Le Blog de Langrensha et Langrensha

J+21



Mon quotidien
Battery for Asus G74

Les Présentations
Battery for Dell 7FJ92
Battery for Acer TravelMate 6592G
Akku für Acer Aspire 4S820TG

Mes rendez-vous
Battery for Lenovo Thinkpad R61
Batterie pour Dell Latitude E6510
Akku für Apple A1079
Battery for Compaq 233343-001
Battery for ASUS G75
Battery for Acer Aspire 5820T
Battery for SONY VGP-BPS21
Battery for Apple A1495
Battery for Samsung NP-R460
Battery for Acer Aspire 5820T
Batterie pour Compaq Presario CQ40
Battery for DELL Alienware M17x

Les échographies
Battery for HP COMPAQ 6830s
Batterie pour Samsung AA-PB2VC6W
Akku für Samsung AA-PL9NC6B
Battery for Samsung NP-R520
Battery for HP Compaq 6515b
Akku Dell Latitude D430 kaufen-akku.com

Les achats
Battery for Toshiba Satellite L650
Akku für Dell Alienware M14x R2
Battery for Acer Aspire 5820T
Batterie pour Compaq Presario CQ72
Akku Dell Latitude D830

Divers
Battery for Dell Inspiron 1525
Batterie pour FPCBP281
Batterie pour Sony VGP-BPS13
Akku für ASUS A32-K55
Battery for lenovo IdeaPad Z575
Akku für IBM ThinkPad T60
Batterie pour Toshiba PA3817U-1BRS
Batterie HP COMPAQ NX9040
Akku für Dell Inspiron N7010


Battery for Lenovo Thinkpad R61

We all knew it was coming. In a conference call with investment analysts in April, Qualcomm CEO Steven Mollenkopf said he was "assuming" that a major customer – cough, cough, Apple – would use a second supplier. And in July, Intel CEO Brian Krzanich said he was "concerned about getting the leading-edge momentum going for us with the 7360" – that's the XMM 7360 modem that launched in 2015.And true enough, the XMM 7360 has turned up in some iPhone 7 and 7 Plus handsets. There's a catch: this chip doesn't support CDMA networks. So if you buy an Intel-modem phone, and you want to switch to a CDMA network, such as Sprint or Verizon in the US, you'll be out of luck. Qualcomm's X12 radio modems support CDMA so iPhones using those chips will work universally.Luckily, there's a handy guide on Apple's website listing the two variants of the iPhone 7/7 Plus. The A1660/A1661 works with GSM and CDMA networks, sports a Qualcomm MDM9645M X12 modem chipset, and works with Verizon and Sprint in the US. The A1778/A1784 supports GSM, sports an Intel modem chipset, and works with AT&T and T-Mobile US in America.


What the Apple website doesn't mention is that if you carrier unlock an A1660/A1661, you'll be able to use it on AT&T and T-Mobile US because the Qualcomm modem inside will support those networks. But if you carrier unlock an A1778/A1784, you won't be able to use it on CDMA networks.Basically, if you want a phone that works everywhere, get the A1660/A1661. If in doubt, check the model number against the aforementioned webpage for carrier compatibility. For what it's worth, in the UK, Apple will sell you an A1778/A1784 that supports 3, EE, O2 and Vodafone.Intel isn't insane for leaving out CDMA support, by the way: the standard is dying, and Qualcomm owns a load of CDMA patents, so Chipzilla decided to skip it.To further complicate things, potentially, Apple can switch out Intel's XMM 7360 in its GSM-only A1778/A1784 for the tried-and-tested Qualcomm X12 but use firmware to limit the phone to non-CDMA networks. This could happen if something goes wrong with the Intel supply – such as if the XMM 7360 isn't up to the X12's performance.One final thought: the new iPhone 7 and 7 Plus won't support the expensive AWS-3 radio bands, aka LTE band 66, which were cleared to make way for greater mobile broadband coverage in the US.



Episode 11 So I'm in the office by myself while the PFY is out doing... something... I guess... when one of our atypical difficult users comes in."Just one question," he starts, interrupting the thought I started when he walked in on potential loopholes in the gun laws. "My browser has an icon which is red.""What's the icon?" I ask, feigning... well everything. Interest, professionalism, the will to live, you name it.There are three very broad categories of user in my vast experience:a. People who think they know what they're doing but realise they don't - and eventually admit it,
and b. People who will never admit they don't know what they're doing. Ever. Because they have a degree and are much smarter than you. And computers. And the people on The Chase. And everyone they socialise with.
The only people worse than a 2b is a 1b - People who don't know what they are doing but don't want to take any risks - who will come and ask you about EVERY BLOODY MESSAGE BOX, WINDOW, WARNING, UNUSUAL BROWSER PAGE, TASKBAR BALLOON, ETC that comes their way.


"Did you take a picture of it?" I ask, trying to buy myself some time to send a text message to the PFY telling him the Swedish Volleyball Team is in Mission Control looking for him before making myself scarce..."Yes I did!" he says, showing me a blurred picture on his phone."That's just an icon to tell you your browser needs updating," I say. “Nothing to be worried about at all.""Well yes, but the internet has been running a bit slowly recently.""Nothing. When we update your browser it'll go away.""Oh. And when can you do that? I've got a meeting in 5 minutes so I'll be away from my desk for an hour or so.""Oh I'm sorry, I have some other installs that have become urgent," I lie."Hmmm, I'll just check the Helpdesk Queue and see if there's anything else urgent.""Oh, look," I say, pointing at the screen. “There’s about 100 urgent jobs stacked up in there.""That one's from 2008!" he gasps, almost discovering the secret of my outstanding urgent-job queue - Never, EVER close a job."Partly this is my own fault for isolating him from the update cycle as he did tend to go heavily 1b every time an automatic update was rolled out and his box told him it had rebooted to complete the install - Because it's probably a virus. Or a "hacker".


The other vexing thing about 1bs - and this guy in particular - is that he'll dash up to tell you that the Google picture has changed and "it's probably a website virus" yet he'll still spend his lunchtimes browsing an obscure hobby discussion board which is about 95 per cent zero-day exploits and 5 per cent content on his work desktop.I realise that it's probably time to update the image that gets flashed to his box every Monday and maybe verify that the scanning software that filters his file-sharing is up to date. Meantime, though, I just need him out of the office.“You say the internet was slow – was it faster or slower than your personal laptop?” I ask, putting a crowbar in the lid of Pandora’s Box and pushing real hard.I recall he once asked me to give his personal laptop a once-over to see if it needed more memory and I recall that the memory and cpu consumption was about 30 per cent browser toolbars, 30 per cent malware and 40 per cent virus scanners, all playing a massive game of Last Man Standing.He asked if we could plug it into our work network to do some updates because his home network seemed rather slow, but I didn’t want our mail gateway to implode from the influx of IPS warnings so accidentally nudged his machine out the office window that hadn’t been open about 30 seconds earlier.



The Cabinet Office is failing to coordinate the UK's government departments' efforts to protect their information according to a damning report by the National Audit Office.The NAO found that the Cabinet Office failed in its duty and ambition to coordinate and lead government departments’ efforts in protecting such information.The Cabinet Office has “tried to take a more strategic role in offering support and guidance to central government departments,” the NAO report found. “However, senior-level governance remains complex and unclear and, until recently, a wide array of central teams have been involved in information assurance and protecting information, sometimes offering overlapping and contradictory advice.”Reporting personal data breaches is chaotic, with different mechanisms making departmental comparisons meaningless. In addition, the Cabinet Office does not have access to robust expenditure and benefits data from departments, in part because they do not always collect or share such data. The Cabinet Office has recently collected some data on security costs, though it believes that actual costs are "several times" the reported figure of £300 million.As a result, NAO stated that GCHQ dealt with 200 “cyber national security incidents” per month in 2015, double the number of attacks it had addressed in 2014, though the result of these attacks has not been reported.The report certainly suggests that departments need to get their own houses in order before they start opening up access to even more of citizens' data, as per the porn-blocking Digital Economy Bill, with 8,995 data breaches in the 17 largest government departments in 2014-15.



Message déposé le 26.06.2017 à 07:46 - Commentaires (0)


Batterie pour Dell Latitude E6510

Alors que la fonctionnalité a été dévoilée pour tous les principaux navigateurs sur iOS et Android au mois de décembre de l’année dernière, maintenant, trois mois plus tard, elle est enfin disponible sur votre ordinateur de bureau.Elle fonctionne comme ceci. Disons que vous recherchez des « chats ». Après avoir trouvé une photo que vous aimez, tout ce que vous avez à faire est de cliquer dessus, et de cliquer sur l’étoile matérialisant la mise en favori de l’image. Dès lors, la photo sera ajoutée à vos collections. La prochaine fois que vous en avez besoin, il suffit de vous rendre sur google.com/save (cela fonctionne également sur mobile) et vous trouverez toutes vos images enregistrées afin d’y accéder très facilement.Comme vous l’imaginez, vous devez être connecté à un compte Google pour enregistrer les images afin d’y accéder depuis vos collections. Cette exigence peut également conduire la société à coupler cette fonctionnalité avec Collections, un service qui a été lancé pour Google+ plus tôt dans l’année, à une date ultérieure. Collections permet aux utilisateurs de consacrer une page Google+ au sujet de leur choix, et permet aux gens de le suivre, grâce à des vidéos, des photos, et d’autres types de contenus qui peuvent être ajoutés.


Google permet de marquer des images et les ajouter aux collections
« Par exemple, si votre jardin a besoin d’une petite replantation, il suffit d’aller à votre bureau, de rechercher une image et d’appuyer sur l’étoile pour ajouter vos potentielles nouvelles fleurs, vos buissons, ou même une piscine », a déclaré Mark Colbert, ingénieur logiciel chez Google Search, dans la publication sur le blog. « Quand vous êtes dans un magasin prêt à acheter, vous serez en mesure de récupérer vos images enregistrées sur votre smartphone et commencer à concevoir votre jardin ».Malheureusement, la fonctionnalité est disponible uniquement aux États-Unis, et l’on ne sait pas quand le géant de la recherche va la rendre disponible dans le monde entier.Alors que nous sommes à quelques heures du début de la conférence BUILD de Microsoft, la dernière rumeur à apparaître au sujet de la prochaine version Redstone de Windows 10 est centrée sur les cartes interactives qui feraient leur apparition dans centre de notifications et Cortana. L’information statique est censée être visible par une nouvelle interface utilisateur sous la forme de cartes, qui permettront d’afficher et de partager des informations entre Cortana et le centre de notifications, selon WinBeta.



Les nouvelles cartes devraient offrir une présentation plus propre que les affichages statiques actuellement utilisés par les deux services. Cortana et le centre de notifications vont partager un ensemble commun d’actions qui sont accessibles de plusieurs façons. Par conséquent, le centre de notifications et Cortana auront la possibilité de communiquer à travers ces cartes, et fournir une expérience plus personnalisée à l’utilisateur.D’autres applications pourraient également avoir accès à cette nouvelle fonctionnalité, afin de présenter des informations et des actions à l’utilisateur. Par exemple, WinBeta affirme que l’application Calendrier aurait la possibilité d’épingler des cartes de rappel pour des anniversaires dans le centre de notifications. Des fiches individuelles pour les réunions pourraient également être épinglées au centre de notifications, fournissant à l’utilisateur une indication visuelle s’il est possible de planifier une réunion.La publication poursuit en citant des sources anonymes qui prétendent que Microsoft expérimente des filtres dans le centre de notifications. Cela permettrait à l’utilisateur de choisir les notifications qui peuvent être vues dans le centre de notifications. Les notifications pourraient également être affichées en fonction des types d’applications, leur permettant d’être mieux organisées. Un bon exemple serait Facebook : toutes les notifications connexes seraient placées sous un en-tête spécifique. Ainsi, l’utilisateur pourrait filtrer le centre de notifications pour afficher seulement les notifications de l’application sociale.


La dernière rumeur provient d’une fuite interne, affirmant que la conception finale de l’interface des cartes pourrait changer ou non une partie ou tout de Windows 10. L’image obtenue dans la publication montre une carte représentant Foursquare, qui affiche plusieurs restaurants et leurs avis. Une autre carte est l’application Calendrier qui montre une réunion qui aura lieu à un moment précis. Une autre carte ressemble vraiment à une fenêtre de chat.La mise à jour Redstone est prévue d’être scindée en deux : Redstone 1 (RS1) qui arriverait au mois de juin, et Redstone 2 (RS2) qui serait disponible au cours du premier trimestre de l’année 2017. La RS1 devrait être révélée lors de la conférence BUILD ce jour, tandis que la RS2 devrait embarquer les caractéristiques qui ne seront pas présentes dans la première itération, et qui devrait arriver avec de nouveaux périphériques (Surface Pro 5 et Surface Book 2).Quoi qu’il en soit, je serais présent dans les locaux de Microsoft pour suivre la conférence BUILD, où l’on s’attend à avoir des informations sur Windows 10 Redstone.Comme prévu, le nouveau Chromebook 14 d’Acer peut être la combinaison parfaite entre des caractéristiques intéressantes, et un prix abordable, capable d’attirer les acheteurs d’ordinateurs portables Windows et Apple. Certes, la fidélité des consommateurs d’ordinateurs est généralement liée à autre chose que les fonctionnalités et les euros dépensés, mais un nombre suffisant d’éléments attractifs pourraient convaincre certaines personnes d’opter pour une autre plate-forme très attrayante. Si vous êtes prêt à tester quelque chose de nouveau, et que vous passez votre temps sur Chrome, le nouveau Acer pourrait vous faire de l’œil.



La nouvelle gamme Chromebook 14 d’Acer est maintenant disponible en précommande sur Amazon, et devrait arriver dans nos foyers à partir du mois d’avril. Malheureusement, ce devrait être le cas uniquement outre-Atlantique pour le moment.Pour ce qui est des spécifications, le Chromebook 14 a un écran IPS LCD de 14 pouces soit avec une résolution full HD (1 920 x 1 080 pixels) ou HD (1 366 x 768 pixels), et offre des angles de vision jusqu’à 170 degrés. Une webcam HD 720p (résolution 1 280 x 720 pixels) avec un microphone enregistre à la fois l’audio et la vidéo en HD, et s’avère être parfaite pour les selfies et la vidéoconférence.Le Chromebook 14 est le premier modèle d’Acer à avoir un châssis tout en aluminium, et le premier à avoir deux ports USB 3.1. Le châssis en aluminium a des coins arrondis et une finition brossée. Le Chromebook 14 est relativement léger, 1,55 kg, soit légèrement plus lourd que les modèles 11 pouces d’Acer. Non seulement il est léger, mais il est également assez mince, avec une épaisseur de seulement 1,7 cm — semblable au MacBook Air. La portabilité et la robustesse du Chromebook sont réellement intéressantes.



Message déposé le 26.06.2017 à 07:20 - Commentaires (0)


Akku für Apple A1079

Hürth (dpa) - Langsam rollt der vierrädrige Roboter über die zerklüftete Landschaft aus Geröll. Plötzlich hat er sich in einer leichten Vertiefung festgefahren. Minutenlang passiert gar nichts. Junge Männer tippen hektisch auf Computern herum, bis der Rover schließlich wieder losruckelt.Zehn Hochschul-Teams aus ganz Deutschland simulierten am Freitag in Hürth bei Köln die Erkundung eines fremden Planeten mit Robotern. Ein Jahr lang hatten die Teilnehmer Zeit, sich auf das sogenannte SpaceBot-Camp des Deutschen Zentrums für Luft- und Raumfahrt (DLR) vorzubereiten.Die Aufgaben sind anspruchsvoll: Der Roboter muss sich auf einer holprigen Planetenoberfläche orientieren, dort Gegenstände finden und greifen. Er muss einen Becher mit einer Bodenprobe zur Basisstation transportieren und einen Akku in einen Schacht stecken. Das alles soll der Roboter möglichst autonom machen, also ohne direkte Steuerung - zumal der Funkkontakt "zur Erde" verzögert ist und wie bei einer richtigen Weltraummission zwischendurch auch mal abbrechen kann."Das ist alles sehr schwierig", sagt Georg Heppner vom Team "Laurope" des Karlsruher FZI Forschungszentrums Informatik, dessen sechsbeiniger Roboter an eine grüne Heuschrecke erinnert. Wenn das Technikmonster an ein Hindernis stößt, kann es ein Bein heben, um darüberzusteigen. Unfassbare Datenmengen seien erforderlich, damit der Roboter solche Handlungen selbstständig ausführt, erklärt Heppner.


