Your Ad Here

25 September 2009

Looking for more Linux and open source apps in your life

Last week extravaganza Technology Association Annual Wireless, CTIA in Las Vegas, home of the top manufacturers of gadgets shared their latest and best products in the mobility.

While the child has recently anointed poster for Open Mobile Devices, Google Android, was virtually nowhere to be found on the show, the event will feature wall exhibition of more than 1,200 companies wall. And here and there, you can find pockets of two devices, you run applications or open source or Linux open-vendor environments Souce courting developers. We might also consider some of the highlights:

Palm ago

Palm agoPalm Pre-party software creates a lot of buzz and a lot of excitement with their legacy emulator. Some of the included software is not yet proven Fandango movie ticket and app, SprintTV and Google Maps. Pandora Internet Radio "is a blessing to every music lover. A fast launcher is located in each front of the screen to reveal the young players without interrupting the current task. Another, Nascar, took a strong season as a NASCAR videos, alloy wheels, profiles and rankings, and much more.

Perhaps the most interesting for owners of older Palm software running cost is webOS OS Garnet in emulation software. It runs as a separate application and allows drag and drop installation / usage. Palm provides a key for a simple upgrade to the latest pre snazzier.

The Pre Palm announced earlier this year at CES, the characteristics of a Linux-based webOS, 3.1-inch multi-touch screen of 320 × 480 pixel resolution and a QWERTY keyboard. It is equipped with Wi-Fi, Bluetooth, GPS, 8 GB and a 3-megapixel camera.

Wistron Pursebook

Wistron PursebookWistron presented their proof of concept Pursebook running the Qualcomm Snapdragon processor. This cute little netbook is running a customized version of Linux with fat ThunderSoft software for office tasks, communication and web-indulgence.

Yes, this paragraph is not the words "Pursebook" Snapdragon "and" Thundersoft. "You're welcome.

Observer status of the keyboard is the first generation instead chiclet-style keyboard used in some models of the current netbook, but overall the unit was easy to use. Others said it has enough energy, enough graphics are very nice, and 8 hours battery life. Prices should start at 299 USD and should be available this year.

NVIDIA Tegra

NVIDIA TegraNVIDIA on the hand, all show-in-one Tegra chip for mobile devices. Tegra, an ARM-based components that are 1080p video output and capable of showing up to 1680 x 1050th It will also be able to IDE drives.

NVIDIA has equipped an HP Mini 1000 cases with a computer-on-a-chip system, used to demonstrate the potential of the Tegra. Its prototype with Windows CE, but NVIDIA also has its own interface, which has been described as something between Android and Mac OS X appearance. Tegra can also support Windows Mobile and Android, and while there was no mention of Linux in particular, a spokeswoman said Tegra technology is very flexible and can easily be used with other platforms. NVIDIA hopes to bring the new chipset market sometime this year at a reasonable price to $ 99 machines.

Nokia E71x


Nokia E71xAnother small smartphone that has created some interest was the AT & T exclusive Nokia E71x. Like the Nokia E71 is the E71x a very light weight of just 4.5 grams and comes with a 320 x 240 QVGA display, full QWERTY keyboard, 8GB of storage and broadband 3G connectivity, Wi-Fi, Bluetooth, GPS and a 3.2-megapixel camera. Mark Louison, President, Nokia Inc., said: "The Frugal E71x a multimedia computer for a lot of people are employed, the Internet-on-the-go capabilities in the palm of the hand like."

This thin Nokia comes with an upgrade to Symbian S60 Feature Pack 2 (which apps a "mobile flaunt option in all applications has) and some services from AT & T AT & T Music, AT & T Mail and AT & T Navigator . He even has support for Quickoffice. The best is probably the new reduced price of $ 100 after rebate. Should be AT & T Nokia E71x be available in the coming weeks.



Samsung Mondi

Samsung MondiSamsung Telecommunications has to compete the first mobile Internet device, this year presented with the netbook form factor. The main features include WiMAX, Wi-Fi and Bluetooth. Its touch screen is 4.3 inches with a QWERTY keyboard and optical mouse. It comes with 4 GB of storage, a 3-megapixel camera, TV out and HDMI.

The Mondi with Opera 9.5 for Internet access. The device should have not been announced this summer are available, although the price ranges.

Speaking of opera, they were on site and the transfer of your current browser Opera Mobile 9.7. Opera comes with turbo, which uses a compression algorithm to surf faster, and enjoy support for Ajax and Flash sites such as Facebook and YouTube.com. Best of all, it passes the Acid 3 test.

Motorola Evoke QA6

Motorola Evoke QA6One of the most anticipated most was the Motorola Evoke QA6 are fully exposed, it is as "a social unit disposed charged" because of its full HTML browser, messaging and IM-style. It has a touch screen 2.8-inch touch-screen QWERTY keyboard, 2-megapixel camera and AGPS.

The Motorola OS is a customized version of Linux with the widget interface cumbersome. It comes with mobile widgets for MySpace, YouTube, Follow Me Quick Weather Picasa and Google, RSS Reader, Mobile, and USA Today. In addition, the QA4 the first phone that virtualization can run on multiple operating systems. This is done with the help of micro-hypervisor kernel Open Kernel Labs, is based on two integrated applications concurrently running operating systems. That means you can to a variant of Linux, if they so wish.

The Motorola Evoke QA4 should be available this year, but announced no pricing information.

Mozilla Fennec

Mozilla FennecFinally, Mozilla was on hand to demonstrate its new mobile browser, codenamed Fennec. The final version of Fennec, now simply as Firefox, numerous performance improvements like TraceMonkey JavaScript engine contains, in order to increase the speed of the rendering page. Plug-in support was also added to enable video playback on popular websites. Other features include download, password, and add-ons manager, Integrated web search and pop-up blocker.

The minimalist interface is designed to enter the height of the border, as we travel around the web through their imaginative use of technologies such as Smart Bookmarks Bar Integration and history, "tabbed browsing" is used, and miniatures. The second major objective of Firefox Mobile is on the interaction of the user tools to minimize the screen to devote the entire space of the display of Web content. User Tools to disappear on the page, but returning to the widescreen display. Firefox is now available for Maemo (the Nokia N810), Mac OS X, Windows and Linux. Other Maemo platforms, Windows Mobile and Symbian versions will follow shortly.

15 September 2009

Samba Multiple Unspecified Buffer Overflow Vulnerabilities

Description:

The Samba team disclosed that, prior to v2.2.8a, there exist multiple buffer overflow vulnerabilities. No other information is available.

References:

Solution:

Upgrade to Samba v2.2.8a

Download and apply the upgrade from: http://hostopia.samba.org/samba/ftp/stable/samba-2.2.8a.tar.gz


Information on these pages is summary information extracted from the NeXpose Vulnerabilty Assessment system. Full details are provided within the NeXpose product for licensed users.

Microsoft Security Bulletins for June 2009

Contrary to speculations in the security community, last month's single security bulletin appears to have been an aberration rather than a sign that the patch burden for Microsoft products is diminishing. The 10 bulletins released in June are more in line with the historical number of monthly vulnerabilities. Six of them describe vulnerabilities affecting core Windows components, one affecting Internet Explorer and three affecting Microsoft Office.

