Le Blog de Langrensha et Langrensha

J+75



Mon quotidien
Battery for Asus G74

Les Présentations
Batterie pour HP Probook 4431s
Battery for Acer AL10BW
Batterie pour ASUS N75SV
Batterie pour Samsung AA-PB9NC6W/E
Battery for Apple PowerBook G4 15 inch
Batterie pour LENOVO ThinkPad X220T
Battery for ASUS A32-K53
Battery for Dell 7FJ92
Battery for Acer TravelMate 6592G
Akku für Acer Aspire 4S820TG

Mes rendez-vous
Battery for Acer Aspire one 532
Battery for Dell Inspiron Mini 1012
Battery for Apple MacBook Pro 15 inch
Battery for Lenovo ThinkPad Edge E120
Battery for Acer Aspire 4736
Akku für ASUS Eee PC 1225B
Battery for Acer Aspire 4736
Battery for Fujitsu FPCBP282
Batterie pour Toshiba PA3356U-3BAS
Batterie pour ASUS N51A
Battery for SONY VGP-BPL26
Battery for DELL Alienware M17x R3
Batterie pour Acer AS09A90
Akku für HP COMPAQ 2740p Tablet PC
Battery for SONY VGP-BPL26
Battery for Lenovo FRU 42T4783
Battery for HP HSTNN-CB0X
Battery for Lenovo Thinkpad R61
Batterie pour Dell Latitude E6510
Akku für Apple A1079
Battery for Compaq 233343-001
Battery for ASUS G75
Battery for Acer Aspire 5820T
Battery for SONY VGP-BPS21
Battery for Apple A1495
Battery for Samsung NP-R460
Battery for Acer Aspire 5820T
Batterie pour Compaq Presario CQ40
Battery for DELL Alienware M17x

Les échographies
Battery for Amilo Pi 1505
Battery for DELL XPS L321X
Akku für ASUS UX42A Ultrabook
Battery for Acer TravelMate 8572G
Battery for ASUS G73S
Akku für Samsung AA-PB4NC6W
Battery for ASUS G73S
Battery for Apple 13 inch MacBook Air
Battery for Acer Aspire One 531
Battery for Samsung AA-PB9NS6W
Akku für Dell XPS M1330
Battery for HP COMPAQ 6830s
Batterie pour Samsung AA-PB2VC6W
Akku für Samsung AA-PL9NC6B
Battery for Samsung NP-R520
Battery for HP Compaq 6515b
Akku Dell Latitude D430 kaufen-akku.com

Les achats
Akku für Dell Inspiron 9200
Akku für Lenovo ThinkPad X201
Battery for Toshiba Satellite L650
Akku für Dell Alienware M14x R2
Battery for Acer Aspire 5820T
Batterie pour Compaq Presario CQ72
Akku Dell Latitude D830

Divers
Battery for Dell Inspiron 1525
Batterie pour FPCBP281
Batterie pour Sony VGP-BPS13
Akku für ASUS A32-K55
Battery for lenovo IdeaPad Z575
Akku für IBM ThinkPad T60
Batterie pour Toshiba PA3817U-1BRS
Batterie HP COMPAQ NX9040
Akku für Dell Inspiron N7010


Battery for Acer Aspire one 532

Although detailed pricing has not been announced, the company said that the Idol 4 series will be available from April 2016, at prices from €279 to €449.Alcatel Plus 10
Next up from Alcatel is a Windows 10 2-in-1 tablet/laptop. The Plus 10 is a 10.1 device with a quad-core 1.92GHz Intel Atom x5-Z8350 chipset. The keyboard is detachable and includes a SIM slot for LTE (4G wireless) connectivity so you can use it as a wifi hotspot for up to 15 users.You also get basic cameras front and rear, 32GB internal storage, 2GB RAM, MicroSD slot, USB and HDMI ports. The Plus 10 is not the slimmest of devices but weighs only 850g, and battery life of 8 hours light usage is claimed. The model on display in Barcelona felt a bit plasticky but its light weight is a benefit.The Plus 10 will be available from June 2016, priced from €379, according to the presentation in Barcelona.


The company is very bullish on Windows, according to VP and chief marketing officer Dan Dery. The Plus 10 joins the Fierce XL Windows 10 smartphone, released earlier this year in the US, and the Pixi 3 8-inch Windows 10 tablet announced at CES in January and set for availability in April 2016. The Pixi 3 is an ARM-based device running Windows 10 Mobile, whereas the Plus 10 runs full Windows and is the first Alcatel device with an Intel chipset.Why do a Windows 10 device? There is a business market but there is also a very good consumer market, Dery told El Reg. A market that is very familiar with Windows. Having a laptop at home that can be detached as a tablet makes a lot of sense.MWC16 HP Inc has unveiled a big bet re-entry into the handheld device market, banking on enterprise’s attachment to the Windows ecosystem to blur the memory of its previous forays and retreats into the space.The vendor will unveil its Elite x3 phablet at MWC, a six inch-high, 7.8mm thick phablet, along with a desktop dock to connect with a big screen and proper corporate networks, and a mobile extender with full size keyboard and 12.5 inch screen.The device cops a Qualcomm Snapdragon 820 processor, meaning it will not be a true Wintel device, but it will run on Windows 10. It packs 4GB of RAM, 64GB of internal memory and will take SD cards of up to 2TB - once they actually hit the market.And how much will all this cost? We don't know yet, with pricing due to be released shortly before its expected summer release.Michael Park, VP and GM for mobility and retail solutions at HP Inc, claimed the x3 is “the one device that is every device...we are basically covering desktop, notebook and phablet use cases with one product”.



He said that while most mobile/handheld vendors were pushing into the enterprise as “a marketing continuum” of their consumer product lines the X3 was an unapologetically commercial enterprise product “designed for a commercial lifecycle which is two to three years.”This industrial grade ethos extends to dual SIM support, claimed all-day battery life, dual biometrics, 8MP front facing camera, active noise cancellation and B&O optimised audio so that you can really appreciate the hold music while waiting for your conference call to start.The x3 is IP67 tested, meaning it can take a four-foot fall, and will operate under water for 30 minutes before failing. (Though if that latter use case is relevant, perhaps you need to reconsider who you’re doing business with.)Needless to say, Park also describes the device as “beautiful”. Nevertheless, despite all this status symbol box ticking, HP’s key selling point will likely be its compatibility with existing enterprise legacy systems.Park said the world doesn’t quite seem to have twigged that with Windows 10 for “the first time in the history of Microsoft that all devices have converged to the common Windows kernel.”While he had no illusions that the consumer world is unlikely to shift ecosystems any time soon, “In the world of commercial though when you go talk to a CIO and ask ‘what you do you use to drive productivity in your enterprise, to secure your back-end or to run your servers,' Microsoft is still the name in the game.”


“The average Fortune 500 company has 3,500 bespoke apps that they’ve written over the last 20 to 30 years, all on .Net, all for PCs, and those have to be moved to a mobile world if that is how people are going to work.”“I think what the market doesn’t see that’s going to happen is the ability to use Continuum in Windows 10 to now drive a new type of application where you write it once and it runs on a desktop, a phone, a Surface hub, a workstation without having to re-write code will present a massive TCO and value proposition for IT moving forward.”If enterprises opted for iOS and Android for their sub-notebook needs, he added, “you have to maintain all that code separately from everything you’ve done in the last 20 years and you have to carry it forward in terms of integrating those things as the underlying OSes change.The TCO implications for this “will become more evident once Windows 10 gains more adoption,” he said.Needless to say, HP has gained vocal support from Microsoft for the launch. The devices will also come bundled with the Salesforce One - when it is docked, it will kick into the full Salesforce One dashboard. Park said it was working with other ISVs on vertical apps, while HP will provide its own app catalog, dubbed Workspace.



What will really underpin the device’s success after its summer launch is whether HP can persuade corporates to buck their users' consumer-based prejudices, and overlook HP's own form in this sector.The company’s false starts in handheld devices and phones include mid-noughties Windows Mobile devices under the iPaq brand it inherited from Compaq. Yes, we're not sure what happened to them either.The company bought the seminal handheld firm Palm in 2010 for $1.2bn, then said it was only after the operating system, WebOS, before losing interest altogether during its minor meltdown under its short-lived CEO Leo Apotheker the following year. Much of the former Palm, and iPaq, IP was sold off in 2014 to... Qualcomm. Runtime Readers' tales of very old computers keep rolling in, so we'll keep rolling them out at you. We even gave ourselves a name for this silliness: Runtime.The last week's most interesting inbox insertion was news of a Tandy 102 that's still alive and kicking and helping reader “Ed” to stay alive and kicking too.The 102 is a member of the TRS-80 family, the PC that Tandy Corporation introduced in 1977. The TRS-80, known as the “Trash Eighty” by snooty Commodore 64 fanbois, started life as a desktop computer. Several models adopted the all-in-one shape made popular by the Commodore Pet and a “luggable” even made it into the range.

Message déposé le 13.07.2017 à 08:19 - Commentaires (0)


Battery for Dell Inspiron Mini 1012

This can only get worse so I plead to event organisers: get your Wi-Fi act in gear, because even software that doesn’t need to be online will try to go online anyway. It’s bad enough leaving it all to chance without actively inviting the internet devils to dance around your motherboards.Mark Shuttleworth, founder of Ubuntu, told The Register that converged devices – phones that can also be PCs – are the future of personal computing.Shuttleworth was at Mobile World Congress (MWC) in Barcelona last week, where Ubuntu exhibited to show off its phones, tablets, and IoT (Internet of Things) initiatives.Among the displays was BQ's Ubuntu tablet, which has both a tablet mode and a windowed mode that can be enabled when attached to an external display, keyboard and mouse.We’re showcasing Ubuntu as a converged OS, said mobile product manager Richard Collins. It’s one codebase that can go onto any device that has some kind of need for a display, one SDK that developers can use. We’ll do the magic to make sure that apps scale for the display. All of that has been engineered into our first tablet product. If you connect a mouse and keyboard, it is running a full Ubuntu PC.


Ubuntu smartphones were also on display, destined for the Chinese market, from brands well-known in China, such as Meizu. Collins said that Chinese vendors wanted to build their own ecosystem, and that Ubuntu gave them freedom to do that.At MWC Microsoft, along with partners such as HP and Acer, were pushing the idea of Windows 10 Mobile as a converged phone and PC, using the feature called Continuum. Shuttleworth said he was delighted.“We’re quite lucky because HP made this big announcement that they were going to do a convergent device, a phone that could be a PC, and we’ve already got it. It really shifted people’s mood. We’ve been saying that we could build, as an open source project, a single device that could run across all these form factors. People have said that’s a little crazy, and now suddenly we’ve got some of the biggest companies in the world saying that’s a great idea,” he said.There’s stuff coming down the pike in terms of changes to personal computing form factors which I think will take this and make it the standard way everybody works. It’s hard to see now, but I’m convinced that’s the future, he added.



