Subject: General Tech, Graphics Cards | May 6, 2011 - 05:25 PM | Scott Michaud
Tagged: linux, kgpu, gpgpu
PC Per has discussed using the GPU as a massively-parallel augment to the CPU for a very long time to allow the latter to focus on the branching logic (“if/then/else”) and other processes it is good at that GPUs are not. AMD and Intel both have their attempts to bundle the benefits of a GPU on to their CPU parts with their respective technologies. Currently most of the applications outside of the scientific community are gaming and multimedia; however, as the presence of stronger GPUs saturates, we are seeing more and more functions relegate to the GPU.
So happy together!
KGPU is an attempt to bring the horsepower of the GPU to the fingertips of the Linux kernel. While the kernel itself will remain a CPU function, the attempt allows the kernel to offload the parallel stuff to the GPU for large speed-ups and keep the CPU free for more. Their current version shows whole multiple speedups of eCryptfs, an encrypted filesystem, in terms of maximum read and write bandwidth by allowing the GPU to deal with the AES cipher.
We should continue to see speedups as tasks that would be perfect for the GPU are finally allowed to be with their true love. Furthermore, as the number of tasks relegated to the GPU increases we should continue to see more and stronger GPUs embedded in PCs which should decrease the fears for PC game developers worried about the number of PCs capable of running their applications. I am sure that is great news to many of our frequent readers.
Subject: General Tech | May 6, 2011 - 12:35 PM | Jeremy Hellstrom
Tagged: fab, TSMC, 12, inch
At 10 million 8-inch equivalent wafers produced in 2010 and an expected 20 million by 2015 it is a good thing that not only is TSMC not having major production issues anymore but it also ahead schedule with the setup of Fab 15, which will be producing 28nm chips on 12 inch wafers. Moving from 8 to 12 inches should also mean less cost per chip, though whether the savings will be absorbed by the costs of the new fab or if they will be passed straight on to the consumer is a question that cannot be answered until summer next year when they expect to get production capacity up to full speed. DigiTimes has the scoop here.
"Taiwan Semiconductor Manufacturing Company (TSMC) has begun equipment move-in for the phase 1 facility of a new 12-inch fab (Fab 15) with volume production of 28nm technology products slated for the fourth quarter of 2011, according to the foundry.
TSMC previously said it would begin moving equipment into the facility in June, and expected volume production to kick off in the first quarter of 2012.
Pilot runs at the phase 1 facility of Fab 15 are expected to start in the third quarter of 2011, following by volume production in the fourth quarter, said Jason Chen, senior VP of worldwide sales and marketing for TSMC, at a company event held on May 5. With new capacity coming online, TSMC will see its combined 12-inch capacity top 300,000 units a month."
Here is some more Tech News from around the web:
- USB 3.0 to Debut as Chip Interconnect @ SemiAccurate
- Meet DOCSIS, Part 1: the unsung hero of high-speed cable Internet access @ Ars Technica
- Transistors go 3D as Intel re-invents the microchip @ Ars Technica
- Apple dumps Intel from laptop lines @ SemiAccurate
- What MDS Should Mean to a CIO @ CoD
Subject: General Tech | May 6, 2011 - 09:20 AM | Tim Verry
Tagged: sony, Internet, Data Breach, Anonymous
As Sony analyzed the forensic data of the recent PSN/SOE attack, they discovered a text file named "Anonymous" and containing the phrase "We are legion," according to Network World. As a result of this, Sony even went so far as to accuse the hacker group as the responsible party in hacking the Playstation Network (and stealing customers' information) in a letter to the U.S. congress.
Anonymous responded to the implications brought by Sony today. Network World reports that Anonymous has stated they were not involved in the attack and that "others performed the attack with the intent of making Anonymous look bad." Based on a press release by the hacker group, it's prior victims had motive to irreparably defame the group in the public eye. Anonymous stated that they have never been involved in credit card theft. Further, they claim to be an "ironically transparent movement," and had they truly been behind the attack they would have claimed responsibility for their actions.
The press release goes on to state that "no one who is actually associated with our movement would do something that would prompt a massive law enforcement response." They further claim that the world's standard fare of Internet thieves would have invested interest in making Sony and law enforcement agencies believe it was Anonymous to throw police off of their trail.
The hacker group names such former victims as Palantir, HBGary, and the U.S. Chamber Of Commerce of being organizations that would like to discredit Anonymous. "Anonymous will continue its work in support of transparency and individual liberty; our adversaries will continue their work in support of secrecy and control," they state in their press release "we are anonymous."
As Anonymous, Sony, and spectators the world over debate, the affected public continues to wait for the true identies of the hackers involved in stealing 77 milion Sony customers' private information to come to light.
Subject: Editorial, General Tech | May 5, 2011 - 11:31 PM | Tim Verry
Tagged: Netflix, Customer Data, Corporate theft
It seems as though this Spring season is just a bad time for customers' personally identifiable information. Especially in the wake of the Sony PSN and SOE attack fiasco, to have yet another large corporation found to be involved in compromised customer data is rather disheartening for customers who trust companies with their private information.