It is notable that four of the ten security bulletins address publicly disclosed vulnerabilities: one in Internet Explorer, one in RPC, two in the Windows kernel and one in IIS. Microsoft's response time for last month's zero-day IIS vulnerability was faster than expected, but the DirectShow QuickTime parser vulnerability that became public on May 28 remains unpatched.

Tas Giakouminakis from Rapid7 said that "We've seen the patch window for Microsoft vulnerabilities shrink to the point where vulnerabilities are being exploited on the day the patches are released or even prior to that."

The active directory vulnerability (MS09-018) had the potential to be devastating for enterprise environments because it affects domain controllers, but fortunately it is ranked critical only for Windows 2000 systems. On Windows Server 2003 the vulnerability leads only to a denial of service.

Of more concern are the print spooler vulnerabilities in MS09-022. One of these is a critical remote code execution on Windows 2000, while the other two allow authenticated users to elevate their privileges on all versions of Windows.

Tas Giakouminakis from Rapid7 said that "The large number of vulnerabilities to be patched in June shows that attackers are not slowing down and the opportunities for them to infiltrate customer networks are increasing. The never-ending stream of Microsoft security bulletins highlights the need for proper patch cycle management and intrusion detection policies in all enterprises."

Samba TRANS2_OPEN Buffer Overflow

Description:

There exists a buffer overflow vulnerability in certain versions of Samba that can be exploited if a remote attacker sends an overly long file name to the TRANS2_OPEN call. Successful exploitation yields root privileges.

References:

Solution:

Upgrade to Samba v2.2.8a

Download and apply the upgrade from: http://hostopia.samba.org/samba/ftp/stable/samba-2.2.8a.tar.gz


Information on these pages is summary information extracted from the NeXpose Vulnerabilty Assessment system. Full details are provided within the NeXpose product for licensed users.

Microsoft PowerPoint Vulnerabilities

This week's Patch Tuesday is focused on PowerPoint vulnerabilities. Since PowerPoint files are frequently exchanged across organizational boundaries and are not blocked by most email gateways, this vector has been used extensively for targeted attacks in the past. At this point all customers should we well aware that attackers have been able to apply highly effective targeted fuzzing to the PowerPoint and other Microsoft Office file formats. Rapid7 expects that we’ll see more vulnerabilities in those products in the future.

Microsoft Office vulnerabilities present a unique threat to organizations because they provide a way for attackers to easily breech the perimeter firewall to gain access to internal systems through email and to spread throughout the enterprise using network shares, internal email or collaboration systems like Microsoft SharePoint and Lotus Notes. A single email with a malicious PowerPoint attachment could be enough to compromise the desktops of enough critical personnel to cripple even a large enterprise.

We believe that a defense in depth approach is crucial to protecting enterprises from these attacks. The Microsoft Office Isolated Conversion Environment (MOICE), combined with system protections such as Data Execution Prevention (DEP) reduce the risk of successful exploitation. Outbound firewalls, limited user accounts and network segmentation are also highly recommended best practices.

The MS09-017 security bulletin released today includes a fix for 14 new vulnerabilities. It is interesting that most of them were reported to Microsoft by researchers working through the iDefense and TippingPoint vulnerability acquisition programs, rather than researchers working directly with the vendor. We believe that this is another example of the increased value of vulnerabilities and the amount of effort required to find them. The large number of vulnerabilities in PowerPoint is not that surprising, considering the immense attack surface and poor code quality of the legacy file format parsers in Microsoft Office. Unfortunately for most organizations there are few alternatives to exchanging Microsoft Office with untrusted parties over email. Even PDF, which for years has been considered more secure than the Office file formats, has proven to be riddled with vulnerabilities that attackers are actively exploiting.

The only good news is that so far we have seen very few vulnerabilities in the new XML based file formats introduced in Office 2007, which means that the measures Microsoft has taken in recent years to increase code quality and security are bearing fruit. Organizations that can afford to make a complete break with the legacy products and file formats will have a better security posture than those still supporting them.

At least one of the vulnerabilities fixed in this bulletin was a public zero day vulnerability described in the 969136 security advisory from Microsoft (dated April 2, 2009). This vulnerability was discovered in the wild and has been used in limited targeted attacks, but widespread exploitation is not currently being observed. It is however likely that this vulnerability would become known to a larger number of attackers in the days after the Microsoft patch is released. Customers who are at risk of targeted attacks are advised to apply this patch promptly, but in most organizations the update can be applied within the regular patch lifecycle.

These new vulnerabilities fit a common pattern many organizations fail to recognize. For example, Adobe has been the hot target lately due to well-publicized Reader vulnerabilities that hackers have exploited, both in limited targeted attacks and in mass exploitation for building botnets. As administrators continue to be on the lookout for new issues and rush to patch Adobe flaws, hackers will now revert back to "old" attacks vectors that are not receiving as much attention, like PowerPoint and other Office vulnerabilities. The false sense of security around "old" threats is put to use all the time by hackers, and this see saw approach keeps them one step ahead of organizations.

Samba Share Restriction Bypass

Description:

Certain versions of Samba do not correctly filter pathname requests from clients. As a result, a specially-crafted request can be made to access potentially sensitive objects outside of the designated share directory.

References:

Solution:

Information on these pages is summary information extracted from the NeXpose Vulnerabilty Assessment system. Full details are provided within the NeXpose product for licensed users.

Downadup Internet Worm

Rapid7 warned of a sophisticated new Internet worm that threatens to steal personal and financial information from infected PCs. Within the previous two weeks the worm, Downadup (also known as "Conflicker" and "Kido") struck an estimated nine million machines worldwide. Fortunately, mitigation is easy.

Downadup takes advantage of a flaw in a Remote Procedure Call (RPC) within Windows Server. Using a rare out-of-cycle patch, Microsoft addressed this flaw in October 2008 by issuing Microsoft Security Bulletin MS08-067 and warned then that a similar RPC flaw back in 2003 had been used to produce the Blaster worm.

According to a SANS Internet Storm Center Diary entry on January 15, 2009, Downadup uses multiple vectors to infect PCs. Windows PCs not patched in October are especially vulnerable. However, new Downadup variants include the ability to crack administrator passwords and directly infect corporate PCs via network shares. Finally, Downadup can also infect removable drives, such as USB or external hard drives.

Once a Windows system is infected, Downadup attempts to download malicious software. What makes Downadup different is that it randomly generates up to 250 random URLs each day, with only one of those URLs being active. The active or "control" server is then used to download the malicious programming although for what purpose remains unclear.

The best protection is to install the MS08-067 patch if you haven't already done so, and to also change your administrator passwords immediately.

If your computer is already infected, most antivirus products and even Microsoft's free Malicious Software Removal Tool should be able to remove Downadup.

Samba nmbd Mailslot Packet Denial of Service Vulnerability

Description:

Certain versions of Samba contain a flawed implementation of the process_logon_packet function in the nmbd daemon. As a result, an unauthenticated attacker can craft a corrupt SAM_UAS_CHANGE request that causes the nmbd daemon to crash. Note that in order for exploitation to be successful, domain logons must be enabled in the configuration file ("domain logons = yes" in smb.conf).

References:

Solution:

Upgrade to Samba 3.0.7



Information on these pages is summary information extracted from the NeXpose Vulnerabilty Assessment system. Full details are provided within the NeXpose product for licensed users.

Microsoft rates MS09-001 as critical

Although there is only one Security Bulletin on this first Patch Tuesday of the New Year, it should not be dismissed. The patch issued today, MS09-001, resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol, a protocol used for sharing files, printers, serial ports, and other communications.