Shuttleworth also talked up Ubuntu's Internet of Things credentials. Running Ubuntu Core on devices improves security, he said, thanks to easy updates.We’re just a common operating system, but the way we’ve structured that solves one of the key problems for the world, which is the security of the internet of things. That means for example that last week’s major global compromise of Linux libc, which affects pretty much every home router in the world, all the carriers in the world could have fixed that problem if they were using this mechanism, because they would just have pushed the update, and they wouldn’t have to wait for the device manufacturers or do it independently, he said.If you imagine a world where everything has a little bit of Linux in it, this is a much healthier world because the core Linux piece can be updated independently of the piece running the fridge, or the piece running the home router.What are the advantages of Ubuntu over Google's Android, which is also Linux-based?In the devices space the key question is, is that a small server running that Uavia drone, or is that a phone? If you think of it as a server, then people’s natural inclination is to use a server operating system. If you are the developer thinking, I’m going to write that software on my laptop running Ubuntu and I’m going to test it on the cloud with Ubuntu, so the natural place to run it on the drone is Ubuntu, he said.


In phones Android has a phenomenal position. We serve the needs of people who want a very secure personal computing platform, and that’s enough for me. If personal computing gets reinvented again, who knows, we could be in front of that next wave.We are certainly at the front of this [IoT] wave. The Google car, the Tesla car, the Audi car, all of those self-driving cars, they all run Ubuntu. A bunch of the leading drone manufacturers, they all run Ubuntu. Robots run Ubuntu, and so on. In the Internet of Things, Ubuntu is the Android. In phones? We’re small but feisty, he told me.In tablets and phones, Ubuntu has the same issues as any mobile OS that is not iOS or Android, which is lack of applications. In this respect, even Windows 10 Mobile is ahead. Libre Office is no fun on a tablet, because it is not designed for touch.We have a new generation of apps that have been designed for touch and convergence, Shuttleworth assured me, but added, You’re right, we do need to create a new set of apps.The convergence idea is also an open question. While smartphones now have the computing power to equal basic desktop computers, the difficulty again is whether converged apps, that run seamlessly both as mobile and desktop software, really make sense.


HP's solution is that you use Windows Mobile as a client for cloud-hosted remote applications when docked to an external display. At MWC, Intel showcased another idea, with Android and Linux stacks side by side, running different sets of applications.A WordPress site? I ask Configured with every plugin under the sun? Loosely 'administered' by the PR team? Hosted on a cloud server in who-knows-where, chosen with the same care and attention you'd use in picking a toilet to use after seven pints and a bad curry and a half hour tube ride which only gets you half-way home.So it's not secure?Never updated, never vetted, protected by what's probably a one-bit self signed SSL key?So it IS secure? he asksWith content that was just sucked out of our old web server and sports massaged into the new server by someone who left their A-Z of IT night course just before C, when Butchery came up?So it's not secure?Nah, it's safe as houses, I say.The Boss has his sarcasm-proof hearing aids in so I'll have to spell it out plainly.It's insecure, I say.How insecure are we talking?



It is so insecure that the hosting company remirrors it every hour.So... it takes an hour to be compromised? he asks, using a word he must have recently heard at an IT Manager's round table somewhere.No, it takes about 30 seconds to compromise, but on average it takes about an hour for the robots to find it. I reply.Well what are the vulnerabilities? he asks – again with the technical words. (It's possible he's had a stack upgrade somewhere along the line)I could tell you – but the quantum rule of insecurity applies.The what?The quantum rule of insecurity – which states that the act of observing how vulnerable a host or service is changes the insecurity level of the service. Have you not heard of Schrödinger's Laptop?Schrödinger's Laptop?There's a laptop, in a box, with a bomb. The bomb is actually timed to explode at some unknown time in the future – BUT if you lift the lid there's a switch connected to the lid which will make the bomb go off immediately. So the question is, is the laptop working or not?Is it powered on? Is it open? the Boss asks, like a helpdesk savant.You're missing the point – the point is that you might not KNOW if the laptop was working or not, but as soon as you open the lid it will DEFINITELY not be working.


Message déposé le 11.07.2017 à 05:38 - Commentaires (0)


Battery for Apple MacBook Pro 15 inch

Mandiant's open source platform is fit for enterprises requiring incident response at scale, and can run off a laptop for many investigations.ANZ bank security analysts Daniel Eden and Roshan Maskey published their work to GitHubThe custom asynchronous forensic tool depends on Mandiant Redline and operates on ElasticSearch backend.The application was born out of the inability to control multiple investigations or hundreds of endpoints in a single pane of glass, the pair say.Eden steps through the application's features in a demonstration video adding that the platform is available as a dependancy-preloaded CentOS ISO install.The application can return about 1000 large documents without load strain after which point server-side processing is required.Their work sports a slick user interface with process trees that allow forensics types to view variables including arguments, paths, and start times.The bank boffins are continuing to work on the tool including real-time tagging and commenting which can be viewable by other incident responders within nightHawk, and features that will improve reporting. According to the US Securities and Exchange Commission (SEC), that error [PDF] resulted in the financial regulator being sent incomplete blue sheet information for a remarkable 15 years – from May 1999 to April 2014.


The mistake was discovered by Citigroup itself when it was asked to send a large but precise chunk of trading data to the SEC in April 2014 and asked its technical support team to help identify which internal ID numbers they should run a request on.That team quickly noticed that some branches' trades were not being included in the automated system and alerted those above them. Four days later a patch was in place, but it wasn't until eight months later that the company received a formal report noting that the error had affected SEC reports going back more than a decade. The next month, January 2015, Citigroup fessed up to the SEC.It turned out that the error was a result of how the company introduced new alphanumeric branch codes.When the system was introduced in the mid-1990s, the program code filtered out any transactions that were given three-digit branch codes from 089 to 100 and used those prefixes for testing purposes.But in 1998, the company started using alphanumeric branch codes as it expanded its business. Among them were the codes 10B, 10C and so on, which the system treated as being within the excluded range, and so their transactions were removed from any reports sent to the SEC.



The SEC routinely sends requests to financial institutions asking them to send all details on transactions between specific dates as a way of checking that nothing untoward is going on. The coding error had resulted in Citigroup failing to send information on 26,810 transactions in over 2,300 such requests.The SEC was not impressed and said in a statement announcing the fine that the failure to discover the coding error and to produce the missing data for many years potentially impacted numerous Commission investigations.Broker-dealers have a core responsibility to promptly provide the SEC with accurate and complete trading data for us to analyze during enforcement investigations, said Robert Cohen, co-chief of the SEC enforcement division’s market abuse unit. Citigroup did not live up to that responsibility for an inexcusably long period of time, and it must pay the largest penalty to date for blue sheet violations. The APT notification ran rate was disclosed by Google senior vice president and Alphabet board member Diane Greene during a Fortune magazine tech conference in Aspen, Colorado, Reuters reports.Google began notifying users about suspected incidents of government-backed hacking attempts since 2012, in response to hacking attacks against it and other tech giants subsequently blamed on China. Other household names in tech including Facebook and Twitter followed suit with state-sponsored hack alerts for customers late last year.


The chief of the monopoly music royalties society PRS for Music earned almost £1m last year. Company house filings show that CEO Robert Ashcroft took home a salary of £989,000, up from £765,000.The remuneration package includes a deferred bonus of £257,000, according to Companies House filings. That means the chief has almost doubled his income in four years.The society holds the monopoly on the collection of royalties for both songwriters and publishers from the public performance of music, and the mechanical royalties owed to songwriters from recorded music sales. (The PPL collects royalties from public performance to the owners of recordings). Overall, royalties collected by PRS rose 4.7 per cent to £537.4m, of which £472.5m was net distributable income.Researchers at the University of Washington (UW) and Microsoft have managed to write data directly onto DNA, a format with dramatic storage densities and a very long life.The team wrote 200MB onto strands of synthetic DNA, including video footage of the band OK Go, the Universal Declaration of Human Rights in more than 100 languages, the top 100 books of Project Gutenberg and the Crop Trust's seed database. They were then able to successfully read back the data using error correction code developed by Microsoft, and could do so again long in the future.



We've seen evidence that this could last intact for thousands of years, Karin Strauss, Microsoft's lead researcher on the project, told The Register on Thursday. Synthetic encapsulation is very temperature-dependent, but at 10 degrees Celsius the DNA won't degrade for around 2,000 years, and at -18 degrees it could last for millions.The technique uses a DNA synthesizer that encodes information onto the four bases in DNA – adenine, guanine, cytosine and thymine – allowing large volumes of data to be stored at microscopic detail. The 200MB archive was stored on a piece of DNA the size of a couple of grains of sugar. The synthetic material was encapsulated to protect it and to prevent degradation.Previous research by UW and Microsoft has estimated that the raw storage limit of DNA is an exabyte per cubic millimeter. That said, it takes a long time to actually read the data – hours at a time – so this isn't going to replace Flash any time soon.


Given a medium so delicate, getting the data read again means dealing with error rates, and so Microsoft's coders came up with an error correction system that allows the data to be taken off the DNA storage system in a usable format.Don't expect this type of technology in your laptop for a good few years yet – the machinery needed to synthesize DNA to write data, and then sequence it to read the information back – is still massively expensive. But that is changing.DNA sequencing costs are lowering way faster than Moore's Law has cut the cost of computing, Luis Ceze, the UW's Torode Family Career Development professor of computer science, told The Reg.The technology for reading DNA is also improving fast. We don't see any reason why it can't be fast and cheap enough for commercial storage – particularly as by showing DNA storage is viable will create a greater incentive to use it.


Message déposé le 08.07.2017 à 06:53 - Commentaires (0)


Battery for Lenovo ThinkPad Edge E120

We had actually forecasted a pause in [data center] purchasing based on what we knew of the big cloud players' ordering patterns, Intel's chief financial officer Stacy Smith said on a conference call on Wednesday. And based on the signals we're seeing from them, we do expect a re-acceleration in the back of the year to something more consistent with what we're seeing through the last couple years.The cloud that we have today is really built on the backs of people. It's your Facebook data, it's your Salesforce data, it's your Twitter data. The current estimates are, if you look out into 2020, that average person will generate about 1.5GB a day of data off those devices, and those are going to be all your posts and pictures and all that kind of information.If you take a look at the average autonomous car in 2020, the estimates right now are it will throw off about 40GB a minute of data. If you take a look at the average autonomous drone doing some kind of scan, looking for somebody lost in the forest or scanning a mine, it's going to throw off about 20GB a minute.So it's that growth in data and the need to both process it at the edge and then through the data center and into the cloud, to be able to store it, to be able to apply machine learning to all of those applications. Those all tell me that the cloud is going to continue to grow.


It's going to be lumpy, he admitted. These guys [the big public cloud providers] don't build out their data centers in a linear fashion. They build out a big chunk of overcapacity so that they can go and then sell that and have expansion space, and they don't build for a while.And so I know people worry, 'is it slowing down?' But these trends in data that tell me no, it's not slowing down over the long term, and what you're really going to see is just the buying patterns and the build-outs of the various structures that are going up.Interestingly, the big boss was coy about Intel's modem chips. Apple is said to be considering using Chipzilla's radio chipsets for future iPhones as well as the Qualcomm silicon it's been using to date. Krzanich was asked if he could talk a little about the future of that business. Let's not get ahead of ourselves, the chief executive seemed to say: the x86 goliath first wants to prove it can make a go of modems with the XMM 7360 and then start thinking big.I'm more concerned about getting the leading-edge momentum going for us with the 7360 and then the follow-on in 2017 and really showing that we are a world-class modem company, he said.