Update: LastPass has also reported a data breach, resulting in customers' emails being compromised. Luckily; however, users' passwords were salted and hashed so users accounts on other sites should not be compromised in contrast to the Sony case where the passwords were compromised.
Fortunately, in the case of Netlfix, they have determined who the responsible party was and have moved swiftly to address the issue. Maximum tech reports that an un-named call center employee for Netlfix was terminated for accessing customers' information without permission. On April 4, 2011 Netflix discovered that one of their call center employees had been accessing confidential information of a number of customers that he had spoken with over the phone. He was found to have accessed the name and credit card information of two customers in New Hampshire.
According to the article, Netflix is now in the process of notifying the two customers in question.
The amount of private data that customers entrust will be kept private by the companies that they do business with everyday is rather daunting. When large corporations like Sony and Netflix run into problems with keeping information secure, one has to wonder how much compromised information goes under the radar of the majority of people. While there is not much one can do to stop others accessing their data without permission once information has been lost in a data breach or as a result of corporate theft, people do have control over what information is given to compainies to begin with.
It may seem rather paradoxical for me to quote Sony of all people; however, they have definitely seen the consequenses and thus can assuredly recommend that customers stay vigilant and protect themselves from fraud. Using one time credit card numbers (if your bank/card provider offers this) or reloadable visa debit cards with just enough money on them fro the desired transactions can help to protect you from data breaches such as this. Further, only provide the minimum amount of information necessary for a transaction, especially if it's to a company that you're unsure about. While various forms of fraud protection can help, preventing yourself from ever needing to use fraud protection in the first place is the best thing you can do for yourself and your private data. "Remain vigilant."
Subject: Editorial, General Tech | May 5, 2011 - 10:58 PM | Ken Addison
Tagged: ultrasharp, u3011, podcast, Phenom II X4 980, Intel, dell, amd
PC Perspective Podcast #153 - 5/05/2011
This week we talk about the Dell UltraSharp U3011 monitor, AMD Phenom II X4 980, 3D transitors and more!
The URL for the podcast is: http://pcper.com/podcast - Share with your friends!
- iTunes - Subscribe to the podcast directly through the iTunes Store
- RSS - Subscribe through your regular RSS reader
- MP3 - Direct download link to the MP3 file
Hosts: Jeremy Hellstrom, Josh Walrath and Allyn Malventano
This Podcast is brought to you by MSI
Program length: 1:23:01
- 0:00:35 Introduction
- 1-888-38-PCPER or firstname.lastname@example.org
- http://twitter.com/ryanshrout and http://twitter.com/pcper
- 0:02:13 That's not a monitor, this is a monitor! Meet the Dell UltraSharp U3011 Review
- 0:23:10 This Podcast is brought to you by MSI
, and their all new Sandy Bridge Motherboards!
- 0:23:55 AMD Phenom II X4 980 Black Edition Review: Last of the Breed
- 0:34:05 Graphics shipments rise 10% despite falling PC sales; NVIDIA share drops
- 0:37:20 AMD's new DX11 compatible embedded E6760 GPU can handle 6 displays
- 0:40:00 Intel and 3D Transistors: A love story
- 0:56:55 Seagate at 1TB per platter
- 1:08:33 Hardware / Software Pick of the Week
- http://twitter.com/ryanshrout and http://twitter.com/pcper
- 1:21:33 Closing
Subject: General Tech, Systems, Mobile | May 5, 2011 - 10:37 PM | Scott Michaud
Tagged: usb computer, Education
In case you did not get enough solder for one day: you are in luck! David Braben, previously known for his work developing such games as Rollercoaster Tycoon, Thrillville, and Kinectimals, created an extremely low cost PC for educational use. His goal is ultimately to have computers like the one he created be accessible such that there would be functionally zero barriers to entry for students to pursue studying computing. A charity was created, the Raspberry Pi Foundation, under these beliefs to distribute this device hopefully sometime within the next 12 months.
Am I the only one who finds it weird that an affordable PC uses HDMI?
Subject: General Tech | May 5, 2011 - 06:05 PM | Scott Michaud
Tagged: security, lastpass
One of the most important parts of security is authentication. A lot of our methods of authentication online revolve around passwords. There is an expectation these days that you are required to remember large passwords composed of completely random characters including numbers and symbols each unique from each other in the event that one source compromises the password you provide it. This necessity confronts our human nature of having terrible memory. Many programs have made attempts at solutions by storing and generating secure passwords for you.
Subject: General Tech, Storage | May 5, 2011 - 06:05 PM | Scott Michaud
Tagged: mod, microSD, atari 810
It is common knowledge that technology gets smaller as time advances. There is, however, a point where a certain level of advancement trots along the border to absurdity and makes you think about exactly what is possible with modern technology and occasionally an innovative spirit. Leave it to the hackers to consistently push that boundary and entertain the rest of us less talented individuals.
