Diberdayakan oleh Blogger.

Popular Posts Today

New Heart of the Swarm trailer preludes release

Written By Unknown on Kamis, 28 Februari 2013 | 16.01

Whether you're killing time playing the beta or sitting there twiddling your thumbs waiting for the Heart of the Swarm expansion to release on March 12, now you can distract yourself with the pretty new CGI trailer titled "Vengence."

They revealed it live on their Twitch channel yesterday at 12pm PST then promplty uploaded it to their Youtube channel.The trailer got me really pumped to dive straight into the campaign, and maybe even go back through the Wings of Liberty campaign as a refresher. Just when you thought there may be a happy ending for Raynor and Kerrigan, it seems the Queen of Blades is a little restless adjusting to Terran life.

The few things I took away from the trailer:


16.01 | 0 komentar | Read More

Researchers discover new global cyber-espionage campaign

Security researchers have identified an ongoing cyber-espionage campaign that compromised 59 computers belonging to government organizations, research institutes, think tanks and private companies from 23 countries in the past 10 days.

The attack campaign was discovered and analyzed by researchers from security firm Kaspersky Lab and the Laboratory of Cryptography and System Security (CrySyS) of the Budapest University of Technology and Economics.

Dubbed MiniDuke, the attack campaign used targeted email messages -- a technique known as spear phishing -- that carried malicious PDF files rigged with a recently patched exploit for Adobe Reader 9, 10 and 11.

The exploit was originally discovered in active attacks earlier this month by security researchers from FireEye and is capable of bypassing the sandbox protection in Adobe Reader 10 and 11. Adobe released security patches for the vulnerabilities targeted by the exploit on Feb. 20.

The new MiniDuke attacks use the same exploit identified by FireEye, but with some advanced modifications, said Costin Raiu, director of Kaspersky Lab's global research and analysis team, on Wednesday. This could suggest that the attackers had access to the toolkit that was used to create the original exploit.

The malicious PDF files are rogue copies of reports with content relevant to the targeted organizations and include a report on the informal Asia-Europe Meeting (ASEM) seminar on human rights, a report on Ukraine's NATO membership action plan, a report on Ukraine's regional foreign policy and a report on the 2013 Armenian Economic Association, and more.

If the exploit is successful, the rogue PDF files install a piece of malware that's encrypted with information gathered from the affected system. This encryption technique was also used in the Gauss cyber-espionage malware and prevents the malware from being analyzed on a different system, Raiu said. If run on a different computer, the malware will execute, but will not initiate its malicious functionality, he said.

Another interesting aspect of this threat is that it's only 20KB in size and was written in Assembler, a method that's rarely used today by malware creators. Its small size is also unusual when compared to the size of modern malware, Raiu said. This suggests that the programmers were "old-school," he said.

The piece of malware installed during this first stage of the attack connects to specific Twitter accounts that contain encrypted commands pointing to four websites that act as command-and-control servers. These websites, which are hosted in the U.S., Germany, France and Switzerland, host encrypted GIF files that contain a second backdoor program.

The second backdoor is an update to the first and connects back to the command-and-control servers to download yet another backdoor program that's uniquely designed for each victim. As of Wednesday, the command-and-control servers were hosting five different backdoor programs for five unique victims in Portugal, Ukraine, Germany and Belgium, Raiu said.These unique backdoor programs connect to different command-and-control servers in Panama or Turkey, and they allow the attackers to execute commands on the infected systems.

The people behind the MiniDuke cyber-espionage campaign have operated since at least April 2012, when one of the special Twitter accounts was first created, Raiu said. However, it's possible that their activity was more subtle until recently, when they decided to take advantage of the new Adobe Reader exploit to compromise as many organizations as possible before the vulnerabilities get patched, he said.

The malware used in the new attacks is unique and hasn't been seen before, so the group might have used different malware in the past, Raiu said. Judging by the wide range of targets and the global nature of the attacks, the attackers probably have a large agenda, he said.

MiniDuke victims include organizations from Belgium, Brazil, Bulgaria, Czech Republic, Georgia, Germany, Hungary, Ireland, Israel, Japan, Latvia, Lebanon, Lithuania, Montenegro, Portugal, Romania, Russia, Slovenia, Spain, Turkey, Ukraine, United Kingdom and the United States.

In the United States, a research institute, two pro-U.S. think tanks and a health care company have been affected by this attack, Raiu said without naming any of the victims.

The attack is not as sophisticated as Flame or Stuxnet, but is high-level nevertheless, Raiu said. There are no indications regarding where the attackers might operate from or what interests they might be serving.

That said, the backdoor coding style is reminiscent of a group of malware writers known as 29A, believed to be defunct since 2008. There's a "666" signature in the code and 29A is the hexadecimal representation of 666, Raiu said.

A "666" value was also found in the malware used in the earlier attacks analyzed by FireEye, but that threat was different from MiniDuke, Raiu said. The question of whether the two attacks are related remains open.

News of this cyber-espionage campaign comes on the heels of renewed discussions about the Chinese cyber-espionage threat, particularly in the U.S., that were prompted by a recent report from security firm Mandiant. The report contains details about the years-long activity of a group of cyberattackers dubbed the Comment Crew that Mandiant believes to be a secret cyberunit of the Chinese Army. The Chinese government has dismissed the allegations, but the report was widely covered in the media.

Raiu said that none of the MiniDuke victims identified so far was from China, but declined to speculate on the significance of this fact. Last week security researchers from other companies identified targeted attacks that distributed the same PDF exploit masquerading as copies of the Mandiant report.

Those attacks installed malware that was clearly of Chinese origin, Raiu said. However, the way in which the exploit was used in those attacks was very crude and the malware was unsophisticated when compared to MiniDuke, he said.


16.01 | 0 komentar | Read More

Linus Torvalds speaks out with a Secure Boot plan

The ongoing "Secure Boot" saga has already caused no end of controversy in the Linux community over the past eighteen months or so, but the vitriol that's been made apparent so far pales in comparison with that evident in a recent debate on the Linux kernel developer mailing list.

Linux creator Linus Torvalds

It all started last Thursday, when Red Hat developer David Howells submitted a request for changes to be made to Linux kernel 3.9 to extend Linux support for Secure Boot.

"Guys, this is not a d**k-sucking contest," was the response from Linux creator Linus Torvalds. "If Red Hat wants to deep-throat Microsoft, that's *your* issue. That has nothing what-so-ever to do with the kernel I maintain."

'Stop the fear mongering'

Fedora's solution to the Secure Boot problem—by which technology enabled in the Unified Extensible Firmware Interface (UEFI) on Windows 8 hardware requires an appropriate digital signature before an operating system is allowed to boot—has been to get its first stage boot loader, or "shim," signed with a Microsoft key.

Though it did receive a nod of at least partial support from the Free Software Foundation, that solution has been controversial.

It was when it came to including modifications in the kernel itself, however, that Torvalds drew the line.

Responding to Red Hat developer Michael Garrett's suggestion that Microsoft could otherwise choose to "blacklist" a distribution's bootloader, leaving the user unable to boot Linux, Torvalds wrote, "Stop the fear mongering already.

"Instead of pleasing Microsoft, try to see how we can add real security," he added.

'Let the user be in control'

Torvalds' own plan calls for Linux distributions to sign their own modules by default, but nothing else.

Users should be asked for permission, meanwhile, before any third-party module is loaded, he wrote. "Not using keys," he added. "Nothing like that. Keys will be compromised. Try to limit the damage, but more importantly, let the user be in control."

Per-host random keys should be encouraged, Torvalds advised, even with the "stupid" UEFI checks disabled entirely if required. "They are almost certainly going to be *more* secure than depending on some crazy root of trust based on a big company, with key signing authorities that trust anybody with a credit card."

'It shouldn't be about MS'

UEFI, in fact, is more about control than it is security, he added.

All in all, "it really shouldn't be about MS blessings, it should be about the *user* blessing kernel modules," Torvalds concluded.

There's been plenty more discussion since Torvalds outlined his view, of course, including his own, more detailed implementation plan later that same day.

The bottom line, however, is that as long as Torvalds is in charge, accommodation for Secure Boot won't be found in the heart of Linux itself.