Microsoft rates MS09-001 as critical, its highest rating, for users running Windows 2000, XP, and Server 2003, and moderate, its second highest rating, for users running Windows Vista and Server 2008. Installation of the patch will require a system restart.

There are three specific vulnerabilities addressed in today's bulletin. Microsoft says these flaws are unlikely to produce exploitable code because the first two (CVE-2008-4834 and CVE-2008-4835) only allow for one fixed value (zero) to be written and controlling what data is overwritten will also be difficult. The third vulnerability (CVE-2008-4114) affects all Windows systems and allows for a Denial of Service attack. It is because of the DoS threat that Microsoft recommends high priority updating of all SMB servers and Domain Controllers. Non-critical systems and those systems where SMB is blocked via a firewall could be considered less of a priority.

MS09-001 replaces the SMB patch MS08-063 issued last October

CIFS Minimum Password Length Policy Allows Password Brute Forcing

Description:

The minimum password length on the CIFS/Samba server is too low. This is a security risk. If the account policy does not enforce a reasonable minimum password length, an attacker will stand a much better chance of guessing or brute forcing users' passwords. Enforcing a higher minimum password length will limit the effectiveness of any brute forcing attempts.

The default password length is typically set to 0, which allows empty passwords. Most policies recommend setting the minimum to 6 or more characters.

Solution:

Microsoft Windows Vista, Microsoft Windows Vista Home, Basic Edition, Microsoft Windows Vista Home, Basic N Edition, Microsoft Windows Vista Home, Premium Edition, Microsoft Windows Vista Ultimate Edition, Microsoft Windows Vista Enterprise Edition, Microsoft Windows Vista Business Edition, Microsoft Windows Vista Business N Edition, Microsoft Windows Vista Starter Edition, Microsoft Windows Server 2008, Microsoft Windows Server 2008, Standard Edition, Microsoft Windows Server 2008, Enterprise Edition, Microsoft Windows Server 2008, Datacenter Edition, Microsoft Windows Server 2008, HPC Edition, Microsoft Windows Server 2008, Web Edition, Microsoft Windows Server 2008, Storage Edition, Microsoft Windows Small Business Server 2008, Microsoft Windows Essential Business Server 2008
Set the minimum password length
  1. Open the Windows Control Panel.
  2. Select "Administrative Tools"
  3. To change the domain-wide lockout policy, select "Domain Security Policy" (or "Domain Controller Security Policy" if the computer is a Domain Controller). Otherwise, to change the policy for this computer only, select "Local Security Policy."
  4. Expand the "Account Policies" folder and select "Password Policy".
  5. Set the Minimum Password Length. This setting enforces a minimum length for new or changed passwords. A value of 6 or higher is recommended.
  6. Note that this policy does not affect existing passwords. It will only take effect when an existing user changes his password.
Microsoft Windows XP, Microsoft Windows XP Home, Microsoft Windows XP Professional, Microsoft Windows Server 2003, Microsoft Windows Server 2003, Standard Edition, Microsoft Windows Server 2003, Enterprise Edition, Microsoft Windows Server 2003, Datacenter Edition, Microsoft Windows Server 2003, Web Edition, Microsoft Windows Small Business Server 2003
Set the minimum password length

  1. Open the "Performance and Maintenance" control panel.
  2. Select "Administrative Tools".
  3. To change the domain-wide lockout policy, select "Domain Security Policy" (or "Domain Controller Security Policy" if the computer is a Domain Controller). Otherwise, to change the policy for this computer only, select "Local Security Policy."
  4. Expand the "Account Policies" folder and select "Password Policy".
  5. Set the Minimum Password Length. This setting enforces a minimum length for new or changed passwords. A value of 6 or higher is recommended.
  6. Note that this policy does not affect existing passwords. It will only take effect when an existing user changes his password.

Microsoft Windows 2000, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2000 Datacenter Server
Set the minimum password length
  1. Open the "Administrative Tools" control panel.
  2. To change the domain-wide lockout policy, select "Domain Security Policy" (or "Domain Controller Security Policy" if the computer is a Domain Controller). Otherwise, to change the policy for this computer only, select "Local Security Policy."
  3. Expand the "Account Policies" folder and select "Password Policy".
  4. Set the Minimum Password Length. This setting enforces a minimum length for new or changed passwords. A value of 6 or higher is recommended.
  5. Note that this policy does not affect existing passwords. It will only take effect when an existing user changes his password.

Microsoft Windows NT, Microsoft Windows NT Workstation, Microsoft Windows NT Server, Microsoft Windows NT Advanced Server, Microsoft Windows NT Server, Enterprise Edition, Microsoft Windows NT Server, Terminal Server Edition
Set the minimum password length
  1. Click on the "Start" button from the Task Bar
  2. Select "Programs"
  3. Select "Administrative Tools"
  4. To change the domain-wide lockout policy, select "User Manager for Domains". Otherwise, to change the policy for this computer only, select "User Manager".
  5. From the "Policies" menu, select "Account..."
  6. Set the Minimum Password Length. This setting enforces a minimum length for new or changed passwords. A value of 6 or higher is recommended.
  7. Note that this policy does not affect existing passwords. It will only take effect when an existing user changes his password.

IBM OS/400
Set the minimum password length

OS/400 V4R2 and later include a feature called NetServer which provides Windows compatibile file and printer sharing. Early versions of NetServer relied on the underlying OS/400 user authentication system. However, starting with V5R1 and V5R2, NetServer can be integrated into your Windows Domain or Active Directory via Kerberos, NetBIOS, or LDAP. This integration allows the NetServer to inherit the domain's account lockout policies. Refer to the NetServer documentation for more information.


Samba
Set the minimum password length

The Samba server uses the host operating system's authentication mechanism to control access. If you want to integrate Samba into your NT4 domain or Win2k Active Directory, you can use Samba 2.2.2 or later with winbind to achieve "single sign-on". However, integrating Samba with LDAP/Kerberos/Active Directory is not a trivial task and should only be undertaken with caution.



Information on these pages is summary information extracted from the NeXpose Vulnerabilty Assessment system. Full details are provided within the NeXpose product for licensed users.

Higher risk of SSL attacks for those relying on MD5 signed certificates

Summary

January 9, 2009 - Recently, a group of international security researchers demonstrated successful attacks against the Public Key Infrastructure (PKI) used to issue security certificates to Web sites when the signatures are generated with the MD5 hash function.

As a service to our customers, is providing a summary of the vulnerability as well as steps for remediation.

Happily, the vulnerability is simple to identify and easy to remediate.

What is this attack?

HTTPS Web sites send their security certificates to inbound browsers to allow them to validate the identity of the sites to which they are connected. A security certificate contains the Web site’s host name and its public key, and is cryptographically signed by a Certification Authority (CA). Browsers are also configured to trust a list of predefined authorities, each of which is represented by a self-signed certificate. A browser uses these trusted authorities to verify the digital signature of a Web site’s certificate, and can thus avoid phishing attacks.

In this particular attack, the researchers successfully created a valid intermediate CA certificate signed by a trusted authority. They then used it to generate arbitrary valid Web site certificates, allowing them to impersonate HTTPS Web sites, monitor or tamper with data sent to such Web sites, etc. This attack can affect any application using X.509 certificates signed using the popular MD5 mechanism. The hack was to prepare, using techniques to find MD5 collisions, one fake intermediate certificate that would be recognized as having been issued by the real CA (Verisign in this case).

