Wednesday, June 27, 2012

Intel Launches Core i3 microprocessors third generation "Ivy Bridge-MB" for Laptops

For several days it was rumored that by the end of this month launched its new microprocessors Intel Core i3 3 rd generation, ending rumor was confirmed today with the launch of the new microprocessors Core i3 3rd generation laptops.

The new chip Core i3 3 rd generation of laptops are based on the core-MB Ivy Bridge, variant based on Ivy Bridge microarchitecture aimed at notebooks and Ultrabooks.

The first two members of the family of microprocessors Core i3 3rd generation Intel launched today are:

Core i3-3217U
Dual-core microprocessor running at 1.8GHz, with its HyperThreading technology is capable of running four threads simultaneously processing, has a 3MB L3, a memory controller DDR3-1600 Dual Channel Graphics Intel Graphics HD 4000. Its TDP is 17W and is focused on Ultrabooks.

Core i3-3110M
Dual core microprocessor running at 2.4GHz, with its HyperThreading technology is capable of running four threads simultaneously processing, has a 3MB L3, a memory controller DDR3-1600 Dual Channel Graphics Intel Graphics HD 4000. Its TDP is 35W and is focused on notebooks.

Both chips have a suggested retail price of U.S. $ 225

Saturday, June 23, 2012

Calxeda shows a server that would be 15 times more efficient than Intel

Calxeda is a company that is gaining attention lately, in media terms-around category of servers, this time through a unique product that promises to be 15 times better than the competition, namely Intel.

For have revealed details of its upcoming ARM Calxeda Server, computer chips based on this architecture and provide a moderate performance but with an energy very, very low.

The company showed its results for the benchmark ApacheBench v2.3 at the following platform: server CPU EnergyCore Calxeda ECX-1000 quad-core running at 1.1 GHz, 4GB of memory and DDR3L-1066 SATA hard drive spinning at 7200rpm, this to move the operating system Ubuntu Server v12.04.

The results? Against an E3-1240 Intel Xeon quad-core also running at 3.3GHz and, underwent both a requirement of one million requests. The Calxeda chip processed 5,500 requests per second, while the Xeon 6950. Intel certainly pays a little better, but what about power consumption? Here's the surprise, as the ECX-1000 processor has a TDP of just over 5W, while Intel's TDP is 80W and the platform was full 102W.

Taking account, Calxeda says that in terms of processing power per Watt they are 15 times higher, pending more benchmarks that show us that a server based on the ARM architecture is a more viable than x86, so little by little more companies try to push to get their ARM products.

Friday, June 15, 2012

Intel Core i3 3rd generation will come to end of this month

A couple of months were leaked specifications unreleased Intel Core i3-based third-generation micro-architecture Ivy Bridge; CPUs rumored to be delayed until August.

Intel goes to dispel rumors and claims that after 24 June (probably the last week of this month) will launch their new Core i3 microprocessors third generation, and has no intention of postergarlos.

Microprocessors Core i3 3rd generation will be available in the variants Ivy Bridge-DT desktop, and Ivy Bridge-MB for laptops (notebooks) and will consist of two x86 cores, the IGPs HD Graphics 4000 or HD Graphics 2500 depending on model, with its HyperThreading technology will be able to run up to four processing threads simultaneously, and 3MB of L3.

Sunday, June 10, 2012

The die size of the four variants of Ivy Bridge-DT

The Intel Core-based third-generation micro-architecture Ivy Bridge was released on April 23 this year and are the second modular architecture of Intel. As microprocessors based on Sandy Bridge micro-architecture, microprocessors based on Ivy Bridge microarchitecture are built in modules, which consist of 2 modules and 2 dual-core x86 graphics core (HD 2500 and HD Graphics 4000 Graphics ), through which Intel can build products aimed at different market segments, while minimizing production costs.
 Although Intel officially informed that your Ivy Bridge-DT/MB/ULV microprocessors (versions for notebook and desktop Ultrabooks respectively) have a die area of 160mm ², this area corresponds to the variant with two x86 modules (4 cores) and PGI HD Graphics 4000, but the other variants have different areas which are detailed below:
2 dual-core x86 modules (4 cores, 8MB L3) + HD 4000 IGP: 159.82mm ².
2 dual-core x86 modules (4 cores, 6MB L3) + IGP HD 2500: 132.82mm ².
1 module x86 dual-core (2 cores, 4MB L3) + HD 4000 IGP: 118.08mm ².
1 module x86 dual-core (2 cores, 3MB L3) + IGP HD 2500: 93.58mm ².