Subject: General Tech | May 5, 2011 - 06:04 PM | Jeremy Hellstrom
Tagged: mouse, wireless, gaming, gigabyte
Gigabyte has joined in the attempts of many companies to convince gamers that wireless mice are cool. With 50 hours of battery life and 6500DPI sensor the Aviva M8600 sounds good on paper but until you get it on the mat you will never know how well it performs. Hardware Secrets were certainly impressed by its ambidexterity, they were just as uncomfortable using it with the left hand as with the right. No complaints about input lag though.
"Gamers usually shun wireless peripherals, always wary of a possible energy loss. No one wants to rummage around for a cable and lose an online match. With that in mind, Gigabyte has released a wireless gaming-grade mouse with a long lasting 50 hour battery that comes with an extra battery that you can rapidly switch. Besides those characteristics, the Aivia M8600 reaches 6,500 DPI and features a design for both right- and left-handed users, plus ten reprogrammable buttons. Let's talk first about its physical aspects and then test its wireless operation."
Here is some more Tech News from around the web:
- Microsoft Express Mouse @ Maximum CPU
- Roccat Kone [+] Review @ t-break
- ROCCAT Alumic Gaming Mousepad Review @ Madshrimps
- Razer Onza Tournament Edition Controller Review @ t-break
- Razer Onza Tournament Edition XBOX 360 Controller Review @ HardwareHeaven
- Razer BlackWidow Ultimate Mechanical Gaming Keyboard Review @ HardwareHeaven
Subject: Editorial, General Tech | May 5, 2011 - 08:35 AM | Tim Verry
Tagged: Internet, Education, Cyber Security
Microsoft recently posted a press release detailing the results of its sponsored study by the NCSA (National Cyber Security Alliance). The study sought to determine whom people believe bears the responsibility for teaching children how to protect themselves on the Internet, as well as what the current situation is as far as K-12 students’ level of preparedness and education. The executive director of the NCSA, Michael Kaiser, had this to say:
“Just as we would not hand a child a set of car keys with no instruction about how to drive, we should not be sending students out into the world without a solid understanding of how to be safe and secure online."
According to Microsoft, the NCSA advocates for a “comprehensive approach” to teaching children from K-12 how to stay safe and secure online. While the consensus seems to be that students do need educated in Internet security, people are divided on exactly who bears the primary responsibility for teaching children. Children’s teachers, parents, and even government leaders and law enforcement have all been raised as possible responsible parties. The majority of teachers (80 percent) and school administrators (60 percent) surveyed are proponents of parents being responsible for teaching their kids about “digital safety, security, and ethics.” On the other hand, more than 50 percent of the IT coordinators surveyed believe that teachers are the ones that bear the most responsibility of educating kids. From the survey, one area where all groups do seem to agree is on the question of government responsibility in educating kids. Microsoft states that less than one percent believe law enforcement and government officials should bear the responsibility.
While cyber security is important for students to learn, as 97 percent of school administrators believe schools should have courses and an educational plan for students throughout their K-12 grades, only 68 percent of administrators “believe their schools or school districts are doing an adequate job of preparing students...”
The situation of adequate education looks even bleaker when teachers where surveyed. When asked whether they feel prepared to teach students adequately, 24 percent believed they were adequately prepared to talk about and educate kids on protecting personal information on the Internet, and 23 percent are comfortable teaching the risks of cyberbullying. Further, only one-third of teachers surveyed believe they are prepared to educated students on basic Internet security skills “such as password protection and backing up data.” The low numbers are attributed to the lack of professional development training that teachers are receiving. Microsoft states that “86 percent received less than six hours of related training.” Microsoft quotes Kaiser in saying that “America’s schools have not caught up with the realities of the modern economy. Teachers are not getting adequate training in online safety topics, and schools have yet to adopt a comprehensive approach to online safety, security and ethics as part of a primary education. In the 21st century, these topics are as important as reading, writing and math.”
In all of this, there is a ray of hope. Comparing the 2010 study to the NCSA’s 2008 study which you can read here, an increasing number of teachers believe cyber security and professional development training is a priority.More than 60 percent of school officials and teachers are interested in pursing further security training. This interest in training among teachers is up to 69 percent from 55 percent in 2008. IT coordinators and administrators are also becoming more interested in revamping the educational curriculum to better teach their students and workers. Further improvements in interest among educators pursuing further security training can be seen between the 2010 and the 2011 NCSA study. Also, slightly higher percentages exist across the board for teachers who have tought aspects of security in their classrooms compared to both the 2010 and 2008 studies.
On the other hand, while interest in training is increasing for teachers, from 2010 to 2011, security topics taught in clases have actually dropped. This is in addition to a decrease in teachers' beliefs that they bear responsibility in educating kids.
A comparison paper between the 2008 and 2010 study can be downloaded here (PDF).
What are your thoughts on this issue; who bears the primary responsibility in educating children on the importance of Internet safety?
Image 1 courtesy 2011 NCSA study. Image 2 courtesy 2008 to 2010 NCSA comparison study. Material is copyright NCSA, and used according to fair usage guidelines for the purpose of commentary and reporting.