The attack works as follows:
  • The attacker creates a rogue CA using vulnerabilities in MD5.
  • The attacker creates a valid HTTPS certificate for the target Web site.
  • The attacker uses this secure certificate to gain trusted status in mainstream browsers.
  • The attacker executes any number of browser-based attacks to gain sensitive data from end-users.

In practical terms, this means that someone in possession of such a rogue CA can launch what is known as a man-in-the-middle attack and gain access to your bank account by having you log on through their attack tool and recording your user ID and password! Other attacks could include directly tampering with data sent to secure Web sites and executing practically undetectable phishing attacks.

Summary remediation steps

In this situation, the best solution is to eliminate all MD5-based certificates. The summary steps to do so are outlined below.

Protect Web applications:
  • Identify any certificate or certificate chain using MD5. In particular, check for TLS/SSL server or client certificates. Rapid7 NeXpose scans for this vulnerability.
  • Migrate affected certificates from MD5 to SHA-1 or SHA-2.

Samba Print Change Denial Of Service Vulnerability

Description:

Certain versions of Samba are vulnerable to a denial of service if out-of-sequence print change notify requests are receieved. Successful exploitation crashes the Samba daemon.

References:


Solution:

Information on these pages is summary information extracted from the NeXpose Vulnerabilty Assessment system. Full details are provided within the NeXpose product for licensed users.

09 September 2009

INF Update Utility - Primarily for Intel® 5, 4, 3, 900 Series Chipsets

The Intel® Chipset Software Installation Utility installs INF files that inform the Windows* operating system how to configure the chipset for specific functionality such as AGP, USB, Core PCI, and ISAPNP services.

**Note**
Intel® Chipset Device Software is the new name for the Intel® Chipset Software Installation Utility; this name will be seen when running the installation package.

**Important**
The Intel Chipset Device Software provides functionality for AGP and USB, not drivers for AGP or USB. DO NOT DOWNLOAD THIS UTILITY IF YOUR DEVICE MANUFACTURER IS RECOMMENDING IT TO CORRECT AN "AGP DRIVER," "AGP GART," OR "USB DRIVER" ISSUE; IT WILL NOT CORRECT YOUR ISSUE.


Multi language: infinst911autol.exe Download
Ver:9.1.1.1019 Date:9/7/2009 Size:2735 (KB) Time @56Kbps:6.33 min

OS:Windows 2000*, Windows 7 RC1, 32-bit*, Windows 7 RC1, 64-bit*, Windows Server 2003 Enterprise x64 Edition*, Windows Server 2003 Standard Edition*, Windows Server 2003 Standard x64 Edition*, Windows Server 2003*, Windows Server 2008*, Windows Vista 32*, Windows Vista 64*, Windows Vista*, Windows XP Home Edition*, Windows XP Media Center Edition*, Windows XP Professional x64 Edition*, Windows XP Professional*

Schroff - Power Search facility simplifies subrack selection

Schroff - Power Search facility simplifies subrack selectionElectronics packaging specialist Schroff has introduced a Power Search facility on its website to simplify the task of selecting products from its comprehensive range of europacPRO subracks.

Through a step-by-step process of choosing the appropriate options for parameters such as height, width, depth, shielding and backplane compatibility, users are presented with the part number and details of a subrack to meet their exact requirements.

A pop-up line diagram of the subrack can be instantly viewed by moving the cursor over a 'drawing' icon, and full technical information can be accessed by clicking on the part number. Featuring a robust aluminium construction, the europacPRO subracks can be supplied in kit form from stock or fully assembled by Schroff's expert technicians in only five working days. Even with modifications such as special sizes or custom printing and painting, fully assembled subracks are despatched in just 10 working days.

The subracks are 84HP wide and can be specified with heights of 3U or 6U and depths from 175 to 475mm. A comprehensive range of accessories is also available, including card guides, front panels, divider plates and handles, says the company.

Gefran - Ethernet/IPT added to compact four-channel temperature control range

Gefran - Ethernet/IPT added to compact four-channel temperature control rangeGefran has added Ethernet/IP communications to its GFX4 and GFXTERM04 multi-channel temperature controllers. The full-featured GFX4 family adds Ethernet/IP to a choice of several fieldbus communication options and the four-loop temperature controller is available in PID control only or fully-integrated versions complete with relays, current transformers and fuses - offering control panel space-saving and reduced installation timescales.

The Din-rail, panel mounted range measures just 25mm x147mm x 160mm and features configurable universal inputs, manual tuning or auto-tuning functions and advanced diagnostics with all interfacing via pluggable connectors. Aimed at demanding process automation applications such as plastic extrusion, injection moulding, thermoforming, wrapping and welding, the Ethernet/IP option allows expansion for up to 16 temperature zones by daisy-chaining Ethernet for up to four GFX4 controllers. The GFX4 also supports a master/slave configuration, helping to reduce network wiring.

Ethernet/IP set-up is simplified with pre-configured GFX4 message blocks that are imported into the Rockwell RSLogix program. Multiple diagnostic functions include 'loop break alarm' and 'heater break alarm' where alarm conditions such as broken probes, lack of load voltage and even partial load failure may be monitored and immediately identified with relay alarms and LED indicators.

The GXF4 is also available with many other fieldbus communication options including RS485 Modbus, Profibus, DeviceNet , CanOpen and Ethernet (Modbus over TCP/IP or GDnet), with protocols for direct connection to PLCs, HMIs and Industrial PCs without further CONVERTERs, says the company.

Austriamicrosystems - Optimal motion sensing solution for angle position systems

Austriamicrosystems - Optimal motion sensing solution for angle position systems
Based on patented stacked-die technology, a new dual-die automotive magnetic rotary encoder IC , the AS5215, has been unveiled by Austriamicrosystems. The device targets challenging safety applications such as electronic power steering systems.

"Micro controlled systems are increasingly used in automotive position sensing applications. In most of these systems, the microcontroller capacity is only partly used. The AS5215 has been specifically developed to provide a position sensing solution which leverages on this fact, and allows our customers to design the most cost efficient systems", said Andreas Pfingstl, product manager automotive encoders, Austriamicrosystems. "The AS5215 can be easily implemented in existing system architectures, providing high reliable contactless angle measurements, without a need to replace or modify proven electronic control units."

The amplitude of the output signal is programmable via sensitivity and gain settings. Due to its selectable output mode signals - raw, inverted or DC-referenced - the AS5215 can fit a variety of conventional motion sensing systems which require measurement redundancy for safety reasons.

Based on the company's patented stacked-die solution, the dual-die AS5215 provides 'excellent' phase matching and very low sensitivity drift over the full ambient temperature range of -40C to +150C. The AS5215 is available in a small TSSOP 14 package and operates at 5V supply. A single die rotary encoder IC version, AS5115, in a SSOP 16 package, will be available in October 2009, says the company.

Texas Instruments (TI) - Processors and analog technologies help simplify building management

As homes and businesses become more complex, there is a growing need to simplify building automation and management by eliminating the clutter of multiple control devices. In response to this, Texas Instruments (TI) has announced that its OMAP technology powers AMX’s automation and control panels.