Wednesday, June 6, 2012

CTX2012: ASUS Wolverine, the monstrous mother card with 40 phase power

 Just yesterday Gigabyte showed his motherboard Z77X-UP7, with which boasted exposing its 32 digital phase power, just awesome, but many wondered what the response from ASUS to it? ASUS's response was immediate, and unfortunately a few hours of fame Gigabyte ended with the announcement of the new ASUS motherboard Wolverine, which has a PCB with 40 digital power stages. ASUS Wolverine has a look that is reminiscent of motherboards P8Z77-V Series ASUS's own, but with the very obvious difference in the number of power phases. The motherboard is compatible with multi-GPU mode 3-Way SLI / CrossFireX, and has a large number of features. Yet know if the new policy will succeed "The more power phases, better" which seem to have both ASUS and Gigabyte engaged, at least not until both products are launched. But if current motherboards like ASUS ROG Maximus V Gene with 8 4 phases are capable of leading the overclock limit to microprocessors Ivy Bridge-DT sub-zero temperatures What else can we offer new multi-phase motherboards ? Are they just marketing? Do they just played their prestige?

Sunday, June 3, 2012

Windows 8 Release Preview raises their hardware requirements?

A few days ago Microsoft made ​​available to users the latest drafts of their future operating system: Windows 8 Preview Release version far more polished than the previous: Developer Preview Windows 8 and Windows 8 Consumer Preview. From OCWorkbench report that apparently Microsoft quietly raised the hardware requirements for Windows 8 Release Preview, then trying to update one of their teams: a NetPC (nettop) based on an Intel Atom dual core running at 1.6GHz (possibly first Generation: Diamondville) in combination with the Nvidia ION chipset, which worked with the old version: Developer Preview Windows 8, Windows 8 Release Preview refused to install under these settings throwing the message: "setup can not continue because of the low power of the team. " It is unknown if Microsoft will make some adjustment in the final version of Windows 8, to enable implementation in the first Atom chips released, or finally the holders of such equipment can not install the new operating system.

Friday, June 1, 2012

6 Myths of Internet Security

We live online: We spent much of the day on the Internet and exchanged a lot of personal information this way, so we know how important it is to take precautions and implement measures to ensure our safety online.We know, for example, that with further technical advice and act with common sense, we can avoid many threats and outwit various types of attacks.However, in regard to measures to safely navigate the Internet, there are many myths as to dismantle these below.

Myth 1: Shopping on the Internet

Belief: If you do not buy products or contract services on the Internet, I can not become a victim of cybercrime.

Fact: Even people who do not buy or make Internet banking may be affected by cybercrime. Just one visit to an infected website, or even a Web site free of viruses, but with an advertisement infected, so your computer can be infected by a software program for illegal activities such as a bot or a Trojan horse.

Tip: Always use secure transactions when you transfer confidential information and make sure you are dealing with a trustworthy company.

Myth 2: Share keys with my family is safe

Belief: It is safe to let other people use my computer, or share with them my keys, provided they are members of my family or very trusted friends

Reality: Anyone can be a victim of an attack on the Internet. Cybercriminals use automated tools to send millions of fraudulent e-mails in hopes of finding a small number of vulnerable victims.They do not care who they have opened the way that allows them to infect a computer, whether adult or child, provided they be misled and make mistakes.Cybercriminals act quickly, and the slightest mistake is enough for them to open Pandora's box. It is preferable not share your passwords, even the access to the computer.

Tip: Choose strong passwords and keep them safe.

Myth 3: I'm not famous, no one will steal my identity

Belief: The Internet is so big that you should not worry about things like identity theft. The probability of my becoming a victim is minimal, unless a public figure or famous person.

Fact: automated bot programs made constant raids on the Internet for new victims to become infective.Even if you're not someone famous, or try to go unnoticed on the Net, this relentless variety of crimeware will test the security of your computer.Furthermore, the volume of phishing scam emails sent each day is so high that it is very likely that sooner or later, you receive a fake message ... While Internet users who frequently use are more likely to become victims, anyone using the Internet is exposed to threats.Tip: Beware of messages from unknown users, and remember that offers that seem too good to be true usually are not true.

Myth 4: I have a firewall, I'm sure

Belief: I am protected against identity theft on the Internet if I have a firewall that blocks intruders, hackers and criminals.

Fact: The firewall software is an excellent first step in the task of protecting your computer, but is only the first line of defense.In fact, the software alone is unable to fully protect against online identity theft, since attacks today may incorporate a psychological aspect to trick the victim into revealing confidential information in place to exploit a flaw software.

Tip: Install protective software on your computer and keep it updated. Never send personal information (credit card numbers, passwords, etc..) In an email.

Myth 5: The photographs are free of viruses

Belief: Not all programs are at risk: For example, it is impossible that the photographs contain malicious code.

Fact: Many of the recent software problems are caused by attackers sent to victims of attack code embedded in image files such as photos.The attack occurs when the victim is browsing the Internet or reading e-mail and finds a web page or a message containing the contaminated photography: When viewing the photo, the attack code executes and infects the victim machine with crimeware.

Tip: Check the authenticity of the attachments before opening them.

Myth 6: If you use Windows, I'm sure

Belief: People who do not use Microsoft Windows are safe. Criminals take advantage of Windows users because they are easy prey, while leaving calm to Linux users and Mac

Reality: While users of Microsoft Windows are certainly Internet users who receive the highest number of attacks, people who use other operating systems or software are not immune to soft failures or fraudulent attacks.Recent cases of virus for Mac, for example, demonstrate that choosing other software is not sufficient to eliminate the risk of online attack. In addition, many of today's attacks, such as phishing, operate independently of the software package being used.