16.01 | 0 komentar | Read More

New security tool serves Amazon Cloud users

Written By Unknown on Rabu, 27 Februari 2013 | 16.00

For many IT managers, moving your company's backbone to the cloud brings a certain sense of freedom. However, the task of caring for and protecting your assets remains. After all, the operative word in "virtual server" is "server"; virtual or not, it's still a fully functioning server from an operational sense, carrying the same risks and vulnerabilities inherent in physical servers. You'll need vulnerability management tools to ensure those servers are secure.

To that end, Qualys announced this week that QualysGuard—its cloud-based suite of security and compliance toolsnow works with Amazon's popular cloud services.

The rate at which new vulnerabilities are discovered is staggering. An estimate from 2010 put the figure at two per second. That may be on the extreme high end, but the point is that securing a server—virtual or physical—is a fluid, constantly changing process. You have to monitor regularly to determine which vulnerabilities your servers are exposed to, what the potential impact is, and what you can do to eliminate or mitigate the risk.

The new QualysGuard connector uses Amazon APIs to connect with virtual servers in the Amazon cloud. Businesses that use Amazon EC2 or VPC cloud services can use QualysGuard to conduct automated scans of virtual server assets, and generate reports to help IT admins address potential risks.

Qualys worked with Amazon to ensure the QualysGuard scans are pre-authorized, and to prevent any inadvertent scanning of third-party virtual servers in the Amazon cloud. Customers don't have to get explicit permission from Amazon before conducting a QualysGuard vulnerability scan because the activity is pre-approved by Amazon.

QualysGuard scanning uses Amazon
APIs and is pre-authorized by Amazon.

The native Amazon API connectors can be connected to one or more Amazon accounts, and automatically sync asset inventories from the Amazon EC2 and VPC services. Amazon attributes and context data are automatically collected during the import process, and IT admins can assign Dynamic Asset Tag data, which is used by QualysGuard for applying policies and generating reports.

Qualys customers who already subscribe to the QualysGuard Service and use Amazon cloud services will welcome the new capabilities. For companies starting at square one in search of a vulnerability scanning solution for Amazon cloud virtual servers, though, Qualys isn't the only choice. QualysGuard is the only thing that comes up in the Amazon AWS Marketplace if you search for "vulnerability scanning", but Eeye Retina Cloud Security also provides vulnerability management for Amazon EC2.

The new features are currently available to Qualys customers as part of their QualysGuard subscriptions. Annual QualysGuard subscriptions start at $2495 per year for 32 IP addresses. At least one QualysGuard Virtual Scanner Appliance license at $995 per year is required for internal network scanning functionality on Amazon. For more information, visit the Amazon AWS Marketplace.


16.00 | 0 komentar | Read More

'Ubuntu Touch Port-a-Thon': 25 devices and counting

Just two days after Canonical's launch of Ubuntu Linux for tablets, the company released the developer's preview image it had promised for both tablets and phones.

With images and installation instructions for the Nexus 7 and Nexus 10 tablets as well as smartphones including the Nexus 4 and Galaxy Nexus, the preview release was designed to show "how well the vision of a design family across different form factors works," as Ubuntu developer Daniel Holbach explained in a blog post last Friday.

Much the way Canonical recently solicited the community's help in designing and creating a set of basic open source apps that will come preloaded on Ubuntu Phone devices, so it is now asking those with access to any of these four Nexus devices to help test the Ubuntu Touch preview images on them.

For all others, it has launched what it calls the Ubuntu Touch Port-a-thon.

'If you don't mind tinkering'

Aiming to help get Ubuntu Touch on many more devices, Canonical just launched its new Ubuntu Touch Porting guide and simultaneously kicked off its Port-a-thon, through which it hopes developers will get the software up and running on the devices of their choice.

"If you don't mind some tinkering, maybe some kernel building, some configuration meddling, and flashing your device repeatedly, you might just be the person we're looking for," Holbach wrote.

Included in the porting guide are instructions about how Ubuntu Touch works internally, how images are put together, how to test them, and more.

Works in progress

If the results so far are any indication, it won't be long before Ubuntu Touch runs on the full gamut of hardware.

In fact, participants in the project have already indicated that a full 25 additional devices are now being worked upon, beyond the original four.

Included among them are the Motorola XOOM, the Sony Xperia, the Huawei Ascend G300, the Samsung Galaxy S and Galaxy Note II, the Asus Transformer Pad TF300T, the Dell Streak 7, and a variety of HTC devices.

Visitors to Mobile World Congress in Barcelona this week, meanwhile, can skip the hard work and let the professionals do it for them: Staff at Canonical's booth (81D30 in App Planet Hall 8.1) are on hand to flash visitors' hardware with the Ubuntu Touch Developer Preview.


16.00 | 0 komentar | Read More

Android phone blasts into space aboard satellite

Nexus One

Credit: Surrey Satellite Technology Limited

Network World - A 2010-vintage HTC Nexus One is the brains of a satellite launched into orbit Monday by the Indian Space Research Organization, dubbed STRaND-1.

STRaND-1, which weighs around 8 pounds, is the brainchild of UK-based Surrey Satellite Technology Limited, which designed the satellite both as a way to gauge how consumer-grade electronics will perform in space and to demonstrate pulsed-plasma thruster use on similar "nanosatellites." The name stands for Surrey Training, Research, and Nanosatellite Demonstrator.

According to SSTL, the Android phone aboard STRaND-1 will run apps that will collect scientific data, take pictures of Earth using its on-board 5MP camera, and even control some satellite functions. Temperature monitoring will prompt the device to run load-intensive programs, heating the CPU and avoiding a frozen battery.

[RELATED: Fabulous space photos from NASA's Hubble telescope]

[MORE ANDROID: Android outselling Apple iOS in America, new report says]

Along with its serious purposes, STRaND-1 will run an app called "Scream in Space," which will put the long-held saying "in space, no one can hear you scream" to the test by playing user-submitted videos and listening for any emitted sound.

SSTL didn't provide an exact unit cost, but said STRaND-1 is only a little more expensive than a "high-end family car."

The Nexus One won't take over for a couple of weeks, according to SSTL, as scientists on the ground verify that everything else aboard the satellite is working. Until the switchover, STRaND-1 is being controlled by the satellite's altitude control system and a Linux-based CubeSat computer.

STRaND-1 is one of six commercial payloads launched into orbit by the ISRO's PSLV-C20 mission, along with its primary cargo, the joint French-Indian oceanographic research satellite SARAL. There is, as yet, no word of a competing iPhone-powered satellite project, although both the iPhone and other Android-powered devices have already been carried into space by intrepid astronauts.

Email Jon Gold at jgold@nww.com and follow him on Twitter at @NWWJonGold, particularly if you want to commiserate over all the HAL-9000 jokes he had to cut out of this.

Read more about wireless & mobile in Network World's Wireless & Mobile section.


16.00 | 0 komentar | Read More

Microsoft suffers another temporary Surface Pro shortage

Written By Unknown on Minggu, 24 Februari 2013 | 16.00

Skip the navigation

Computerworld
  • White Papers
  • Webcasts
  • Newsletters
  • Solution Centers

    • BlackBerry: Build up your BlackBerry® 10 knowledge
    • BMC Control-M Workload Automation
    • View all Solution Centers
  • Events
  • Magazine

    • Latest Issue
    • Magazine Index
    • Subscribe
    • Subscriber Services
  • Twitter
  • Facebook
  • Google+
  • LinkedIn
  • RSS
  • Topics
    • Applications
    • Cloud Computing
    • Consumerization of IT
    • Data Center
    • Data Storage
    • Government/Industries
    • Hardware
    • Internet
    • Management
    • Mobile/Wireless
    • Networking
    • Operating Systems
    • Security
    • All Topics
  • News
  • In Depth
  • Reviews
  • Blogs
    • Featured Blogs
    • IT Blogwatch
    • Jonny Evans
    • JR Raphael
    • Michael Horowitz
    • Preston Gralla
    • Richi Jennings
    • Robert L. Mitchell
    • Shark Tank
    • All Bloggers
  • Opinion
  • Shark Tank
  • IT Jobs
  • More

    • Enterprise IT
    • Hot Topics
    • IDGE CEO Interviews
    • Insider Articles
    • QuickPoll Center
    • Slideshows
    • Video
  • IT Verticals

    • Financial IT
    • Government IT
    • Healthcare IT
Mobile/ Wireless
  • Android|
  • iOS|
  • Laptops|
  • Mobile Apps|
  • Mobile Device Management|
  • Mobile Payments|
  • Netbooks|
  • Smartphones|
  • Tablets|
  • Ultrabooks|
  • Windows Phone|
  • Wireless Carriers

16.00 | 0 komentar | Read More

Microsoft Azure service restored after being downed by expired SSL certificate

Microsoft's Azure cloud platform faced a worldwide outage in its storage services from Friday afternoon because of an expired SSL (secure sockets layer) certificate. The company reported services were restored Saturday.