The Modero ViewPoint touch panels (MVP-5000 series), Modero wall / flush-mount touch panels (NXD-500i and NXD-430 series) and the Metreau Entry Communicator devices are sleek, single-system automation panels that seamlessly manage electronics, lighting, temperature, video / audio conferences, Internet and more for homes, theatre systems, hotel rooms, meeting and conference rooms, classrooms or restaurants. TI’s OMAP processor provides advanced processing performance and extended battery life for crisp, life-like video and graphics for these latest products

The ARM and digital signal processor (DSP) processing architecture offered by the OMAP device enables AMX to deliver advanced graphical user interfaces (GUIs) so consumers can navigate on-screen functions with multiple windows, monitor remote security cameras and control audio and video equipment at the same time. Additionally, the multi-core design of the OMAP processor simultaneously supports numerous functions, such as video encoding / decoding and playback, 2D/3D graphics and audio. This gives AMX the edge in designing multi-functional touch panels with exceptional system EFFICIENCY to instantly run applications without compromising performance. With several power modes from full-powered to processor shutdown, the Modero ViewPoint touch panels for instance, take advantage of the sophisticated power management framework to yield greater energy savings by turning off unused peripherals based on the user’s activity and modes of operation.

“We are dedicated to developing flexible, compact and innovative solutions that allow consumers to easily automate their entire home or corporate environment from managing audio and video equipment, changing the thermostat, checking who is at the front door to making a phone call with just a single touch of a button,” said Robert Noble, chief technology officer, AMX. “By working with TI, we are able to address customer’s growing demands for products featuring the latest, cutting-edge technologies that are easy to operate to ultimately simplify their lives.” AMX leverages a complete system-level solution from TI, ranging from the OMAP applications processor to a full complement of analog ICs, including power management, interface, audio, touch screen control and logic devices. The combined solutions pave the way for AMX’s signature ultra-light, ergonomic designs to integrate the fastest video processing, intuitive GUIs with photo-realistic graphics and low power consumption levels on a single platform, says the company.

Farnell - Configurable power management unit integrates two Dc-DC converters

Farnell - Configurable power management unit integrates two Dc-DC convertersThe National Semiconductors LM26484 multi-function, configurable power management unit is now available from Farnell.

The device integrates two 2A Step-Down DC/DC converters, one LDO Controller, POR (Power On Reset) circuit, and thermal overload protection circuitry. All regulator output voltages are externally adjustable. The LDO controller is a low-voltage NMOS voltage regulator. The LM26484 is offered in a 5mm x 4mm x 0.8mm LLP-24 pin package, says the company.

Toshiba - Integrated constant current drivers provide responsive LED brightness

A new family of integrated constant-current LED drivers has been introduced by Toshiba Electronics Europe (TEE). They provide very high levels of ESD protection while significantly reducing component count and board space in applications built around multiple LEDs.

Ideal for panel displays, devices in the TB62747 LED driver family feature 16 driver outputs with the ability to deliver constant currents of between 1.5mA to 45mA. ESD protection in accordance with Man Machine (MM) and Human Body (HB) models is ±500V and ±4000V respectively.

The drivers 'guarantee' a maximum current accuracy between outputs and between different devices of ±1.5%. This ensures constant brightness in designs built around large number of LEDs. The high number of integrated outputs, coupled with the ability to adjust the current through the use of a single, external resistor, significantly reduces the number of components needed to drive LED array applications.

All TB62747 drivers operate with a supply voltage of between 3.3V and 5V and deliver output voltages up to 26V. Internally the devices are based around 16 channels of shift registers, latches, AND gates and the constant current outputs. Control data format is serial-in, parallel-out. The devices are fully BiCMOS-compatible and can accommodate 3.3V and 5V input signals. A power-on-reset (POR) facility is also available.

The TB62747 drivers deliver fast output current response (tWOE(L) = 100ns min) and, when cascaded, support serial data transfer rates of 25MHz. Package options are 1mm pitch SSOP-24 (TB62747AFG), 0.65mm pitch SSOP-24 (TB62747AFNG) and 0.64mm pitch QSOP24 (TB62747AFNAG and TB62747BFNAG). All of the drivers will operate between -40C and 85C, says the company.

06 September 2009

AMD Release Packs 6-Core Opteron

AMD Opteron

Advanced Micro Devices has released a version of the 6-Core low-power Opteron processor in time for VMworld virtualization key that opens Monday.

The 6-Core AMD Opteron EE consume 40 watts and is designed for 2P servers, one of the most popular in the area of virtualized servers. The chip costs $ 989 and will begin shipping on Monday.

Maintaining the thermal envelope identical to the previous generation of chips, the Opteron 2419 EE 1.8GHz, compared to 2.0 GHz clock speed of the "Generation Opteron Shanghai. AMD claims that the third EA 2419 provides better performance than the EA 2377, four core chip whose nuclei have been clocked at 2.3GHz, who also ran against a 40-watt thermal envelope.

The new 6-core chip also contains the AMD-V virtualization technology, including AMD mechanisms power management P. VMworld, the show managed by the virtualization company VMware.

AMD also said that energy for a fully populated 42U rack would be 9.2 kilowatts using 6-core Opteron 2425 SE, item 55-W. The replacement of these chips with EE 2419, would require 7.5 kilowatts, or about 18 percent energy savings.

According to IDC data cited by Brent Kerby, a product manager for the chip, about 82 percent of the cloud and Web servers use only about half the processing power available at a given moment. "With more cores, you have more space for moments ... Web pips strikes a fair amount of support, if you want, "said Kerby. "The region most affected, energy consumption, set in the power range of 40 watts, and even above the threshold of power."

The bottom line? More power in a rack (or compute density) while maintaining low power range of 40 watts, Kerby said.

The new Opteron chip also uses DDR-2 memory, which AMD claims will save approximately $ 1,000 per server, as opposed to DDR-3 more expensive memory.

Holographic Projections at Near Real-Time Speeds

If the emergence of 3D glasses in the local cinemas are an indication, we all want a little more, ahem, our depth of experience film. Unfortunately, the style of glasses are not exactly suitable for an immersive experience. What would be really cool animated holograms. Although holograms are not the easiest things in the world, it is possible to make a 3D computer model and data necessary to calculate a hologram that can be used to project a 3D image from one generation to screen. Given the fact that the animation is now largely computer-generated anyway, where are my holographic animated films?

One problem seems to be efficient rendering. A recent article appeared in Optics Express, although an enormous speed holographic display this shows the difficulty of the problem. The basic animation is now within reach of modern rendering farms, unfortunately, who have no power left on important issues, such as shadows, lighting and shadows (much more character and plot ).

As usual, we take a step backwards in this case to see how a real hologram is made. Take the light of a laser, split into two beams. Shine a light on the object you want from a hologram, and then let it hit a landslide photographic paper. The other beam goes directly on photographic paper. Accordingly, the photographic paper records the interference between two beams instead of an image of the object.

The reason this is useful is that of the laser light is coherent in space and time, and only one interference pattern is recorded, rather than the average of millions of such models.

(For those who care about the details: if we have a piece by the laser beam, the electric field are two places in this part stuck in their relationship with each other. Even if we know that the electric field at a point in time and space, while the temporal coherence means that we know how it will change over time in this space. This type of consistency is why we have a single interference pattern. )

To project the image, the process is reversed. Half of the laser light reflected by the interference pattern, then recombined with a beam that has not changed. The combined beam is then projected to the viewer using a lens system. Viewers can see the 3D object, instead of the interference pattern.