Patrick Moorhead, a tech industry veteran and principal analyst at Moor Insights & Strategy, said everyone expected the hit from the restructuring – but not the slowing Data Center Group growth.The biggest area of concern and the reason why Intel's stock price is down is due to the Data Center Group: they had planned in double-digit growth and they came in at single-digit growth, Moorhead told The Register.I will give Intel the benefit of the doubt in that it will hit that growth for the year. For one thing, there's the market size to consider, and the availability of new Broadwell processors.Intel tracks at a micron level its enterprise and public cloud customers. It knows exactly what's going on right down to their hardware purchasing and rollouts, hence its confidence for the rest of the year.On the consumer side, it's not entirely doom and gloom, either: demand is growing for two-in-one laptop-tablet convertible PCs, which Intel can supply the chips for, while smartphone sales stall and tablets remain in free fall.


Intel wins whether it's Apple or HP that sells a computer, Moorhead noted.The consumer market has turned into a bookend market: people buy either the cheapest or the best they can get. But they still need devices with large screens, even the kids who start off with smartphones: they need a keyboard and monitor to do their work and research online. In three to four years, there will still be a need for a device with a keyboard and a large display, that's fundamentally not going to change.The tablet market has declined 30 to 40 per cent. We piled on PCs because smartphones were doing so well, and the tablet market got as big as the PC market with about 300 million units a year. Now the PC market is looking better than the tablet market and growth has stopped in smartphones. In a few years from now we're see an attitudinal resurgence in PCs. The department entrusted with the protection of corporate data is seemingly somewhat less bothered when it comes to guarding personal info.The Intellectual Property Office yesterday made the classic schoolboy error of sending out an email containing hundreds of recipients in the 'to' field.



Realising its blunder minutes later, the body recalled its missive only to send the message with the same email addresses contained in the 'to' field.It does beg the question why a government department is relying on someone to manually send out e-mails like this from their mail client rather than using a proper CRM/mailer daemon, noted one Reg reader who was included in the gaffe.We apologise for any inconvenience caused, we've taken appropriate steps to ensure this doesn't happen again.Ironically, more information was displayed in the 'to' field than in the body of the email itself, which simply included a link to the IP Connect newsletter. Among promises that the IPO will continue to uphold an outstanding environment for intellectual property post Brexit, the newsletter said:“We remain committed to working with industry to ensure that producers, workers and the public are protected from fraudsters.Security boffins at ANZ, one of Australia's largest banks, have offered their nightHawk incident response tools for organisations running free Mandiant tools.


Message déposé le 08.07.2017 à 06:44 - Commentaires (0)


Battery for Acer Aspire 4736

It introduced its first helium drive, the 7-platter 10TB Enterprise Capacity disk drive, in January. Now there are three more, plus the re-branding to understand.You'll need to concentrate so pay attention; there is a topline Guardian Series brand with three component brands; a resurrected BarraCuda with IronWolf and SkyHawk. Each of these branded product ranges is topped by one of the new 10TB helium-filled drives.The BarraCuda desktop/laptop/gaming drive range comes in 2.5-inch and 3.5-inch versions. It has a FireCuda sub-brand featuring go-faster flash caches. The BarraCuda and IronWolf brands have higher-spec Pro sub-brands as well.A Wi-Fi hack experiment conducted at various locations at or near the Republican National Convention site in Cleveland, US, underlines how risky it can be to connect to public Wi-Fi without protection from a VPN.The exercise, carried out by security researchers at Avast, an anti-virus firm, revealed that more than 1,000 delegates were careless when connecting to public Wi-Fi.Attendees risked the possibility of being spied on and hacked by cybercriminals or perhaps even spies while they checked their emails, banked online, used chat and dating apps, and even while they accessed Pokemon Go.Avast researchers set up fake Wi-Fi networks at various locations around the Quicken Loans Arena and at Cleveland Hopkins International Airport with fake network names (SSIDs) such as “Google Starbucks”, “Xfinitywifi”, “Attwifi”, “I vote Trump! free Internet” and “I vote Hillary! free Internet” that were either commonplace across the US or looked like they were set up for convention attendees.Of the people connecting to the fake candidate name Wi-Fi in Cleveland, 70 per cent connected to the Trump-related Wi-Fi, 30 per cent to the Clinton-related Wi-Fi.


With mobile devices often set to connect to known SSIDs automatically, users can overlook the networks to which they are connecting. Although convenient, this feature is eminently easy to exploit by cybercriminals who set up a false Wi-Fi network with a common SSID. Moreover, web traffic can be visible to anyone on any Wi-Fi network that is unencrypted. Any Wi-Fi that does not require a password is a risk.In its day-long experiment Avast saw more than 1.6Gbps transferred from more than 1,200 users. Some 68.3 per cent of users‘ identities were exposed when they connected, and 44.5 per cent of Wi-Fi users checked their emails or chatted via messenger apps. The researchers scanned the data, but did not store it or collect personal information.Avast learned the following about the Republican National Convention attendees:55.9 per cent had an Apple device, 28.4 per cent had an Android device, 1.5 per cent had a Windows Phone device, 3.4 per cent had a MacBook laptop and 10.9 per cent had a different device
13.1 per cent accessed Yahoo Mail, 17.6 per cent checked their Gmail inbox, and 13.8 per cent used chat apps such as WhatsApp, WeChat and Skype
6.5 per cent shopped on Amazon, and 1.2 per cent accessed a banking app or banking websites like bankofamerica.com, usbank.com, or wellsfargo.com

“With Washington heatedly discussing cybersecurity issues virtually every week, we thought it would be interesting to test how many people actually practice secure habits,” said Gagan Singh, president of mobile at Avast.



“Understanding the talking points behind these privacy issues is very different from implementing secure habits on a daily basis. Though it is not surprising to see how many people connect to free Wi-Fi, especially in a location with large crowds such as this, it is important to know how to stay safe when connecting. When joining public Wi-Fi, consumers should utilize a VPN service that anonymizes their data while connecting to public hotspots to ensure that their connection is secure.” Analysis Intel's stock price fell on Wednesday after it became clear the processor maker is not selling quite as many server processor chips as investors had hoped.The Silicon Valley giant reckons its CPU sales into data centers will hit double-digit growth by the end of the year. So far, with half the year gone, we're staring at mid-single-digit growth. This is not great. Data center processors were supposed to be strong. In reality, revenues in that sector are slowing down for Intel.Chipzilla blamed this deceleration on enterprises and the big public cloud players – like Google and Amazon – which apparently paused their hardware spending until the time comes to build new server farms to meet demand. They've finished constructing their latest data centers and have more than enough workload capacity available for now, hence a cut in spending on Intel's x86 Xeon chips which investors didn't expect.


This slowdown has left Intel's sales book looking a little leaner than anticipated, although the biz is confident server chip orders will start flowing in again over the next six months. Another piece in the puzzle is that Intel CPUs power 99 per cent of the world's data centers, according to industry estimates. There really isn't that much more room for growth in such a monopoly position especially when customers keep their wallets in their pockets.Meanwhile, the company took a $1.4bn blow after announcing in April it will literally decimate its workforce in a massive restructuring. That effort has turned out to be rather expensive.And its non-volatile memory sales have been knocked for six by rivals – particularly Samsung – driving down their prices, virtually pricing Intel out of the flash storage market.Intel's stock price was down 3.25 per cent to $34.53 (£26.08) at time of publication.
Here's a summary of Intel's Q2 2016 financial results [PDF] for the three months to July 2, published on Wednesday:Overall revenue was $13.5bn, up three per cent year-on-year. This just missed analysts' expectations of $13.54bn.
Gross margin was 58.9 per cent, down 3.6 points.
Net income was $1.3bn, down 51 per cent from $2.7bn a year-ago, mainly due to the restructuring costs.
Earnings per share was 27 cents, down 51 per cent from 55 cents a year-ago. This was somewhat lower than the 53 cents analysts were expecting earlier.
Tax rate was 20.4 per cent, up from last year's 9.3 per cent.
The Client Computing Group (desktop PC chips, etc) booked sales of $7.3bn, down three per cent year-on-year. Operating income for the group was up 19 per cent to $1.9bn from last year's $1.6bn.



Overall volumes were down 15 per cent although the average selling prices were up 13 per cent. Desktop volumes were down seven per cent and the average selling prices were up one per cent. Notebook volumes were down five per cent and the average selling prices were up two per cent. Tablet volumes were down 49 per cent and the average selling prices were up "significantly."
The Data Center Group (CPUs for servers, cloud providers, etc) booked sales of $4bn, up five per cent. Operating income for the group was down four per cent to $1.77bn from last year's $1.8bn, due to increased costs in ramping up 14nm chip production.
Volumes were up five per cent and the average selling prices were down one per cent, "as a result of strong unit growth in networking and storage."
The Internet of Things Group booked sales of $572m, up two per cent. Operating income for the group was down to $89m from last year's $145m.
The Non-Volatile Memory Solutions Group booked sales of $554m, down 20 per cent. The group made an operating loss of $224m versus a $92m operating profit in Q2 2015.
The Intel Security Group had revenues of $537m, up 10 per cent. Operating income for the group was up to $97m from last year's $22m.
The Programmable Solutions Group (basically, Altera that Intel bought last year) booked sales of $465m, up 12 percent year over year when compared to Altera’s results from a year ago. The group made an operating loss of $62m.
That data center sales growth of five per cent is less than the eight or more per cent analysts were expecting, and is down on the 11 per cent growth seen this time last year. So it's slowing down when it should be picking up to offset the falling desktop PC chip sales. What's going on?


Message déposé le 07.07.2017 à 06:42 - Commentaires (0)


Akku für ASUS Eee PC 1225B

Der zweite große IT-Marktforscher Gartner kam auf ein Minus von 9,6 Prozent im Jahresvergleich. Mit 64,8 Millionen verkauften PCs sei der Absatz erstmals seit 2007 unter die Marke von 65 Millionen Geräte gefallen, betonte Gartner.Alle Regionen seien von dem Abschwung betroffen gewesen, aber am härtesten habe es Lateinamerika getroffen, wo die Verkäufe um fast ein Drittel eingebrochen seien. Auslöser seien die wirtschaftlichen und politischen Turbulenzen in Brasilien gewesen, erklärte Gartner-Analystin Mikako Kitagawa. Insgesamt bremse der starke Dollar, der die Preise für Computer in vielen Ländern hochtreibe, weiterhin das Geschäft.Die Industrie hoffte zuletzt, mit dem Microsoft-System Windows 10 und im Herbst eingeführten neuen leistungsstarken Chips von Intel den Trend umzukehren. Die PC-Verkäufe sind seit Jahren unter Druck, weil Verbraucher und Unternehmen lieber zu Smartphones und auch Tablets greifen. Zugleich gibt es Wachstum bei extrem dünnen Notebooks und Kombi-Geräten, die als Tablet und Laptop benutzt werden können.