The company also reported problems with its Xbox Music and Video Store services.

The service problems come on a day the company said it was recently a victim of a cyberattack similar to ones that targeted Apple and Facebook.

"Beginning Friday, February 22 at 12:44 PM PST, Storage experienced a worldwide outage impacting HTTPS operations (SSL traffic) due to an expired certificate," Microsoft said on its Windows Azure service dashboard. HTTP traffic was not impacted, the company said. It said it executed steps to update the SSL certificate and expected HTTPS traffic to notice gradual recovery in many sub-regions.

Hypertext Transfer Protocol Secure, a combination of the HTTP and SSL/TLS protocols, is an Internet communications protocol for secure network communications.

"Further updates will be published to keep you apprised of the situation. We apologize for any inconvenience this causes our customers," the company said.

Microsoft also reported problems in its Xbox Music and Video services. It said users may be unable to browse, stream, download, or buy things at the Xbox Music and Video Store, also known as "Zune Marketplace." The company did not trace a connection between the Azure storage outage and the Xbox service problems.

The company said early morning on Saturday on the Xbox support site that it is working with its team of engineers "to get those jams back online and streaming properly." The company earlier reported that users were experiencing issues accessing content in Xbox Music and Video, and said, "know that we are aware of the issue and actively engaged working toward a fix to bring you back those sweet tunes !"

Microsoft also had a serious problem in its Azure service last February. An August 2012 outage affected primarily customers in Western Europe.

By Saturday, the company reported that Xbox Music and Video Store were "up and running." It also said on its Windows Azure service dashboard that it had "executed repair steps to update SSL certificate on the impacted clusters," and had recovered to over 99 percent availability across all sub-regions, but warned customers of intermittent failures for the next 24 hours. "We will continue monitoring the health of the Storage service and SSL traffic for the next 24 hrs," it said.

The company has not disclosed what led to the expired SSL certificate or the service problems on Xbox Music and Video Stores. Microsoft could not be immediately reached for comment.

Although a number of services are luring both businesses and consumers to store data in the cloud and rely on cloud-based applications, none of the major players has been immune from outages. Amazon has sustained several outages, as has Google, supporting concerns about the reliability of remote storage.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's email address is john_ribeiro@idg.com


16.00 | 0 komentar | Read More

Microsoft's Tough Friday: Software giant battles hackers, malware, and a cloud outage

While workers at many companies were ending their work week Friday, Microsoft techs were scrambling to put out operational fires.

Late on Friday afternoon, Microsoft discovered that its worldwide Azure cloud service had gone offline when an expired security certificate prevented users from accessing the network.

Meanwhile, the company also discovered that a malware infection already discovered on internal computers at Facebook, Apple, and Twitter had crept into its in-house systems, too.

Azure fails

All encrypted traffic on Azure was disrupted when an SSL certificate expired, Microsoft explained at a company website. Unencrypted traffic was unaffected by the certificate snafu, the company added.

microsoft azure

Service was almost totally restored by Saturday morning.

While the outage caused lots of grumbling on Microsoft's online forums, contributor Brian Reischl accepted the mishap with a wry sense of humor.

"Might want to fix that, ASAP," he wrote after a "certificate expired" message appeared on his computer screen. "It also wouldn't hurt to put a sticky note on someone's monitor so they remember to update that before it expires next time.

Outages aren't new to Azure users. A year ago, the system went down. A certificate was the root cause of that outage, too. In addition, Western European users lost service due to a configuration issues in July 2012.

Malware makes inroads

Along with its Azure woes, Microsoft also discovered that some of the computer systems in its Mac business unit had been infected with malware pushed to them through a vulnerability on Oracle's Java programming language.

Similar infections have been detected at Twitter, Facebook and Apple. A common denominator of the infections is they all seem to have originated at a single developer's website, iPhoneDevSDK.com.

According to Ian Sefferman, owner of a popular iPhone developers'site, the site's systems were unaffected by the malware, which infects a visitor's computer through a "drive-by" attack.

The attack exploits a vulnerability found when running Oracle's  Java programming language in a browser.

Following the news of the Facebook and Apple exploits, both Oracle and Apple quickly moved to address the situation with security updates. Either Microsoft didn't install those updates or the infections were discovered before the updates could be installed.

Java's hot water

Java is no stranger to security holes. A critical vulnerability in Java 6 that had already begun to be exploited in the wild was plugged in 2010. Nine more critical fixes for that version of the program were released in 2011. Apple's Java fixes this week included one for Java 6, which is the last version of the program shipped from the factory with Apple computers.

When Oracle released a new version of the software, version 7, things didn't improve. Security holes began popping up in that version, too, and continue to pop up to this day.

Although the recent attacks on high tech companies follow revelations of data pilfering forays into major U.S. media outlets allegedly by Chinese byte bandits, it has been reported by Bloomberg that the attacks on the technology companies may have been perpetrated by a gang of East European hackers.


16.00 | 0 komentar | Read More

Review: Dell C1660w color printer

Written By Unknown on Jumat, 22 Februari 2013 | 16.00

The superlow $200 price (as of February 21, 2013) for the Dell C1660w makes color-laser-class printing (using laserlike LED technology) tantalizingly accessible. Its text output looks great, and the color graphics are very nice indeed. Because the toner is expensive, however, the C1660w would be a good deal only if you didn't print much (as we discovered when we compared inkjet pricing last year). The printer's modest speed and features reflect the intended, light-volume audience.

Setting up the C1660w couldn't be easier. The small footprint means it can be used virtually anywhere. USB and Wi-Fi connectivity are standard. We used the manual Wi-Fi setup, but there's support for WPS as well. A blue Wi-Fi indicator notifies you that the unit is connected wirelessly. The tiny two-line LCD display and control buttons are minimal, but effective. The software is spare, but you can surf from anywhere on your network to the printer's configuration pages to check status and see if you need more toner. There's also the full gamut of remote printing features, including printing from mobile devices and via email.

Paper handling features on the C1660w are minimal. A front panel flips out onto your work surface to make the bottom of the 150-sheet input tray; a cover piece is included. The classic, indented output bin on the top holds 100 sheets. There's no automatic two-side printing (duplexing), but there is manual support for the process in the form of dialogs telling you how to reinsert the paper. Having an open-faced paper tray makes this process significantly easier. You can easily reach most of the paper path by folding down the panel on the back of the unit. Toner cartridges are accessed via a panel on the right side of the unit.

Probably the least appealing aspect of the C1660w is its pricey toner. The unit ships with 500-page starter cartridges. The 4 cents you'll pay per black page is a little higher than the average for entry-level inkjets, and the additional 16.8 cents that adding color to the average page costs is pricey indeed. Black toner is sold in $50, 1250-page units; the 1000-page cyan, magenta, and yellow cartridges cost $56 each. There are, unfortunately, no high-capacity supplies.

Melissa Riofrio

It's a bit pricey per page with color, but the C1660w's output quality matches that of laser-class printers costing considerably more. Text is outstandingly sharp, and black areas are smooth and uniform, if a tad lighter than we'd like. Color graphics and photos look outstanding. You'd have to spend six times as much on something such as Lexmark's c748de to see a significant improvement in photo output.

You wouldn't want to wait while the C1660w prints out War and Peace, but speed is fine for light use. Black text and mixed pages of black text and monochrome graphics print at an aggregate 7.2 pages per minute (ppm) on the PC and 7.5 on the Mac. Full-page (letter-size) photos print to laser glossy paper at a swift 1.5 ppm. Smaller snapshot-sized (4- by-6-inch) photos print at 2.7 ppm to plain paper and just under 2.1 ppm to glossy laser stock.

