Subject: General Tech | June 21, 2011 - 11:38 AM | Jeremy Hellstrom
Tagged: opteron, interlagos, bulldozer, amd
It might just be that the ISC is the perfect place to show off their new chip or it may have been Intel's displaying of the 50 core Knights Corner silicon yesterday; whatever triggered it we finally get a look at AMD's Bulldozer. A 1U server by Supermicro contained two 16-core Bulldozer chips though other vendors are claiming to be able to fit a 4 socket system in the same size case. Those sweet talking wonks over at The Inquirer not only talked their way into getting a few photos of the system they were even allowed to fondle it, which revealed heatsinks that were cool enough to touch even when running POVRay which lends credence to the idea of 4 CPUs, or 64 cores, in a 1U box. We are still looking at Q3 for a release of the new Opteron architecture, with no news at all as to AMD's plans to turn that architecture into an APU in a later generation of chips.
What a little chutzpah gets you
"CHIP DESIGNER AMD chose the International Supercomputing Conference (ISC) to finally demonstrate a working Bulldozer system.
At AMD's ISC stand one could find several 2U and 4U servers built with older Opteron chips, but it was a 1U pizza box server made by Supermicro that housed two 16-core Bulldozer chips running live demonstrations of POVRay. This is the first time that AMD has publicly displayed its next generation Opteron processor, codenamed Bulldozer."
Here is some more Tech News from around the web:
- 13-Year-Old Password Security Bug Fixed @ Slashdot
- McAfee announces Wavesecure security software @ The Inquirer
- Microsoft could buy RIM @ The Inquirer
- Intel to launch Ivy Bridge in March 2012 @ DigiTimes
- Google revives TV buzz with SageTV buy @ The Register
- Google bypasses admin controls with latest Chrome IE @ The Register
- Resistive memory: how small can you go? @ NanotechWeb
Subject: General Tech | June 21, 2011 - 03:33 AM | Scott Michaud
Tagged: vsis, sudo, PlanetLab, linux
The Unix-based computer has always been ahead of the curve when it comes to enforcing permission levels upon their users. Back during the infancy of operating systems the idea of permissions did not compute with many of the platform developers. Today it is next to impossible to imagine a modern operating system without some sort of hierarchy of trust. Historically there were various methods of controlling access: first there was “su” which temporarily logged you in as another user; then there was “sudo” which let you just execute commands to another user rather than log in as them; now PlanetLab claims to have a better offering, called “Vsys”.
Vsys was created to allow finer control over what user is allowed what action. One feature is the ability to create extensions, scripts from executable files, to define what is permissible and what is not. It is apparently possible to permit certain combinations of commands but no other similar combinations. PlanetLab, the creator of Vsys, is a research network headquartered at Princeton University. From the wording of the article it appears as if Vsys was an internal tool developed for their researchers to have more specific access to what was necessary which they now released publicly. While it has been stated that Vsis will not replace sudo for the common user it should be useful for administrators of larger groups of users.
Subject: General Tech, Storage | June 20, 2011 - 09:06 PM | Ryan Shrout
Tagged: storage, raid, network attached storage, NAS, drobo
Just Delivered is a new section of PC Perspective where we share some of the goodies that pass through our labs that may or may not see a review, but are pretty cool none the less.
When the time is right for dedicated network storage and you don't want to go through the hassle or complication of building your own FreeNAS or other type of device, one of the best options on the market according to our own Allyn Malventano is a Drobo.
For an upcoming review we just received a new Drobo FS, the network attached version of the Drobo lineup. Available in both a standard and a "Pro" model, the former with 5 bays the latter with 8, they are about as idiot-proof and easy to setup as a NAS can be.
The Drobo FS only has a single connectivity option: the Gigabit Ethernet port for connection to your primed-and-ready router. Adding or swapping hard drives for larger models is super easy and the "BeyondRAID" technology makes it reliable as well as simple to use.
We are looking forward to putting the Drobo FS to the test in the coming days and reporting back to you on the performance, features and reliability of it.
Subject: General Tech, Processors | June 20, 2011 - 04:46 PM | Scott Michaud
Tagged: VIA, sysmark, nvidia, bapco, amd
People like benchmarks. Benchmarks tell you which component to purchase while your mouse flutters between browser tabs of various Newegg or Amazon pages. Benchmarks let you see how awesome your PC is because often videogames will not for a couple of years. One benchmark you probably have not seen here in a very long time is Sysmark from the Business Applications Performance Corporation, known as BAPCo to its friends and well-wishers. There has been dispute over the political design of BAPCo and it eventually boiled over with AMD, NVIDIA, and VIA rolling off the sides of the pot.
Fixed that for you
The disputes centered mostly over the release of SYSmark 2012. For years various members have been complaining about various aspects of the product which they allege Intel strikes down and ignores while designing each version. One major complaint is the lack of reporting on the computer’s GPU performance which is quickly becoming beyond relevant to an actual system’s overall performance. With NVIDIA, AMD, and VIA gone from the consortium, Intel is pretty much left alone in the company: now officially.