Thus, a holographic computer sounds pretty simple: just restart the interference pattern. But there is a gotcha. For example, if you cut an image into two, get two partial images. Cutting a hologram in half, however, results in two pictures full of less quality information on each pixel encodes the whole image. And therein lies the difficulty: to show a hologram calculated intensity of each pixel are calculated from the interference pattern, not only the local contribution to the subject.

This can not be so difficult? Well, Japanese scientists have created a graphics card, called Horn-6, which can make for you. It consists of four Xilinx field programmable gate arrays (FPGAs), each about 7 million gates and a little memory (less than 1 MB). Each FPGA is connected to 256 MB of DDR RAM, then fifth, smaller FPGA is used to manage the PCI bus.

These FPGA divide the surface of an LCD screen 1920 x 1080 and calculates the intensity of each pixel using an algorithm for ray-tracing the footsteps of the phase of the phase of light, the interference must be calculated. In a beautiful piece of technology, as the block size that each FPGA can handle (eg, limited local storage) is completed in a little less time it takes for the next block to retrieve from memory. This allows researchers to load FPGA almost constantly maintaining data prefetching.

When the record is complete, the resulting interference pattern can be displayed on an LCD. This model can then be projected with a laser to create a hologram that is 1m in one dimension (the document does not say which, if I suspect that the diagonal) and has five degrees angle of vision.

Of course, gamers among us want the framerate. Well, it will Blow Your Socks Off: A peak performance of 0.08fps (full size). But if we dig deep and Shell, for the model fully clothed, the yield increases. To do this, stabbed your computer as many cards in your PCI slots. Researchers have shown a four-board that had 0.25fps up. A distributed system of four computers, each with four plates, clocks full 1.0fps. Awesome stuff.

It helps to put that into perspective by comparing the rendering times with different hardware. Unfortunately, researchers do not have a very good job here. I suspect they could not use the GPU standard, because they are limited in how they can be programmed (but I'm no expert, so this would be a mistake). So instead they used the CPU-time rendering.

Even then they could have done better, because these figures compared to a Intel P4 clocked at 3.4 GHz, which is not exactly cutting edge equipment. However, a single image are displayed in 1 hours, 16 minutes and 14 seconds by a P4, so it's probably not as much their card is still faster than current equipment.

The PDF is freely available and contains a number of films.

AMD Outlined its Upcoming 12-core Server Processor

At Hot Chips, last week, AMD unveiled details about the upcoming 12-core "Magny-Cours" processor, which it hopes will help it remain competitive in the game server. In 2010, AMD 45 nm SOI, Magny-Cours uses the same basic Core micro architecture as the current Shanghai quad-processor database server, so if there is no improvement in performance by wire will come from better system design.

The idea of Magny-Cours is simple: Take two to six processors at the heart of Istanbul, they clock down a little on the power to reduce and work in a multi-chip module (MCM), so they can take in a socket. Using an MCA, AMD will be able to fit 12 cores in the same power envelope as heat and Istanbul.

Doing this work requires a little compromise, and one of them is the MCM itself. AMD had previously ridiculed for using an MCM first Intel dual-core effort, the Pentium 4-based Smithfield, not "true" dual-core. They repeated the charge in the first quad-core Intel, which is also an MCA. But with per-core Nehalem cleaning absolute performance, which AMD is eager to maintain a credible presence server, and part of that crowd is the determination of strategy of MCA who had mocked.

For reasons of system architecture, AMD MCM picture is somewhat more complicated than was Intel, Istanbul, because each chip has its own on-die dual-channel DDR3 memory controller, and four HyperTransport links. Obviously you can not support any full-chip interconnect bandwidth through a single connection, so AMD had to cut some ties.

The company has four overall MCM design HT 2.0 ports (two per chip) and four DDR3 memory ports (two per chip) on each MCM. For each chip, a link is x16 and one x8 is different. The two chips are connected in the module x16 link exc.

Even with four HT links and four memory channels for the MCM Fed to maintain the 12 cores is a lot to pack into an electrical outlet, bandwidth and hunger is a concern. To help alleviate the bandwidth pressure on AMD Istanbul assistance of a clever balance in the form of HT, and this assessment will be carried forward to Magny-Cours, where even more necessary.

One of the major challenges in the design of multiprocessor system is maintained caches of different processors in sync with the other solutions to this problem to a certain degree of communication between processors, and "snoop" bus traffic Dining the precious bandwidth. The solution adopted in Istanbul and Magny-Cours AMD involves the destruction of 6 MB of cache 1 MB per chip to store the contents of a directory caches of other chips, so by consulting the local telephone directory each chip can prevent a broadcaster major growing number of requests for traffic to snoop other chips.

The reason is that hormone Assist workspace is relatively cheap compared to tube and bus bandwidth, so that every trick you trade some transistors on die for a boost in bandwidth real world bus is a victory. In fact the basic idea behind all kinds of caches, and directory HT Assist is really just another type of cache. Bandwidth per socket will always be expensive if the number of cores in each socket increases, and so we see the plans multi swing back to the state of affairs at the end of the era single-core, ie where a transformer, which is usually a large proportion of very fast memory with a number of blocks to load attached.

After Magny-Cours, AMD plans to continue to raise the number of cores per socket, while maintaining backward compatibility with Magny-Cours and taken to Istanbul, power and thermals.

IBM's 8-core POWER7 Crams an Amazing Amount of Hardware

IBM's Hot Chips presentation on the 45nm server processor POWER7 had a wealth of information on the chip, which with 1.2 billion transistors and 567mm2, is actually quite slim given that it offers. The secret is to first use a special caching technology that is lauded by IBM since 2007, but more about that in a moment.

POWER7 come in 4 -, 6 - and 8-core varieties, the standard is probably the 8-core and lower basic versions are offered to improve yields. Each core is equipped with 4-way simultaneous multithreading, which means that the 8-core a total of 32 simultaneous threads per socket support. POWER7 Multi Socket is designed for systems that scale to 32 sockets, which means that a full 32-socket 8-core components of the system in 1024 would support son.

Feed eight cores on a socket is a challenge, which is why each POWER7 has a pair of four-channel DDR3 controller that supports up to 100 GB / s memory bandwidth supported. Also help the situation is less than 32 MB on-die L3 cache, IBM has managed to ride that much cache uses a special embedded DRAM (eDRAM) transistor design that reduces the cost of swimming pool large cache of about half.

To see how the economies of this system EDRAM transistor cache, compare the 8-core, 32MB cache POWER7 of 1.2 billion transistors in number 2 billion transistor 4-core, 30MB cache, "Tukwila 'Itanium d 'Intel. Naturally EDRAM POWER7 is almost certainly a bit slower than SRAM Tukwila, but today the power of the transistor age sensitive than the level of savings is impressive. Also consider how cells POWER7 the eight-core Nehalem EX, which has 24MB of cache and weighs more than 2.2 billion transistors, more, IBM has more with less.

Note that the four-SMT design is another thing that helps with the problem of feeding all the material acting as a mechanism for latency hiding while basic backend. If one thread stalls waiting for memory, the kernel (ideally) find instructions for running another wire to feed the execution units to keep them occupied. This issue of bandwidth is probably one of the reasons behind the decision of IBM to deal with such a high level of SMT.