Die fünf großen Anbieter konnten auch bei Absatzrückgängen ihre Marktanteile allesamt steigern - dafür waren die Einbrüche bei kleineren Herstellern umso stärker. Branchenexperten warnen schon lange, dass der teure Dollar sie viel stärker unter Druck setze, weil sie schwerer gegensteuern könnten.Der chinesische Konzern Lenovo blieb an der Spitze als größter Anbieter. Sein Marktanteil wuchs laut Gartner von 18,8 auf 19,3 Prozent - weil der Absatzrückgang mit 7,2 Prozent zwar hoch ausfiel, aber das gesamte Geschäft noch schneller schrumpfte. Hewlett-Packard folge mit dem kaum veränderten Marktanteil von 17,6 Prozent. IDC kam auf 20,1 Prozent für Lenovo und 19,2 Prozent für Hewlett-Packard.Dell liegt demnach bei über 14 Prozent. Laut IDC überholte Dell im US-Markt erstmals seit Mitte 2009 Hewlett-Packard, wenn auch nur knapp. Dell kam demnach auf 25,6 Prozent und Hewlett-Packard auf 25,3 Prozent.Bei der Einschätzung zu Asus und Apple gehen die Marktforscher auseinander. Laut Gartner konnten als einzige in der Top 5 die Verkäufe steigern, Asus komme jetzt auf 8,3 Prozent des Marktes und Apple auf 7,1 Prozent. IDC hingegen errechnete für beide Rückgänge im Jahresvergleich und sieht Apple knapp vor Asus mit Marktanteilen von jeweils 7,4 und 7,2 Prozent.Berlin (dpa/tmn) - Scharfe wie helle HD-Displays, gute Verarbeitung und meist sogar ein gefälliges Design: Das alles bekommt man bei vielen Smartphones in der Preisklasse von 100 bis 150 Euro, berichtet das "c't"-Fachmagazin, das sechs LTE-Geräte dieser Liga getestet hat (Ausgabe 8/16).



Praktische Ausstattungsmerkmale wie ein wechselbarer Akku oder Platz für eine zweite SIM-Karte haben viele der günstigen Smartphones den Top-Geräten der Hersteller sogar voraus.Für eine gute Kamera muss man den Experten zufolge aber tiefer in die Tasche greifen und besser 170 bis 200 Euro investieren - auch wenn die Bildqualität in der Preisklasse zwischen 100 und 150 Euro im Schnitt längst nicht mehr so lausig sei wie noch vor ein paar Jahren. Die Kameras fast aller Testgeräte reichten zumindest für Schnappschüsse im Freien.Käufer tun also gut daran, sich im Vorfeld genauer über ihr Wunschmodell zu informieren. So kann man etwa auch sicherstellen, dass das Gerät das Auslagern von Apps auf SD-Karte erlaubt - ein wichtiges Detail bei den oft nur 8 Gigabyte (GB) kleinen internen Speichern in der Preisklasse der Testgeräte.Während die Helligkeit der hochauflösenden IPS-Displays im Test meist nichts zu wünschen übrig ließ, gab es aber größere Unterschiede bei Kontrast und Farbwiedergabe. Sowohl ein Gerät für knapp 100 Euro, aber auch das mit 150 Euro teuerste Smartphone im Test unterstützen den sRGB-Farbraum, können also mehr Farben wiedergeben. Einen negativen Ausreißer gab es bei der Blickwinkelstabilität eines Displays: Schon leichtes Kippen verfälschte den Bildeindruck extrem. Wer sein Wunschgerät in die Hand nehmen kann, sollte deshalb auch den Kipptest machen.


Die in den Testgeräten verbauten Vierkernprozessoren lassen sowohl Android als auch Windows 10 Mobile ruckelfrei laufen. Die Bedienung läuft den Experten zufolge die meiste Zeit geschmeidig, und mit der Ausnahme von Spielen genüge die Performance auch den Apps. Direkt positiv bemerkbar, etwa bei der Startgeschwindigkeit von Anwendungen, macht es sich, wenn ein Smartphone nicht nur - wie in der Preisklasse üblich - 1 GB Arbeitsspeicher (RAM) bietet, sondern 2 GB.Weitestgehend keine Blöße gaben sich die Günstig-Smartphones beim WLAN-Empfang. Das nWLAN-Modul eines Gerätes unterstützte sogar das im Gegensatz zum 2,4- weniger belegte 5-GHz-Funkband. Die Sprachqualität ließ bei einigen Geräten zu wünschen übrig. Entweder war einer der Teilnehmer zu leise oder gleich beide. Am Preis lässt sich das aber nicht festmachen: Die besten Gespräche brachte das mit 95 Euro günstigste Gerät zustande, filterte Umgebungsgeräusche sauber heraus und überzeugte sogar beim Freisprechen.Wer nun denkt, dass er auch in der absoluten Einstiegsklasse im Preisbereich um die 50 Euro anständige Smartphones bekommt, wird enttäuscht: Hier setzen die Hersteller den Experten zufolge extrem den Rotstift an. Für den Käufer bedeute das schwer abzulesende, pixelige TN-Displays, viel zu wenige Speicher und "grottige" Kameras. Wer für wenig Geld nur telefonieren und Nachrichten schreiben möchte, sei mit einem klassischen Handy besser bedient als mit einem Smartphone.



Berlin (dpa/tmn) - Grundsätzlich existieren bei elektrischen Fahrrädern drei Typen: Pedelecs, schnelle Pedelecs und E-Bikes. Wo liegen die Unterschiede und Besonderheiten der Modelle? Der Allgemeine Deutsche Fahrrad-Club (ADFC) und der Pressedienst Fahrrad nennen die wichtigsten Merkmale:Pedelec: Das steht für Pedal Electric Cycle. Tritt der Radler in die Pedale, unterstützt ein Elektromotor mit bis zu 250 Watt den Vorgang. Allerdings nur bis 25 km/h. Für diese Fahrräder braucht man weder Helm noch ein Versicherungskennzeichen. Diese Gattung macht den Löwenanteil der elektrischen Fahrräder aus.Schnelle Pedelecs/S-Klasse:Diese Kleinkrafträder mit bis zu 500 Watt - auch Schnelle Klasse genannt - sind für den Gesetzgeber keine Fahrräder mehr. Man braucht einen entsprechenden Führerschein (Klasse AM), Helm und eine Versicherung. Hier darf nur in die Pedale treten, wer mindestens 16 Jahre alt ist. Radwege sind tabu. Der Motor unterstützt beim Treten bis zu einem Tempo von 45 km/h. Fünf Prozent aller verkauften Elektroräder gehören laut Pressedienst Fahrrad (pd-f) zur Schnellen Klasse. Bei diesem Pedelec-Prinzip lässt sich in der Regel der Grad der Unterstützung in mehreren Modi einstellen. Den Strom zieht der Motor aus einem Akku. "Entweder kann ich den direkt über eine Buchse am Rad laden oder herausnehmen und in einem Ladegerät laden", sagt Gunnar Fehlau vom pd-f. Bei manchen geht beides.


Message déposé le 07.07.2017 à 05:51 - Commentaires (0)


Battery for Acer Aspire 4736

So now three out of four of our PCs are suddenly obsolete in the Windows world. But what about the fourth? That's a different story. Hydra hasn't had a bios update in years, but it still took Windows 10 without a problem – even without a Windows 10-specific version of the bios.Admittedly, all of these systems are fairly old, so I wouldn't necessarily expect the manufacturers to spend time/money to build new bios versions for these boards.But Microsoft could fix these problems by putting more backward compatibility into the Windows 10 code base. They did it with other versions of the venerable OS – why not now? From using Windows 10 on Hydra, it seems more of an evolution of Windows 7 than something completely new and different.Sure, there could be different, non-Windows 7-like things happening under the hood that I don't see, but that stuff can be translated via software routines in order to make it run on older hardware.I predict that legions of users are facing the same problems as I saw today, and that they won't be happy to see their free upgrade hopes dashed.


Analysis Intel's non-volatile memory product revenues are diving as it converts to 3D NAND and waits for XPoint to deliver the goods.Intel’s second quarter 2016 flash revenues of $554m were down 20 per cent year-on-year and one per cent sequentially.Analyst haus Stifel Nicolaus' MD, Aaron Rakers, charted Intel’s quarterly flash product revenues and we can immediately see a four quarter decline.The company talks about a challenging price environment and we would point out it, and flash foundry partner Micron, are late into 3D NAND, which is being popularised by Samsung, with its 48-layer technology.This means, in general, that Samsung can supply flash capacity more cheaply than Intel/Micron as its flash wafers have three bits per cell whereas Intel/Micron’s have two bits per cell.



The client computing 850 EVO SSD from Samsung now has up to 4TB of capacity using 48-layer 3D TLC NAND for the 4TB model. Its the first 4TB PC/laptop SSD. Lenovo is now also shipping its own Atsani* M.2 NVMe SSDs. Both these data points indicates how flash drive supply is broadening and competition intensifying.Intel is also facing the winding down of an SSD supply contract to WDC’s HGST unit which sold Intel-based SSDs. As WDC has bought SanDisk and has acquired its foundry partnership with and output from Toshiba NAND fabs then it will change the Intel/Micron flash componentry to SanDisk/Toshiba NAND and save itself cost.Chipzilla is converting its Dalian fab in China to build 3D NAND and initial wafer production has started. Rakers writes that “Intel/Micron expects it will have cost effective pricing on 3D-NAND in 2HC2016” but whether this translates into increased non-volatile product revenues for Intel depends upon market dynamics. In general, in the flash product market you have to run to stand still, and Intel has fallen behind – so it has to catch up before it can run ahead of the pack.


Intel is looking to bulk up its non-volatile product revenues with the coming Optane 3D XPoint drives. Intel might launch Optane either at the Flash Memory Summit in Santa Clara, Aug 89-11, or the Intel Developer Forum in San Francisco, Aug 16-18. Optane SSDs should start sampling before the end of the year.But Optane revenues will start in 2017. So we could see continued declines in Intel flash revenues in the third and even fourth 2016 calendar quarters. * See Atsani drives lusted on the recent NVMe plugfest which also listed Intel’s Optane 3D XPoint SSDs.World exclusive Dell's ingenious strategy for financing its audacious $67bn acquisition of EMC is a secret no more.Now a crack Reg investigative team can reveal that the Round Rock computing giant has an ambitious plan in place to raise the cash necessary for the deal – and it involves kicking out a line of portable PCs that are so powerful they shatter conventional price structure. Behold, the $650,000 Precision 7700-series laptop, available from dell.com.Throw out your MacBooks and take a second mortgage, because the game just changed (click to enlarge)
These revolutionary notebooks, touted as the world's most powerful, will almost certainly turn the IT market on its head. Given the price, the only logical explanation we can find is that Dell has advanced the field of computing by such amazing leaps and bounds that all other electronics will now be obsolete.



The $652,000 superbooks – on sale, down from a million dollars – will sport a state-of-the-art Windows 7 operating systems, the software that Microsoft doesn't want you to have. It is also packed with a Core i5 processor from Intel, and a full 500GB of storage space.For those who may not be able to splash out the $650k up front, Dell is offering a generous financing program with payments as low as $19,565 per month, well within the spending range of even the most junior of Oracle VPs.While the cost of the systems may seem steep, Dell doesn't need them to sell far and wide. Just 102,631 units sold would scare up the necessary money for the EMC buyout. Sure, Dell's PC business is going through a rough patch, but cracking the 100,000 mark should still be doable.So only about three months of rent of a one bedroom apartment in San Francisco
When confronted with El Reg's findings, Dell predictably went silent, as if it were treating today's startling revelation as a mere website programming error. More on this breaking story as it develops. After we contacted Dell, the US tech titan tore down the pages for its Precision 17 laptops (normal RRP: $1500). Good thing we took screenshots, huh?Seagate has added three new 10TB helium drives, simultaneously re-branding its desktop/laptop disk and SSHDs, NAS and surveillance drive products in a complicated scheme involving disparate drive technologies.