Subject: General Tech | June 20, 2011 - 12:11 PM | Jeremy Hellstrom
Tagged: Intel, mic, larrabee, knights corner, 50 GPGPU
Knights Corner is not exactly Larrabee but the idea behind both are very similar. A large number of GPGPUs are integrated with a CPU, Intel is using a Xeon core now as opposed to a Pentium; with the GPGPUs hooked up in a similar method to Larrabee's ring of Pentium cores. The design is proven as they have sold units of the previous generation Kights Ferry and offers a feature that a lot of programmers are going to appreciate; instead of needing to learn a new language like CUDA or OpenCL, standard x86 scalar code is used to program these chips. This architecture is also expected to scale very well, for as ARM recently pointed out only specific multithreaded applications continue to scale well as more cores are added. Drop by The Inquirer for more information.
They will likely be sold as PCIe card like the Knights Ferry card pictured above.
"CHIPMAKER Intel has announced its second generation hybrid core technology codenamed 'Knights Corner'.
Knights Corner is Intel's second chip in its Many Integrated Core (MIC) chip line and will feature Xeon X86 cores and more than 50 GPGPU cores loosely based on what was previously known as Larrabee. Knights Corner will be fabricated using Intel's 22nm tri-gate process node beginning in 2012, though the firm would not be drawn on the exact core count at this time."
Here is some more Tech News from around the web:
- Japan's 8-petaflop K Computer Is Fastest On Earth @ Slashdot
- Intel admits that Moore's Law is not enough @ The Inquirer
- When WiFi doesn't work: a guide to home networking alternatives @ Ars Technica
- Western Digital Livewire PowerLine AV Kit @ TechwareLabs
- US reveals Stuxnet-style vuln in Chinese SCADA 'ware @ The Register
- Adobe offloads unwanted Linux AIR onto OEMs @ The Register
- Designcord 5 Metre Autorewind Cable Reel Extension Lead Review @ eTeknix
- x264 HD Benchmark 4.0 @ TechARP
- ArtRage: quality digital painting on the cheap @ Ars Technica
- Ultra Simple 360-degree Photo Hack @ Make
- AMD Developer Summit lacks Bulldozer details @ The Inquirer
- Nokia Connections 2011 - Our Expectations @ t-break
- DreamHack Summer Festival kicks off! Day One! @ eTeknix
- Interview with Ziad Matar of Qualcomm @ t-break
- Patriot Xporter XT Rage 32GB Flash Drive Giveaway! @ ThinkComputers
- Weekly Giveaway #2: Foxconn Flaming Blade GTI, Innergie mCube Lite, SteelSeries Spectrum AudioMixer, StarTech ExpressCard eSATA Controller Adapter Card @ eTeknix
Subject: General Tech, Displays | June 20, 2011 - 04:03 AM | Scott Michaud
Tagged: widi, D-Link
There are a lot of benefits of having a home theatre PC but still one major drawback: having the PC by the TV. Intel has worked hard to find a solution and released the specification under the name “WiDi”, a wireless display specification that lets you share your monitor with an HDTV attached to a wireless receiver box. D-Link has just recently launched their WiDi receiver in the US with Canada coming next month; will WiDi start picking up market share with more capable devices?
Why do network appliances these days look like pillows?
(Image from D-Link)
The D-Link MainStage (known as DHD-131 to its friends) has only a power cable to its name apart from your choice of video and audio connection to your TV or sound system. For choice of connection you have two video options and three audio options: on the video side you have HDMI for your high-resolution viewing and standard RCA for your standard definition devices; on the audio side you have optical audio or HDMI for surround and white and red RCA for stereo. Apart from a power button and a reset button that is the whole of this unit.
Plastic case with on/off butty. Baby got back shots.
(Image from D-Link)
One thing that typically holds back other implementations of WiDi that I have seen, and I assume this is no exception, is latency. The slight lag when controlling a media program or browsing a website is acceptable however it would really hold back the use of a PC as a console replacement unless the video card is directly connected to the TV which is a definite shame but to be expected given the bandwidths over WiFi that we are talking about. If you happen to be interested in this solution, however, it retails for just under 130$.
Subject: Editorial, General Tech | June 20, 2011 - 03:24 AM | Tim Verry
Tagged: simulator, networking, Internet, cyber warfare
Our world is the host to numerous physical acts of aggression every day, and until a few years ago those acts have remained in the (relatively) easily comprehensible physical world. However, the millions of connected servers and clients that overlay the numerous nations around the world have rapidly become host to what is known as “cyber warfare,” which amounts to subversion and attacks against another people or nation through electronic means-- by attacking its people or its electronic and Internet-based infrastructure.
While physical acts of aggression are easier to examine (and gather evidence) and attribute to the responsible parties, attacks on the Internet are generally the exact opposite. Thanks to the anonymity of the Internet, it is much more difficult to determine the originator of the attack. Further, the ethical debate of whether physical actions in the form of military action is appropriate in response to online attacks comes into question.