The C1660w carries a one-year warranty. You can up that to five years for $80; exchange and on-site services are also available. The drum/fuser is a lifetime unit, and those support options are reassuring when no replacement is readily available. Dell quotes a 30,000-page duty cycle, but in real life this is about a 500-page-a-month unit. Even if the unit can handle heavier use, print more than that and the pricey toner will start catching up to you. In that case you should look for a cheaper-to-operate unit.

The Dell C1660w's expensive toner and light-duty capabilities make it best for small or home offices. Before you reach automatically for a laser, however, it's worth noting that office-minded inkjets such as the $100 Epson Workforce Pro WP-4020 offer better speed, competitive print quality, and much cheaper inks—and their multifunction cousins add more capabilities.


16.00 | 0 komentar | Read More

NBC.com hacked to serve up banking malware

Websites affiliated with U.S. broadcaster NBC were hacked for several hours on Thursday, serving up malicious software intended to steal bank account details.

On its own technology blog, NBC released a statement saying, "We've identified the problem and are working to resolve it. No user information has been compromised."

Sites such as NBC.com are a frequent target for hackers since the high volume of visitors offers a chance to infect many people in a short period of time.

Facebook and Google blocked access to NBC.com after it was found on Thursday serving up malicious software intended to steal bank account details.

Several computer security companies said the main NBC.com website had been modified to serve up an iframe, which is a way to load content into a website from another domain.

The iframe loaded an exploit kit called Redkit, which tries to see if a visitor is running unpatched software, according to a blog post from Securi, a computer security company based in Menifee, California. The style of attack is known as a drive-by download and can infect a computer when a user merely views a website.

NBC.com was temporarily blacklisted by Google after the attack. Facebook also stopped directing users to NBC.com. Securi wrote that other NBC sites, including ones for TV talk show hosts Jimmy Fallon and Jay Leno, were also affected.

The hack follows the release of a report this week from security vendor Mandiant about a long-running hacking campaign allegedly based in Shanghai that targeted U.S. corporations, although it did not immediately appear connected with the problems at NBC.com.

Another computer security firm, SurfRight, wrote on its HitmanPro blog that the NBC attack loaded exploits that look for vulnerabilities in Oracle's Java programming framework and Adobe's PDF products. Oracle and Adobe have both released critical updates for their products this month, but hackers hope to hit users who have not updated their computers.

If the attack is successful, one of two malicious software programs is delivered, called Citadel or ZeroAccess. Citadel is a trojan designed to collect account credentials for banks including Bank of America, Wells Fargo, Chase and others, according to Fox-IT, a Dutch computer forensics company.

The version of Citadel analyzed by Fox-IT showed it was being detected by only three of 46 products on VirusTotal, a website where malicious software can be tested for detection against many of the popular security suites.

According to Symantec, ZeroAccess is an advanced rootkit, or a piece of malicious software that hides at a low level in a computer's operating system. ZeroAccess, detected by Symantec in July 2011, can create its own hidden file system and download other malware to a computer.


16.00 | 0 komentar | Read More

HP reports drop in profit but says turnaround effort making progress

Hewlett-Packard reported a drop in profit for the last quarter as printer and PC sales both declined, but said cost-cutting measures the company announced last year are starting to pay off.

HP reported earnings for the first quarter of its fiscal year, ended Jan. 31, of $1.2 billion, down 16 percent from the same quarter a year earlier. Revenue fell 6 percent to $28.4 billion, the company announced Thursday.

Sales of PCs and workstations fell 8 percent to $8.2 billion, HP said, while its printer division suffered a 5 percent decline in revenue, to $5.9 billion, HP said.

HP's Enterprise Group, which sells server, storage and networking gear, saw revenue decline 4 percent to $6.98 billion, HP said. Sales of software and enterprise services also declined.

HP has now reported six quarters of declining profit and revenue, following a period of turmoil that saw two leadership changes within a year and a botched plan to spin off its PC division, a decision HP later reversed.

Under the new leadership of CEO Meg Whitman, HP announced a restructuring plan last year that includes reducing its workforce by 27,000 people. The goal is to reduce HP's costs so it can invest more in new products and expanding its business.

Those efforts have started to pay off, Whitman said in a statement Thursday. Pro forma earnings for the quarter, which exclude certain one-time charges, were $0.82 per share, down 11 percent from a year earlier but better than the $0.71 financial analysts had been expecting, according to a poll by Thomson Reuters.

"While there's still a lot of work to do to generate the kind of growth we want to see, our turnaround is starting to gain traction as a result of the actions we took in 2012 to lay the foundation for HP's future," Whitman said in the statement.

Investors applauded the news, at least initially, sending HP's shares 7 percent higher in after hours trading, to $18.31 per share. That's still off of HP's 52-week high of $27.87 a share.

HP isn't the only big computer maker suffering—Dell reported a 31 percent drop in profit earlier this week, and CEO Michael Dell is trying to take the company private to escape Wall Street's scrutiny while he rebuilds the business.

HP's results were down almost across the board. Enterprise services revenue declined 7 percent and software revenue declined 2 percent. Its hardware business was hit by a 3 percent drop in sales of industry standard servers, and a 24 percent drop in its mission critical systems business, which sells primarily high-end Itanium servers.

A bright spot was networking revenue, which climbed 4 percent, and revenue from financial services, which increased 1 percent, HP said.


16.00 | 0 komentar | Read More

Companies are desperately seeking Linux talent, report says

Written By Unknown on Kamis, 21 Februari 2013 | 16.01

Here's even more good news for IT professionals with Linux skills. Last month, we got word from IT careers site Dice that salaries in Linux jobs are going up, and on Wednesday the Linux Foundation and Dice jointly presented a report of more promising findings.

"The 2013 Linux Jobs Report shows that there is unlimited opportunity for college graduates and technology professionals who want to pursue careers in Linux," said Amanda McPherson, vice president of marketing and developer programs at the Linux Foundation.

The report includes fresh data collected last month from 850 hiring managers and 2600 Linux professionals. The infographic below presents an overview, but here's a quick breakdown of some of the key findings.

1. Even more hiring plans

Whereas last year's report found that a full 89 percent of hiring managers were planning to hire a Linux professional in the next six months, this year's data looked even better for Linux pros. Specifically, 93 percent of hiring managers now say they hope to hire a Linux professional in the next six months, according to this year's report.

2. An elusive skill set

The 2013 Linux Jobs Report (Click image for full view.)

Perhaps even more telling than hiring managers' plans is how difficult they say it is to fulfill them. Nine out of 10 such managers now say that finding Linux talent is difficult, compared with eight out of 10 last year.

3. Recruiters are on the hunt

A full 75 percent of Linux professionals responding to this year's survey said they have received at least one call from a recruiter in the last six months. "These professionals are being pursued by employers offering above average salaries and bonuses," notes the Linux Foundation, citing Dice's recent salary survey.

4. Sysadmins top the list

Last but certainly not least, the 2013 Linux Jobs Report found that systems administrators are the most sought-after Linux professionals—a trend it attributes to the growth of Linux in the enterprise for cloud computing and big data. Also high on the list were developers and DevOps pros.

"The improvement in hiring intent from last year's sky high levels shows that Linux professionals are in a job market of their own," concluded Alice Hill, managing director of Dice.com and president of Dice Labs. "For Linux professionals, the trend is your friend—make sure you are taking advantage of this market's career opportunities."

You can download the report from the Linux Foundation site or from Dice.com.