Speaking of a back-end POWER7 core, each core includes a solid set of execution resources. There are 12 units in total performance, as follows:
  • 2 integer units
  • 2 Load in-store units
  • 4 Double-precision floating-units
  • 1 branch unit
  • 1 record unit condition
  • 1 unit vector
  • 1 decimal floating-point unit
Those of you who have read my past articles or my book microprocessor will know that most units are above, with the possible exception of CSF-specific unit's status register (which was present in the 970) and float - unit, which mathematical functions commonly found in mainframe workload increases.

My only comment about the above is four floating-DP unit has plenty of power point in floating point. This makes streaming memory bandwidth is crucial for the performance POWER7 FP, so it is good that it was enough.

I heard that the remains POWER7 "pass" group scheme, which is part of the power line from the days POWER4. It represents the amount of accounting logic necessary during the flight by sending instructions and follow the instructions in bundles . The POWER4 and 970, instructions are sent to the queue instruction in the back in packages of 5 pieces, but groups are available now expanded to 6 locations.

Overall, IBM has a very impressive 32-thread chip with a sample of a ton and a large portion of cache memory bandwidth, and done with half the transistors of the game. This is quite an achievement, and reaffirms the IBM mainframe continues strong market very lucrative.

Second Android Phone from T-Mobile

While the first Android phone, T-Mobile G1 is a welcome entry to the smartphone market. And he may still be the must-have smartphone if it were not for a particular device from Apple. The reason is that while the Android platform itself much of the opportunity given its open nature, the G1 hardware is simply not large compared to something like the iPhone. But now T-Mobile is back with another attempt at an Android phone in the United States, which calls the myTouch 3G - and it's much better.

How do I know? Well, because I actually a business unit for a few weeks. You see, myTouch 3G, which will be available in early August for $ 199 with a 2 year contract is the same device as the ion Google phone, which was given to all those who attended the Google I / O conference a few weeks ago. And technically, the two are actually the HTC Magic, who released a few months ago in Europe and more recently in Canada. But for myTouch 3G, T-Mobile offers a different bells and whistles to distinguish.

The biggest thing is trumpeting T-Mobile for this device is a deep level of adaptation. Users will be able to access menus, wallpaper, icons and many other things to personalize the device with the use of themes and skins. This is a sharp break with a device like the iPhone, including a UN fully customizable look and feel.

And the device itself comes in three colors: black, white and what she calls the "typical" Merlot. (This makes me think of Paul Giammati in Sideways, "I do not drink merlot whore!"). But there will also be able to fully customize the phone shell too.

Another important point, T-Mobile is touting the myTouch something called Sherpa, which together with T-Mobile startup Geodelic to create. Basically, Sherpa is an application that claims to learn a user's actions. For example, if you are looking for excellent Thai food, Sherpa must recognize that as something you want in the future. And it uses your location information to provide tailored results for what they believe based on what you want around you.

Here spiel on the T-Mobile

At the heart of the T-Mobile myTouch, Sherpa ™ is an application with a high-engine itself learning automatically adjusts to your preferences. Created by Geodelic, the application learns your preferences and dislikes for the behavior and user feedback, prioritize recommended retailers, restaurants and attractions. Seamless mixing behavior recognition, a recommendation engine and locating relevant information, it is this combination of learning exclusively for Sherpa and experience unlike any currently on the market.

Equipment

But how real hardware myTouch stacking against the G1? Very good.

The first thing you will notice it is much smaller than the G1. All this by eliminating the physical keyboard. Because myTouch the Android 1.5 "Cupcake" software uses a virtual keyboard. While this will certainly hamper some users, from a design point of view, it was a very good initiative. It allows a device that not only smaller and lighter (it is about a gram and a half lighter), but it seems a lot nicer too.
And it became a little bump in the specifications. Although processor features the same, the myTouch has double the internal memory the G1 (now 512 MB), then load and run applications much smoother.

The screen size and resolution remain the same (3.2-inch TFT-LCD 320 x 480). And unfortunately, while the screen is not capacitive multi-touch that one of the main features of the iPhone and the new Palm Pre.

MyTouch also the same 3.2 megapixel camera with autofocus, the G1 had. And the device also comes pre-installed with a MicroSD card to 4GB, but the user can be upgraded in all formats.

But the most striking difference is that if the lifetime of the battery. From my experience, the G1 was very poor battery life. The myTouch offers a considerable improvement in this regard. How? Well just in daily use with applications running in the background the battery in my G1 would have disappeared within hours. The battery is easily myTouch all day in the same area.

The iPhone

Although this device the G1 in all respects, the assets, the more people interested to compare myTouch is probably how it stacks up against the iPhone. By eliminating the physical keyboard, the units are closer now.

Before coming to that, I would say that the main factor for which you will probably enjoy more when you a bigger fan of the more open Android platform, or the most tightly controlled approach Apple takes the iPhone OS.

In terms of hardware, there is no doubt in my mind that the iPhone is much prettier. HTC managed many solid improvements on the G1, but when the two hand in hand, he still feels plastic myTouch and therefore inexpensive, compared to the iPhone.

If the original iPhone or iPhone 3G, you will enjoy the 3.2 megapixel camera and can shoot video with myTouch, but the iPhone 3G comes out of S corresponds to these two functions now.

In terms of speed, it is somewhat difficult to compare the two, because the different platforms to run applications. The myTouch as G1, has a 528 MHz processor, a faster processor than the original iPhone and iPhone 3G had. But again, the new iPhone 3G combines speed and S grows even beyond, in terms of raw power.

I only played with the iPhone 3G S for a few days, but I think it is fair to say that daily use applications and surf the web, the new iPhone blows along the myTouch in terms of speed. But again, it seems significantly faster myTouch in many respects than the original iPhone and iPhone 3G.

This does not mean that myTouch has no advantages over the iPhone. It has enormous: it can run third party applications in the background. Apple has already played a bit with the idea, but the Android phones have done since day one. And as I mentioned above, if the battery in the G1 seriously affected the performance, MyPhone much more efficient, even with applications running in the background.

Price

But in a move that still does not talk much of it, Apple may have dropped a bomb on devices like the 3G myphone not the iPhone 3G as much as S $ 99 with the iPhone 3G. At $ 199, is the point myTouch same price as the entry level S iPhone 3G, but I see many new smartphone buyers choose iPhone over $ 100 cheaper.

Pre-orders for myTouch will be effective for T-Mobile customers on July 8. The unit will be $ 199 with a 2 year contract, and general availability scheduled for early August.

AT&T has announced that MMS

AT&T has announced that MMS - a feature great hype of the iPhone OS 3.0 - Finally hitting AT&T on September 25. There is no date attached, although the company line that will be available "in the future." Extending the logic behind the delay Grapple, they say that "by its nature, this feature can exponentially more traffic on the network, and we must ensure that some of our current updates are in place before we can offer enhanced functionality to the excellent performance that customers expect. "We are not network engineers, but" the exponential increase in traffic "and" AT&T are two things we normally do not hear the same phrase - Hopefully the 850MHz, 7.2 Mbps, and upgrading backhaul they will stimulate a long way towards sorting it out. As for MMS, they recognize that "the release of a few days in fact decrease beyond the official end of summer, saying their support for iPhone customers more than any other airline in the world a positive experience to run a bit of a challenge. Of course, almost any another phone from AT&T sells (and has sold in recent years) supports the same technology, so this feels pretty as an asset acknowledged that iPhone users through information-rich Blaze in a rhythm that society ill-equipped to manage.