Tip: Keep the list of recommendations to protect your Mac that you bargained for here.


You see, there are many myths about Internet security. The good news is that while the Internet there are many threats, we have no reason to deprive us of using technology to facilitate our daily tasks: The key is to take precautions to safely navigate the Internet, the advice to share with you here.Thus, the general recommendation is to use common sense and take advantage of that offer specific products to protect the network as Norton Internet Security, which offers advanced protection for surf, bank, shop online without interruptions and contact your friends in social networks without worry: What are you waiting for protecting what matters most to you?

Manufacturer places "back doors" in chips intentionally

For the first time in history has been able to discover, test, develop and document a vulnerability or backdoor on a silicon chip that allows an attacker to take control of the device using the platform. And not any user: but at the same manufacturer who deliberately added this backdoor to the chip and also put a "key" to use it.The affected products are units FPGA (Field Programmable Gate Array) Actel American manufacturer, in his series of models ProASIC3, IGLOO, Fusion and SmartFusion, and as we said, the researchers believe that the level of integration of the problem likely the hole found was put "at home" intentionally by Actel, which has been occurring since 2002 at least until 2010, when the company took over Microsemi manufacturing.To discover what is that a group of researchers at the University of Cambridge launched an investigation that sparked alarm among the institutions that use this kind of chip security features that require the highest level, such as military and communications applications public, private and institutional, to name a few, where governments and private organizations and researchers contacted for help. And yes, there were great efforts to find the problem because it also deliberately was very hidden in the hardware design, further aggravating the situation.The affected products are chips that can be programmed in a personal way to implement on different devices to perform specific functions, with the "implementer" deciding how it will work and where. This flexibility is what makes chips for applications desired in addition to those mentioned above also involve combat aircraft, satellites, nuclear power plants, commercial aircraft Boeing and many others.The worst thing of all is that you can break the AES encryption, an algorithm that provides high security and therefore, is widely used in engine chips to implement AES at the hardware level. Now all that is useless because of the vulnerability that Actel inserted into their products, which were acquired by naively all kinds of institutions that now are endangered data and more importantly, access to their platforms.According to investigators, the tailgate is embedded in the architecture that was designed with the piece of silicon, making it impossible to fix it or remove it because it is hardware, ie irons that are already done and can not be changed. The best thing you can do for now is to find ways to exploit the vulnerability and exploit it more difficult and costly for malicious, but anyway this is inevitable if it occurs.Because this is not a computer virus or other malware that is software or virtual code that can be fixed: This problem is a pit or hole embedded in physical processors, which can not cover more than exchanging one product for another. It is as if the computer you bought had a leak and the only solution to fix it is change it.

Thursday, May 31, 2012

Microsoft employees accused of downloading protected content using BitTorrent

Microsoft employees may have used company equipment in Washington, United States, to download content via BitTorrent. The materials have downloaded movies and even pornographic. The information was known by a compilation of public trackers BitTorrent where the IP would be registered teams at Microsoft.Microsoft is one of the most committed to the fight against piracy and misuse of copyrighted software and content. The company, also one of the most affected by piracy, has made several initiatives to combat these practices. One of the latest Microsoft stock was directed specifically against the BitTorrent system. The Redmond company financed a small BitTorrent company created to break bonds, designated as one of the mechanisms used for piracy. Despite Microsoft's efforts, the company could have the "enemy" at home. According to Torrent Freak website, have discovered evidence that employees at Microsoft offices in Washington would have used the equipment and the corporate network to download different content via BitTorrent. Evidence has been released by YouHaveDownloaded page, a website that has so far been published information public BitTorrent trackers, which allow you to view downloaded content for different IPs. According to Torrent Freak, IPs have been introduced related to Microsoft and have been found to have downloaded content via BitTorrent.To associate these IPs to Microsoft, Neowin has explained who have come to the Register Americado of IPs and found that Microsoft was responsible for a group of addresses among which were some of those used for downloading files with BitTorrent.Besides the fact that teams are used to download Torrent Microsoft despite the opposition of the company, allegedly downloaded files are also news. In addition to movies and other content on Torrent Freak ensure that pornographic films were downloaded from the IP addresses associated with Microsoft.

Gigabyte X11: The 973 grams Ultrabook

Gigabyte promised several weeks ago the early launch of the Ultra-light Ultrabook most of all, the Gigabyte X11 Ultrabook, which officially confirmed will weigh just 973 grams (0.973Kg). The Gigabyte X11 Ultrabook is based on a third-generation Core microprocessor yet revealed by Gigabyte, but we assume will be based on the Ivy Bridge-core ULV with a TDP of 25 or 17W & Graphics HD Graphics 4000; this microprocessor is accompanied by Intel HM77 chipset, 4GB of DDR3 memory and a 128GB SSD. The X11 has a screen of 11.6 "with a resolution of 1366 x 768 pixels and a carbon fiber deck, its dimensions are: 297x192x16.5mm, and will be priced between $ 999 to 1299 depending on the installed microprocessor.