Top image credit: bgottsab on Flickr


16.01 | 0 komentar | Read More

NASA rover Curiosity grabs first Martian rock sample

Skip the navigation

Computerworld
  • White Papers
  • Webcasts
  • Newsletters
  • Solution Centers

    • BlackBerry: Build up your BlackBerry® 10 knowledge
    • BMC Control-M Workload Automation
    • View all Solution Centers
  • Events
  • Magazine

    • Latest Issue
    • Magazine Index
    • Subscribe
    • Subscriber Services
  • Twitter
  • Facebook
  • Google+
  • LinkedIn
  • RSS
  • Topics
    • Applications
    • Cloud Computing
    • Consumerization of IT
    • Data Center
    • Data Storage
    • Government/Industries
    • Hardware
    • Internet
    • Management
    • Mobile/Wireless
    • Networking
    • Operating Systems
    • Security
    • All Topics
  • News
  • In Depth
  • Reviews
  • Blogs
    • Featured Blogs
    • IT Blogwatch
    • Jonny Evans
    • JR Raphael
    • Michael Horowitz
    • Preston Gralla
    • Richi Jennings
    • Robert L. Mitchell
    • Shark Tank
    • All Bloggers
  • Opinion
  • Shark Tank
  • IT Jobs
  • More

    • Enterprise IT
    • Hot Topics
    • IDGE CEO Interviews
    • Insider Articles
    • QuickPoll Center
    • Slideshows
    • Video
  • IT Verticals

    • Financial IT
    • Government IT
    • Healthcare IT
Applications
  • App Development|
  • Big Data|
  • Business Intelligence/Analytics|
  • Content/Document Management|
  • CRM|
  • Databases|
  • Desktop Apps|
  • Emerging Technologies|
  • Enterprise Architecture|
  • ERP|
  • Open Source|
  • Regulatory Compliance|
  • Social Business|
  • Unified Communications

16.00 | 0 komentar | Read More

FCC makes a move to lessen Wi-Fi congestion

The U.S. Federal Communications Commission has taken the first step toward an expansion of the spectrum available for Wi-Fi, with the agency launching a rulemaking proceeding to open new parts of the 5GHz spectrum to unlicensed uses.

The new spectrum could reduce congestion at Wi-Fi hotspots and allow speeds of up to 1 GBps, the FCC said. The FCC did not give a target date for the spectrum to be available for Wi-Fi.

With many mobile phone users off-loading data-intensive tasks to Wi-Fi, U.S Wi-Fi spectrum is getting crowded, particularly in heavily populated areas, commissioners said. Mobile users are now off-loading about 33 percent of traffic onto Wi-Fi networks, with that percentage expected to grow significantly, said FCC Chairman Julius Genachowski.

The commission voted Wednesday to approve a notice of proposed rulemaking, or NPRM, to look at ways to use 195MHz of the 5GHz spectrum, now occupied by government agencies and other users, for unlicensed Wi-Fi services. The 195MHz would represent a 35 percent increase in the amount of U.S. 5GHz spectrum available for unlicensed devices.

The FCC, in an NPRM, proposes rules and asks for public comment.

Wi-Fi congestion

"Wi-Fi congestion is a very real and growing problem," Genachowski said. "Like licensed spectrum, demand for unlicensed spectrum threatens to outpace supply."

Demand for Wi-Fi spectrum will continue to grow "because it's increasingly common in homes to have multiple data-hungry devices," Genachowski added.

The U.S. now allows unlicensed devices to operate in parts of the 2.4GHz band and other parts of the 5GHz band.

Unlicensed devices now operate in 555 megahertz of spectrum in the 5GHz band, and are used for short-range, high-speed wireless connections including Wi-Fi-enabled local area networks and fixed outdoor broadband transceivers used by wireless Internet service providers to connect smartphones, tablets and laptops to the broadband network.

AT&T called the FCC's Wi-Fi NPRM a "step in the right direction." However, the agency's priority should be to clear and auction spectrum below 3GHz for licensed, commercial use, a spokeswoman said.

"Freeing up spectrum for unlicensed uses can also play an important role in more fully utilizing spectrum that is not ideal for mobile broadband use," she added. "We fully support efforts to explore new unlicensed technologies that can play an important role in driving incremental network efficiency."

Rules for mobile-phone signal boosters

In addition to the Wi-Fi action, the FCC voted to approve an order that sets the rules for mobile-phone signal boosters. Since 2007, some mobile carriers had raised concerns that some signal boosters cause interference to their networks and to public safety communications.

Mobile customers have purchased "literally millions" of signal boosters to improve signals and coverage, Commissioner Ajit Pai said. "It's too late for us to put the genie back in the bottle," he said.

The new rules allow carriers to veto the use of some signal boosters, raising the concern of some digital rights groups.

Pai called on carriers to act in a "consumer-friendly manner." Some carriers may give blanket consent to all signal boosters that comply with FCC rules, and others may issue approvals for each model, he said.

An example of a mobile-phone signal booster

The rules will require booster buyers to register the devices before deploying them, but carriers shouldn't require buyers to get individual approval to set up a signal booster, Pai added. "Such a process would be inefficient for carriers and unnecessarily burdensome for consumers," he said.

The FCC order also sets up rules for industrial signal boosters designed to cover large areas such as stadiums, airports and tunnels.

Industrial signal boosters will continue to fall under the existing authorization process, and must be installed and operated in coordination with licensees.

Wilson Electronics, a manufacturer of signal boosters, applauded the FCC rules.

The rules will "eliminate poorly designed products that currently plague the market, and have been a source of cell site interference," Joe Banos, Wilson's chief operating officer, said in a statement. "Today's outcome is a major victory not only for our industry, but also for the end users who benefit from added levels of safety, security and satisfaction with their service through the use of signal boosters."


16.00 | 0 komentar | Read More

Google retail stores might be a smart move, analysts say

Written By Unknown on Senin, 18 Februari 2013 | 16.00

Opening its own brick-and-mortar retail stores could help Google sell more of its Chromebooks, Nexus tablets, and other hardware, analysts said, reacting to online reports that Google may soon be coming to the local shopping mall.

Google is in the process of building its own retail stores and hopes to have the first stores open in time for the holidays in major U.S. metropolitan areas, according to a report Friday in 9to5Google, which cited an unnamed, "extremely reliable" source.

"Google feels right now that many potential customers need to get hands-on experience with its products before they are willing to purchase," the website reported.

Raising product profile

Google's Android is already the dominant mobile operating system for smartphones, but the company is trying to make greater inroads with its laptop computers, known as Chromebooks, and its Nexus tablets.

The company is also developing Google Glass, a head-mounted augmented reality system that people would wear to give them real-time information throughout the day. And Google now owns Motorola's handset business.

Online, Google's products are currently sold through its Play digital storefront and through Amazon and some other retailers. Some products can also be bought in pop-up or smaller stores within Best Buy and Staples.

Logical step

But having its own retail stores could increase consumer awareness around its growing line of physical products and potentially increase sales, analysts say.

"I wouldn't put it past Google to do this," said Ben Bajarin, principal analyst with Silicon Valley-based Creative Strategies.

Samsung Chromebook and Chromebox

Regardless of whether the products are actually bought in the store, the strategy could help demonstrate their value, he said. Google's mobile devices are not pushed in physical stores like Best Buy as effectively as they should be, he said. "The stores' sales teams push different products different weeks," he said.

"Google does not have as many products as Apple, but it has enough to justify a physical retail presence," agreed Greg Sterling, senior analyst with Opus Research.

Even if consumers don't buy the product on the spot, they could get a better feel for it in a physical store staffed by Google employees than they could by reading about it online, Sterling said, especially for a cutting-edge product like Glass.

But Google will have to think carefully about its approach. After all, Gateway went the retail route to sell its personal computers and accessories, "but that largely failed," Sterling noted.