Message déposé le 06.07.2017 à 09:48 - Commentaires (0)


Battery for Fujitsu FPCBP282

Delegates need not. The Black Hat NoC will again be housed in The Fish Bowl, a glass den housing the crew and mascots Lyle the stuffed ape and Helga the inflatable sheep. Delegates are welcome to gawk.The Black Hat NoC operators need to check their defensive reflexes at the door in part to allow a user base consisting almost entirely of hackers to pull pranks and spar, and in part to allow presenters to legitimately demonstrate the black arts of malware."When you see traffic like that, you immediately go into mitigation mode to respond to that threat," Wyler says. "Black Hat is a very interesting network because you can't do that – we have to ask if we are about to ruin some guy's demonstration on stage in front of 4,000 people."Stump recalls intruding on a training session to claim the scalp of a Black Hat black hat slinging around the infamous Zeus banking trojan on the network: "The presenter says 'it's all good, we are just sending it up to AWS for our labs' and we had a laugh; I couldn't take the normal security approach and simply block crazy shit like this."Flipping malware will get you noticed and monitored by one of the Black Hat NoC's eager operators who will watch to see if things escalate beyond what's expected of a normal demonstration.If legitimate attacks are seeping out of a training room, the sight of Wyler, Stump, or any other NoC cop wordlessly entering with a walkie-talkie clipped to hip and a laptop under arm is enough for the Black Hat activity to cease. "It is part of the fun for us," Wyler says. "Being able to track attacks to a location and have a chat."


Targeting the Black Hat network itself will immediately anger the NoC, however.The team has found all manner of malware pinging command and control servers over its network, some intentional, and some from unwittingly infected delegates. "We'll burst in and say anyone who's MAC address ends with this, clean up your machine," Stump says.Training is by far the most expensive part of a hacker conference. Of the 71 training sessions running over the weekend past ahead of the Black Hat main conference, each cost between US$2500 (£1887, A$3287) and US$5300 (£4000, A$6966) with many students having the charge covered by generous bosses.So it was to this writer's initial incredulity that most of the sea of "weird porn" flowing through the Black Hat pipes stems from randy training students. "It is more than it should ever be," Wyler says of the Vegas con's porn obsession. "While you are at a training class – I mean it's not even during lunch."The titillating tidbit was noticed when one Black Hat NoC cop hacked together a script to pull and project random images from the network traffic on Fish Bowl monitors. A barrage of flesh sent the shocked operators into laughing fits of alt-tab. Another moment was captured when Stump was filmed for on CNN Money and a shopper's blowup doll appeared with perfect timing.



Black Hat's NoC started as an effective but hacked-together effort by a group of friends just ahead of the conference. Think Security Onion, intrusion detection running on Kali, and Openbsd boxes.Now they have brought on security and network muscle, some recruited from a cruise through the expo floor, including two one-gigabit pipes from CenturyLink with both running about 600Mbps on each. "We were used to being a group of friends hanging out where a lot of stuff happened on site, and now we've brought in outsiders," Stump says.Ruckus Wireless, Fortinet, RSA and CenturyLink are now some of the vendors that help cater to Black Hat's more than 70 independent networks. "It's shenanigans," Wyler says. "But we love it."The pair do not and cannot work on the DEF CON networks since they are still being built during Black Hat, but they volunteer nonetheless leading and helping out with events, parties, and demo labs. "I feel a responsibility to give back to the community which feeds me," Wyler says. "That's why we put in the late nights." Comment As your humble HPC correspondent for The Register, I should probably be running Linux on the array of systems here at the home office suite. But I don't. I've been a Microsoft guy since I bought my first computer way back in 1984.


You, dear readers, can rip me for being a MStard, but it works worked well for my business and personal needs.I've had my ups and downs with the company, but I think I've received good value for my money and I've managed to solve every problem I've had over the years.Yesterday was the day that I marked on my calendar as "Upgrade to Windows 10 Day." We currently have four systems in our arsenal here, two laptops and two desktops.The laptops are Lenovo R61 and W510 systems, and the desktops are a garden variety box based on an Asus P7P55D Pro motherboard. The other desktop is my beloved Hydra 2.0 liquid cooled, dual-processor, monster system based on the EVGA Classified SR-2 motherboard. These details turn out to be important in our story.The first problem arose with the Asus desktop. Windows 10 was supposedly choking on trying to upgrade while Acronis backup was installed. Even though we removed Acronis, removed all registry entries, used a cleanup utility, and even performed a quick exorcism – Windows 10 still said it was there. Same problem on the Lenovo laptops.



This prompted us to bring Microsoft tech support into the loop. We quickly got past first line support and were promoted to second line – now we'll get the answers we need.Well, yes and no. We got some answers, just not the answers we wanted. According to Microsoft, since there weren't specific Windows 10 drivers out there for the Asus board and R61 laptop, it would be impossible to upgrade them to Windows 10.(This didn't explain the Acronis error, I repeatedly pointed out, but this was never addressed in our text chain, and later, in our phone call.)"Impossible? What the hell?" was my response. Travel faster than the speed of light is impossible, sure, but doing this upgrade certainly doesn't fall into the impossible category.The bottom line from Microsoft tech support is that if there isn't a Windows 10-specific version of the bios for your particular PC, you're sh*t out of luck when it comes to Windows 10.It's the drivers, according to the third-level support person I managed to get on the phone. But what about the generic drivers that every version of Windows includes? "Microsoft doesn't write drivers" was the response from him. Huh? Of course they do.


Message déposé le 05.07.2017 à 07:10 - Commentaires (0)


Batterie pour Toshiba PA3356U-3BAS

Nintendo n’a pas officiellement confirmé à quoi va ressembler la manette, et encore moins le nom de la nouvelle console. La seule information concrète que nous avons vient de la bouche de Satoru Iwata, PDG du groupe de jeux vidéo Nintendo. Il a affirmé que le nom de code interne de la console est « NX », et qu’il doutait qu’elle soit prête en 2015. Son intuition était la bonne.Il est attendu que Nintendo montre sa dernière console lors de l’Electronics Entertainment Expo de cette année, mais ses nouvelles fuites, Nintendo pourrait revoir ses plans, et annoncer la console plus tôt que prévu.En prenant exemple sur sa maison mère, Facebook, Instagram vient de pousser une mise à jour sur son site Web en affichant les notifications des utilisateurs dans une nouvelle zone accessible depuis une liste déroulante. La boîte montre les différents « j’aime », les gens qui vous ont suivi, et les amis qui ont récemment lancé leur compte Instagram.La mise à jour est d’ores et déjà disponible pour tous, comme vous pourrez le constater une fois connecté à votre compte Instagram sur le Web. Le changement est intéressant, puisque jusqu’ici Instagram a uniquement conservé ses fonctionnalités de retouche et de partage photo à son application mobile. Instagram a lancé la gestion des profils utilisateurs sur le Web en 2012, suivi par une refonte graphique en 2013 afin de commenter et aimer les photos, et a poussé la recherche l’année dernière.


Comme on peut le voir, l’application Web est reléguée au second plan, mais la mise à jour améliore réellement la présence d’Instagram sur le Web. Elle pourrait conduire à une plus grande utilisation de la plate-forme sur un ordinateur de bureau, laissant penser que d’autres améliorations pourraient être poussées à l’avenir.
Permettre aux utilisateurs de publier des photos à partir du Web est l’une des caractéristiques les plus demandées par les utilisateurs d’Instagram, mais Facebook est timide quant à son activation, craignant les abus de robots — ce qui arrive de toute façon sur l’application mobile, mais à un degré moindre.WhatsApp, appartenant également à Facebook, est arrivé sur le Web l’année dernière, tout comme le service de messagerie du géant bleu, Messenger, qui a également fait son apparition sur la toile l’année dernière.Personnellement, je pense que je vais rester sur l’application mobile. Je ne vois pas le besoin d’être constamment le nez dans le service, mais j’imagine que des gens célèbres, des responsables de marque, et d’autres gens qui passent leurs journées sur Instagram apprécieront la mise à jour. En effet, Instagram pour le Web commence à ressembler à une application entièrement fonctionnelle, et n’est plus seulement l’endroit où les gens vont aller regarder les clichés sur un plus grand écran.



Si vous cherchez à acheter un MacBook Retina de 12 pouces, vous aurez peut-être envie d’attendre le mois prochain parce que, comme une source l’a confirmé à 9to5Mac, une nouvelle version de la collection d’ordinateurs portables d’Apple est sur le point d’être annoncée. La source a découvert cette information en creusant dans les applications OS X Server et l’utilitaire de système d’imagerie.Dans l’utilitaire, le MacBook Retina 2015 est répertorié comme un modèle d’ordinateur pris en charge, mais de façon surprenante, un modèle début 2016 a également été ajouté, avant sa sortie. Compte tenu de la définition d’Apple pour le terme « early » (« début »), qui signifie dans les quatre premiers mois de l’année, nous pouvons nous attendre à voir le successeur du MacBook de 12 pouces présenté l’année dernière, le prochain mois.Alors que les MacBook de l’an dernier sont tous arrivés en avril 2015, une date de sortie en avril 2016 ne serait pas impossible, surtout compte tenu de l’adhésion d’Apple à une routine annuelle. Toutes les nouveautés appliquées au MacBook seront probablement marginales, bien que l’on puisse espérer que la cinquième génération de processeur Intel Core M soit remplacée par quelque chose d’un peu plus puissant. Croisons les doigts que cette année nous allons voir la mise en œuvre de puces Intel Skylake.L’introduction d’un MacBook de 12 pouces plus puissant ne serait pas injustifiée. En fait, la sixième génération de processeurs Intel Core M est disponible depuis l’année dernière, bénéficiant de la même autonomie de 10 heures que son prédécesseur, mais avec une augmentation des performances du processeur de 10 à 20 %, et un gain de 40 % pour le GPU.