Der orangefarbene Roboter des Teams "Nimbro" der Uni Bonn ist mit zwei Greifarmen, acht Kameras und einem rotierenden 3D-Laserscanner ausgestattet. Das Wunderteil könne auch Türen öffnen, Treppen steigen und einen Kreis aussägen, erläutert der Teamleiter, Prof. Sven Behnke. Wenn die Technik hakt und der Rover nicht von alleine macht, was er soll, greifen Menschen aus der Ferne ein. Mit einer Spezialbrille können die Studenten die Perspektive des Roboters einnehmen und sehen dann das, was er sieht: Farbige Punkte, die unterschiedliche Geländehöhen kennzeichnen, und die Greifarme, die wie die eigenen Arme erscheinen.Das Bundeswirtschaftsministerium hat jedes der zehn Teams mit 50 000 Euro unterstützt. Ziel sei es, die Forschung im Bereich der Weltraumrobotik zu fördern, erläutert DLR-Projektleiter Thilo Kaupisch. Dass die in Hürth gezeigten Roboter eines Tages tatsächlich auf einem fremden Planeten zum Einsatz kommen, ist indes eher unwahrscheinlich. "Aber die Veranstaltung soll zeigen, dass in Deutschland die Fähigkeit da ist, sich an internationalen Erkundungsmissionen zu beteiligen."



Der Krypto-Messenger Signal für verschlüsselte Chats und Anrufe ist nun auch für Android verfügbar. Das kostenlose Open Source Programm ersetzt die bereits vorhandenen Messenger TextSecure und RedPhone. TextSecure wird beim nächsten installierten Update automatisch durch Signal ersetzt, RedPhone wird nach Angaben der Entwickler nicht mehr als unabhängige App weitergeführt.Signal verwendet die Telefonnummer des Nutzers und verzichtet auf ein eigenes Log-in mit Benutzername und Passwort. Alle mit Hilfe der App übertragenen Textnachrichten und Anrufe sind Ende-zu-Ende-verschlüsselt. Das vom nichtkommerziellen Unternehmen Open Whisper Systems herausgegebene Programm wird nach eigenen Angaben auch von Whistleblower Edward Snowden benutzt. Für Apples iOS ist die App schon länger verfügbar.Gekaufte Games, Items und gespeicherte Spielfortschritte machen einen Account bei der Spiele-Plattform Steam unter Umständen sehr wertvoll. Das alles können Hacker via Phishing oder mit Hilfe von Trojanern zunichtemachen, wenn sie ans Passwort für das Konto gelangen, warnt der Verband der Internetwirtschaft (Eco). Nutzer sollten deshalb die Kontosicherheit erhöhen, indem sie einen zweiten Faktor zur Authentifizierung beim Einloggen aktivieren.


Diese Möglichkeit bietet die Plattform in den Einstellungen unter "Account/Steam-Guard-Accountsicherheit verwalten". Dort kann man einstellen, dass man zum Einloggen einen zusätzlichen Code per E-Mail geschickt bekommt oder diesen mit Hilfe der Steam-App auf seinem Smartphone oder Tablet erzeugt. Nur wenn Code und Passwort richtig eingegeben werden, bekommt man Zugriff auf den Account.Abstürzen und Fehlermeldungen beim neuen Tablet Surface Pro 4 und beim neuen Convertible-Notebook Surface Book begegnet Microsoft mit aktualisierter Firmware. Die Updates sollen nicht nur die Systemstabilität verbessern, sondern auch Probleme mit dem Grafiktreiber beheben, die sich den Angaben zufolge teils in Bildschirmflackern geäußert hatten. Das Surface Book ist in Deutschland noch nicht erhältlich.Mobile LTE-Router sind nicht größer und schwerer als ein Smartphone. Dank integriertem Akku können sie überall ein WLAN-Netz aufspannen und so beliebige Geräte ins Internet bringen.Beim Kauf eines solchen Routers sollten Verbraucher auf die Gerätekategorie (Cat) achten, berichtet das "c't"-Magazin (Ausgabe 25/15). Wer etwa auf sehr hohe Datendurchsatzraten angewiesen ist, wählt laut den Experten am besten einen Cat-6-Router, der im Gegensatz zu einem Cat-4-Gerät auch das 2600-MHz-LTE-Frequenzband unterstützt: Das übliche 1800-MHz-Band sei bereits gut ausgelastet.


Cat-5 ist den Angaben zufolge bisher weltweit kaum bei Mobilgeräten gebräuchlich, weil dafür vier Antennen und mehr Strom erforderlich sind. Beides bieten nur stationäre Router.Die Telekom will künftig verstärkt auf die integrierte SIM-Karte (eSIM) setzen. Statt einer auswechselbaren Chipkarte, mit deren Hilfe sich Mobilfunkgeräte seit rund 26 Jahren ins Netz einbuchen, kommt bei der eSIM ein fest eingebautes Modul zum Einsatz. Es kann von außerhalb programmiert werden, damit man etwa beim Anbieterwechsel nicht gleich eine neue SIM-Karte braucht. Laut der Telekom können mit der neuen Technologie auch einfacher mehrere Geräte unter einem Mobilfunkvertrag betrieben werden.Aktuell arbeiten Anbieter und der Mobilfunkverband GSMA an einem offenen Standard für die eSIM. Gegen Ende 2016 sollen erste Geräte auf den Markt kommen. Die SIM-Karte aus Plastik wird aber damit nicht sofort ausrangiert. In der Anfangsphase dürften laut Telekom Hybridlösungen mit eSIM und klassischer SIM-Karte zum Einsatz kommen. In rund zehn Jahren soll der Übergang abgeschlossen sein.



Berlin (dpa/tmn) - Jeder Akku erreicht eines Tages die Grenzen seiner optimalen Funktion. Die Hersteller geben in der Regel an, wie viele sogenannte Ladezyklen ihre Energiespeicher durchhalten.Apple gibt die Haltbarkeit der Akkus seiner neueren MacBook-Pro- und MacBook-Air-Modelle etwa mit rund 1000 vollständigen Entladungen und anschließendem Wiederaufladen an. Ältere Modelle kommen nur auf rund 300 bis 500 Zyklen. Wer nun wissen will, wie viele Ladezyklen noch übrig sind, kann das im Systembericht des Macs nachlesen. So lässt sich herausfinden, ob der Akku am Ende seiner Laufzeit angekommen ist, oder ob er eventuell einen Defekt hat, der vom Hersteller oder Händler behoben werden kann.Der Systembericht wird über einen Klick auf den Apfel oben links in der Menüleiste aufgerufen. Dort wird auf "Über diesen Mac" geklickt, anschließend auf "Weitere Informationen" und "Systembericht". Hier findet sich die Information im Unterpunkt "Stromversorgung", gemeinsam mit weiteren Informationen über Zustand und Kapazität des Energiespeichers.


Message déposé le 26.06.2017 à 06:55 - Commentaires (0)


Battery for Compaq 233343-001

Impala is an incubatory native analytic database on Apache Hadoop that runs in the cloud. It claims Impala offers elastic scalability, better flexibility, and direct Amazon S3 query-ability that are unavailable from traditionally-architected systems, such as Redshift, Amazon’s analytics database.Using TPC-DS benchmark queries Cloudera found Impala is over 200 per cent less costly and over 10x faster on S3 compared to a general purpose tuned Redshift. It also claimed Impala is eight per cent less costly and 90 per cent faster on S3 compared to a pre-tuned Redshift for specific fixed reporting queries. Something for the Weekend, Sir? The man on stage is baffled. It was his big moment, a chance to show off his company’s proficiency and expertise, but now he’s being made to look useless.Two huge screens on either side of the stage are supposed to be displaying his presentation. They remain resolutely blank.A 200-strong audience of paying conference attendees stare on impassively in disinterested silence.There used to be a time when an occasion like this would cause spectators to squirm in empathetic embarrassment, the shuffling of audience arses in their seats helping distract general attention from the presenter’s temporary discomfort.


Not this time. If anything, the conference room gets quieter. Fed on a diet of reality TV, the audience wastes not a second thinking about what it might be like to share the unfortunate man’s predicament.No, they want to watch what he is going to do next. Some members of the audience have even begun to lean forward for a better view of his emotional discomfort. Will he get angry? Will he burst into tears?The poor sod on stage is at a loss. While his grumbling colleagues back at the office were forced to work for their living, he spent the best part of the previous day dicking around in Powerpoint. Now that he’s in a position to demonstrate very publicly that this was not a misuse of his employer’s money, the Slide Transition Gods have thrown a spanner in his bullet points.Moments earlier, he had been observed head held high and striding confidently towards the podium where the AV team had already connected his laptop. Now with rapidly paling face, his eyes wide and his teeth bared in a terrified smile, the former strider was visibly shrivelling into a kind of besuited Gollum.



Taking a deep breath, the presenter summons all the technical skills acquired over his years of training and experience to diagnose the problem.He taps some keys on his laptop. He waggles the video cable. He pokes the trackpad. He rattles the spacebar like Humphrey Bogart trying to get a line to the operator.He looks up and mumbles something in a squeaky voice. One of the words sounded a bit like “help”.His call – or strictly speaking, a squeak – for help is eventually answered by a 5ft hobgoblin from the venue’s AV team.We know he’s from the AV team because he’s wearing a black polo shirt and a wireless earpiece. Either that or a lost polo player with a hearing aid has stumbled into the conference and thinks his horse might be hiding on stage among the autoprompts.Ah no, it’s definitely an AV man because he is applying recognisable technical skills to the situation: after some thoughtful chin-rubbing, he is now hammering on the laptop’s spacebar and waggling the cables.A joker at the back of the audience shouts: “Have you tried turning it off and back on again?”Charitable laughter followed by even deeper silence. Did the AV man hear that? Will he oblige? The suspense is broken 30 seconds later as we hear the familiar tones of the Windows startup bongs. Yes he did. Still nothing on the screens, though.


Still, it’s a welcome break for the audience, giving us an opportunity to try connecting to the venue’s Wi-Fi again. We’ve been trying all morning to no avail.The event hosts proudly gave us the SSID and password but when we try to connect, it insists on asking for a username too. No complaints about this little extra layer of security but when I ask any of the venue staff for a Wi-Fi username, they stare at me as if I’m speaking a foreign language.Actually, from their point of view, I am speaking a foreign language: they’re all Polish. But I don’t recall this being a documented root cause of Wi-Fi issues at central London conference venues.I’m reminded of a recent smartphone app launch to which I was invited, only to discover upon my arrival that nobody there knew how I might connect to the internet. Worse, they seemed utterly taken by surprise that anyone might need this.The event was held in the depths of a hotel beyond the reaches of any phone signal, so the lack of any type of cable-free internet access somewhat took the shine of the ability to do anything with the app, other than to admire its splash screen. Hmm, splashy.Back at the conference, another tech hobgoblin has accompanied the first on-stage, soon to be joined by a third.All three are stroking their chins, looking pensively at the presenter’s stubborn laptop. At one point, they stop and look at each other, and for a thrilling few seconds I think they are about to stroke each other’s chins.


Hobgoblin 2 trots off-stage and returns with a MacBook, plugs it in and – hey presto – the massive screens spring into life, revealing all the kind of crap that hobgoblins tend to keep on their Mac Desktops.Very audibly, he accuses the presenter: “It’s your laptop that’s the problem!”The accused does not take this well. “My laptop is fine!” he squeaks. “It was working earlier!”Defusing what we had hoped might develop into fisticuffs, one of the event hosts belatedly grabs a mic and suggests we take an early tea-break and watch the presentation afterwards.Foolishly, he suggests we use this time to check our emails. Members of the audience begin shouting out that they can’t because no-one can access the Wi-Fi without a username. It is turning ugly.Near the entrance to the tea-break area, a passing cleaner carrying a mop and bucket is able to inform me of the Wi-Fi username, and I pass it on through the crowd.Half an hour later, emails checked and refreshed with tea, we sit down to watch a much-relieved but still quite sweaty man on-stage deliver his presentation from his restarted Windows 10 laptop.“Thank you for attending Data Communications for the Future 2016. I have a few slides to show you…”Analysis Love rat Apple two-times its long-suffering squeeze Qualcomm with dishy Intel – and it's going to keep the baby but only let some of us see it.



Over a cheap bottle of chardonnay one dark night in Cupertino, Intel wooed Apple with flimsy promises. The pair felt a connection (around the 1.9GHz mark) after the iPhone maker opened up about its long-distance relationship with San Diego's Qualcomm."I don't want to get too tied down," Apple sighed. "I'm not ready for the commitment."Apple's heart melted like a Galaxy Note 7 in a child's hand. Now, thought Intel, if only it could scheme its way further into the MacBook maker's life to wreck any plans to move from x86 to ARM.I just can't understand why my screenwriting career hasn't taken off.A peek inside the iPhone 7 has confirmed that Apple is using a mix of Intel and Qualcomm radio modems in the new handsets. Typically, Qualcomm provides these communications chips, which are used to connect the device wirelessly to the cellular network for calls, texts and mobile internet. Apple hates being tied down to a single component source, so it decided to give Intel a shot.There's also the interesting dynamic of Qualcomm providing Snapdragon system-on-chips and modems to Apple's arch-rival Samsung. Couple that with Intel's desire to get its radio modem business a slice of the massive mobile world – while Intel's traditional PC world diminishes – and that Apple relies on Intel x86 processors for its desktop and laptop products, you can see why Apple let Intel in through the backdoor to its iPhone production.


Message déposé le 24.06.2017 à 08:08 - Commentaires (0)


Battery for HP COMPAQ 6830s

Police took away the iPad, his iPhone and his laptop. The iPhone was found to also have been used in private browsing mode and the history had been “switched off”, the court heard.Three search capabilities were said to have been present on his devices: Safari, Chrome and DuckDuckGo, the anonymous search engine. DuckDuckGo, a web-based search engine that does not track your internet searches, is available as an iOS app.Police interviewed McGarrity and it was said that he “didn't understand what was meant by private browsing”. He maintained that he hadn't altered the device settings, though the court heard this morning that he was warned in 2014 about using private browsing.Shaven-headed McGarrity, wearing a plain grey t-shirt with a small Union Flag at the back of the neck and blue Adidas tracksuit bottoms, leaned on the rail of the dock as his solicitor made his plea in mitigation to the judge.His solicitor, from London firm Dalton Holmes Gray – who refused to confirm his name after the hearing – said in McGarrity's defence that he “suffered from clinical depression” and was undergoing cognitive behavioural therapy, as well as receiving employment support allowance."No substantive offending has resulted from the breach," asserted McGarrity's solicitor.District Judge Susan Bayne, sitting alone, adjourned the sentencing hearing to a later date. Indicating that she wanted to make a new sexual harm prevention order against McGarrity, she said the court had insufficient information to do so this morning.


Lenovo, Intel and others are aiming to make online payments more secure by bringing the Fast Identity Online (FIDO) biometric authentication standard to PCs.The fingerprint scanning technology is implemented in Lenovo’s latest Yoga 910 laptop, which is one of those consumer 2-in-1 convertible gizmos with a fold-back screen that lets it be used like a laptop. It relies on some hardware security features implemented in Intel’s 7th-gen Core processors, but also uses biometric fingerprint sensor technology from Synaptics and payment processing from PayPal to deliver a FIDO-compliant solution.The goal, according to Lenovo, is to help reduce online fraud and increase security, while making authentication “nearly frictionless" with biometrics secured by hardware-level protection replacing those so-easily stolen passwords.In actual fact, Intel, Lenovo, PayPal and Synaptics are all members of the FIDO Alliance, the industry body setup several years ago to address the lack of interoperability among authentication devices. While this has enjoyed some take up in the mobile world, the Yoga 910 brings FIDO authentication to PC users for the first time, according to Lenovo.



As well as offering greater security than passwords, the technology is also intended to be more convenient. Once the user has registered with a FIDO-compliant website, they no longer need to enter a password to be authenticated, but simply swipe their finger over the built-in sensor and are instantly logged in.And according to the FIDO Alliance, this is just the start of the FIDO effort to bring password-free authentication to PC users, although it remains to be seen whether the standard has any teeth (geddit?)“The W3C is working to make FIDO web APIs a formal web standard, which will bring FIDO authentication to web browsers across all platforms, said a statement on the organization’s website.In addition, Microsoft is said to have made a “strong commitment” to implementing FIDO compatibility with Windows Hello, the biometric security features in Windows 10, and Google has already FIDO-enabled its Chrome browser with support for second factor authentication via its Security Key program.A 49-year-old IT bloke from Essex has been sentenced to five years' imprisonment on two counts of fraud after his cunning plan to steal £450,000 from his employer was uncovered... almost immediately.


Adeshola Dada, of Watts Crescent, Purfleet, Essex, was employed in the IT department of Genesis Housing Association, where he changed the passwords of two colleagues working in the financial department.Dada subsequently attempted to divert payments for genuine suppliers into the account of co-conspirator Ansar Ali's company. Pretty much straight after the event, an internal audit team at Genesis discovered that a payment of £138,788 had been made to a bank account held by Pathmeads Property Services, which Genesis had no contracts with.Once alerted to the fraudulent transaction, the team managed to stop a further payment of £290,090 that was due to be effected a few days later.While Dada's job title was that of an ICT Analyst, Court News UK reported that Southwark Crown Court heard his role was closer to that of a sysadmin, as it "involved supporting users with all computer based access and systems performance issues, including password creation and resetting."A forensic investigator brought in by Genesis discovered that the attempt to divert the payments was committed by a user connecting to the businesses' systems remotely using the username and password of an employee who had left the company.