Zach Miners covers social networking, search and general technology news for IDG News Service. Follow Zach on Twitter at @zachminers. Zach's email address is zach_miners@idg.com


16.00 | 0 komentar | Read More

Microsoft reopens 128GB Surface Pro online orders

Skip the navigation

Computerworld
  • White Papers
  • Webcasts
  • Newsletters
  • Solution Centers

    • BlackBerry: Build up your BlackBerry® 10 knowledge
    • BMC Control-M Workload Automation
    • View all Solution Centers
  • Events
  • Magazine

    • Latest Issue
    • Magazine Index
    • Subscribe
    • Subscriber Services
  • Twitter
  • Facebook
  • Google+
  • LinkedIn
  • RSS
  • Topics
    • Applications
    • Cloud Computing
    • Consumerization of IT
    • Data Center
    • Data Storage
    • Government/Industries
    • Hardware
    • Internet
    • Management
    • Mobile/Wireless
    • Networking
    • Operating Systems
    • Security
    • All Topics
  • News
  • In Depth
  • Reviews
  • Blogs
    • Featured Blogs
    • IT Blogwatch
    • Jonny Evans
    • JR Raphael
    • Michael Horowitz
    • Preston Gralla
    • Richi Jennings
    • Robert L. Mitchell
    • Shark Tank
    • All Bloggers
  • Opinion
  • Shark Tank
  • IT Jobs
  • More

    • Enterprise IT
    • Hot Topics
    • IDGE CEO Interviews
    • Insider Articles
    • QuickPoll Center
    • Slideshows
    • Video
  • IT Verticals

    • Financial IT
    • Government IT
    • Healthcare IT
Mobile/ Wireless
  • Android|
  • iOS|
  • Laptops|
  • Mobile Apps|
  • Mobile Device Management|
  • Mobile Payments|
  • Netbooks|
  • Smartphones|
  • Tablets|
  • Ultrabooks|
  • Windows Phone|
  • Wireless Carriers

16.00 | 0 komentar | Read More

PC epicenter shifts to Asia as Dell, HP and others regroup

Asia is fast becoming the epicenter of the PC market as Chinese and Taiwanese companies challenge the turf occupied for more than a decade by prominent U.S. PC makers Hewlett-Packard and Dell, whose laptop and desktop shipments are stumbling.

Lenovo, Asus, and Samsung are increasing PC shipments at the expense of U.S. companies even as the demand for laptops and desktops slows. Asian companies have taken advantage of low-cost manufacturing capabilities as well as proximity to the component supply chain and burgeoning markets like China to grow faster than their U.S. counterparts, industry observers said.

Sales still short

Demand for PCs has dropped with the emergence of tablets and smartphones, lack of innovation and flagging economies. The PC business at HP and Dell—in first and third place, respectively, for global PC shipments—are struggling as the companies focus on high-margin enterprise offerings. This puts Asian firms, which are developing innovative consumer products, in a better position to lead the volume PC market.

IDC is projecting annual worldwide PC shipment growth of just 2.8 percent year-over-year for 2013, and single-digit growth once again in 2014. This comes after a rough 2012 in which PC shipments fell by 3.2 percent compared to 2011. PC shipments fell for HP and Dell, which were hurt by the weak economies in the U.S. and Europe. Lenovo, Asus, and Samsung bucked the trend by increasing worldwide PC shipments last year, even in the U.S. market.

Meanwhile, there are questions about the future of HP and Dell in the PC business as they try to morph into mini-IBMs with a growing enterprise product portfolio, said Jay Chou, senior research analyst at IDC. The uncertainty could cause HP and Dell customers to move to Lenovo and Asus, who are committed to consumers and PCs, Chou said.

HP in 2011 mulled getting rid of its PC business, and Lenovo is inching closer to become the world's top PC maker. Dell is already de-emphasizing the PC business, and last week announced it would go private, leaving customers with questions about the company's continued interest in desktops and laptops.

Asian vendors climb

In the fourth quarter of 2012, three of the top ten PC makers—HP, Dell, and Apple—were based in the U.S., while the rest had headquarters in China, Taiwan, Korea, and Japan. In the fourth quarter a decade ago, the top three PC makers were HP, Dell, and IBM, but since then the industry has contracted with Taiwanese and Chinese companies involved in key transactions. Lenovo acquired IBM's PC business in 2004, and also Japan-based NEC, which was one of the top five PC vendors in 2002. Acer bought out U.S. vendor Gateway and European vendor Packard Bell. Asus, which made PCs for companies like HP in the past, spun off its assembly business into a firm called Pegatron, and created its own brand of PCs.

There's a big difference between the enterprise and consumer sectors with respect to products and business models, said John Ciacchella, principal at Deloitte Consulting.

To play in the consumer market, where companies like Lenovo are strong, manufacturers need to move volumes of product, while they need to offer services and value to appeal to enterprises, Ciacchella said.

"Lenovo has played economies of scale, they've globalized. They've played the market better than an HP or Dell has," Ciacchella said.

Lenovo also has the natural advantage of proximity to their suppliers as well as to growing markets. Taiwan, Korea, Japan and China are hubs for PC assembly and manufacturing of components like memory, motherboards.

"In the case of Lenovo they've got an indigenous market that's huge," Ciacchella said. "It's still nowhere near saturation."

Consumer focus

Asian PC makers, especially Lenovo and Asus, are aggressively investing in the consumer market, either through acquisitions or through research and development, said Tracy Tsai, an analyst at Gartner.

Microsoft Surface Pro

The Asian companies are devoted to creating a variety of consumer-oriented product lines, including tablets and smartphones, Tsai said. HP and Dell were slow in adapting to the mobile device business, and research and development is focused more on enterprise products for the long term, instead of consumer products that fulfill short-term demand.

Innovations from U.S. PC makers IBM, HP, Compaq, Apple, and Dell drove early PC growth. But PCs have become commodity products and the level of innovation in laptops and desktops has not matched that of tablets. Innovation in PCs is now primarily being driven by chip maker Intel, which hopes to fuel the market with ultrabooks, a new category of thin-and-light laptops with tablet features.

But expensive ultrabooks and a weak user response to Windows 8 have failed to boost the PC market. Microsoft has developed Surface tablets, which the software maker intends to be a starting point for PC makers to develop a new generation of Windows PCs. Early reception to the device, however, raises questions about its future success.

One big exception to the general trend in the U.S. is Apple, which created the tablet market and has committed customers willing to pay a premium for Macs. Apple is bringing back manufacturing jobs to the U.S. In addition, Lenovo will start making tablets and computers in the U.S. There are also some exceptions to the generally positive trend in Asia—Japanese PC vendors like Sony and Fujitsu continue to struggle, while Taiwanese PC maker Acer is floundering after putting too much stock on netbooks and not anticipating the arrival of tablets.

Manufacturing challenge

But it's hard to compete with Asian PC makers on margins, said Kelt Reeves, CEO of Falcon Northwest, which makes laptops and desktops for a specialized audience including gamers.

Mass-market products from Asia are cheaper and with numerous factories available to enable low-cost manufacturing and assembly, Asian companies can make low-margin PCs better than anyone else, Reeves said.

Falcon Northwest's desktops and laptops use high-end components and are typically priced at thousands of U.S. dollars. The company sources motherboards from Asus at a price of US$200 to $400, and gets specialized chassis from Taiwan. The company prefers PC assembly and customer support in the U.S.

"We prefer it U.S.-based, but that keeps the cost a little higher," Reeves said.

Dell Inspiron 15R 5520

Analysts noted that HP and Dell won't leave the PC market in the short term and will continue to drive revenue and volumes of shipments. But the companies are dependent on Taiwanese manufacturers like Pegatron, Compal, Wistron to build and design products, which indicates that the PC epicenter in some ways has already moved to Asia.

Asia is more competitive at making commodity PCs, but the U.S. is skilled in manufacturing high-end technologies llike microprocessors, said Deloitte's Ciacchella.

In addition, the U.S. could have a fighting chance to retain some PC competency if it becomes increasingly cost-competitive to do business in some parts of the country as companies like Apple and Lenovo bring PC and tablet manufacturing jobs to the country.

A lot of the competitiveness in the U.S. may also depend on Dell retaining its PC unit under the proposed private ownership, which will allow it to execute on its product strategy without having to show the sort of steady quarter to quarter rise in profit that Wall Street demands.

"It's going to be an interesting situation to monitor," Ciacchella said.

Agam Shah covers PCs, tablets, servers, chips and semiconductors for IDG News Service. Follow Agam on Twitter at @agamsh. Agam's e-mail address is agam_shah@idg.com Michael Kan of the IDG News Service in Beijing contributed to the story.


16.00 | 0 komentar | Read More

Reddit will accept bitcoin payment for premium service

Written By Unknown on Minggu, 17 Februari 2013 | 16.00

The popular social-news site Reddit said it will now accept bitcoins, following blogging platform WordPress in embracing the four-year-old virtual currency.

bitcoin logo

Reddit, which lets users submit and vote on popular Web content, already uses PayPal and Google Wallet for its "Gold" service, which gives users a range of editing tools and an option to turn off advertisements. The Gold service costs US$3.99 a month or $29.99 a year.