Curieusement, il n’y a rien indiquant un MacBook Air Retina ou un MacBook Pro Retina pour le début de l’année 2016. Bien que cette information puisse facilement être considérée comme sans intérêt, elle pourrait indiquer un rafraîchissement du MacBook de 12 pouces un peu plus tôt que ses homologues plus puissants. Il a été rapporté qu’Apple préparait des variantes « ultra-minces » de ses MacBook de 13 et 15 pouces, avec un possible lancement en juin ou juillet de cette année, bien que la famille de produits exacte reste incertaine.Certes, Deezer a élargi son service au monde entier l’année dernière, mais beaucoup de gens ont été si solidement ancrée dans les services de streaming qu’ils ont déjà connu et aimé, qu’ils ne voient aucune raison de changer, même si Deezer avait offert une meilleure fidélité audio. La société ne va pas rattraper Spotify ou Apple Music de sitôt, mais aujourd’hui, un peu plus de gens pourraient avoir une raison de lui porter une attention toute particulière.Dans une publication sur ​​son blog, Deezer a annoncé que son service est maintenant disponible sur l’Apple Watch. De nombreuses applications de streaming, y compris Pandora et le propre service de musique d’Apple, Apple Music, sont disponibles sur l’Apple Watch. Mais, Spotify est le grand absent, laissant une petite, mais importante, ouverture pour Deezer d’attirer une poignée de nouveaux utilisateurs, en plus d’apporter une nouvelle fonctionnalité pour ses clients.Toutes les fonctionnalités attendues sont là, y compris les playlists, les hits, et Ma musique, qui permettent aux utilisateurs de synchroniser leur Apple Watch et leur smartphone, afin d’accéder à leurs morceaux, artistes et albums préférés, et plus encore. Le support de la technologie Force Touch est inclus, permettant le contrôle de la répétition d’une piste ou encore d’activer le mode de lecture aléatoire. De plus, il y a la possibilité pour un utilisateur de voir rapidement la file de lecture. La musique enregistrée pour une lecture hors ligne sur l’iPhone de l’utilisateur est également disponible depuis la nouvelle application.



Bien que les caractéristiques ci-dessus puissent être attendues de près pour toute application musicale, la fonctionnalité « Flow » de Deezer est également prise en charge sur l’Apple Watch. Flow agit comme un DJ personnel, que la société utilise comme étant « le meilleur de l’homme et de la machine » permettant de jouer intuitivement la bonne musique au bon moment.‘I love my classic watch, but when I want to listen to Flow on-the-go, it’s my Deezer on Apple Watch that lets me listen to all my favourite tracks on hand – anytime, anywhere’, a déclaré dans un communiqué, Alexander Holland, Directeur du contenu et produit de Deezer.Toutes les smartwatches créées ne sont pas égales. Soyons honnêtes, certaines ont un look plutôt horrible sur notre poignet. Si vous êtes dans les montres plus classiques et à la mode, une start-up voudrait vous convaincre que le mieux est de garder votre montre traditionnelle, et la transformer en un appareil intelligent, sans que personne d’autre ait besoin de le savoir, et surtout le voir.La start-up derrière ce nouveau concept est MainTool, et son bracelet remplace celui de votre montre traditionnelle pour l’un de ces choix, vous offrant beaucoup plus de fonctionnalité que juste la capacité d’afficher l’heure. Il permet à la montre de surveiller votre rythme cardiaque, de recevoir des notifications par des vibrations personnalisées, de suivre le nombre de pas, de jeter un œil sur votre sommeil, et de rejeter les appels téléphoniques.


Message déposé le 05.07.2017 à 06:46 - Commentaires (0)


Batterie pour ASUS N51A

Apple a finalement poussé iOS 9.3 à ses utilisateurs. Comme vous l’avez certainement lu ici et là, c’est une mise à jour qui apporte un certain nombre de fonctionnalités intéressantes, comme la possibilité de protéger par mot de passe individuellement des notes dans l’application Notes d’Apple.Bien sûr, au premier abord ce n’est probablement pas une bonne idée de stocker des informations telles que les noms d’utilisateur et des mots de passe dans l’application Notes, mais beaucoup de gens utilisent l’application pour stocker des informations sensibles. S’il y a des informations privées dans vos notes que vous ne voulez pas que quelqu’un voie quand il prend votre smartphone, la nouvelle fonctionnalité sera idéale.Voici comment activer l’option de mot de passe et du Touch ID dans Notes. L’ajout d’un mot de passe à une nouvelle note ou une existante est extrêmement facile à faire, et il y a deux façons d’y parvenir.


C’est un peu ironique que, pour protéger des notes, on doive aller dans le menu de partage – néanmoins, c’est la façon qui est proposée à l’heure actuelle. Une fois que vous avez défini le mot de passe, ce dernier sera automatiquement appliqué aux nouvelles notes que vous souhaitez protéger par mot de passe. Le mot de passe doit être différent de celui que vous utilisez avec l’option Touch ID.Après que les mots de passe aient été mis en place pour les notes que vous voulez protéger, vous serez en mesure de voir quelles notes sont verrouillées par l’icône d’un cadenas qui apparaît en haut de la note. Une fois que vous l’avez déverrouillée, elle le restera jusqu’à ce que vous fermiez l’application ou que vous sélectionniez à nouveau le cadenas.Il est important de noter que la première ligne d’une note apparaîtra toujours dans votre liste de notes. Autrement dit, si la note contient des informations sensibles, il faudra éviter de mettre cette information sur sa première ligne. Après l’avoir déverrouillé, vous pouvez faire tout ce que vous seriez en mesure de faire si la note n’avait pas été protégée par un mot de passe, telle que la partager et l’éditer.L’industrie horlogère suisse porte une plus grande attention à la popularité croissante des smartwatches. Néanmoins, celle-ci ne va pas se presser à entrer dans la compétition. TAG Heuer, l’un des premiers grands noms de fabricants de montres suisses à avoir libéré une smartwatch ne prévoit pas de lancer une suite à la Carrera Connected avant 2017.
Et, tandis que la partie intelligente de la montre va faire partie de la gamme Hublot à l’avenir, cela n’arrivera pas avant l’année prochaine. Quant à la marque Zenith, son introduction pourrait même arriver plus tard.



Ces indications proviennent de différentes sources. Un analyste de CCS Insight, Ben Wood, a tweeté que TAG Heuer va lancer un nouveau modèle de smartwatch en 2017 lors du Baselworld, le plus important salon horloger au monde. Il s’agirait d’un lancement similaire à ce que l’horloger suisse a fait avec la sortie de la Carrera Connected. Même si elle coûte 1 500 dollars, la Carrera Connected a été couronnée de succès, et l’homme en charge de TAG Heuer, Jean Claude Bivet, a déclaré à Reuters que l’entreprise a sous-estimé la demande : « nous étions trop prudents ». Il a déclaré que la société prévoit que 50 000 smartwatches soient vendues cette année.Cependant, et malgré cela, il n’est pas tout à fait convaincu que les smartwatches soient là pour perdurer. « Personne ne sait ce qui se passera avec les smartwatches. Bien sûr, nous pourrions regarder de loin où va ce marché, mais je préfère être là ». Les messages discordants continuent, puisqu’il a affirmé que les montes connectées pourraient éventuellement correspondre à la moitié des ventes totales de TAG Heuer.Dans une interview accordée à Bloomberg, Biver a mentionné que la gamme Hublot était potentiellement la prochaine montre de luxe à « ajouter des fonctions intelligentes », et que la gamme Zenith pourrait la rejoindre prochainement. Il ne divulgue aucun détail, en dehors de mentionner que certaines caractéristiques pourrait être liées aux amateurs de sport. Mais avec une date de lancement prévue pour le courant de l’année 2017, il est peu probable que tout soit définitif. Il est également difficile de savoir si les montres arriveront sous Android Wear, ou si la Hublot et la Zenith seront des modèles « moins connectés ».


Les sites des réseaux sociaux comme Facebook et Twitter sont constamment en train de tester, expérimenter et breveter de nouvelles fonctionnalités. Du plus étrange, au plus banal et au plus exaspérant, les outils ne sont pas toujours ce qu’ils devraient être, et peuvent se révéler être d’une quelconque utilité pour le grand public.Cependant, le dernier test de Facebook peut conduire à une fonctionnalité de support véritablement utile. Facebook teste une caractéristique qui va automatiquement vous alerter si elle découvre qu’un autre utilisateur usurpe votre compte en utilisant votre nom et votre photo, rapporte Mashable.Voilà comment cela fonctionne. Quand Facebook détecte qu’un autre profil correspond au vôtre, le réseau social vous enverra une notification du présumé imposteur. Vous serez alors invité à identifier si le profil sélectionné s’est fait passer pour vous en utilisant vos renseignements personnels, ou s’il appartient réellement à un autre utilisateur qui n’est en fait pas un imposteur.
Bien qu’automatisée, la fonctionnalité verra une équipe d’assistance dédiée examiner manuellement les faux comptes identifiés. Selon Facebook, la caractéristique a été à l’étude depuis le mois de novembre, et a été étendue à 75 % du monde. Facebook prévoit d’étendre sa disponibilité dans un proche avenir.
La fonctionnalité prend tout son sens dans le cadre de l’augmentation des efforts de support de Facebook pour ses diverses communautés mondiales. Plus récemment, la plate-forme a introduit un nouveau système de « faux nom » visant à répondre aux questions des utilisateurs LGBTQ, les individus non occidentaux, et les personnes victimes de harcèlement et d’abus. Cette dernière fonctionnalité tombe probablement dans ce dernier cas, puisque la politique d’inscrire un véritable nom sur le réseau social oblige les gens à utiliser un nom authentique.



Bien que l’usurpation d’identité ne soit pas nécessairement un problème répandu sur Facebook, il est une source de harcèlement sur ​​la plate-forme, en dépit de la politique de longue date que la société a contre elle. Ce nouvel outil va aider à l’endiguer.
Facebook teste également deux autres fonctions de sécurité : de nouvelles façons de rapporter des images à caractère sexuel ciblées, et un bilan du partage des photos. La première permettra de générer des liens vers des ressources externes — comme des groupes de soutien pour les victimes, ainsi que des informations sur d’éventuelles options juridiques, en plus de déclencher le processus d’examen qui se produit lorsqu’une telle image est signalée. La seconde fonctionnalité est similaire à l’assistant de confidentialité de Facebook, qui aide les utilisateurs à vérifier leurs paramètres de confidentialité. La fonctionnalité centrée sur les photos est destinée à aider à éduquer les utilisateurs sur qui peut voir leurs photos.Microsoft a annoncé qu’elle publiera prochainement la version preview de son application universelle de Skype, Skype Universal Windows Platform (UWP), pour tous les membres du programme Windows Insider.Autrement dit, tous les testeurs de Windows 10 sur PC et tablettes seront en mesure de mettre la main sur la nouvelle application de messagerie dans les « prochaines semaines », indique la firme de Redmond. L’application ne va pas être immédiatement utilisable sur Windows 10 Mobile, mais elle suivra sur les appareils fonctionnant sur ce système d’exploitation sous peu.


Alors, que pouvez-vous attendre de la nouvelle application Skype ? Microsoft affirme avoir beaucoup appris sur la rétroaction donnée de la version preview de Skype intégrée à Windows 10 à l’automne dernier. Celle-ci a reçu un certain nombre de plaintes de la part des consommateurs.Une des premières problématiques a été d’améliorer l’utilisation sur des écrans plus grands, que ce soit les tablettes ou les périphériques hybrides, mais aussi les écrans de bureau. Et bien sûr, c’est en grande partie ce que l’application Skype UWP va aborder. La firme de Redmond promet une interface plus simple, et un look simplifié, dépouillant les menus inutiles et les fonctionnalités dupliquées.Au fond, ce sera un nettoyage de printemps, et les menus globaux sont maintenant dans un nouveau menu affichant de simples réglages, avec des menus contextuels par la suite.Dans l’incarnation initiale de cette application, vous serez en mesure de vous connecter avec votre compte Microsoft, lier un identifiant Skype, puis voir votre liste de contacts Skype avec la capacité d’initier une conversation, passer des appels, envoyer des photos, et prendre part à des discussions de groupe existantes. Les émoticônes et les émojis seront disponibles, et les utilisateurs seront également en mesure de voir quand l’autre personne tape dans une fenêtre de chat.