Solar Cell for Charging iPods and iPhones


It seems that Apple gadget users have a new way of charging iPods and iPhones with the sun, thanks to the latest Think of Novo. The company issued Surge solar skin with an integrated solar cell can charge the Apple devices to 100% solar energy.

As for the strength, the company says that 2 hours of direct exposure to the sun provides approximately 30 minutes talk time on 3G networks or 60 minutes talk time on 2G networks, and the battery stores the skin of 120% of the capacity of the iPhone 3G.

It also comes with a solar-Planner application that helps you assess your needs Sun to fully charge your gadget, you can remove the guess how many hours of daylight you need to get full bars.

A convenient way to gadgets grid - or at least it will be. This is not all on the market. But at the end of this month, you will be able to to pick up for $ 70. A bit expensive, yes, but not too bad for a solar charger specifically to fit and protect your device and power.

Maybe Kernel 2.6.31 More Faster?

The next version of the Linux kernel 2.6.31, which should be communicated as soon we can expect a user experience of desktop Linux in addition to support fast USB 3.0 and FireWire new drivers.

The kernel developers have worked to improve the interactivity of desktop, especially when the memory pressure since the last release, version 2.6.30, in June

Desktop applications can live a long and significant pauses when the code of the application path breaks at some of the code are not stored in memory and must be read from disk, which is slower.

However, recent work of memory management kernel scalability resulted in an office environment with poor interactive applications that can respond more easily.

In version 2.6.31, a heuristic is used for much more difficult for the allocated pages executable move "from the list of active pages, according Kernelnewbies.org.

"The result is an enhanced desktop experience, benchmarks show tight memory for desktop computers and large errors in time reduced by 50 percent, and the numbers pswpin (memory reads from disk) are reduced to about third. This means X desktop responsiveness is doubled memory under high pressure".

In addition, memory benchmarks ignited in a file server provides the number of major faults range from 50 to 3 more than 10 percent cache warm bed.

Foundner Linux Linus Torvalds, the first operating system developed for its desktop and it increased to promince as commodities Unix server.

However, adoption of Linux on PCs and laptops remained niche over Windows and not become an alternative to more mainstream in recent years.

Estimates range game, how many Linux workstations are in use today, but market share data from Net Applications, Linux desktops from a peak of 1.17 percent in May 2009 and has since declined 0, 94 per cent in August.

The arrival of Windows 7 in October, conduct a market share of desktop Linux even further.

It is not so bad for the penguin, however, such as improved memory management kernel, X.org server development boards, updated graphics drivers and developments in the two main environments Desktop - GNOME and KDE - are all the Linux desktop to improve the ecosystem.

Another improvement mode with 2.6.31 kernel parameter support for ATI Radeon graphics cards.

In kernel mode moves initialization parameter in graphics mode from the startup process of the X server kernel, which allows the user to quickly change and launch a seamless experience.

Developments devices that enhance the experience of desktop Linux will include support for the new USB 3.0 specification and a new FireWire stack.

Intel has worked USB 3.0 device support for hardware that eXtensible Host Controller Interface (xHCI) 0.95 specification implements.

USB 3.0 or USB-Super Speed, UPS theoritcal the maximum data rate to 4 Gbit / s.

XHCI material is not yet available, but the kernel drivers are tested as part of Fresco Logic prototype host controller.

For Firewire, 2.6.31 brings improved support for access to fine grained authorization policies implemented in user-space programs, IP networks with the new driver stack, and support for Firewire drives more than 2 TB.

"This is no longer marked as experimental in the setup menu of the nucleus, the distributors who have provided the older driver IEEE1394 stack to date are encouraged to build both the driver and installation of chimneys", says project .

The latest release candidate for the new Linux kernel 2.6.31-rc8 August 28.

Notebook Lenovo gScreen G400 NVIDIA GeForce

Notebook Lenovo gScreen G400 NVIDIA GeForce

CanovaV12 and success followed W700DS Lenovo Thinkpad laptop as a dual display, Computer Gscreen, American companies were ready for a two-screen LCD dual display output laptop before the end of this year.

G400 Series Laptop Computers Gscreen property features a main screen and an extra screen that can be shifted in order to guarantee a giant screen on the same laptop. Each has a screen size of 15.4 cm and a resolution of 1280 × 800 pixels, low enough for the size of a laptop today's standards.

GScreen The G400 is equipped with two 15.4-inch LED-backlit displays, Intel Core 2 Duo 2.8 GHz or 2.26 GHz, up to 8 GB of RAM and 500 GB of storage.

Other specifications include either a NVIDIA Quadro FX 2700M or NVIDIA GeForce 9800M GT graphics card, 6 USB 2.0 ports, VGA, Display Port, RJ-45, audio, firewire in a choice of a 6 cell or 8 cell battery.

The G400 gScreen is due to go on sale, it certainly appears as a notepad interesting, I wonder how much it will retail.

The most important thing on both screens laptop is the need of high energy consumption, with a 9 cell battery for measuring the time taken for backups. According to sources Gscreen computers, the G400 system will work with Windows XP or Vista, and ready to install Windows 7. Notebook G400 is expected to be released in the market for $ 3,000.

Ultra Lightweight Design Sony VAIO X Slim Netbook

Ultra Lightweight Design Sony VAIO X Slim Netbook

Sony has announced at IFA 2009, the X-series ultra-Slim VAIO laptop is only 0.5 cm thick and weighs only 1.5 kilograms. The VAIO X will use carbon fiber for the chassis and aluminum for the keyboard. The final specification is not yet confirmed, but the device is running on the Intel Atom.

The X VAIO has a 11.1 inch screen, two USB ports, VGA output, multi-in-one memory card slot and an Ethernet port. Sony VAIO officially launch X

Sony X-Series, this time with material of carbon fiber. 11.1-inch and 0.55 inches thick. Weighing only 1.5 kilograms. Half the size of the MacBook Air. Sony promises its new laptop has a battery life longer. For comparison, a book thick with Adamo 0.65 inches, weighs 4 pounds or even close to 2kg. Macbook Air Apple products have a thickness of 0.76 inches with the same weight.

After an introduction of the VAIO X505 revolutionary in 2003 when a carbon fiber stylish beautifully landscaped with chicklet keyboard was unveiled to the world, Sony has its sweet time before the publication of a different model in the X-and happened today ' Today at IFA in Berlin. This new ultra-portable, called Vaio X, provide an LED-backlit LCD 11.1, possibly an Atom processor (Sony has not confirmed that yet), 120GB HDD, 2GB of memory and a battery supposedly long . Common I / O includes 2 USB ports, VGA, MS / SD card reader, WiFi / WWAN We're going to review the specifications before long! But the laptop seems interesting, we'll just hope his performance will be so sweet!

The X-Series VAIO use a low voltage Intel processor (or Atom or Culv), but a shell of carbon fiber instead of aluminum or other more substantial material. Transfer to the body very rigid but light gives it a record weight of only 1.5 pounds, half as much as most netbooks and ultraportables like the MacBook Air. It also thins the system to a single half-inch thick on the issue.

Despite its new dimensions and greater than normal of 11.1 inches, the X is known that the battery life for them extremely long and last "all day and late into the night", although Sony will not say what involved. Most other specifications are vague, but 3G will be built.

Sony has hinted that under "Two thousand is going to cost". More Come Around October.