It seems as though the Pentagon is seeking the answers to the issues of attack attribution and appropriate retaliation methods through the usage of an Internet simulator dubbed the National Cyber Range. According to Computer World, two designs for the simulator are being constructed by Lockheed Martin with a $30.8 million USD grant and Johns Hopkins University Applied Physics Laboratory with a $24.7 million USD grant provided by DARPA.
The National Cyber Range is to be designed to mimic human behavior in response to various DefCon and InfoCon (Informational Operations Condition) levels. It will allow the Pentagon and authorized parties to study the effectiveness of war plan execution as it simulates offensive and defensive actions on the scale of nation-backed levels of cyber warfare. Once the final National Cyber Range design has been chosen by DARPA from the two competing projects (by Johns Hopkins and Lockheed Martin), the government would be able to construct a toolkit that would allow them to easily transfer and conduct cyber warfare testing from any facility.
Image cortesy Kurtis Scaletta via Flickr Creative Commons.
Subject: General Tech, Mobile | June 19, 2011 - 12:22 AM | Scott Michaud
Tagged: tablet, sony, S2, S1
We are going to see quite a few Android-based tablets come out in the next few months as the flood gates open for tablet creators. We have been reporting on strong rumors have been pointing to Amazon stepping in the tablet space to extend their Kindle portfolio this fall. Amazon is generally very successful when they decide to step in the market, yet that did not deter Sony from preparing to dive in to the tablet space as well. Sony are preparing to launch a 9-inch tablet and a dual screen 5.5-inch tablet in the autumn and to build hype they have released a video ad campaign to build hype for that event.
This “Two Will” Pass
As you can tell from watching the video, it says little about the product except that they slide really quickly, absolutely love someone, cast ominous shadows, and can kill action figures with lightbulb mind bullets. Sony did mention that this is just the first episode of five so it is possible that their later videos may be more informative. However, if you just want to see what an Echochrome 2-esque city has to do with Android tablet then be sure to watch the next four commercials.
We apologize for the lack of a podcast, but you don't often get a chance to see your city humiliate its self
Subject: General Tech | June 17, 2011 - 06:36 PM | Jeremy Hellstrom
Tagged: friday, PC Perspective Forums
Before your weekly tour through the PC Perspective Forums, it would behoove you to check out the bottom of some of our front page stories. If you click on the comments link, or just scroll down after clicking on an article you will notice it is possible to have a discussion about that article right there on the front page with other readers and with the creator of the review or news post. It is easy and you don't even need to sign up, though we would prefer that you do as membership at PC Perspective does have its privileges. If you want to remain anonymous or unverified then certainly do, though we do require you to fill something in the email address box and read a captcha, as there are still spammers out there on the internets.
To get really in depth advice and opinions you really should head off to the PC Perspective Forums, we can't give you indepth instructions on using Microsoft's debugging tools in the comments section but it is a piece of cake (slightly old cake, but still) to provide step by step instructions with pictures in the Forum its self. Some things just shouldn't be on the front page, but in the forums you will find kind souls ready to help your wetware as well as your hardware. Sometimes you will even find independent reviews in the Forums.
In the Cases'n'Cooling Forum, a new case mod has appeared; the Blood Ice HAF 922 is worth a look whether you are into case modding or just want to see an impressive tool set and workbench. In the Storage Forum a member is having an unpleasant time with a recent SSD upgrade as is someone in the Linux Forum.
The live watchers are already upset with us and the rest will just be receiving the bad news, but for the first time in quite a while we failed to provide our dedicated viewers a fresh PC Perspective Podcast on Wednesday. With Ryan in Seattle schmoozing with AMD and a pending riot of Vancouver residents, we decided to call it off. Perhaps next week we shall torture you with a double length episode?
Subject: General Tech | June 17, 2011 - 02:37 PM | Scott Michaud
We have been long battling online menaces that are looking to generate money off of the grief of others. It used to be simple for the attack to be successful: release virus; ???; profit. Now that worms are much less common the focus has shifted from invading a person’s computer to tricking the person to allow you in their computer or attacking the service they are accessing. Now, what was once a far-fetched joke by a popular comic strip is true: people are being contacted at home and told to infect their computer.
Your call is VERY important to us.
The story for security has always been the same: be careful what you do, keep your attack surface as small as possible, and limit the damage in the event of a breech. You need to be aware, regardless of what platform you utilize, that you are only as safe as your level of complacency. If someone is attempting to get you to do something quickly, they likely are trying to play on your complacency by distracting you with an urgency. The disappointing part is that in the heat of the moment even someone aware of these attacks could still be susceptible to them because social engineering is simply very effective.
All of the above said, the silver lining to this whole problem is that the attackers are getting substantially more desperate which means that it is only a matter of time before the pool of attackers shrinks due to lack of profitability. The problem will never go away, but as the difficulty steadily increases for the attackers (which it is, otherwise they would not be so inventive) the draw of money will seem much less luscious.