Accepting bitcoin will allow the site to take payments from anywhere in the world, according to Reddit's blog.

Bitcoin is a virtual currency that can be purchased through exchanges for government-issued currency. Transactions are verified by a peer-to-peer system, and payments can be sent anywhere in the world for a low fee or in some cases no fee within about an hour. On Friday, one bitcoin cost about US$27, according to Mt.Gox, a Japan-based exchange.

The virtual currency is looking increasingly attractive to online merchants, who run the risk of incurring a "chargeback" by banks if someone fraudulently makes a purchase with someone else's credit card details. Due to its cryptographic verification system, bitcoins cannot be fraudulently spent, which relieves merchants of chargeback worries.

Reddit also accepts credit card payments, but only from the U.S. and Canada, although the site said it hopes to accept credit card payments from more countries within a week.

It said it will use Coinbase as its payment processor. Coinbase, based in Beaverton, Oregon, is one of many businesses specializing in services for merchants who want to use bitcoin.

WordPress announced in November that it would accept bitcoins, opening up some of the blogging platform's paid-for features to people in countries not supported by credit card companies and PayPal.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


16.00 | 0 komentar | Read More

Intel shifts gears on Itanium, raising questions about the server chip's future

Intel has scaled back plans for the next version of Itanium in a move that raises questions about the future of the 64-bit server chip, used primarily in Hewlett-Packard's high-end Integrity servers.

In a short notice posted quietly to its website on January 31, Intel said the next version of Itanium, codenamed Kittson, will be produced on a 32 nanometer manufacturing process, like the current version of Itanium, instead of on a more advanced process, as it had previously planned.

Intel has also shelved a plan announced only a few months ago to make Kittson socket-compatible with its Xeon server chips, which would have reduced costs for both Intel and HP, the main seller of Itanium systems. Kittson will now plug into the same socket as the existing Itanium 9300 and 9500 chips, Intel said.

"The modular development model, which converges on a common Intel Xeon/Intel Itanium socket and motherboard, will be evaluated for future implementation opportunities," Intel said.

The revised plans paint a bleak picture for Itanium, according to some observers. "It could easily be that this is their way of cutting it back and having essentially an exit strategy," said industry analyst Nathan Brookwood of Insight64.

"It may very well be that Itanium's time has come and gone," he said.

Gartner analyst Martin Reynolds said there may yet be a new manufacturing process, or "shrink," for Itanium, if demand improves sufficiently to make the investment worthwhile. But he doesn't expect any more major updates to the chip's microarchitecture. "I think after this we're talking about shrinks," he said.

Early hiccups

Intel launched Itanium in 2001 with the hope that it would eventually unseat the RISC chips used in Unix servers, but sales have never come close to the volumes it expected. Early versions of Itanium underperformed, and Advanced Micro Devices outsmarted Intel by adding 64-bit extensions to its x86 server processors, a strategy Intel eventually mimicked.

Still, HP and Intel have long insisted they are committed to Itanium, a sentiment they reiterated this week. HP killed off its own PA-RISC chip early on in favor of Itanium, and has far more riding on the design than other server vendors. HP has acknowledged paying Intel millions of dollars to fund Itanium's continued development.

During that time, the writing for Itanium seemed to be on the wall. With shipments relatively low, vendors including Red Hat, Microsoft and Oracle stopped developing new software for the chip. Oracle has been forced to resume its development for Itanium, after HP filed a breach of contract lawsuit, but not before some customers backed off.

"When Oracle said no more software for Itanium, that spooked a lot of customers," Reynolds said.

It's unclear what prompted Intel and HP to revise their Itanium plans suddenly, but one possibility is that customers got skittish about Oracle's retreat and told HP they planned to leave the platform, prompting Intel and HP to reconsider their plans.

"Clearly, database software is a crucial element in this kind of high-end system, and it's far easier for an end user to change the underlying hardware platform than it is for them to change the underlying database platform," Brookwood said.

HP's revenue from Business Critical Systems, which includes its Itanium servers, dropped 23 percent in 2012 compared to the previous year. In December, IDC forecast that Itanium server shipments would remain roughly flat through 2016, at around 26,000 systems a year -- less than half the volume sold in 2008.

HP has been laying a path to help customers transition from Itanium to Xeon processors if they so wish. It is developing an Integrity Superdome server codenamed Dragon Hawk that will let customers use Itanium and Xeon server blades in the same chassis.

HP and Intel have also taken steps to reduce their Itanium development costs, by allowing Itanium to use the same chipsets and other external components as the Xeon. In November they said that would go further, allowing Itanium and Xeon to use the same motherboard and some "silicon-level" components.

That would have reduced costs further in the longer term, making continued Itanium development more viable. But the companies will no longer make that investment, at least for now. Sticking with the same manufacturing process will also save them some money. "Pulling the plug on 22-nanometer certainly reduces their R&D expense a whole lot," Brookwood said.

Revised roadmap

An Intel spokesperson said a combination of factors led to the changes, including declines in the overall Unix systems market, of which HP-UX is a part. The revised roadmap also "answers certain requirements of our customers," the spokesman said, though he declined to elaborate. HP is by far Intel's biggest customer for Itanium.

HP declined to discuss the matter but said in a statement that it remains committed to its Integrity products, including a new line of Kittson-based systems.

"The recent statement by Intel has no impact on those plans or on HP's ongoing commitment to our mission-critical customers," HP said. A spokesman confirmed that HP continues to develop Dragon Hawk, the system that will accommodate both Xeon and Itanium blades. HP may now feel compelled to accelerate development of that system, Brookwood said.

Intel painted the decision as a positive one for customers. Because Kittson will now be socket-compatible with current Itanium chips, upgrading existing systems will be much easier.

But it's unclear what the cost will be in performance. The latest Itanium chip released in November, known as Poulson, included significant architectural changes, and Kittson was expected to benefit primarily from the new manufacturing process, which produces faster, more energy-efficient transistors.

Intel won't discuss details of Kittson, noting it isn't due for release for two to three years. "It's going to be better, obviously, but we haven't discussed how much better," the Intel spokesman said. Manufacturing improvements can be made, even within the context of the current process, he said.

Brookwood said Intel and HP could go on tweaking Kittson's architecture for years, giving customers a stream of minor improvements. But he was disappointed to see both the process shrink and the Xeon socket compatibility being shelved.

"This clearly suggests some backing off," he said.

James Niccolai covers data centers and general technology news for IDG News Service. Follow James on Twitter at @jniccolai. James's e-mail address is james_niccolai@idg.com


16.00 | 0 komentar | Read More

Crash-proof computer tactic revealed by UK researchers

For a PC user, nothing chills the heart like the "Blue Screen of Death" in Windows. It means the computer has crashed.

Although crashes are as old as computers, some UK researchers may be taking the first steps toward sending blue screens to the same graveyard where 5.25-inch floppy disks are buried.

The boffins at University College in London (UCL) have made something they're calling a "systemic computer" that they say taps into the chaos found in nature to enable a computer to heal itself.

A chief cause of computer crashes, according to the researchers, is the way computers process the instructions in the programs they run. They do that sequentially, a step at a time. Disturb that sequence, and the computer jumps the track and crashes.

That's not how nature works. "Its processes are distributed, decentralized and probabilistic," a computer scientist working on the research, Peter Bentley, told New Scientist.

Nature is also fault tolerant, which is why biological systems can heal themselves, he added.

Fault tolerance, of course, is nothing new to computing. Servers have had it for years. simulate the activity of neurons in the human brain.

Unfortunately, the crash-proof computer being developed by the researchers won't be something rank-and-file computer users will see any time. The clue is in their assessment of the practical applications of the research: it could allow drones to reprogram themselves to cope with combat damage.


16.00 | 0 komentar | Read More

Infographic: The top 10 productivity-killers (and how to beat them)

Written By Unknown on Sabtu, 16 Februari 2013 | 16.00

Time is on your side, at least according to Mick Jagger. (Think: song lyric.) But it rarely seems that way when you get to the end of the day and realize you didn't have nearly enough of it. Where on earth does the time go?

To find out, OfficeTime conducted a survey of "over 600 small business owners, freelancers and professionals." The resulting infographic (see below) lists "The Top 10 Time Killers (and how to fight back!)".