Message déposé le 03.07.2017 à 07:38 - Commentaires (0)


Battery for SONY VGP-BPL26

Apps included Signal, Skype, WeChat, Gmail, Facebook, WhatsApp, and Telegram running on a Samsung S4, LG G3, and HTC One.It is a "new paradigm in smartphone forensics", according to the team of Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, and Dongyan Xu of Purdue University, and Golden G. Richard III of the University of New Orleans."We feel without exaggeration that this technology really represents a new paradigm in smartphone forensics," Saltaformaggio says."It is very different from all the existing methodologies for analyzing both hard drives and volatile memories."The lead author says he was "amazed" by the lack of in-memory app data protection reckoning that information should be "shredded" after it is displayed.Writing over expired screens will impact smartphone performance however and the team did not find an easy way to counter their forensic data extraction methods.


The team's work builds extends early research which recovered the last screen displayed by an Android application.Retroscope is described in the paper Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images [PDF] and in a proof-of-concept video as a tool for police to pull new information from smartphones that have not been locked or shut down.
Retroscope is inspired by the observations that app-internal data on previous screens exists much longer in memory than the GUI data structures that 'package' them and each app is able to perform context-free redrawing of its screens upon command from the Android framework.
Based on these, RetroScope employs a novel interleaved re-execution engine to selectively reanimate an app’s screen redrawing functionality from within a memory image. Our evaluation shows that RetroScope is able to recover full temporally-ordered sets of screens (each with 3 to 11 screens) for a variety of popular apps on a number of different Android devices.Police have methods for preserving machines that have been left on in a bid to capture decrypted information and data stored in memory.Jailed Silk Road kingpin Ross Ulbricht was nabbed in a public library with his laptop still running, securing police additional crucial evidence.



Security researchers will demonstrate how crooks can break into cars at will using wireless signals that can unlock millions of vulnerable vehicles.The eggheads, led by University of Birmingham computer scientist Flavio Garcia alongside colleagues from German engineering firm Kasper & Oswald, have managed to clone a VW Group remote control key fob after eavesdropping on the gizmos' radio transmissions.The hack can be used by thieves to wirelessly unlock as many as 100 million VW cars, each at the press of a button. Almost every vehicle the Volkswagen group has sold for the past 20 years – including cars badged under the Audi and Skoda brands – is potentially vulnerable, say the researchers. The problem stems from VW’s reliance on a “few, global master keys.”El Reg asked Volkswagen to comment on the findings, but we didn’t hear back at the time of going to press. We’ll update this story as and when we hear anything more.During an upcoming presentation, titled Lock It and Still Lose It — on the (In)Security of Automotive Remote Keyless Entry Systems at the Usenix security conference (abstract below) – the researchers are also due to outline a different set of cryptographic flaws in keyless entry systems as used by car manufacturers including Ford, Mitsubishi, Nissan and Peugeot.


The two examples are designed to raise awareness and show that keyless entry systems are insecure and ought to be re-engineered in much the same way that car immobilisers were previously shown to provide less than adequate protection.While most automotive immobiliser systems have been shown to be insecure in the last few years, the security of remote keyless entry systems (to lock and unlock a car) based on rolling codes has received less attention. In this paper, we close this gap and present vulnerabilities in keyless entry schemes used by major manufacturers.
In our first case study, we show that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few, global master keys. We show that by recovering the cryptographic algorithms and keys from electronic control units, an adversary is able to clone a VW Group remote control and gain unauthorised access to a vehicle by eavesdropping a single signal sent by the original remote.Secondly, we describe the Hitag2 rolling code scheme (used in vehicles made by Alfa Romeo, Chevrolet, Peugeot, Lancia, Opel, Renault, and Ford among others) in full detail. We present a novel correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop. Our findings affect millions of vehicles worldwide and could explain unsolved insurance cases of theft from allegedly locked vehicles.



Garcia was previously blocked from giving a talk about weaknesses in car immobilisers following a successful application to a British court by Volkswagen. This earlier research on how the ignition key used to start cars might be subverted was eventually presented last year, following a two year legally enforced postponement.The latest research shows how tech-savvy thieves might be able to unlock cars locked by the vehicles' owners without covering how their engines might subsequently be turned on.WiReD reports that both attacks might be carried out using a cheap $40 piece of radio hardware to intercept signals from a victim’s key fob. Alternatively, a software defined radio rig connected to a laptop might be employed. Either way, captured data can be used to make counterfeit kit.Jason Hart, CTO data protection at Gemalto, said: “The security of connected cars is one of the biggest issues that manufacturers are faced with today as it has the potential to be one of the most dangerous connected ecosystems. While no car, or device for that matter, can ever be 100% unhackable, there are some key security precautions that original equipment manufacturers must incorporate.


Message déposé le 01.07.2017 à 07:24 - Commentaires (0)


Battery for DELL Alienware M17x R3

It seems that no good deal can go unpunished, whatever it is – and if it offends the slacktivists' idea of internet purity, then it must be forbidden.T‑Mobile US' problems with its ambitious new all-you-can-eat deal aren't oddball activists, but economics and physics. All-you-can-eat internet plans are never really all you can eat – nor can you reasonably expect them to be, given finite resources and cost constraints. And not one, anywhere, has lasted very long.Deutsche Telekom-owned T‑Mobile US is the third largest of the four national mobile networks in America, and so it likes to make splashy pronouncements. It even pretends not to be a mobile network at all. But fair play to them, under CEO John Legere, T‑Mobile US has tried to simplify pricing, improve customer service, and innovate where it can, surpassing Sprint in the process.The odd thing about T‑Mob's One plan is the echo of H3UK's One plan, launched in 2010. Back then, Hutchison's 3 was the fifth largest out of five operators and also liked to make splashy announcements. The One plan was a great way to entice new customers, and 3 shifted a lot of iPhones. But after four years it scaled 3 back, as it repositioned itself more upmarket. The One Plan became "unlimited data plus tethering," and you can still buy an unlimited bucket from 3. Now called the "Advanced Plan," it costs 33 quid and 30GB of hotspot data is thrown in, when you commit for a year.


T-Mobile US's One plan introduces a new pricing structure that rewards multi-SIM family packages but makes the on-ramp quite a bit steeper. It's $70 for one SIM, the second is $50, and each additional line is $20. So a family of four pays $40 a head for unlimited LTE. If you're Octomom, the price goes down to $20 per line.(T-Mo says lower-priced plans will continue, starting at $50 for 2GB, but this is clearly a push to volume users and away from bargain hunters.)T-Mobile US says the highest three per cent of users – those using more than 26GB of high-speed data per month – "may see their data traffic prioritized behind other users once they cross that threshold during their billing month."CCS Insight notes that "in general, plans have adjusted to reasonable modern-day data use," meaning that you get what you pay for.The biggest complaint about the small print that comes with AYCE plans is tethering. Laptop users expect broadband quality, not downsampled video streams. And they burn through a lot of data. T‑Mobile US has put tethering outside the One plan, as a $15 bolt-on, and that buys you 5GB of data.It seems a sensible precaution. Full high-def video will also require an extra $25 a month per SIM. Ouch. Experience suggests that as long as operators put the caveats up front, people don't care. It's the bill shock that they really do mind.



For connoisseurs of net neutrality nuttiness, the Witchfinder General Barbara van Schewick offered the most far-fetched reasons for why T‑Mobile US's Binge On was eeeevil, here [PDF]."A customer who has used almost all of her data could still binge on HBO, but would be unable to make an important video call with her doctor," she wrote. And best of all: "Binge On harms free expression by favoring commercial entertainment over other forms of video content." Like watching lectures by law professors on net neutrality, I suppose, or Albanian folk-dancing. So-called artificial intelligence reader performs reality check Email is a fundamental format for modern life, but one that many of us have yet to fully understand.While a concise/firm response may seem perfect to you, others may see it as, shall we say, a little rude. Likewise, your careful and accurate rundown can often result in people's eyes glazing over and failing to respond with the information you asked for (at the end of the 800-word exposition).Boomerang says it hopes to change all this with an artificial intelligence reader that plugs into your Gmail and will let you know if your email is going off the rails in terms of length, subjectivity, politeness and so on. And it breaks each part down, providing you with the overall likelihood of you receiving a response to the email you are about to send.


Hands On Microsoft’s Continuum is one of the spookiest computing experiences you can have. Either plug a phone into a dock, or turn on a nearby wireless display and keyboard, and the phone doubles up as an ersatz Windows PC. No more lugging a laptop around.Back in January, we described Continuum reviewers as sharing the surprise and disdain that Samuel Johnson had for women preachers. So has much changed? Is Continuum still a limited use novelty or a transformative feature, allowing you to shed multiple devices for one very powerful, pocketable one?HP is betting on the latter. HP has put a lot of thought and work into making Continuum usable, and so finding a profitable business niche. It’s about to debut not just a powerful Continuum-capable phone, but a static and mobile dock and a streaming app service that plugs the gaps left by lack of native x86 support.So as a prelude to our rundown of HP’s work, we took Continuum for a work out with the latest cut of Windows 10 Mobile (this week’s, in fact) and the most powerful Continuum-capable Lumia, the 950 XL.You can see why people dismiss Continuum as a novelty. It’s a pretty damn novel experience. First impressions are unsettling: yes, your phone really is a PC. It isn’t just projecting. Look! The same start menu. Look! The same wallpaper. Fire up Outlook Email and it’s really the same software!



In the latest builds of Windows 10 mobile, Edge really shines in Continuum. I kept trying to trip it up, but came back surprised. It’s just a pity that the latest Edge won’t run the handy extensions (ad blocker, Evernote clipper, Last Pass) that the desktop Edge can now run. Hmmph.Plug in, detach, and go: this basic part of the Continuum experience is really fundamental and should work perfectly. You shouldn’t get BSODs or catatonic screen flickering. And by and large it does. That wasn’t true a earlier this year, when the phone could have random seizures (and, yes, BSODs too).Getting going with Continuum has obviously been a major focus for Microsoft this year, so much so it’s brushed aside niceties. It's really now plug it in and go. For example, I noticed every time I un-docked, there was a polite dialog box on the phone asking me whether I’d want to connect via a cable or wirelessly - a box that had been displayed back when I plugged the phone in. It’s just that Continuum is in such a rush to turn your phone’s display into a touchpad, you don’t see this request until you undock.I found I could plug in a random, ancient USB headset and Continuum picked up the audio output stream nicely. (But wouldn’t take audio input.)I’ve been trying Continuum with two Lumias, the 950XL and 950. The former has the notorious (for overheating) Qualcomm Snapdragon 810, last year’s flagship SoC. The latter runs the more modest Snapdragon 808. And you know what? It doesn’t really matter which you use. There’s a fraction more lag switching between apps, but not much. There’s a fraction of a second Alt-Tabbing, which brings up the expected thumbnails.