Southwark Crown Court heard that Genesis' systems logs showed that Keys' password had been changed, and forensic analysis further showed that Dada, in fact, had been the only person with password reset privileges on Genesis' systems.When Dada’s laptop was seized, Dada told police he would loan it out to people and not keep a record of whom he had loaned it to. He was found guilty of two counts of fraud on 19 August and was sentenced today.Alongside him, Ansar Ali, 43, of Limehouse Causeway was sentenced to two years' imprisonment, suspended for two years and ordered to carry out 225 hours of unpaid work after pleading guilty to acquiring criminal property at an earlier hearingTwo others were sentenced for their roles in the scam, which involved receiving sums of around £10,000 into their bank accounts.James McMasters, 24, of The Heights, Northolt, Middlesex was found guilty of acquiring criminal property. He was sentenced to one year imprisonment, suspended for two years. He was also ordered to carry out 200 hours of unpaid work.Danielle Gillian Brown, 25, of Church Lane, N8 was found guilty of the same offence. She was sentenced to nine months' imprisonment, suspended for one year. Cloudera says Apache Impala is 10x faster than Amazon Redshift and has 275 per cent better cost efficiency.


Message déposé le 24.06.2017 à 07:57 - Commentaires (0)


Battery for ASUS G75

On Thursday, the 30-year-old marched into the Apple store located in Toison d'Or shopping Centre in Dijon carrying the steel ball in a gloved hand. He was accompanied by someone videoing the scene, which suggests premeditation.He then proceeded to pick up iPhones, place them flat on the counter, and smash their screens in using the ball.While doing so he rails against the staff, claiming that he had bought a shiny new laptop from them that had failed and he wanted his money back.While this was going on, staff stood around doing nothing and keeping clear. He then moved on to some MacBooks and carried on his smashing activities before a security guard finally turned up and escorted him from the store.
Once outside, more security guards appeared and surrounded the man. After a full and frank exchange of views, the attacker put his hands around the throat of one of the guards and the others piled in to restrain him.The man has since been detained by police and is currently facing criminal charges. Dijon prosecutor Marie-Christine Tarrare said that the man had caused €50,000 worth of damage to the shop's stock.


Getting stiffed on a new purchase is never fun, but the gentleman involved should have taken a lead from we rosbifs and shown some sang froid. A disgraced former Territorial Army sergeant convicted of making indecent images of children has pleaded guilty to using private browsing mode on his iPhone and iPad.Paul Martin McGarrity, a 56-year-old of Mirabel House, Wandsworth Bridge Road, Fulham, appeared at Hammersmith Magistrates’ Court this morning to be sentenced, following his earlier plea at the same court.The former Royal Signals SNCO was ordered “not to use any device capable of accessing the internet unless it has the capacity to retain and display the history of internet use and he makes such device available on request to a police officer”, as part of a sexual offences prevention order (SOPO) made by a court martial at Bulford Camp in 2011.The SOPO was made after McGarrity, who was on full-time attachment to a regular Royal Signals unit, pleaded guilty to two counts of making an indecent photograph of a child. The order also said he "cannot take any photograph of a child under 18 unless authorised, expressed or implied, by a parent or legal guardian."



He pleaded guilty to breaching the SOPO, contrary to sections 103I(1) and (3) of the Sexual Offences Act 2003, in August. Sentencing was then adjourned for pre-sentence reports to be completed.According to the Crown at today's hearing, police were empowered to make spot checks on McGarrity to check his compliance with the SOPO. When they arrived unannounced at his flat on 19 February this year, they found him using a laptop and an iPad. McGarrity agreed to allow the police to inspect the devices “and within a couple of minutes it was noticed” that he was using the iPad in private browsing mode.Police took away the iPad, his iPhone and his laptop. The iPhone was found to also have been used in private browsing mode and the history had been “switched off”, the court heard.Three search capabilities were said to have been present on his devices: Safari, Chrome and DuckDuckGo, the anonymous search engine. DuckDuckGo, a web-based search engine that does not track your internet searches, is available as an iOS app.


Police interviewed McGarrity and it was said that he “didn't understand what was meant by private browsing”. He maintained that he hadn't altered the device settings, though the court heard this morning that he was warned in 2014 about using private browsing.Shaven-headed McGarrity, wearing a plain grey t-shirt with a small Union Flag at the back of the neck and blue Adidas tracksuit bottoms, leaned on the rail of the dock as his solicitor made his plea in mitigation to the judge.His solicitor, from London firm Dalton Holmes Gray – who refused to confirm his name after the hearing – said in McGarrity's defence that he “suffered from clinical depression” and was undergoing cognitive behavioural therapy, as well as receiving employment support allowance."No substantive offending has resulted from the breach," asserted McGarrity's solicitor.District Judge Susan Bayne, sitting alone, adjourned the sentencing hearing to a later date. Indicating that she wanted to make a new sexual harm prevention order against McGarrity, she said the court had insufficient information to do so this morning. A disgraced former Territorial Army sergeant convicted of making indecent images of children has pleaded guilty to using private browsing mode on his iPhone and iPad.Paul Martin McGarrity, a 56-year-old of Mirabel House, Wandsworth Bridge Road, Fulham, appeared at Hammersmith Magistrates’ Court this morning to be sentenced, following his earlier plea at the same court.



The former Royal Signals SNCO was ordered “not to use any device capable of accessing the internet unless it has the capacity to retain and display the history of internet use and he makes such device available on request to a police officer”, as part of a sexual offences prevention order (SOPO) made by a court martial at Bulford Camp in 2011.The SOPO was made after McGarrity, who was on full-time attachment to a regular Royal Signals unit, pleaded guilty to two counts of making an indecent photograph of a child. The order also said he "cannot take any photograph of a child under 18 unless authorised, expressed or implied, by a parent or legal guardian."He pleaded guilty to breaching the SOPO, contrary to sections 103I(1) and (3) of the Sexual Offences Act 2003, in August. Sentencing was then adjourned for pre-sentence reports to be completed.According to the Crown at today's hearing, police were empowered to make spot checks on McGarrity to check his compliance with the SOPO. When they arrived unannounced at his flat on 19 February this year, they found him using a laptop and an iPad. McGarrity agreed to allow the police to inspect the devices “and within a couple of minutes it was noticed” that he was using the iPad in private browsing mode.


Message déposé le 23.06.2017 à 07:39 - Commentaires (0)


Battery for Acer Aspire 5820T

One of customer got in touch to report that BT customers are currently being locked into their BT Yahoo email service.A recent screengrab of a customer attempting to use this function seen by The Register reads: “Sorry the delete feature is currently unavailable. This feature will become available by the end of September."The customer said BT/Yahoo! had also made it impossible for BT customers to configure the forwarding of emails to a third party address from their BT Yahoo addresses.He said: "BT is being about as communicative as Trappist monks about this."He added: "BT refuse to acknowledge any contractual responsibilities to customers with regard to email as they see email as a freebie add-on to the broadband service."Other customers have also complained on BT's forum. One said: "Help! I have tried to delete email sub accounts but unable to do so. Any help and or advice will be greatly appreciated."Another complained: "It's October BTYahoo get it sorted or did you mean September 2020?"Apparently these problems also affect customers who have migrated to the new BTMail email provider Critical Path/Openwave.


A BT spokesman told The Register: “We apologise to customers who have been unable to delete their Yahoo! account. We are working quickly to sort this out and expect to have this fixed soon.” US trade watchdog the FTC has terminated second-hand electronics reseller Laptop & Desktop Repair in Sparks, Nevada – after the biz shafted people out of millions of dollars.The company, operating under such names as cashforiphones.com, cashforlaptops.com, ecyclebest.com, smartphonetraders.com and sell-your-cell.com, offered online quotes for used smartphones and laptops.Once the quote had been calculated, people sent in their hardware for assessment and were given a much lower revised quote – typically between 3 and 10 per cent of the original amount offered.They had three to five days to request that their hardware be returned, but the FTC found that the company seldom answered its phones and was closed on weekends, even though the firm counted Saturdays and Sundays in its time limits."This is a classic case of bait-and-switch updated for the 21st century," said Jessica Rich, director of the FTC's Bureau of Consumer Protection."The defendants in this case lure consumers with false promises of generous payments, then hold consumers hostage once they have mailed their devices to the company."After an investigation by the FTC and the US state of Georgia, the biz has now been shut down and had its assets seized. The FTC said it had received thousands of complaints about the firm, which kind of makes you wonder what took them so long.



A pair of cybercriminals responsible for laundering millions of pounds stolen using a banking trojan have been sentenced to a combined total of 12 years in prison.Pavel Gincota, 32, and Ion Turcan, 35, are Moldovan nationals with Romanian citizenship. The duo made over £2.5m in criminal profits using the banking trojan Dridex, the National Crime Agency and London's Metropolitan Police Service revealed.The pair were charged with conspiracy to possess false identification and conspiracy to launder money, while Gincota was also charged with a separate money laundering offence in relation to a cyber fraud in Germany in 2012, in which the victim lost €25,000.Gincota and Turcan pleaded guilty to all of the charges against them and were sentenced yesterday at the Old Bailey to five years and eight months and seven years respectively.Over two years the pair “funded a luxury lifestyle” with their ill-gotten gains, garnered from more than 220 bank accounts which they had accessed after infecting their victims' machines.According to Court News UK (behind paywall), the investigation into the pair began in June 2015 "after more than half a million pounds was stolen from a medical research company and laundered through a series of Barclays accounts".


They were reportedly already under investigation by the National Crime Agency when they were arrested by the Met in February 2015 for being in possession of multiple false identity documents. During a search of their home in Yiewsley, West Drayton, the cops seized further fraudulent documents and several electronic devices.Forensic examination of these devices by the NCA's National Cyber Crime Unit (NCCU) confirmed that a laptop belonging to Gincota had been used to control the bank accounts through which the money was laundered.Steve Brown, senior investigating officer at the NCCU, said: “Pavel Gincota and Ion Turcan were serial money launderers who processed millions of pounds worth of stolen money through hundreds of bank accounts to fund their lifestyles.“Those involved in the most serious types of organised crime depend on the services provided by money launderers like Gincota and Turcan to hide their criminal profits."He continued: “The NCA will continue to work closely with our partners to prevent organised criminals from accessing the proceeds of their crimes and to bring them to justice.”


Google today announced new phones, VR kit and home gadgetry. But it didn't announce a tablet. And nobody cared.We've known for ages that tablet sales are declining. The most recent tablet sales data we've covered has the market at about 150m units a year. Apple has a quarter of the market and Samsung has about 15 per cent. Vendors in third through fifth place – Lenovo, Huawei and Amazon – won't sell ten million units a year.The tablet market's sliding even faster than the PC market – by about 12 per cent a year compared to five per cent for PCs.We can also see that it takes more and more effort to get a tablet off the shelf: Apple has teamed with Deloitte to point out how an iPad might make sense at work, having already allied itself with IBM. Microsoft, meanwhile, has bundled training with its Surface-as-a-service pay-by-the-month plan for its hybrid laptop/fondleslab Surface products. Those hybrids, by the way, are considered the sole bright spot in the PC market.



And now Google's act of omission shows us that the company's assault on our personal space does not include a frontline role for a tablet computer.Which is not to say that tablets are doomed. They are clearly very handy devices in many applications. But the lack of a Google tab clearly shows us the fondleslab's not a core component of the evolving connected home. And that their omission won't be mourned. Roundtable On the afternoon of Oct 12, in central London, we’ll be gathering a select group of senior IT leaders together to discuss the changing nature of end user computing.We'll kic off by exploring the digital workplace of the future and the likely shift from devices to users and infrastructure. We’ll touch on the realities of making the shift happen - not just the technology to create a modern and open environment, but also how to manage all the stakeholders and budgets.Fundamentally we'll explore how the increasingly heterogeneous world of multiple operating systems, devices and clouds are changing the way we think about end user computing.It promises to be both a lively and useful discussion. If you'd like to join us, please register your interest here and we'll be in touch to confirm your attendance.A French man has been charged after he stormed into an Apple store and smashed up iPhones and MacBooks using a metal ball that is more commonly used for the traditional game of pétanque.


Message déposé le 23.06.2017 à 07:25 - Commentaires (0)


Battery for Toshiba Satellite L650

Zimperium researcher Simone Margaritelli has hacked his coffee machine finding a way to brew coffee using the command line.Margaritelli (@evilsocket) says he reverse engineered the app used to control the Smarter AM coffee machine.It means hackers can choose to ignore apps when they need a coffee and instead stumble over to a laptop and bash away at a terminal.There is some usefulness however; Margaritelli says he and other hackers might prefer the code crunching as they work from laptops."Since I work from home, most of the times I’m using the computer keyboard, not a smartphone, therefore I wanted a console client for it," Margaritelli says"[This is] something that the vendor never released, so I started reversing the Android application in order to understand the communication protocol and write my own client implementation."
His hacking did not uncover serious security bugs but it would let fellow hackers on the same network as the coffee machine to mess with its firmware without requiring authentication, something that could leave the device bricked."Even if the mobile app requires you to register an account, access to port 2081 is completely unauthenticated [so] anyone on your network could access it and even flash a new firmware with no authentication required."


The company was last year found to be spilling WiFi passwords all over London through vulnerabilities in its iKettle line.The devices would brew cleartext WiFi passwords when a physical attacker shipped a disassociation packet to the devices, after setting up a mimic SSID WiFi network.Attackers would gain their target's WiFi password when the device reconnects to their evil access point.The same Pen Test Partners researchers mapped iKettles across London making the attack vector significantly more fun. Episode 13 "S I just need a bit of help with the O.I.A.A.P." the new Boss blurts, bowling into Mission Control with a folder tucked under his arm...."The Overarching Information And Architecture Project," the Boss says, too green to know whether our blank expressions are genuine or whether we're being obstructive."You know you're not suppose to capitalise the A in AND, don't you?" the PFY says, opting for obstructive. "It smacks of desperation. It should just be O.I.A.P.""The Overarching Information And Architecture Project aims to determine the systems we have, the systems we need and what systems we will need into the future.""I'm sorry," I say. "I think I may have temporarily lapsed into a coma - It's a medical condition. I have a note."



"And Overarching bit is a little redundant too isn't it?" The PFY chips in. "I mean you could just call it the I.A.P and it would still be the same thing.""Just a quick slap," I urge the Boss. "Then really put the slipper in when he goes down. It's the only thing he understands."There are five main exercises undertaken by managers who don't have the wherewithal to do their job but want to look like they're contributing:
Either way, it's a black hole into which time and energy will be poured whereas the maximum workplace benefit would be derived from nailing the Boss into an airtight soundproof cupboard in the basement with an open drum of calcium chloride for several months.It's a fairly transparent attempt to get rid of everything we have here that he doesn't understand and replace it with some lame version of the same thing which costs four times as much, does half the job but produces a nicely coloured pie graph. So we're probably talking E.And we all know who the one respondent was - a crawly sycophantic toerag from the Hell Desk who thinks he can suck his way to the top by agreeing with every inane thought which crosses the Boss' mind.So it's Catch 22 - If providing input to this process is a drain on your time and will to live, being on the Committee is like being immersed in a jar of turd-scented treacle with a urinal drain as a snorkel. Which accounts for the lack of respondents.


"YOU MISSED THE CHAIR!" I say, a couple of seconds even later, "AND BANGED YOUR HEAD ON THIS RUGGEDISED LAPTOP."You only get a chance to use the old "master reset" on a Boss a couple of times in their career before the deja vu kicks in - and if you've got to play that card you may as well play it to get out of being on a Committee. Especially a committee like this one which a scope so open-ended it could see you through to retirement.As it turns out while we dodged a bullet avoiding the committee we collected a 40 pound shell we got slapped onto the working party. Apparently the first thing the newly-formed two-man committee did was create a list of people who would be on the two-man "working group" - the PFY and myself.So perhaps one too many master-resets after all.Now the Committee of an infrastructure and architecture project has the dubious pleasure of scores of seemingly endless meetings to decide upon a project framework, project goals and project champions before getting down to the real nitty-gritty important stuff of deciding the font to use in the survey document, but the Working Group will be the people who'll actually administer the survey.They'll talk to people individually, collate their responses, analyse those responses against the project framework and present the analysis to the committee so that it can be completely ignored when the Boss does everything he wanted to do in the first place but needed an investigation to support.



so to give you a bit of background for your questions I thought I'd give you an overview of our EXISTING infrastructure first" I say to the Boss and sycophant. "So you have a better idea of what we have and what we do and what to ask.""So we've got.... nothing?" the sycophant says sarcastically, gesturing around the mostly empty room."Not quite nothing," I say, pointing as I step backwards through the door. "There's that large drum. And this nail gun."BT customers are unable to delete BT Yahoo email services - despite an exodus of users seeking to leave the security-challenged webmail biz.Since allegations arose that Yahoo built an app to enable it to scan all of its users' emails at the request of US intelligence, many users have sought to delete their email accounts.That was in addition to Yahoo!'s confession last month that hackers had stolen the credentials for at least 500 million of its customer email accounts.BT had outsourced its webmail hosting to Yahoo - and has a total of 7 million accounts. BT had said a minority of its customer base had been affected by the breach, but declined to say how many.