Number one? You guessed it: email. Thirty-three percent of survey respondents spend 1-2 hours per day dealing with email, while 22 percent spend more than two hours. In an eight-hour day, that's a full fifth of your time devoted solely to your inbox.

Next up? You guessed it again: the Web. Fully 80 percent of those surveyed admitted to spending at least two hours per day surfing the Internet. Granted, some or all of that might have been work-related, but there's no denying the distracting siren song of Facebook, YouTube, Amazon, and other non-work destinations.

Other big time-wasters include meetings, commuting, non-work-related conversations, and watching TV (what?!).

The infographic also reveals the three different types of procrastinator and offers tips on dealing with your particular motives. And from there it explains how to combat all these time-killers—primarily by keeping close track of your time (which just happens to be OfficeTime's business—convenient!).

Eh, there's probably a bit more to it than that. For example, you can boost your productivity by blocking distracting sites. And learn to block out common tech distractions. Heck, I think you can make your mornings more productive just by steering clear of email.

What do you think? Are these time killers familiar in your office? If so, what methods have you found for dealing with them?


16.00 | 0 komentar | Read More

Review: Baldur's Gate Enhanced Edition serves up the classic RPG better, and worse, than you remember

Bioware made it big riding on the back of Baldur's Gate, and its success became the basis for add-ons, sequels and spin-offs that established Ray Muzyka and Greg Zeschuk as legends in the gaming industry. A mix of undiluted 2nd edition D&D rules along with party combat dynamics, well-paced leveling and a strong, character-driven narrative produced an experience so satisfying, its remains a benchmark other RPGs are measured against. Overhaul Games, fresh off the slick remake of MDK2 HD, aimed its sights considerably higher in the Bioware back catalog and produced a long-requested and highly anticipated update to this crown jewel of gaming. Baldur's Gate Enhanced Edition ($20, buy-only) introduces official native high-resolution visuals, new story content, multiplayer support and a gladiator-style combat mode for quick action. It delivers on these promises, but like most translations, something of the original spark is lost in the process.

1) Character creation is a step down memory lane with D&D 2nd edition rules used throughout.

Overhaul Games, who started out life as a division of online game distributer Beamdog, petitioned Bioware for over a year before being given access to the sacred Infinity Engine source code, the lifeblood from which Baldur's Gate, Icewind Dale and Planescape flowed. What followed were hundreds of bugs fixes and improvements as the engine was refitted for modern OS and hardware environments along with visual upgrades to the artwork and interface graphics.

The technical improvements are largely successful. The game runs in crisp high resolution without lag and supports widescreen monitors natively, feats the original game can only perform with substantial end-user modification. Engine improvements from later games in the series, such as Shadows of Amn, have been retroactively fitted so additional class kits and subraces are available to round out character creation. The experience cap has also been raised, giving a little headroom for point gobbling multiclass builds.

Combat is a mix of RTS mob management and RPG clickfest.

Gameplay is largely the same, with characters arrayed on the right side of the screen, mode selections to the left, and actions across the bottom. Control is more like an RTS game than a traditional action RPG, focusing on mob attacks using a pause-go command flow to issue orders to your party or relying on AI. Quick slots let you pick preferred weapons or items via function keys and despite its age, the ergonomics of the layout are easy to appreciate. In some ways, they surpass the radial menu paradigm Bioware used for the subsequent Neverwinter Nights series.

Stylistic changes are less on target, however. The redone, 2D overlay cinematics are obviously derived from vastly improved content creation software, but this doesn't render them any more effective than the sparse originals. The rudimentary 3D animation featured in the 1998 version seems more authentic and fits the rest of the game's art style more closely, even to modern eyes.

3) Baldur's Gate leaves plenty of backstory lying around. Be prepared to read.

Content updates are hit and miss. Some new material is welcome, such as the gladiator mode that allows you to level up, try out different combat strategies, and generally master Infinity Engine combat outside of plot-affecting encounters. New side quests are less polished, however, with dialog and creative aspects that don't hold a candle to the original storyline.

Nevertheless, the game remains supremely entertaining and a nice package for the $20 asking price. With more updates planned, remakes of the rest of the Infinity Engine based series in the works and an eventual plan to create Baldur's Gate III, the people at Overhaul deserve a little love and attention. If springing for the PC version irks you because the original, complete with mods, graces your hard disk, consider the iOS or upcoming Android version.

Note: The Download button on the Product Information page takes you to the vendor's site, where you can download the latest version of the software.


16.00 | 0 komentar | Read More

Facebook targeted by hackers, says no user data compromised

Facebook said Friday it had been the target of a sophisticated hacking attack but that it had no evidence any user data had been compromised.

The attack comes two weeks after Twitter asked 250,000 of its users to reset their passwords after it too was hacked. In the same week, The New York Times and The Wall Street Journal also reported being hacked.

Facebook said its systems were targeted last month when a handful of employees visited a mobile developer website that had been compromised. The website allowed malicious code to be installed on the employees' laptops, Facebook said in a blog post. It said the laptops were fully patched and running up-to-date antivirus software.

"As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcement, and began a significant investigation that continues to this day," Facebook said.

The company said it had no evidence that any user data was compromised. It did not say where it thinks the attack originated or who may have conducted it, and a spokesman reached via email said the company had no further comment at this time.

The attack was identified when Facebook's security team spotted a suspicious domain in the company's corporate DNS logs and tracked it back to an employee laptop. After a malicious file was found on that laptop, the search was expanded companywide and several other compromised employee laptops were flagged, Facebook said.

"After analyzing the compromised website where the attack originated, we found it was using a 'zero-day' (previously unseen) exploit to bypass the Java sandbox (built-in protections) to install the malware," Facebook said.

It said it immediately reported the exploit to Oracle, which provided a patch on Feb. 1 to address the vulnerability.

The attack was not limited to Facebook. "It is clear that others were attacked and infiltrated recently as well," it said. As one of the first companies targeted by the malware, it said it "immediately took steps to start sharing details about the infiltration with the other companies and entities that were affected."

Oracle's Java technology has come under fire recently over security. It patched some critical vulnerabilities in the platform in mid-January, but still the U.S. Computer Emergency Readiness Team (US-CERT) urged users to disable browser plug-ins that use Java.

Oracle released another patch at the start of February, but did not mention at the time that the vulnerability had been used to target Facebook. Last week it said it would release yet more patches on Feb. 19.


16.00 | 0 komentar | Read More

T-Mobile exec: 4G LTE-launch timing is 'perfect'

Written By Unknown on Kamis, 14 Februari 2013 | 16.01

White Papers
Webcasts
Solution Centers
  • BlackBerry: Build up your BlackBerry® 10 knowledge
  • Dell: Welcome to Dell AppAssure
  • HP + Microsoft Data Management Appliances & Architectures
  • Oracle-Endeca Executive Toolkit: Bringing Agility to Your BI Environment
  • Riverbed Accelerate Your Network with WAN Optimization
  • Symantec Archiving Solutions for Microsoft Exchange Server
  • View all Solution Centers
IT Jobs
CIO Executive Council
Events
Magazine
  • Archive
  • Subscribe
  • Subscriber Services
Newsletters
RSS
Google PlusFacebookLinkedinTwitter
NEWS
ANALYSIS
BLOGS
SLIDESHOWS
VIDEOS
HOW TO

DRILLDOWNS

Applications
Big Data
BYOD
Careers
Cloud
Consumer Tech
Mobile
Operating Systems
Outsourcing
Security
Social Media

All topics

DRILLDOWNS

All topics

Technology

  • Applications
  • Architecture
  • Cloud Computing
  • Data Center
  • Developer
  • Hardware
  • Internet
  • Mobile
  • Network
  • Open Source
  • Operating Systems
  • Security
  • Social Media
  • Storage
  • Virtualization

Business / Management

  • Careers
  • Consumerization of IT
  • Financial Results
  • Industry Verticals
  • IT Organization
  • Investments
  • Leadership/Management
  • Legal
  • Mergers/Acquisitions
  • Outsourcing
  • Project Management
  • Risk Management
  • Supply Chain Management
  • Var/Reseller
  • Venture Capital

16.01 | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger