect less valuable information, such as income tax information. Secure operating systems designed to meet medium robustness levels of security functionality and assurance have seen wider use within both government and commercial markets. Medium robust systems may provide the same security functions as high assurance secure operating systems but do so at a lower assurance level (such as Common Criteria levels EAL4 or EAL5). Lower levels mean we can be less certain that the security functions are implemented flawlessly, and therefore less dependable. These systems are found in use on web servers, guards, database servers, and management hosts and are used not only to protect the data stored on these systems but also to provide a high level of protection for network connections and routing services.
source : en.wikipedia.org