Message déposé le 22.06.2017 à 12:44 - Commentaires (0)


Battery for SONY VGP-BPS21

The problem was that it had got to the point where he and his team were spending hours listening to stories from users and managers within the business justifying why they, or even their whole department, should be an exception. Some were adamant that the latest Apple MacBook, Microsoft Surface or some other clever convertible was the only thing that would solve their productivity needs.Others said it was essential to have an iPad with all the accessories, which would meet all of their requirements - though of course they would have to hang onto their Windows laptop “just in case”.Add to this the usual sob stories about how 18-month-old laptops really had to be replaced because they didn’t support the latest Wi-Fi standard, only had 4GB of memory, had a disk rather than an SSD installed, etc, and the process was getting wearisome. And with IT in control of the equipment budget, and users not giving up easily when told they couldn’t have what they wanted (even though it would cost twice what was in the plan), there was no escaping the wrangling.Fortunately, the IT department had been quietly investing behind the scenes in a VDI and digital workspace management environment.It hadn’t taken much working out that most employees were almost completely desk-based; even so-called "mobile" users were actually more "nomadic" in their working patterns - they were usually sitting on a company LAN in one office or another, or on their home Wi-Fi network.


This opened the door to switching many of them to server-hosted virtual desktops, and where this wouldn’t work (for genuine connectivity reasons) you could still centralise and "stream" a lot of what they needed. The workspace management software then allowed most essential resources to be accessed through tablets and smartphones.The pilot had been going well (despite some initial technical glitches and suspicion on the part of users), so our brave IT manager went for it. He got his guys to put together a service catalogue detailing what was available in terms of virtual desktops and application services.Guidelines were then issued highlighting the experience a user could expect given a particular type of device of a particular class. He then transferred the bulk of the desktop uipment budget to business unit managers, which most gleefully accepted – “Free from those killjoys in IT at last!”You can imagine the kind of conversations that took place from there on in.IT Manager: “Well it’s not a Windows machine, so there are some limitations in some areas, and access to some things will depend whether or not they are on the network. But it’s all written down in the guidelines we circulated. It’s basically up to you to decide whether your team can live with the constraints.”



Dept head: “Yeah, I saw that document, but it says the iPad won’t run some of the things we use, and they’ll have trouble directly accessing some of our document shares. So, I think they’ll still have to have laptops as well, and some of those machines are pretty old and need replacing.”Dept head: “But there isn’t enough allocated to give everyone an iPad and upgrade the laptops.”IT Manager: “Then go and talk to the FD make the case to him for more budget.”Apparently, some of these conversations got pretty heated, but they did succeed in getting business managers to start to appreciate the difference between "want" and "need".During the subsequent discussion at our roundtable, we agreed that what our hero had done was a pretty good start, but that the real point of all this was a need to rethink how we tackle the whole end user computing need.Some of the pushback received during the above type of conversations was around why the IT department couldn’t make the same capability available regardless of whether the user chose a Windows machine, Mac, iPad, iPhone, android device or whatever.While the obvious response to this is that they are all different, and run different flavours of software, if we consider the question from a business perspective, particularly if we look forward over the next five to 10 years, it’s pretty clear that we need to drive towards making IT systems in general as device-agnostic as possible.


In practical terms, this essentially means that end user computing is rapidly becoming less about devices per se (which will come and go over time), and more about the infrastructure that enables the application services delivered to them. Obvious when you say it, perhaps, but the truth is that the infrastructure options we ideally need are still a big work in progress from an industry perspective.Mobile application frameworks and middleware are becoming more enterprise ready, and digital workspace solutions are now getting pretty good at presenting services and resources coherently to users across a range of devices. But if vendors are honest, they’ll own up to some aspects of the technology still being a work in progress.The possible exception is VDI, which has matured quite nicely over the last couple of years. Today you can get a hyperconverged platform from pretty much any mainstream vendor, or cartridge-based system (such as Hewlett Packard Enterprise Moonshot), that comes out of the box designed for virtual desktop serving. It’s no longer the black magic art it used to be.



Specific technology to one side, though, the main takeaway from all of this is that things need to change. Right now, too many organisations have one thread of activity around Windows desktops, and another totally different thread around mobile devices and applications. Meanwhile, they just muddle through on things like Macs and possibly Linux machines as best they can. Then to cap it all, the IT team is too often left in the untenable position of having to referee on the conflicting wants and needs of users within the business.Against this background, separating device decisions and budgets from those relating to the infrastructure and back-end systems may be something for more IT teams to aim for. It might not be the answer for everyone, and you certainly wouldn’t want to go down that route before you get your act together on some infrastructure basics, but users are constantly pushing for device freedom, so it’s something to consider as you transform the way things work in your environment.If you have tried any of this yourself, or have other ideas on how best to deal with the increasing complex problem of delivering services into a heterogeneous device estate, we’d love to hear from you.


Message déposé le 22.06.2017 à 12:37 - Commentaires (0)


Battery for Apple A1495

Besides, there’s little chance of Siri being able to hear me over the noisy racket of my MacBook’s fans going apeshit crazy so as to prevent my keycaps from melting. This must be what it feels like for Ontarian hipsters teleworking from a cafe at Niagara Falls, except with less humidity and better tea.Honestly, if the fans blew any harder, my MacBook could technically be classified as a drone.If only I could do something about its 2kg payload, I could hire my aluminium Apple drone out to run errands, delivering lightweight goods such as paperbacks and condoms. I could even get it to spy on my dickhead neighbour who has spent the last 12 years of weekends in his back garden noisily assembling a gigantic rotting wooden shed that looks like Santa’s chalet shitehouse.So, great. I’ve updated my laptop to an operating system that guzzles a full battery charge in less than half an hour. To my horror, I discovered that it does this even when asleep. Perhaps Sierra gives it nightmares.This not a good thing for a computer supposedly designed to be used away from a mains power source. Need. Solution. Now.I checked the user forms at Apple and elsewhere, but found only the same old suggestions that never work such as zapping SMC and NVRAM.


Oh for the love of gaaahd. Who are these helpful souls who go around the forums insisting that every Mac issue ever encountered can be solved by restarting the computer with your fingers held down on keys at opposite ends of the keyboard like a double-jointed cellist? You may as well hold another finger in the wind and thrust one up your arse for all the good it’ll do.Indeed, on my forum visits, offers of solutions were far outweighed by posts by people like me, asking why their MacBooks have suddenly begun blowing sheets of paper off their desks. Some of them didn’t even know that laptops had fans until now, and boy do they know now.Another suggestion is that the updated OS is indexing itself, as if my MacBook was constructed by Heath Robinson and that the indexing process isn’t done in software at all but by fans, and probably a host of cogs, string and spoons holding eggs.Look, if it hasn’t finished indexing my 14 photographs by now after a week, it never will. Time to take the solution into my own hands.A quick peek into Activity Monitor and there it is: the culprit is my old friend, the Safari web browser.Safari is apparently chomping its way through “99%” of my CPU resources. Er, and open web pages are eating up another “105%”... each.Something tells me that either Safari is a jolly demanding mistress or Activity Monitor doesn’t quite understand the concept of percentages.I close a web tab. The fans become quieter. I close all my web tabs. The fans are quieter still. I quit Safari. The fan noise fades away to silence.



Uh-oh, later in the day, the fans are back with a whoosh! What’s up, Activity Monitor? I see, this time it’s iTunes, which launched automatically when I began recharging my phone, and is now taking up “103%” of the CPU. Within seconds of me quitting iTunes, the fans die away again.So I’ve discovered the fix all by myself: under macOS Sierra, make sure you don’t launch any Apple software and you’ll be fine. Bang, solved.Last month’s Mr Chow ransomware attacks serve as a timely reminder that security should be at the top of any business IT strategy. Ransomware is on the increase, at least according to the FBI and while it is not all email borne, it is an example of how sophisticated hackers and criminals are getting with technology.Certainly the recent spear phishing attack at sports anti-doping agency WADA was a clear indication of the lengths attackers will go to creating detailed and personal emails to hoodwink targets. Clearly, email is still one of the biggest threats to business security and will continue to be so for a very long time.In some ways it’s no surprise. Email use is as healthy as ever. According to research company Radicati Group’s Email Statistics Report (PDF) 2015-2019, over 205 billion emails were sent and received every day last year. A six percent increase is expected this year and although numbers vary dramatically from report to report, it seems to average out that around one billion of those emails are spam or malicious emails.In security terms email is of course just the delivery vehicle but it has history. Computer viruses date back to the days of the mainframe and early IBM PCs in the 70s and 80s but it wasn’t until the increased proliferation of email in the late 90s and 2000s that email started to really kick off as a security threat. The Michelangelo virus, Melissa worm and Anna Kournikova virus all became synonymous with computer security threats during the internet boom and dotcom years. Spam email was rocketing too.


In fact, according to Professor Alan Woodward from the Department of Computer Science at the University of Surrey, all that we see on email is exactly what has happened on regular snail mail. The big difference is that it can be done on a massive scale, and you can deliver electronic payloads that once opened are harmful, unlike the normal spam mail you get through the letterbox.“I have to say I think things have become a great deal better. In many ways junk mail filters on corporate mail servers like Exchange are something of an unsung success story,” he says. “Sadly it takes only a few to get through to cause problems but these servers are routinely blocking vast amounts of junk, spam, phishing and malware.”It’s a good point. We often forget about the good work and how quickly security firms react to new threats. Of course, email is not about to disappear from business either. It’s too useful and is a good way of storing a messaging dialogue but as Woodward points out, it’s not the only messaging form that can be open to abuse.“I’ve seen scams only this week using WhatsApp, and phishing using SMS,” he says. “If anything I suspect people who have learned about the dangers of email will end up learning all over again (probably the hard way) that other messaging vehicles can be used to deliver a variety of attacks as well.”


For businesses this is a perennial problem. Threats from email are as old as, well email and keeping pace with any technology change is a constant challenge. Security is however a unique challenge with increased remote working, a variety of devices with an ability to roam networks and an increasingly sophisticated cybercriminal.Prevention, as security firms have been saying for years, is better than cure. Ask US presidential candidate Hillary Clinton. She is something of an email security expert now, especially when it comes to understanding the consequences of not taking email security seriously. After being caught using a personal email server for official communications while acting as the US Secretary of State, Clinton has also been hacked, supposedly by the Russians.She is not alone of course. Large businesses and government departments, as well as well-known names, are consistent targets for hackers.Consequently, says Joe Diamond, Director of Cybersecurity Strategy at Proofpoint, “Customers demand more from their security solutions today more than ever before. That’s why we see security in board level conversations. Visibility about who is attacking you, what they are using, who in the organization they are targeting… and even understanding whether your organization is being singled out or caught in the crossfires of a broad attack campaign, are all insights to help organizations respond.”“I think companies can do only more of what they are already doing,” says Woodward. “Use of up to date mail servers, anti-virus and so on is an obvious point. Education is equally important, especially with BYOD muddying the waters. One has to be careful to educate users that not all mail clients are the same.”



Education or lack of it has of course led to human error enabling threats to sneak through cyber defences. Interestingly the number of security breaches reported to the Information Commissioner’s Office (ICO) has doubled this year, up to 2,048 from 1,089 in 2015. Around 70 per cent of these reports were due to human error.“It does suggest that the protection is best done at the server but that is not always possible,” adds Woodward. “Plus if one person is hacked their system can send emails that will appear perfectly valid to any automated system, so the human in the loop has to be on guard. I don’t think any technology is leading the charge but what you are seeing is a more sophisticated scoring system for spam emerging and some of that is being supplemented by heuristics. The systems are learning from what you delete, what is junk.”“Giving away budget never felt so good." Those were the words of an IT manager attending one of our roundtables recently. But why was he so happy about losing control of a chunk of his IT funding?The topic of the roundtable was end user computing, and he was explaining how the annual budget negotiations around desktop equipment were becoming so miserable. For many years, his IT department had defined a range of standard desktop and laptop machines to meet the needs of different types of user, refreshing a subset of kit on an annual basis. It’s a familiar model that many will recognise, and from an IT perspective it’s not a bad way of making sure everything stays manageable.



Message déposé le 21.06.2017 à 07:49 - Commentaires (0)


Batterie pour Samsung AA-PB2VC6W

Cette annonce signifie que chaque version de Visual Studio, allant de l’édition gratuite Community jusqu’à l’édition Enterprise, a désormais accès à l’ensemble des outils de Xamarin afin que les développeurs puissent créer des applications pour Android et iOS (bien que le développement sur iOS continue d’avoir besoin d’accéder à une machine sous OS X) en utilisant les outils .NET et C# qu’ils aiment.Et, il n’y a aucune restriction à cette inclusion. En tant qu’entreprise indépendante, Xamarin avait jusqu’ici une version gratuite fournissant aux développeurs un aperçu de ce qu’il offre. Mais, le produit a été historiquement limité à offrir un support à de petits exécutables, avant de passer à une licence payante — 25 dollars/mois pour l’option la moins chère pour les développeurs indépendants, 999 dollars/ans et 1 899 dollars/an pour la version Entreprise. Cela n’est donc plus le cas aujourd’hui. En effet, même avec la version Visual Studio 2015 Community, il n’y a aucune restriction. Néanmoins, certaines fonctionnalités de Xamarin axées sur l’entreprise sont encore limitées, et les développeurs auront besoin d’un abonnement à Visual Studio Enterprise pour utiliser celles-ci.En effet, le Xamarin Test Cloud qui permet aux développeurs de tester à distance leurs applications sur de véritables appareils restera un produit autonome. Le prix de ce service ne change pas, mais les clients de Visual Studio Enterprise bénéficieront d’une réduction de 25 %.


Xamarin offre également un support au développement sur OS X en utilisant Xamarin Studio. Cette version aussi est maintenant disponible gratuitement en édition Community pour les petites équipes, et est incluse dans les abonnements MSDN.Microsoft va également ouvrir en open source le Xamarin SDK au cours des prochains mois. Ce changement signifie que le runtime Xamarin ainsi que les bibliothèques, ainsi que tous ses outils de build, seront publiés sur GitHub, et ils vont être gérés par la .NET Fondation. Ce que l’on va retrouver dans le packaging open source est la bibliothèque Xamarin Forms qui fournit une boîte à outils multi-plate-forme pour la création d’interfaces utilisateur.Visual Studio est un environnement de développement bien-aimé par les développeurs Windows qui, jusqu’à récemment, était presque entièrement pour développer des applications Windows. L’inclusion de Xamarin par défaut signifie que Visual Studio peut être utilisé pour développer des apps Windows, Android et iOS en un seul endroit.Cette décision est sans doute l’une des principales choses que les développeurs espéraient après l’acquisition de Xamarin. Les outils et ses capacités sont bien aimés, mais son prix était un frein pour certains développeurs. Cela devrait changer à partir d’aujourd’hui.



Inutile de dire que la frontière entre Xamarin et Visual Studio va disparaître au fil du temps, et que Microsoft va déployer la plupart des IDE Xamarin dans Visual Studio au fil du temps.Apple nous a donné beaucoup de raisons de mettre à jour notre iDevice vers iOS 9.3, comme le fait d’apporter le mode Night Shift pour mieux dormir, mais vous devez à nouveau retourner dans le menu de mise à jour pour passer à la dernière itération de l’OS mobile d’Apple.Apple a publié aujourd’hui iOS 9.3.1 pour corriger un bug qui empêchait des applications de répondre après avoir touché des liens dans Safari et d’autres applications. Les problèmes ont été causés par certaines applications ayant des implémentations « non traditionnelles » de la fonctionnalité « Universal Links » introduite dans iOS 9, que j’ai détaillé plus tôt dans la semaine.Si vous utilisez un iDevice plus âgé et que vous n’avez pas encore mis à jour ce dernier à iOS 9.3, la version 9.3.1 devrait également inclure un correctif pour un problème où certains appareils ne peuvent pas être activés et utilisés si l’utilisateur avait oublié son mot de passe iCloud.La mise à jour ne contient pas d’autres changements majeurs. Elle est disponible pour tous les appareils qui prennent en charge iOS 9, y compris l’iPhone 4S et les modèles plus récents, l’iPad 2 et les plus récents, tous les iPad Pro et iPad Mini ou encore l’iPod Touch de 5e et de 6e génération.


L’iPad Pro de 9,7 pouces et l’iPhone SE arrivent avec iOS 9.3 préinstallé, donc iOS 9.3.1 devrait aider les consommateurs à avoir une expérience harmonieuse avec leur nouveau dispositif. La mise à jour iOS 9.3 n’était pas parfaite, malgré les multiples versions previews poussées aux développeurs.En plus des bugs identifiés sur l’ouverture des liens, de nombreux utilisateurs ont eu des problèmes d’activation avec d’anciens iPhone et iPad. Et, l’échec de la mise à jour rend tout simplement inopérant l’iPad 2, conduisant Apple à retirer temporairement iOS 9.3 pour ce périphérique.Le fait qu’Apple publie déjà une mise à jour comme iOS 9.3.1 n’est pas une surprise, car ses principales mises à jour n’ont jamais été complètement exemptes de bugs, en particulier iOS 8. Espérons qu’Apple continue d’améliorer son processus de test. On s’attend à ce que la société lance iOS 10 bêta lors de sa keynote au WWDC au mois de juin pour cette raison.Il était plutôt décevant de constater que lors de la première keynote de la Build 2016, le navigateur Web de la firme, Microsoft Edge, n’avait pas été mentionné par le géant de Redmond. Cependant, Microsoft Edge a finalement obtenu une certaine attention lors d’une apparition dans une séance intitulée « Microsoft Edge : quel avenir pour le nouveau navigateur de Microsoft et Web Platform ». Et, ZDNet a réussi à capturer une diapositive de la présentation qui révèle la feuille de route du navigateur Microsoft Edge.Le quatrième élément de cette liste est celui qui a excité tout le monde sur la toile : « la construction d’une fonctionnalité de blocage de publicités dans le navigateur ». Si l’on en croit la diapositive, cette fonctionnalité aurait été ciblée comme étant disponible pour la prochaine version de Microsoft Edge, et rendrait la nécessité pour la prochaine extension AdBlock plus qu’inutile. Et, il était supposé que le bloqueur de publicités et les extensions feraient leurs débuts dans la version Anniversary Update (Redstone 1) prévue pour cet été.



NON, Microsoft Edge ne va pas arriver avec un bloqueur de publicités
Malheureusement, pour ce qui est du bloqueur de publicités, ce ne sera pas le cas. Peu de temps après la publication de ZDNet, l’ingénieur de Microsoft Edge, Jacob Rossi, est allé sur Twitter pour démystifier celle-ci. « Nous ne construisons pas un bloqueur de publicités en natif au sein de Microsoft Edge, mais nous allons offrir un support aux bloqueurs de publicité tiers comme AdBlock et AdBlock Plus », dit-il.En plus des extensions du navigateur, la diapositive de la Build 2016 révèle que Microsoft Edge va voir Bing Translator poussé dans le navigateur. Le géant de Redmond travaille également en permanence sur les problèmes de rendu des sites Web au sein du navigateur. L’entreprise travaille également pour faciliter la gestion et l’organisation des favoris dans la nouvelle version.



Message déposé le 21.06.2017 à 07:26 - Commentaires (0)


Akku für Dell Alienware M14x R2

Wer sich die technischen Daten in Werbeprospekten durchliest, wird mit Fachbegriffen wie Leuchtkraft, Kontrast und Helligkeit konfrontiert. "Helligkeit und Geräuschentwicklung sind im Kino oft die entscheidenden Kriterien. Gerne wird aber vergessen, dass Helligkeit häufig zulasten der Farbwiedergabe geht", sagt Raphael Vogt, Experte im Bereich Beamer-Kalibrierung aus Worms.Damit das Gerät während des Filmabends nicht stört, sollte es nicht lauter als 26 Dezibel sein. Denn als Faustregel gilt: Je billiger und kompakter ein Projektor ist, desto mehr Lärm macht er. "Alle Beamer, die deutlich kleiner sind als eine Aktentasche, nerven nach einer gewissen Zeit mit fauchenden oder surrenden Kühlventilatoren", warnt Vogt. Große, gedämmte Gehäuse erlauben Vogt zufolge eine leisere Kühlung.Prinzipiell gilt es beim Kauf abzuwägen, welche Aufgabe der Videoprojektor erledigen soll. Beamer werden entweder auf hohe Helligkeit bei Standbildern oder auf flüssige Videowiedergabe hin optimiert - je nachdem ob sie im Büro und der Uni oder im Wohnzimmer zum Einsatz kommen. "Deshalb hat der Cineast wenig Freude an den besonders hellen Bürobeamern, und der Büroleiter wird für Video optimierte Modelle meiden. Denn deren Kontrastumfang und flüssige Videowiedergabe braucht er nicht", erklärt Peter Knaak von der Stiftung Warentest.


Bei der Ausstattung darf ein HDMI-Eingang am Beamer nicht fehlen, ebenso ist eine Fernbedienung mit beleuchteten Tasten sinnvoll. Als teuerstes und wichtigstes Bauteil nennt Vogt das Objektiv, das für Schärfe, Kontrast und Geometrie sorgt. Die Brennweite muss zum geplanten Projektionsabstand, zur Bildgröße und zur Leinwand passen."Da helfen nur Geodreieck, Millimeterpapier und ein Blick in die Datenblätter der infrage kommenden Modelle", sagt der Experte. "Hier entstehen die meisten Fehlkäufe, weil das Bild schlicht nicht auf die Leinwand passt oder zu klein ist."Ein neuer Beamer sollte außerdem die Full-HD-Auflösung mit 1920 mal 1080 Bildpunkten unterstützen. Das ist sinnvoll, weil Zuspieler wie TV-Sender, Blu-ray-Player, Spielekonsole oder Notebook meistens genau diese Pixeldichte zur Verfügung stellen. Am 16:9-Seitenverhältnis führt ebenfalls kein Weg vorbei, so Vogt, auch wenn speziell in den unteren Preisklassen noch immer 4:3-Modelle angeboten werden.Wer bei Spielen, Filmen und Fußballübertragungen auch Wert auf ein akustisches Erlebnis legt, muss seinen Beamer mit externen Lautsprechern bestücken. "Nur wenige Geräte liefern Sound wenigstens auf dem Niveau eines Küchenradios", klagt Vogt. "Die meisten integrierten Lösungen sind kaum besser als der Freisprechmodus eines Telefons."



Nicht sparen sollte man auch bei der Leinwand. Eine billige Rolloleinwand verliert schnell ihre Form, bekommt eingefallene Seiten und verzerrt womöglich sogar das Bild. Am besten sind Rahmenleinwände, die ein Leben lang plan bleiben.Apple hat eine eigene Batteriehülle für das iPhone 6 und 6S im Angebot. Das Smart Battery Case (119 Euro) zaubert einen kleine Buckel auf die Rückseite des Smartphones, verlängert dafür aber die Nutzungsdauer nach Herstellerangaben auf rund 18 Stunden Netzzugang oder 20 Stunden Videowiedergabe.Außerdem steckt in der Silikonhülle mit Mikrofaserfutter noch eine passiv gekoppelte Antenne, ein Ladeanschluss und ein 3,5-Millimeter-Stecker für Kopfhörer. Geladen wird der in Weiß und Anthrazit erhältliche Reservetank per Lightningkabel. Das fehlt im Lieferumfang allerdings ebenso wie nähere Angaben zur Kapazität oder zum Gewicht das Smart Battery Cases.Gigasets SL450HX ist ein DECT-Telefon für den Hausgebrauch, das sich nicht nur mit der eigenen Basisstation, sondern auch mit Routern verschiedenster Hersteller versteht. Per DECT-Protokoll oder CAT-iq kann es auch mit anderen Voice over IP-Routern wie der Fritzbox oder den Speedport-Modellen der Telekom betrieben werden. Über Bluetooth oder Micro-USB können Adressdaten synchronisiert oder Headsets angeschlossen werden. Das SL450HX kostet rund 140 Euro.Inlines Tastaur BT-Quick verbindet sich per Bluetooth drahtlos mit Smartphones oder Tablets (Android/iOS/Windows), kann aber noch mehr. Ihre Schutzhülle lässt sich zu einem Tabletständer umklappen, zum Transport wird die 185 Gramm schwere und knapp acht Millimeter flache Tastatur zusammengeklappt. Der eingebaute Akku (bis zu 85 Stunden Betriebszeit) wird per Micro-USB geladen. Die Inline BT-Quick kostet im Handel rund 50 Euro.


Meerbusch (dpa-infocom) - Nach dem Upgrade auf Windows 10 funktioniert manchmal das in vielen Notebooks eingebaute Touchpad nicht mehr richtig, das eigentlich als Mausersatz fungieren soll.Meistens liegt das an einem inkompatiblen Treiber. Am besten, man schließt eine USB-Maus an, um das Problem schnell zu beheben. Als Erstes die Tastenkombination [Win]+[R] drücken, danach "devmgmt.msc" eingeben und mit [Enter] bestätigen.Danach den Bereich "Mäuse und andere Zeigegeräte" aufklappen und auf den Eintrag für das Touchpad doppelklicken, sodass dessen Eigenschaften angezeigt werden. Als Nächstes oben zum Tab "Treiber" umschalten. Ist der Button "Vorheriger Treiber" verfügbar, klickt man ihn an und folgt dann den Anweisungen, um zum früher verwendeten Treiber zurückzukehren.Wenn der obere Button ausgegraut ist, kann man stattdessen über "Treiber aktualisieren..." versuchen, eine neue Version herunterzuladen, die mit Windows 10 zusammenarbeitet. Kann das Betriebssystem den neusten Treiber nicht von selbst finden, auf der Website des Hardware-Herstellers nachsehen, um den neuen Treiber von dort herunterzuladen.


Berlin (dpa/tmn) - Verbraucher investieren inzwischen nicht mehr nur bereitwillig ins Smartphone selbst. Sie greifen auch zum Zubehör. Doch welche Accessoires sind wirklich nützlich und können im täglichen Umgang punkten?Smartphones bekommen immer größere, hochauflösendere Displays und schnellere Prozessoren. Damit wächst oft auch der Energiebedarf, aber leider nur selten die Kapazität der Akkus. Deshalb sind transportable Stromtankstellen eine sinnvolle Anschaffung. Die oft als Powerbanks bezeichneten externen Akkus machen das Smartphone noch mobiler, selbst wenn Ladegerät und Steckdose verfügbar sind. "Denn während der Ladephase ist man immer an eine Steckdose gebunden, ergo nicht mehr mobil", erklärt "Tablet PC"-Chefredakteur Thomas Johannsen.Powerbanks werden über ein kurzes USB-Kabel mit dem Smartphone verbunden und schon fließt der Strom. Besonders kompakte Varianten lassen sich sogar mit einem Gummi oder einem Klettband am Mobiltelefon befestigen und stören damit kaum noch. Die Kapazität der Powerbank hängt vom Einsatzzweck ab.



"Im Urlaub oder auf längeren Geschäftsreisen empfiehlt sich ein Akku mit deutlich mehr Kapazität als der des internen Akkus", rät Johannsen. "Diese haben meist 2000 bis 3000 Milliamperestunden (mAh), man könnte also mit einer Powerbank von 5000 mAh das Smartphone mindestens einmal komplett aufladen und hätte für brenzlige Situationen sogar noch etwas Restkapazität."Als reiner Notfall-Akku reichten um die 2000 mAh oder weniger, um wenigstens noch die wichtigsten Anrufe erledigen zu können. Entscheidend sei, dass die Powerbank immer aufgeladen ist. Preislich sind Powerbanks mit 10 000 mAh bereits für rund 20 Euro zu haben.Der Zubehör-Bedarf ist immens, wenn man sich den Smartphone-Boom hierzulande vor Augen führt. Mit 25,56 Millionen verkauften Geräten könnten die mobilen Alleskönner dieses Jahr einen neuen Absatzrekord aufstellen, prognostizieren die Marktforscher EITO und GfK.Aber es geht nicht nur darum, Smartphones mit zusätzlichem Strom zu versorgen, sondern auch um Zubehör, das nicht zuletzt zum Werterhalt beiträgt: Um die empfindlichen Smartphone-Displays in Hosen, Taschen und Rucksäcken vor Schlüsseln, Münzen und anderen harten oder scharfkantigen Gegenständen zu schützen, führt an einer Folie oder einem dünnen Schutzglas kein Weg vorbei. "Folie bricht beim Sturz nicht, Glas schützt tendenziell besser vor Kratzern", erklärt Dirk Waasen, Chefredakteur der Fachzeitschrift "Connect", die Vor- und Nachteile. "Folien sind aber keinesfalls schlecht."



Message déposé le 21.06.2017 à 06:46 - Commentaires (0)


Battery for Dell 7FJ92

Unlike their main competitors – SmartThings, owned by Samsung, and Wink – WigWag plans to use the power of open source software and the broader technical community to create the solution that more and more people are asking for: a way to make the disparate world of smart-home products function together.Open source is ultimately more flexible, Hemphill notes, and since it's completely exposed, it is far more likely that bugs will be found.Like so many other IoT companies, WigWag has its own smart lightbulb and room sensor – covering everything from motion and noise to temperature and humidity – but its real focus is on its gateway hub. Its goal is both simple and complex: create a way for people to easily control multiple different products.To do so, it has several different components in its $149 relay that work with the main IoT standards: one covering Z-Wave; one covering ZigBee; another that will work with Bluetooth LTE. It is working on full support for Google's Thread protocol and will add Wi-Fi later this year. In short, anything that is out there, it will try to work with.Most critically however, the whole thing is built using Javascript, Go code and C/C++ and, Hemphill stresses, everything will be open sourced. When a new product comes out, a simple .js file – created by WigWag or, the company hopes, by a community of coders – will be added to the system, then downloaded and updated.


It is a system that is desperately needed. The IoT market is so diverse, with every product seemingly requiring its own app (and sometimes its own hub), that it has actually started to hold the market back. What's worse is that consumers' number one concern – security – suffers. Most products use and store your home Wi-Fi as a way of communicating, but sloppy security has repeatedly made those authentication details accessible, opening up your entire home's system to attack.Hemphill sees the problem as an opportunity. The assumption has always been that everything outbound is fine, and you just need to protect from stuff coming in, he notes, but that's just not the case any more.Until very recently, everything on your network was pretty simple – a laptop, a PC, a mobile phone – but now with people adding new products, many of which are running software that could be years out of date, the problem could be inside the network.People are adding weird stuff now, he notes. That new product you buy might be running Linux 2.8 [we're on 4.8]. The SDK could be five years old.Hemphill is all too aware of this problem: in the US Signal Corps, by the time technology worked its way down to the troops – through the bureaucracy and multitude of defense companies that all wanted to take their cut – it was already out of date. It's a long time ago, but I can remember Windows XP coming out and being given new gear running NT4. That's 2001 and 1996 to save you wracking your brains.



Not that WigWag's product has the solution to the problem. At least not yet. The company is working on a firewall within its product that will give you greater control over what your smart-home products actually do.Hemphill gives two examples. If you have a Belkin product, for example, you want to make sure it is only communicating with Belkin's cloud service. Anything else and something unusual may be happening.Equally, if you have, say, a webcam in your bedroom. You don't want it to be on all the time – particularly when you are in the room at night. But as things currently stand, the company you bought the camera from has a surprising degree of control over that. No one is going to physically turn off a camera every night, but a gateway could electronically shut it off on a time schedule you decide upon. You want to be able to turn if off, and say 'I own the LAN', he argues, and that includes it not talking to the mothership.By being open source, not only do the security problems get smaller – because of all the eyeballs on it – but the ability to work with new products grows. What's more, the approach can keep old products alive. When Nest/Google killed the Revolv hub, people rightly freaked out. What is less known is the decision by TCP to end support for its lightbulb hub. Hemphill says that WigWag has effectively brought that hub back to life by allowing the bulbs to continue to communicate.


The beauty of open source also means that the code can be included wherever it needs to be: in the product, in the cloud, in your router. The idea is to provide a solution that enables different products to function together, while also providing a degree of essential security.So where does WigWag make its money? It has patents on the next level up – syncing – and, it hopes, a leg-up in the world of properly functioning hubs. It is putting its money on the fact that when it comes to complexity, open is the way to go. Open has always, always worked better, says Hemphill. Meh. Another day, another proposition. Disappointingly, this time it’s my laptop offering to do the business, right there in my lap.Ever since I updated its operating system to Sierra, it’s been running hot and cold. Actually no, I mean hot and hotter, regularly firing up the fans in an attempt to cool itself down.For my laptop is a MacBook Pro – or given that the operating system has been pointlessly rebranded from “Mac OS” to “macOS”, it is probably now called a macBOOK prO. From apPLE.Luckily for them, this overheating issue has been entirely ignored by the general public because it barely reaches lukewarm proportions compared with the quite literally explosive problems over at Apple’s playground enemy, Samsung.



It’s not for me to trawl up old news about the fire-starting, twisted fire-starting Galaxy Note 7 since it’s been repeated to death in the mainstream media channels already. Let me simply express my manga-reader’s tingle of recognition when some people started calling the product the Death Note.In fact, I think I managed to source a photo of the event at which Samsung announced the immediate recall of all units:Back to the Cupertino dickswingers, though: for the benefit of those of you who don’t care what the fanboi favourite does, I am happy to confirm that your gut feeling is well-founded. macOS Sierra is an upgrade that puts Siri on proper computers, hauling it up from its previous hopeless depths of uselessness to somewhere almost half as good as Cortana.And Cortana, as you must already be aware, is about as indispensable in the burgeoning personal AI field as the unwanted cork placemat you were given by an aunt some 15 Christmases ago and are now using to stop your (actually useful) Amazon Echo from scratching the surface of your coffee table.I don’t use Siri because it’s an idiot that can’t understand plain English spoken by an Englishman living in England. Unless, of course, the problem is that I am only half English: perhaps it’s the Scottish half that’s buggering up Siri’s comprehension of wha’ um sayun'.


Message déposé le 20.06.2017 à 07:22 - Commentaires (0)


Battery for Samsung NP-R460

Both M-Series and S-Series have a serious amount of processing power.Capacity can be expanded with E-Series expansion trays or by adding S-Series boxes.There have been hundreds of Swarm software deployments on PowerEdge servers, so Caringo is confident the hardware will do the business. We're told enterprise-class 24x7 on-site hardware support is provided by the Caringo and Dell support organizations working as one team.Swarm 9 is available now. Pricing for the M1000 is $20,000, and the S3000 is $48,000. Both include 3 years of hardware and software support and maintenance.Swarm Servers will be available from Caringo, its global channel, Dell Direct or Dell's channel. That means one more object storage product is available from Dell EMC on top of the EMC products, such as the long-standing Centera, Atmos, and ECS. Let a million object flowers bloom seems to be the idea here, for the time being anyway.


Of all the agile practices out there, “pair programming” is the one that elicits the most heckles, confusion, and head-scratching. The idea is that rather than having one person sitting at a screen, coding, you have two who program together. Those who practice it speak of it like most people do of their first time at Burning Man, while those who have never had the “experience” just can’t see what the big deal is.While finding them are hard, over the years studies of pair programming have consistently shown that it’s an effective way to keep bugs out, write code faster, manage the risk of developer churn, and actually raise morale.But – really? Looking at surveys, I’d estimate that somewhere south of 20 per cent of people do pair programming. If pair programming was so great, why do people find it so odious? I mean, who wants to work so close to someone that you can smell the effects of coding?And as if it wasn’t enough to keep that foetidly in the developer cubes, it’s been wafting into the server room despite those cyclopean fans in there: operators are starting to pair as well.The theory behind pair programming is straightforward: programming is difficult and error prone. It’s much better to have a buddy helping along. In addition to actually coding together, it sometimes means having one developer write code and the other write tests right next to each other, in co-ordination. With two heads together, the thinking is that you write less bugs and get better test coverage.



Indeed pairs in studies over the past 20+ years have consistently written higher quality code and written it faster than solo coders. So, while it feels like there’s a “halving” of developers by pairing them up, as one of the original pair programming studies put it: “The defect removal savings should more than offset the development cost increase.”If the pairs rotate frequently, the theory says you’ll get better diffusion of knowledge across the team: no one person builds up a fief of knowledge around, say, builds, or how the “Print Invoice” function works. This means there’s a lower “bus factor,” helping protect against team churn and brain-drain.Large organisations I talk with - who’re all trying to figure out the footwork for that “digital transformation” dance - use rotating pairing as a way to spread new technical knowledge, but also change that oh so mysterious “culture” in their organisation.Much like alcohol and black coffee, pairing tastes awful at first... until you start imbibing of it repeatedly. In most of the studies, and the feedback I hear from organisations doing it nowadays, pairing practitioners end up liking it after just a few weeks. At first, true, the usually solitary programmer has to, you know, talk to someone else. They even have to get used to be corrected by someone else – horrors of all horrors!


But, with a rigorous enough schedule that allows for breaks and bounds the programming time to normal 9-to-5 schedules, most people end up liking pairing after a while. It only takes a few pints to dedicate your life to it.It’s hard to say why people like it more, but I suspect it has something to do with the fact that humans, fundamentally, like being social, so long as it feels safe. Also, most programmers and operations people take pride in their craft: they want to do good work (despite what those overflowing tickets queues are doing to them). If pair programming increased quality, there’s more to be proud of.Managers of these programmers should also like the quality, speed, and predictability of pairing.That predictability comes from an interesting side effect of how exhausting pair programming is. For one, it’s harder to goof off – er, “check email” – and attend meetings when you’re pair programming. As the man from downtown said: “Always Be Coding.”And, on that kind of schedule, developers are straight up pudding-headed after seven or eight hours of pair programming. As one practitioner put it: “This makes pair programming intense, especially at the beginning. At the end of the first day, I couldn't go home. Before I could face humans again, I put my phone on airplane mode, ignored my usual online accounts, and went to the gym for two hours of self-imposed isolation.”Developers can only pair so long. They have to stop, so you just close up shop at 5. No more playing Doom until 10pm and then coding – er, I mean “working late".



It can come off as sounding a bit like nanny-management, but pair programming seems to induce developers to actually do the work.While the research is sparse (and, really, when it’s “n=whatever students enrolled in my CS class” it’s a little fishy), from where I sit and what people keep telling me, pair programming works. Should you be doing it all the time, though?I’ve heard practitioners say that you should at least do it for complex, difficult tasks. If it’s some routine coding or operations tasks, then pairing may not be the nitro-charge you’re expecting. Indeed, one of the studies suggests that pairing is the most beneficial for “challenging programming problems".Put another way, if the task is “boring,” maybe it’s better to solo it. Still, I can’t help but think that it’ll be the boring tasks that end up biting you, especially when it comes to pair sysadmining. After all, how many systems have come down because of the boredom of DNS configurations? "Open is always going to win," states Ed Hemphill, CEO of WigWag, a company that hopes to make sense of the ever-expanding and ever-more-complex Internet of Things market.WigWag is named after the traditional flags used by the US military's Signal Corps to communicate messages. Hemphill and his cofounder Travis McCollum both served in the Signal Corps before starting up their company in Austin, Texas.


Message déposé le 20.06.2017 à 07:11 - Commentaires (0)


Battery for Acer Aspire 5820T

You may not need HP Workspace at all to make use of the Elite x3, it runs some UWP surprisingly well. It’s just that many applications are missing in UWA format – as we found when we tried to use Continuum for real work.HP has built a comprehensive hardware and software package around the promise of Windows 10 – including a laptop dock (basically a shell of a laptop with a 12.5 inch HD display – pdf), and a desk dock. Orders can be placed with HP for the phone but Microsoft has yet to fulfil its side of the bargain, as Continuum remains resolutely single window for now.Comment Red Hat is the biggest – and one of the oldest – companies in the Linux world, but despite the difficulty of accurately measuring Linux usage figures, Ubuntu and its relatives seem to be the most popular Linux distributions. Red Hat isn’t sitting idle, though. Despite its focus on enterprise software, including virtualisation, storage and Java tools, it’s still aggressively developing its family of distros: RHEL, CentOS and Fedora.Fedora is the freebie community-supported version, with a short six-month release cycle, but it’s still important. Although RHEL is the flagship, it’s built from components developed and tested in Fedora. According to Fedora Project Lead Matthew Miller told this year’s Flock to Fedora conference this summer its future looks bright.After the major "Fedora.next" re-focus in early 2014, Fedora's numbers are up. Both new downloads and updates to installed systems are rising. External involvement – that is, from non-Red Hat staffers – is sharply up: two-thirds of Fedora's contributors are from outside the company these days. And yes, that's counting 'Hatters using non-company email addresses.


It's getting better as a distro, too, benefitting from the improving fit-and-finish of Linux and its manifold supporting components: desktops, applications and their less-obvious underpinnings. Fedora 24 is significantly more usable than it was five or six releases ago. Rather than just being the testbed for future RHEL releases, the project now has wider aspirations – Miller identified the project's primary target as developers.I must confess, I lean more towards Ubuntu, only periodically dipping a toe into the waters of the RPM world. So when looking at Fedora, it’s sometimes irresistible to draw comparisons with the more orangey-purple side of the fence.And these days it's a family rather than a single distro. The old structure of Fedora Core plus additional rings of functionality has been discarded in favour of multiple "flavours", "spins" and "labs"."Flavours" are akin to Ubuntu's editions: as well as the standard GNOME 3 desktop, there's Fedora Server plus the ultra-minimal Fedora Cloud. Fedora's "spins" resemble Ubuntu's remixes, offering KDE, Xfce, LXDE, Maté-Compiz and Cinnamon. An interesting addition is SOAS, a live USB drive with the One Laptop Per Child's Sugar environment.Fedora's Labs are a more versatile equivalent to Ubuntu's handful of special-purpose editions. Labs are pre-assembled bundles of functionally related software, which can be installed as standalone distros or added into existing installations. Finally, COPRs are directly analogous to Ubuntu's PPAs: ad-hoc supplementary repositories to facilitate adding new software that isn't part of the main distro.The overall structure of the software is changing, too. Platform Architect Langdon White’s talk at the conference introduced the Modularity initiative, an attempt to restructure the entire project down into functional modules which can be installed and updated independently, in different ways – for instance as classic RPM packages or container images.Atomic Workstation represents another possible future direction – a smartphone-like OS, with a read-only root partition, installed and updated via OSTree, with all applications in Docker containers.



As of the version 25, standard Fedora will support the Raspberry Pi 2 and 3. Fedora is an all-FOSS distro, with no proprietary drivers, firmware or plugins, so it doesn't support the Pi 3's Wi-Fi and Bluetooth, as these require binary blobs. (We're told there are efforts underway to help people install closed-source components, such as Chrome, by the way.)There are still downsides to Fedora relative to Ubuntu. There are no long-term support releases, as that's the role of the technologically much more conservative CentOS. Ubuntu's more pragmatic attitude to including proprietary binaries means more hardware works out of the box, and installing the "restricted extras" package enables Flash, MP3 and so on in one easy operation. But the Red Hat family has come a long way. The 7mm 2.5-inch drives are for standard laptop drive bays, while the 15mm ones are for desktops. We're led to believe that these thicker, higher-capacity 2.5‑inch drives will feature in upcoming external storage products.Seagate says all disk drives in the BarraCuda family have Multi-Tier Caching Technology (MTC) to speed data reads and writes. This uses a hierarchy of NAND Flash, DRAM and media cache technologies to optimise the data flow.


Apparently the drives have new firmware that checks how data accesses are operating and spins the platters down when it can, to reduce power consumption without affecting performance. This might seem of not that much consequence to consumers and small businesses, but it matters more to larger businesses with bigger electricity bills.The 2.5‑inch BarraCudas spin at 5,400rpm, have a 6Gbit/s SATA interface, transfer data at up to 140MB/sec and come with a 2‑year limited warranty. Get a PDF data sheet here. The 7mm thick 2.5‑inch drive has two platters, and the 15mm model has five 1TB platters.The 3.5-inch BarraCudas and BarraCuda Pros are faster, spinning at 7,200rpm, and have a longer, 5‑year warranty. Seagate claims the BarraCuda Pro is the fastest 10TB desktop drive available.The 500GB – 4TB BarraCudas have 1, 2 or 3 1TB platters, a 64MB cache and 55TB/year workload rate limit. The highest sustained transfer rate is 210MB/sec (180MB/sec for the 4TB model). Get a PDF data sheet here.BarraCuda Pros have either 6 platters (6TB and 8TB) or 7 (10TB). Their maximum sustained transfer rate from the data sheet [PDF] is 210MB/sec, while the workload rate limit is 300TB/year.The FireCuda 2.5-inch accelerated drives can be viewed as 7mm BarraCudas with added 8GB cache. Their sustained transfer rate is the same as the BarraCuda; 140MB/sec, though. Seagate isn't revealing the spin speed in the data sheet [PDF], but we figure it's 5,400rpm again.


Sticking these FireCudas in a 3.5‑inch case gets you a 7,200rpm spin speed and a 210MB/sec sustained transfer rate.FireCudas have a 5‑year warranty and, like the BarraCudas, use MTC to speed their operation. They are not given a workload rate limit by Seagate.FireCuda drives operate in the performance gap between basic disk drives and SSDs. We can't expect them to get significantly faster, particularly as the per‑GB cost of flash is dropping with 3D TLC NAND. Caringo has updated its Swarm object storage software and will flog the code on appliances based on Dell PowerEdge servers.Deployments of Caringo's object storage is used for applications such as bulk storage, analytics, archiving, backup, cloud storage and content distribution. The software provides NFS, SMB, S3, HDFS and Rest APIs for native object storage access methods to data.Swarm 9 is the latest release of Caringo's software. It has an NFS protocol converter and the OEM hardware platform in addition to its availability in software-only form. The software features:Data is managed through creation to expiration via administrator-defined policies called Lifepoints, which are stored as metadata that automatically manages the number of replicas, erasure-coding scheme, and deletion.



There can be metadata annotations, made without modifying the reference object, and these are searchable through the SCSP API.The company says Swarm Servers are a fully-supported hardware and software system starting at 288TB and scaling linearly in 96TB increments (just add another S-Series server) to hundreds of petabytes of capacity with a pay-as-you-grow pricing scheme.The system includes M-Series Management Servers and S-Series Storage Servers. The M-Series is a 1U, rack-mountable appliance with a Dell PowerEdge R630 inside it. It has a Xeon E5-2695v4 processor with 18 cores, 128GB DDR4 DRAM, 8 x 1TB, 7,200rpm SAS disk drives, 2 x 10GbitE data access ports and a 1GbitE management port. VMware's ESXi is booted off an internal SD module.The management software is Swarm VMware APP, with a vCenter Server Appliance and ESXi 6.0U2. There is a scale-out, stateless NFS protocol converter for high performance and high availability.The 2U, rackmount, S-3000 Storage Servers use a PowerEdge R730xd platform, with CPU, memory and network resources, plus 96TB capacity. The CPU resource is 2 x Xeon E5-2640v4 10 core processors; 20 cores total, plus 128GB DDR4 DRAM and 12 x 8TB, 7,200rpm SAS disk drives. There are 2 ports of 10GbitE (Intel x540) for data access and a 1GbitE management port.


Message déposé le 19.06.2017 à 08:05 - Commentaires (0)


Battery for Acer Aspire 5820T

You may not need HP Workspace at all to make use of the Elite x3, it runs some UWP surprisingly well. It’s just that many applications are missing in UWA format – as we found when we tried to use Continuum for real work.HP has built a comprehensive hardware and software package around the promise of Windows 10 – including a laptop dock (basically a shell of a laptop with a 12.5 inch HD display – pdf), and a desk dock. Orders can be placed with HP for the phone but Microsoft has yet to fulfil its side of the bargain, as Continuum remains resolutely single window for now.Comment Red Hat is the biggest – and one of the oldest – companies in the Linux world, but despite the difficulty of accurately measuring Linux usage figures, Ubuntu and its relatives seem to be the most popular Linux distributions. Red Hat isn’t sitting idle, though. Despite its focus on enterprise software, including virtualisation, storage and Java tools, it’s still aggressively developing its family of distros: RHEL, CentOS and Fedora.Fedora is the freebie community-supported version, with a short six-month release cycle, but it’s still important. Although RHEL is the flagship, it’s built from components developed and tested in Fedora. According to Fedora Project Lead Matthew Miller told this year’s Flock to Fedora conference this summer its future looks bright.After the major "Fedora.next" re-focus in early 2014, Fedora's numbers are up. Both new downloads and updates to installed systems are rising. External involvement – that is, from non-Red Hat staffers – is sharply up: two-thirds of Fedora's contributors are from outside the company these days. And yes, that's counting 'Hatters using non-company email addresses.


It's getting better as a distro, too, benefitting from the improving fit-and-finish of Linux and its manifold supporting components: desktops, applications and their less-obvious underpinnings. Fedora 24 is significantly more usable than it was five or six releases ago. Rather than just being the testbed for future RHEL releases, the project now has wider aspirations – Miller identified the project's primary target as developers.I must confess, I lean more towards Ubuntu, only periodically dipping a toe into the waters of the RPM world. So when looking at Fedora, it’s sometimes irresistible to draw comparisons with the more orangey-purple side of the fence.And these days it's a family rather than a single distro. The old structure of Fedora Core plus additional rings of functionality has been discarded in favour of multiple "flavours", "spins" and "labs"."Flavours" are akin to Ubuntu's editions: as well as the standard GNOME 3 desktop, there's Fedora Server plus the ultra-minimal Fedora Cloud. Fedora's "spins" resemble Ubuntu's remixes, offering KDE, Xfce, LXDE, Maté-Compiz and Cinnamon. An interesting addition is SOAS, a live USB drive with the One Laptop Per Child's Sugar environment.Fedora's Labs are a more versatile equivalent to Ubuntu's handful of special-purpose editions. Labs are pre-assembled bundles of functionally related software, which can be installed as standalone distros or added into existing installations. Finally, COPRs are directly analogous to Ubuntu's PPAs: ad-hoc supplementary repositories to facilitate adding new software that isn't part of the main distro.The overall structure of the software is changing, too. Platform Architect Langdon White’s talk at the conference introduced the Modularity initiative, an attempt to restructure the entire project down into functional modules which can be installed and updated independently, in different ways – for instance as classic RPM packages or container images.Atomic Workstation represents another possible future direction – a smartphone-like OS, with a read-only root partition, installed and updated via OSTree, with all applications in Docker containers.



As of the version 25, standard Fedora will support the Raspberry Pi 2 and 3. Fedora is an all-FOSS distro, with no proprietary drivers, firmware or plugins, so it doesn't support the Pi 3's Wi-Fi and Bluetooth, as these require binary blobs. (We're told there are efforts underway to help people install closed-source components, such as Chrome, by the way.)There are still downsides to Fedora relative to Ubuntu. There are no long-term support releases, as that's the role of the technologically much more conservative CentOS. Ubuntu's more pragmatic attitude to including proprietary binaries means more hardware works out of the box, and installing the "restricted extras" package enables Flash, MP3 and so on in one easy operation. But the Red Hat family has come a long way. The 7mm 2.5-inch drives are for standard laptop drive bays, while the 15mm ones are for desktops. We're led to believe that these thicker, higher-capacity 2.5‑inch drives will feature in upcoming external storage products.Seagate says all disk drives in the BarraCuda family have Multi-Tier Caching Technology (MTC) to speed data reads and writes. This uses a hierarchy of NAND Flash, DRAM and media cache technologies to optimise the data flow.


Apparently the drives have new firmware that checks how data accesses are operating and spins the platters down when it can, to reduce power consumption without affecting performance. This might seem of not that much consequence to consumers and small businesses, but it matters more to larger businesses with bigger electricity bills.The 2.5‑inch BarraCudas spin at 5,400rpm, have a 6Gbit/s SATA interface, transfer data at up to 140MB/sec and come with a 2‑year limited warranty. Get a PDF data sheet here. The 7mm thick 2.5‑inch drive has two platters, and the 15mm model has five 1TB platters.The 3.5-inch BarraCudas and BarraCuda Pros are faster, spinning at 7,200rpm, and have a longer, 5‑year warranty. Seagate claims the BarraCuda Pro is the fastest 10TB desktop drive available.The 500GB – 4TB BarraCudas have 1, 2 or 3 1TB platters, a 64MB cache and 55TB/year workload rate limit. The highest sustained transfer rate is 210MB/sec (180MB/sec for the 4TB model). Get a PDF data sheet here.BarraCuda Pros have either 6 platters (6TB and 8TB) or 7 (10TB). Their maximum sustained transfer rate from the data sheet [PDF] is 210MB/sec, while the workload rate limit is 300TB/year.The FireCuda 2.5-inch accelerated drives can be viewed as 7mm BarraCudas with added 8GB cache. Their sustained transfer rate is the same as the BarraCuda; 140MB/sec, though. Seagate isn't revealing the spin speed in the data sheet [PDF], but we figure it's 5,400rpm again.


Sticking these FireCudas in a 3.5‑inch case gets you a 7,200rpm spin speed and a 210MB/sec sustained transfer rate.FireCudas have a 5‑year warranty and, like the BarraCudas, use MTC to speed their operation. They are not given a workload rate limit by Seagate.FireCuda drives operate in the performance gap between basic disk drives and SSDs. We can't expect them to get significantly faster, particularly as the per‑GB cost of flash is dropping with 3D TLC NAND. Caringo has updated its Swarm object storage software and will flog the code on appliances based on Dell PowerEdge servers.Deployments of Caringo's object storage is used for applications such as bulk storage, analytics, archiving, backup, cloud storage and content distribution. The software provides NFS, SMB, S3, HDFS and Rest APIs for native object storage access methods to data.Swarm 9 is the latest release of Caringo's software. It has an NFS protocol converter and the OEM hardware platform in addition to its availability in software-only form. The software features:Data is managed through creation to expiration via administrator-defined policies called Lifepoints, which are stored as metadata that automatically manages the number of replicas, erasure-coding scheme, and deletion.



There can be metadata annotations, made without modifying the reference object, and these are searchable through the SCSP API.The company says Swarm Servers are a fully-supported hardware and software system starting at 288TB and scaling linearly in 96TB increments (just add another S-Series server) to hundreds of petabytes of capacity with a pay-as-you-grow pricing scheme.The system includes M-Series Management Servers and S-Series Storage Servers. The M-Series is a 1U, rack-mountable appliance with a Dell PowerEdge R630 inside it. It has a Xeon E5-2695v4 processor with 18 cores, 128GB DDR4 DRAM, 8 x 1TB, 7,200rpm SAS disk drives, 2 x 10GbitE data access ports and a 1GbitE management port. VMware's ESXi is booted off an internal SD module.The management software is Swarm VMware APP, with a vCenter Server Appliance and ESXi 6.0U2. There is a scale-out, stateless NFS protocol converter for high performance and high availability.The 2U, rackmount, S-3000 Storage Servers use a PowerEdge R730xd platform, with CPU, memory and network resources, plus 96TB capacity. The CPU resource is 2 x Xeon E5-2640v4 10 core processors; 20 cores total, plus 128GB DDR4 DRAM and 12 x 8TB, 7,200rpm SAS disk drives. There are 2 ports of 10GbitE (Intel x540) for data access and a 1GbitE management port.


Message déposé le 19.06.2017 à 08:05 - Commentaires (0)


Batterie pour Compaq Presario CQ72

Selon Ubergizmo, il n’y a pas encore de news concernant le nom que Samsung va donner à son nouveau système d’ exploitation. Cependant, le site révèle que l’OS sera open source. L’ordre du jour de la conférence fournit cette information : « Samsung va annoncer son nouveau système d’exploitation en temps réel (RTOS) open source dédié à l’IdO, qui dispose d’un large éventail de fonctionnalités tout en conservant une empreinte légère et efficace ».Il y a eu récemment beaucoup de nouveaux développements liés aux plates-formes pour l’Internet des Objets. ARM a récemment annoncé son module de M2.COM – fabriqué en consortium avec d’autres entreprises – qui va embarquer l’OS d’ARM. Google a également annoncé son intention de se faire une place sur le marché dans un effort de promouvoir son travail avec les plates-formes Weave et Brillo. Enfin, un autre acteur, Orange, a déclaré sa flamme pour l’IdO avec son réseau LoRa.C’est donc tout ce que nous avons à ce jour, car il est peu probable que Samsung publie de plus amples informations sur ce nouveau système avant la Samsung Developer Conference qui aura lieu dans moins d’un mois.


Après avoir créé une pléthore d’appareils connectés SmartThings, et fournissant même des conseils aux développeurs afin qu’ils puissent construire des dispositifs intelligents, ce nouveau système d’exploitation de Samsung devrait aider à stimuler le marché.Microsoft va déployer cet été sa mise à jour « Anniversary Update » pour Windows 10, et entre autres choses, celle-ci va inclure un centre de notifications mis à jour, pour les notifications et les paramètres. L’une des nouvelles fonctionnalités les plus cool ? Vous serez en mesure de voir et répondre aux notifications de votre smartphone à partir de Windows 10. Et, cela est vrai si vous utilisez un smartphone sous Windows Phone ou sous Android.La société a révélé le projet et les détails lors de la Build 2016, en montrant comment le système fonctionne au cours de sa conférence.Néanmoins, il y a un hic : vous devez installer l’application Microsoft Cortana sur votre appareil Android si vous souhaitez synchroniser vos notifications — celle-ci est actuellement disponible uniquement aux États-Unis. Mais une fois que vous faites cela, vous serez en mesure de voir les SMS, les appels, ou d’autres notifications manquées sur votre smartphone. Vous voulez répondre à un message ? Vous devriez être en mesure de le faire depuis votre PC Windows, sans déverrouiller votre smartphone Android.



Si vous avez Windows 10 sur votre téléphone, il va également disposer du nouveau centre de notifications, et vos notifications seront synchronisées à travers les dispositifs, de sorte que vous pouvez les renvoyer sur un seul appareil et les faire disparaître sur l’ensemble de vos dispositifs. Le but est de vous permettre de rejeter de la même façon les notifications sur votre smartphone Android, mais encore une fois, cela ne fonctionne que si vous avez l’application Cortana installée sur votre smartphone.Alors que Microsoft propose également une application Cortana pour iOS, la firme n’a pas autant accès aux entrailles du système d’exploitation que la version Android, donc elle ne peut pas synchroniser vos notifications sur un ordinateur sous Windows 10 de la même manière.Les autres nouvelles fonctionnalités de la mise à jour de Windows 10 Anniversary Update vont être un support amélioré pour la saisie au stylet, une fonctionnalité de sécurité biométrique avec Windows Hello dans le navigateur Web Edge pour se connecter à des sites Web à l’aide d’une empreinte digitale de l’iris ou la reconnaissance faciale, et l’inclusion d’un sous-système Ubuntu Linux qui permet d’exécuter un shell Bash dans Windows.Après les grandes projections de l’an dernier sur Windows 10 et le casque HoloLens, la Microsoft Build de cette année était plus incrémentale. Bien que Microsoft n’ait pas communiqué ou annoncé une nouvelle version de Windows lors de l’événement, ou même un tout nouveau matériel, la firme nous a permis de jeter un coup d’œil à ce qui va venir dans la mise à jour dite « Anniversary Update » de Windows 10, qui doit sortir cet été.


Rappelez-vous, Windows 10 est la dernière version numérotée de Windows. Autrement dit, attendez-vous à voir de plus petites, mais plus régulières mises à jour. Plus de 270 millions de personnes sont passées sur Windows 10, a annoncé Terry Myerson, à la tête de Windows, lors de la keynote d’ouverture de la Build. Mais, même l’Anniversary Update va manquer de fonctionnalités flambant neuf. À contrario, le géant de Redmond va pousser un peu plus loin des fonctionnalités existantes, comme son assistant numérique, Cortana.Une grande partie de ce qui va venir pour Windows est surtout intéressante pour les développeurs. Par exemple, de nouveaux outils vont permettre de facilement porter les applications conçues pour les versions précédentes de Windows vers des applications dites « modernes », dédiées à Windows 10 et accessibles depuis le Windows Store. Et, le système d’exploitation offrira un support au Bash shell Linux, permettant d’exécuter davantage d’applications. Je dois souligner que Windows 10 Anniversary Update ne concerne pas seulement les PC, mais aussi les smartphones, les tablettes, la Xbox, ou encore les dispositifs de l’Internet des Objets ainsi que le HoloLens.



Non seulement Cortana va devenir plus proactif, ce qui suggère plus de choses comme où déjeuner si vous êtes dans une ville inconnue (puisque vous lui avez indiqué vos préférences de cuisine), mais l’assistant vocal va apparaître dans plusieurs endroits du système, telles que l’écran de verrouillage ou encore au sein de Skype lors d’une conversation avec un bot. Si l’intégration de Cortana sur l’écran de verrouillage est un sujet délicat concernant la vie privée, les représentants de Microsoft ont mentionné que vous pourrez filtrer ce qui s’affiche à l’écran.Une intrigante fonctionnalité de Cortana qui n’a pas été beaucoup discutée lors de la keynote est le contrôle du système par Cortana. « Hey Cortana arrête le PC ! » ne fonctionne pas maintenant, mais une vidéo présentée à la Build suggère qu’une telle caractéristique sera disponible dans l’Anniversary Update. Je me demande si cela signifie aussi que Cortana sera en mesure de modifier les paramètres système, comme « Désactiver le Wi-Fi » ou « Regarde les mises à jour ».Cortana se retrouve désormais intégré au sein de multiples applications tierces, afin d’obtenir des réponses sur certaines questions, tout en effectuant des actions. Si vous l’avez utilisé, vous savez que l’assistant peut facilement obtenir des informations sur TripAdvisor ou encore la météo, mais la société a lancé une nouvelle section « Mieux avec Cortana » dans la boutique d’applications Windows, qui liste près de 1 000 applications qui intègrent maintenant Cortana. Alors soyons fou, « Cortana, va me chercher une voiture Uber ! ».


www.portable-batteries.com


Message déposé le 19.06.2017 à 07:37 - Commentaires (0)


Akku für Samsung AA-PL9NC6B

Endet diese Herstellergarantie aber schon vor der zweijährigen Gewährleistungspflicht des Händlers, sollte man darauf achten, dass der Extraschutz direkt ab dem Kauf greift. Sonst muss man Reparaturen unter Umständen selbst zahlen, trotz zusätzlicher Garantie.Viele Zusatzgarantien kosten einmalig und laufen dann nach dem Schutzzeitraum von selbst aus. Einige Versicherungen verlängern sich aber automatisch von Jahr zu Jahr. Gerade bei Policen, welche nur den Zeitwert erstatten, wenn das Gerät kaputt geht, kann das zum Problem werden. Denn das verliert über die Jahre an Wert, so dass man am Ende bei Defekten oder Totalschäden kaum mehr etwas bekommt. Sittig: Das muss man auf dem Schirm haben, damit es kein Verlustgeschäft wird.Las Vegas (dpa/tmn) - Frische Hardware für Spieler, die häufiger unterwegs sind. Auf der Elektronikmesse CES in Las Vegas zeigen mit Gigabyte, MSI und Lenovo drei Branchengrößen neue Notebooks für Spieler.Gigabytes P57W richtet sich mit 17,3 Zoll Bildschirmgröße an Spieler, denen Handlichkeit nicht so wichtig ist. Im Inneren stecken Intels Skylake-Prozessoren und Nvidias Geforce GTX 970M. Die Tastatur soll auch Mehrfacheingaben durch gleichzeitige Tastendrücker zuverlässig erkennen. Das P57W ist ab sofort ab rund 1300 Euro verfügbar.


Deutlich kleiner ist MSIs GS40 Phantom mit 14 Zoll Bildschirmdiagonale. Auch hier sind Intels Skylake-Prozesoren verbaut, die Spielegrafik wird von Nvidias Geforce GTX 970M berechnet. Für ein Spieler-Notebook ist der GS40 Phantom mit 1,7 Kilogramm Gewicht recht leicht. Im ebenfalls vorgestellten GTS72S Tobii steckt die gleichnamige Augen-Tracking-Technik, die ein leichteres Steuern von Spielen und Programmen ermöglichen soll. Der Computer kann so ermitteln, auf welchen Teil des Bildschirms ein Spieler gerade schaut. Das GT70 Stealth-Modell mit 17 Zoll Bildschirmgröße hat eine neue Display-Option erhalten. Im GT72 Stealth Pro kann nun auf Wunsch ein 4K-Display (3840 zu 2160 Pixel) eingebaut werden. Alle drei Geräte sind noch im Laufe des Januars verfügbar.Lenovo zeigt mit dem Ideapad Y900 ein Gerät, das mit klassischen Laptops nur noch wenig gemein hat. In dem 4,5 Kilogramm schweren Notebook (17 Zoll Bildschirmgröße) stecken auf Knopfdruck übertaktbare Prozessoren, bis zu 64 Gigabyte Arbeitsspeicher und Grafikchips bis hoch zur GTX 980M von Nvidia. Die Tastatur verfügt über mechanische Schalter für jede Taste, was viele Spieler wegen höherer Präzision schätzen. Vier frei belegbare Makrotasten am linken Tastaturrand sind für häufige Aktionen programmierbar. In den USA soll das Ideapad Y900 ab Juni für rund 2000 US-Dollar (rund 1860 Euro) aufwärts verfügbar sein. Einen Termin für Deutschland nannte Lenovo noch nicht.



München/Berlin (dpa) - Der Einkauf im Netz wird bei den Kunden in Deutschland immer beliebter. Nach einem guten Weihnachtsgeschäft erwartet der Bundesverband Onlinehandel (BVOH) auch für das laufende Jahr ein Umsatzwachstum im niedrigen zweistelligen Prozentbereich.Mittlerweile würden auch immer mehr Produkte des täglichen Bedarfs übers Netz gekauft, sagte Verbandspräsident Oliver Prothmann der Deutschen Presse-Agentur. Es ist keine Besonderheit mehr, Waren vom Klopapier über die neue Zahnbürste bis hin zu Lebensmitteln online einzukaufen.Das beste Weihnachtsgeschäft seiner Geschichte erlebte etwa der Onlinehändler Otto, wie eine Unternehmenssprecherin sagte. Dabei standen Elektronik-Produkte wie Notebooks, LED-Fernseher und Smartphones auf der Hitliste der beliebtesten Geschenke ganz oben, aber auch Hausgeräte wie Waschmaschinen, Geschirrspüler und Kaffeevollautomaten. Angesichts von Umtausch und Gutschein-Einlösungen dürften sich die Ausläufer des Weihnachtsgeschäfts noch bis Ende Januar hinziehen.Ins laufende Jahr blickt das Unternehmen optimistisch: Wir gehen mit ausgesprochen positiven Erwartungen ins neue Jahr und wollen spürbar weiter wachsen, so die Sprecherin. Größtes Wachstumssegment für den Onlinehändler seien dabei Möbel - von Schränken über Betten bis hin zu Sofas.


Auch der Versandriese Amazon sprach von einem erfolgreichen Weihnachtsgeschäft. Genaue Umsatzzahlen nannte die deutsche Niederlassung des US-Handelsriesen aber nicht. Rekord-Verkaufstag für Weihnachtsgeschenke bei Amazon.de sei der 14. Dezember gewesen, an dem alleine mehr als 5,4 Millionen Produkte verkauft worden seien und damit so viele wie nie zuvor in der Unternehmensgeschichte.Bei der logistischen Abwicklung des Weihnachtsgeschäfts dürfte mancher Internethändler auch von der milden, schnee- und eisfreien Witterung im Dezember profitiert haben. Wer allerdings wie Zalando auf Mode spezialisiert ist, musste wiederum umsteuern, weil die tendenziell auch höherpreisige Winterkleidung in den Wochen vor dem Fest wetterbedingt wenig gefragt war.Auch der Handelsverband Deutschland hatte zuletzt über einen schleppenden Absatz von Wintermode berichtet. Dies mache aber dem stationären Handel mit seinen begrenzten Lagerkapazitäten üblicherweise noch stärker zu schaffen, weil er früh mit Rabatten beginne, um schon einmal Platz für die Frühjahrsmode zu schaffen, hieß es in der Branche. Wenn dann ein Kälteeinbruch kommt, hätten viele Geschäfte warme Kleidung nicht mehr parat - hier könnten Internet-Händler flexibler reagieren.Berlin (dpa/tmn) - Das Smartphone fordert alle paar Stunden die Steckdose, das Notebook hält ohne Netzteil nur noch wenige Minuten durch. Also höchste Zeit für neue Akkus. Doch Original-Ersatz ist teuer.


Nachbauten gibt es im Internet für viel weniger Geld: Kostet mancher Smartphone-Akku beim Hersteller um die 30 Euro, locken baugleiche, vermeintliche Schnäppchen-Batterien mit weniger als der Hälfte des Preises. Kann man da bedenkenlos zugreifen?Zumindest im Neuzustand können manche Ersatz-Akkus es in Sachen Laufzeit durchaus mit Original-Batterien aufnehmen, wie das c't-Magazin bei einem Test diverser Smartphone-Akkus ermittelt hat. Einige Nachbau-Akkus hielten genauso lange durch wie das Original, und einige sogar länger - etwa beim Samsung Galaxy S3 oder Google Nexus 4. Wir haben festgestellt, dass Nachbau-Akkus in der Regel schneller altern als die Originale, schränkt c't-Redakteur Christian Wölbert aber ein. Sie halten nicht so lange durch.Während die Original-Akkus im Test nach eineinhalb Jahren typischer Nutzung meist noch mindestens 80 Prozent ihrer ursprünglichen Leistung boten, lag die Kapazität der Konkurrenz-Produkte nach dieser Zeit meist deutlich darunter. Für Nutzer, die damit leben können, dass der Akku etwas schneller altert, seien die Nachbauten aber eine günstige Alternative, meint Wölbert.



Auch Jürgen Ripperger vom Elektrotechnik-Verband VDE rät nicht generell von Nachbau-Akkus ab. Wenn der Gerätehersteller die Nachbauten freigegeben hat, dann kann man zugreifen. Setzt man aber einen nicht freigegebenen Energiespeicher in Kamera oder Handy ein, erlösche die Produkthaftung des Geräteherstellers.Die Gefahr, dass Ersatz-Akkus explodieren, ist zudem gering, schreibt die c't: Jährlich würden Milliarden Akkus verkauft, bekannt seien aber weniger als zehn Fälle explodierender Akkus. Zudem habe es sich dabei teils auch um Original-Akkus gehandelt.Doch was ist eigentlich ein guter Nachbau-Akku und was ein schlechter? Das lässt sich pauschal nicht sagen, erklärt Wölbert. Die Qualität schwankt sehr stark. Denn während die Akkus einer Charge gute Leistung liefern, kann dies bei der nächsten Charge schon anders aussehen. Also ist ausprobieren angesagt.Wer einen Nachbau-Akku im Netz bestellt, sollte darauf achten, dass der Händler in Deutschland oder zumindest in der EU sitzt. Denn dann hat man die gesetzlich vorgeschriebenen zwei Jahre Gewährleistung auf den Akku, erklärt Jürgen Ripperger.Aber auch beim Kauf von Original-Akkus ist Vorsicht geboten: Viele vermeintliche Originale, die im Netz zu einem Bruchteil des Original-Preises angeboten werden, sind offenbar gefälscht. Das zeigte jüngst auch ein c't-Testkauf von zwölf als original gekennzeichnete Smartphone-Akkus bei einem großen Versandhändler. Das Ergebnis: Alle zwölf Akkus waren Fälschungen.


www.kaufen-akku.com


Message déposé le 19.06.2017 à 06:38 - Commentaires (0)


Battery for Acer TravelMate 6592G

He writes that the phone had the things he wanted most, and while browsing doesn't need a keyboard, writing book chapters and blog posts is painful on a phone screen – hence the painstaking effort to hack the laptop into a keyboard for the phone.“I use the phone for multiple interfaces, yes VNC, but more often using my laptop’s keyboard to interface to the phone’s existing apps, Termux (to SSH into my laptop), Chrome, Gmail, Whatsapp, etc.”Sorry to say, part A is always going to be painful – actually starting the laptop blind – and with a tiny screen area working he could remember how to get to the Linux desktop and a terminal screen.“By a huge stroke of luck I had the extra good fortune to have two text lines worth of working pixels at the top of the screen. Well I say working, they didn’t automatically update, I had to sort of twist the screen with my hands and at some point they’d decide to update.”
To present the laptop's login interface via the phone, he had to install an OpenSSH client (also a blind install), and here's an important lesson for everyone: “always setup an SSH daemon with a strong password on a new laptop”.


For “normal” operations, though, Buckley-Houston wanted to get the laptop's keyboard working as a Bluetooth keyboard to the phone.By now, though, he's got a screen – so it was just a matter of testing various packages to see which worked best, and settling on one called Hidclient.The Register won't be trying this ourselves any time soon, but we're sure some of our readers will want to top this experience. We're always listening. Security startup MedSec and the financial house backing the biz have published new allegations of security flaws in pacemakers and defibrillators built by St Jude Medical – and again look set to profit from the disclosures in an unorthodox way.In four swish videos, the MedSec team claims it exploited a debugging backdoor in the St Jude-built Merlin@home control unit so it could send commands wirelessly to a patient's defibrillator. The team were able to hijack the the control unit after reverse-engineering its software, written in Java, and hooking a laptop to the unit via Ethernet.MedSec claims it could do away with the Merlin@home all together, and wirelessly send orders to people's devices in their chests from software-defined radio kit, after working out St Jude's protocols.Using the compromised terminal, the team says it managed to make the defibrillator vibrate constantly, turn off its heart monitoring software, or get it to administer a mild electric shock, which the actor narrating the video describes as "painful, and can be detrimental to a patient's health if used in an unprescribed manner."MedSec's CEO Justine Bone explained to The Register that the team had used a hacked MedSec device because it was the easiest route to show deficiencies in the device. By using old debugged developer code left on the device by the original designers, they were able to take control of it.


"We believe that this could be done from any wireless attack platform once someone had written out all protocols," she said. "It's going to be very hard to fix; you'd have to rewrite the RF communication protocols."Some of the attacks, particularly if used in conjunction with each other, could put lives at risk. But she acknowledged that in tests so far the maximum range of the defibrillator was limited to seven feet, so an attacker would have to be up close and personal.Bone also said that the MedSec team hadn't contacted St Jude Medical about the flaws before releasing the videos, and had instead gone to the Food and Drug Administration and the Department of Homeland Security. Bone said this was because St Jude doesn't have a good record of sorting out flaws like this.St Jude confirmed to The Register that MedSec hadn't passed on any details about the flaws, and made the following statement:



"Muddy Waters and MedSec have once again made public unverified videos that purport to raise safety issues about the cybersecurity of St Jude Medical devices. This behavior continues to circumvent all forms of responsible disclosure related to cybersecurity and patient safety and continues to demonstrate total disregard for patients, physicians and the regulatory agencies who govern this industry."The company is also setting up a Cybersecurity Medical Advisory Board to give it tips on how to build more secure products. However, it appears as though it's mostly staffed by doctors, who aren't the best for finding sloppy software holes.The whole sorry saga started in August when MedSec found what it claims were flaws in St Jude's devices. Rather than go to the manufacturer and sort these out, the firm partnered with financial house Muddy Waters and shorted the stock before going public with the news.The security firm now gets a payout based on how far St Jude's stock price falls – the more the better. St Jude and others have disputed the claims, and St Jude is now suing those involved in the disclosures. People who have St Jude devices implanted have been left panicked and confused by the whole matter.


In the meantime, many in the security community are worried that this kind of disclosure is just going to increase fear, uncertainty, and doubt in an industry sector already bedeviled with it. If short selling becomes the norm, then headlines rather than fixes will become the goal, and it's difficult to see how that benefits end users. HP Inc has disclosed pricing for HP Workspace, the Windows app-streaming service that allows its new Elite x3 business phone to fully replace a PC.Although Universal apps on Windows 10 mobile apps can adapt to run fullscreen with a keyboard and mouse, Workspace is needed to run legacy Win32 apps, which don’t run natively on ARM devices such as the x3. Workspace streams the apps to the Elite x3 at 15fps, sufficient for most business applications.The per-user monthly pricing is $79 and $40, depending on how much Win32 you need. Both packages give you a dedicated two-core vCPU. $79 buys you 8GB of virtual machine RAM and 80 hours per month, and unlimited apps. The more basic “Essential" tier aimed at “mostly mobile” workers buys you a 4GB RAM virtual machine and 40 hours of app streaming a month, limited to up to 10 apps.This isn’t cheap, but as Windows watcher Steve Litchfield points out, it’s cheaper than paying an in-house IT team to sit around all day, setting fire to the bins.And you can blame Microsoft for the pricing. VDI (virtual desktop infrastructure) as a service can be found cheaper via AWS, but Microsoft still sets a floor price.


Message déposé le 17.06.2017 à 10:14 - Commentaires (0)


Battery for Asus G74

Xbox users and Windows 10 will also get enhanced sound from Dolby Atmos and support for 4K gaming videos as part of the Creators Update release.The update will also boost the operating system’s social media chops. The OS will now find the most commonly communicated-with contacts you have and will make sharing stuff with them easier.Demonstrators showed that if you right-click on a file, the option to share it with your top four contacts pops up instantly. It can also filter communications so that messages from those top contacts get priority – initially in email and Skype, and then SMS and Xbox later.These top contacts can also be shown in the bottom right of the screen and they can send you “shoulder taps” – basically emoji messages in 3D. That could get irritating very quickly.It wasn’t just about the software at today’s conference – the Surface Book is getting an update and there’s a monster 28-inch new Surface aimed at designers.The top-end Core i7-powered Surface Book is getting an upgrade, with a faster processor that required a new cooling system, double the graphics performance of last year’s model, and 30 per cent more battery life to give 16 hours of operations.


The end result, promised head of the Surface line Panos Panay, is the fastest and best-specced laptop out there. It will be out in November for $2,399 and is available for preorder today.Panay also unveiled the Surface Studio, a 28-inch screen that features the thinnest LCD touchscreen ever produced, just 12.5mm thick and powered by a base unit. The screen has 13.5 million pixels at 192PPI and a 3:2 aspect ratio – but the grunt is in the hardware.The Surface Studio runs on an Intel quad-core Core i5 or i7, high-end Nvidia graphics and a 1TB or 2TB hard drive. The screen also has microphones arrayed around it for voice control and a “studio quality” camera for videoconferencing.The screen can be folded back to around a 20-degree angle, like a drafting board. The Surface Pen works on it, but Microsoft has also built the Surface Dial for the platform.The silver hockey puck works on and off the screen. On the desk it can be turned to scroll forward and backward through a document or through changes in a document or artwork. Alternatively it can be put on the screen and used there to scroll through color palates and different commands.


The Dial will also work with Surface Pro 3 and 4 models, and the Surface Book.The Surface Studio will set you back $2,999 and is available for pre-order now and in limited quantities by November. Here are the super-slab's main geeky tech specs:Display: 637.35 mm x 438.90 mm x 12.5 mm (25.1” x 17.3” x 0.5”). 28” 4500 x 3000 (192 PPI) touchscreen with 10 point multi-touch. This sits on a 250.00 mm x 220.00 mm x 32.2 mm (9.8” x 8.7” x 1.3”) base.

Microsoft’s head honcho Satya Nadella popped on stage at the end of the set to wrap up the session, and put the boot into Apple.“Each of us has an innate desire to create, to connect, to express – that’s what makes us human,” he said. “The last 10 years in our industry has seen a variety of new technologies. Much of that has been slanted toward consumption, however I believe the next 10 years will be defined by technology that empowers creation.”Microsoft is all about the creatives, the builders, Nadella said, somewhat disingenuously. Apple has traditionally been the territory of designers and other creatives, but it’s clear that the new hardware and software is aimed directly at one of Cupertino’s core markets.



Apple once again saw revenues drop, as 45.5 million iPhone 7 sales were not enough to boost its fourth-quarter earnings.CEO Tim Cook talked up the particularly strong performance of Apple's internet services while glossing over another quarter of falling revenues."Our strong September quarter results cap a very successful fiscal 2016 for Apple," Cook said."We're thrilled with the customer response to iPhone 7, iPhone 7 Plus and Apple Watch Series 2, as well as the incredible momentum of our Services business, where revenue grew 24 percent to set another all-time record."The figures come just two days before Apple is expected to announce a refresh to its Mac line with a new edition of Macbook Pro laptop. The notoriously tight-lipped Apple may have accidentally leaked images of the notebook inside a recent system update. The WiFi Alliance reckons it's bestowed on a waiting world the first hint of what 5G will look like, and apparently it's a radio link that can manage 8 Gbps over 10 metres.The group has announced the first products to carry its freshly-minted WiGig certification.Chipsets to carry the certification come from Qualcomm (the QCA9500 chipset with reference solutions for clients and routers) and Intel (Tri-Band Wireless).


There are also reference adapters from Socionext, and Dell's Latitude E7450/70 laptop.The big advantage the 60 GHz band offers over what we're familiar with for Wi-Fi – 2.4 GHz or 5 GHz – is that there's plenty of room for extremely wide channels that provide multi-gigabit per second capacity.The short range of 60 GHz WiGig makes it most suitable for applications like docking and in-room device-to-device interconnect – file transfers, multimedia streaming, and (if enough people eventually care about it) virtual reality headset connections.In a crowded environment, beamforming on its multiple-in, multiple-out antennae should cut down interference.Where devices support operation across all the Wi-Fi bands, the standard stipulates the ability to keep sessions intact while switching between 2.4 GHz, 5 GHz or 60 GHz frequencies.Stretching the use-case out to the 5G business, a Wi-Fi alliance bod told LightReading that with a cantenna long-range directional antennae WiGig's range could be extended to distances sufficient to provide cellular base station backhaul. We all know that sinking feeling when you realise your laptop screen is broken and you need to use it sooner than you can get it fixed.So has Thomas Buckley-Houston, who's written a MacGyver-esque how-to for getting to his phone from the laptop's keyboard (going the other way via VNC is easier) – when he couldn't see the lappie's screen.Why bother? Because Buckley-Houston was in the Himalayas at the time, in Ladakh in Northern India, two days by bus from repairs.


Message déposé le 17.06.2017 à 09:38 - Commentaires (0)


Page suivante >>Dernière page >>
 Livre d'Or

 Contact



Tous les messages
Battery for Lenovo Thinkpad R61
Batterie pour Dell Latitude E6510
Akku für Apple A1079
Battery for Compaq 233343-001
Battery for HP COMPAQ 6830s
Battery for ASUS G75
Battery for Acer Aspire 5820T
Battery for Toshiba Satellite L650
Battery for SONY VGP-BPS21
Battery for Apple A1495
Batterie pour Samsung AA-PB2VC6W
Akku für Dell Alienware M14x R2
Battery for Dell 7FJ92
Battery for Samsung NP-R460
Battery for Acer Aspire 5820T
Battery for Acer Aspire 5820T
Batterie pour Compaq Presario CQ72
Akku für Samsung AA-PL9NC6B
Battery for Acer TravelMate 6592G
Battery for Asus G74
Battery for Samsung NP-R520
Batterie pour Compaq Presario CQ40
Akku für Acer Aspire 4S820TG
Battery for DELL Alienware M17x
Battery for HP Compaq 6515b
Battery for Dell Inspiron 1525
Batterie pour FPCBP281
Batterie pour Sony VGP-BPS13
Akku für ASUS A32-K55
Battery for lenovo IdeaPad Z575
Akku für IBM ThinkPad T60
Batterie pour Toshiba PA3817U-1BRS
Batterie HP COMPAQ NX9040
Akku für Dell Inspiron N7010
Akku Dell Latitude D830
Akku Dell Latitude D430 kaufen-akku.com


Créez votre blog sur Blog-grossesse.com