Message déposé le 30.06.2017 à 14:21 - Commentaires (0)


Batterie pour Acer AS09A90

L’hystérie de masse entourant Instagram qui a agité les réseaux sociaux ce lundi, est attribué à la récente révélation que l’application prévoit de modifier son flux d’actualité affiché par ordre chronologique inverse, à une chronologie basée sur un algorithme. Selon Instagram, le nouveau flux afficherait de « meilleures » photos et vidéos en tout premier lieu, fournissant aux utilisateurs un contenu pour lequel ils sont plus susceptibles d’être intéressés. Pour ce faire, la plate-forme sociale prendrait en compte le nombre de « j’aime », les recherches et les interactions entre les utilisateurs.Ceci est naturellement un sujet de préoccupation pour les utilisateurs les plus populaires de Instagram, qui ont peur que leurs publications ne se retrouvent plus aux yeux de leurs abonnés à la suite des changements. Par conséquent, dans la crainte d’une mise à jour imminente, l’application a été inondée avec des images invitant les utilisateurs à activer les notifications pour leurs publications, assortis du message : « Instagram change sa politique de notifications. Activez les notifications si vous voulez continuer à suivre mes posts ».En réalité, personne ne sait vraiment quand Instagram prévoit de déployer la mise à jour de son flux d’actualité. L’application n’a pas détaillé les changements ou annoncé une date de lancement pour sa nouvelle timeline basée sur un algorithme. Instagram a répondu aux messages — dont beaucoup sont accompagnés de hashtags, tels que #turnmeon et #letsstaytogether — en rassurant les utilisateurs que « rien ne change » avec le flux « à l’heure actuelle ». La firme a également ajouté que les changements sont encore dans les cartons, et qu’elle indiquera à sa communauté quand elle décidera de « pousser » la mise à jour « au sens large ».


We’re listening and we assure you nothing is changing with your feed right now. We promise to let you know when changes roll out broadly.Le sentiment assez vague ne va probablement pas endiguer la vague d’inquiétude parmi les nombreux utilisateurs de la populaire application. Afin d’apaiser à nouveau les tensions, Instagram a publié une déclaration sur ABC News, fournissant un peu plus en détail. « Nous avons encore des semaines, voire des mois, de tests à faire. Actuellement, les groupes de testeurs sont très faibles. Lorsque nous pousserons globalement cette mise à jour, nous avertirons la communauté », a déclaré le porte-parole d’Instagram.Avec au moins quelques « semaines » avant que l’algorithme soit mis en œuvre, il semble que la crise sur Instagram soit un peu prématurée. Néanmoins, il est compréhensible que les gens soient inquiets au sujet d’un changement qui pourrait reléguer leurs selfies au second plan…Il semble que Facebook travaille sur un tas de nouvelles fonctionnalités pour son application Messenger, y compris la capacité de payer en boutique à travers l’application. Alors que Messenger vous permet déjà d’envoyer de l’argent à des amis, le code source décortiqué par The Information montre la preuve d’une nouvelle fonctionnalité de paiement mobile qui peut autoriser les transactions par une carte de crédit dans des boutiques.



Les détails de la façon dont la fonctionnalité fonctionnera restent un mystère pour l’instant. Facebook pourrait avoir l’intention de collaborer avec des solutions de paiement mobile déjà établies, comme Apple Pay, Android Pay, Samsung Pay et bien d’autres, ou mettre en place son propre système.Bien sûr, vous pourrez simplement utiliser l’une des possibilités déjà offertes sur le marché, au lieu de ce que Facebook mijote. En effet, Messenger pourrait s’appuyer sur ce que les concurrents font, sans apporter une réelle nouveauté.Le code source iOS de Facebook révèle également que la firme travaille sur d’autres fonctionnalités pour Messenger, y compris ce qui est considéré comme un outil « de conversations secrètes ». Encore une fois, on ne sait pas ce que cette fonctionnalité entraînera, mais cela pourrait signifier quelque chose de similaire à une navigation incognito, ou des conversations cryptées ou même des fils de discussions qui ne vont pas être historisés (à la Snapchat).Il y a aussi des références à la synchronisation et l’ajout d’éléments à des agendas, au partage de publications à un groupe restreint d’amis, et aussi le partage de citations d’articles.


Étant donné que toutes ces caractéristiques ont seulement été mentionnées dans le code source de l’application Messenger, il se peut que Facebook les teste juste pour l’instant. Cela peut prendre des mois avant qu’elles ne soient officiellement annoncées, et seulement si la société décide de les libérer.Cependant, une chose est claire : Facebook ne veut pas vous faire quitter l’application Messenger, même pas pour acheter des choses IRL. La société a poussé Messenger comme une plate-forme il y a un an maintenant, et alors qu’elle n’est pas devenue la plaque tournante sur mobile, elle est néanmoins devenue un outil de plus en plus utile.L’iPad Pro d’Apple est maintenant disponible en deux tailles : il y a le modèle de 12,9 pouces qui a été lancé l’année dernière, et la nouvelle version de 9,7 pouces qui a été annoncée la semaine dernière. Alors que le nouveau modèle est plus petit et a une batterie plus petite, Apple indique qu’il devrait fournir une autonomie similaire, tout en offrant le support pour son stylet sensible à la pression, Apple Pencil, et a même quelques caractéristiques légèrement supérieures, comme de meilleures caméras, et un écran « True Tone », qui, à l’aide de capteurs de luminosité ambiante à quatre canaux, adapte automatiquement la couleur et l’intensité de l’écran au niveau de clarté du lieu dans lequel vous vous trouvez.



Mais, il se trouve que si le nouvel iPad Pro de 9,7 pouces est non seulement plus petit et moins cher que la version de 12,9 pouces, il est également moins puissant.D’une part, alors que les deux tablettes ont des processeurs Apple A9X, Matthew Panzarino, rédacteur en chef chez TechCrunch, a réalisé un benchmark Geekbench sur chaque tablette et a découvert que l’iPad Pro avec un écran de 9,7 pouces a un processeur avec une vitesse d’horloge de 2,16 GHz, tandis que le plus grand modèle est cadencé à 2,24 GHz. Autrement dit, malgré que la puce soit identique Apple semble avoir ralenti la cadence de celle-ci, très certainement pour rester avec une autonomie décente.D’autre part, le modèle de 12,9 pouces dispose de 4 Go de mémoire vive (RAM), alors que la version plus petite a juste 2 Go de RAM.Bien que cela puisse passer inaperçu pour de nombreux consommateurs, sachez que cela pourrait affecter les performances du multitâche, en particulier en utilisant la fonctionnalité de partage d’écran intégré dans les versions récentes d’iOS. Et, l’effet combiné du processeur plus lent et d’une quantité de mémoire vive réduite fournit des scores différents dans les benchmarks.
Panzarino a partagé des images montrant que le modèle de 12,9 pouces obtient un score sur Geekbench de 3 231 points en simple-cœur, et de 5 482 points en multicœurs, tandis que l’iPad Pro de 9,7 pouces a obtenu des scores de 3 022 et 5 107 points pour les mêmes tests.


Message déposé le 30.06.2017 à 13:20 - Commentaires (0)


Akku für HP COMPAQ 2740p Tablet PC

Akku wärmen: Wer ein Pedelec hat, sollte sich im Winter um seinen Akku kümmern. Denn in Pedelecs werden in der Regel Lithium­Ionen-Batterien verbaut, erklärt die Stiftung Warentest. Und die sind frostempfindlich. Touren bei strengem Frost machen den Stromspeichern aber in der Regel nichts aus. Der Fahrstrom sorgt unterwegs für warme Akkuzellen. Nur sollten die Batterien bei einer Fahrpause nicht auskühlen. Eine Möglichkeit, das zu verhindern, sind Schutzhüllen aus Neopren.Bahnhofskneipen können schön sein. Absolut unverständlich: Es gibt bei den Emojis vier Lautsprecher, zwei Megafone, vier Vorhängeschlösser und zwei (!) Lupen – aber keinen anständigen Vogel. Dinkel-Toast aus dem Bioladen entzieht sogar Nutella die Geilheit.
1047126
ANZEIGE


Spätestens ab Mitte Oktober gibt es nichts Schöneres als eine heiße Badewanne am Abend. In einer Stadt, in der man früher einmal gelebt hat, stolpert man an jeder Ecke über Erinnerungen. Plastikhaargummis sind die Rainbow Looms der Erwachsenen. Der erste Eindruck ist nicht immer richtig. Zu 95 Prozent aber schon. Irgendwann kommt der Freundeskreis in ein Alter, in dem die Frage Hast du was dabei? Wickelutensilien meint. Dinge zu tun, die man nicht tun soll, macht am meisten Spaß. Bis man sich wieder erinnert, warum man sie nicht tun soll. Amerikaner lieben Zäune. Und amerikanischer Poetry Slam ist Sozialkritik von Freaks und Geeks (deutscher Poetry Slam ist Witze und Gedichte von Geisteswissenschaftlern). Der Soundtrack in einem landenden Flugzeug ist fast immer ein schreiendes Baby. Komisch: Menschen mit fremdenfeindlichen Ansichten oder sehr patriotischer Gesinnung sind erstaunlich oft extrem tierlieb. (Jetzt sagt sicher jemand: Hitler war ja auch Vegetarier!) Niemand, wirklich niemand kann den Namen Matthew McConag..., nein, Matthew McConneg... nein, Matthew McConnaugy, NEIN, richtig schreiben. Matthew McConaughey, man schreibt es McConaughey. Wie man das richtig ausspricht, weiß übrigens auch keiner. Wer seinen Schrott loswerden will, ohne ihn zum Wertstoffhof bringen zu müssen, muss ihn einfach nur mit dem Label Zu verschenken bei Ebay Kleinanzeigen anbieten. Spätestens wenn man versucht, das Wasserglas statt des Handys an das Akku-Ladegerät anzustöpseln, sollte man dringend ins Bett gehen. Man sollte sich immer gemeinsam mit den Mitbewohnern betrinken. Sonst macht man in ihrem Beisein krakenhafte Bewegungen, schreit: Ich bin das Monster vom Titisee! und wird dabei gefilmt. Gabeln mit drei Zacken können einem das Essen versauen.

Berlin (dpa/tmn) - Haustür auf, Ohrstöpsel raus, ein Fingertipp aufs Smartphone, und schon läuft der Song im ganzen Haus weiter. Und zwar nicht, weil die Anlage im Wohnzimmer den Sound auf maximaler Lautstärke in alle Winkel des Zuhauses pumpt.



Funklautsprecher in jedem Raum empfangen die Musik drahtlos, so dass der Pegel die Nachbarn nicht verschreckt - Audio-Streaming macht es möglich. Die Technik ist ausgereifter denn je und boomt. Vernetztes Musikhören ist einer der absoluten Wachstumsmärkte der Heimelektronik, sagt Timm Lutter vom IT-Verband Bitkom. Dieser Trend wird dadurch befeuert, dass immer mehr Menschen Musik aus dem Internet streamen. 37 Prozent der Internetnutzer in Deutschland nutzten Bitkom-Zahlen zufolge etwa Audio-Streamingdienste.Und wer eine Festplatte an seinen dafür ausgerüsteten WLAN-Router hängt, eine Netzwerkspeicher-Festplatte (NAS) ins Heimnetzwerk einbindet oder seinen Rechner als Medienserver arbeiten lässt, kann überall im Haus drahtlos auf seine Musiksammlung zugreifen.Zuhause Musik streamen geht bei einfachen Boxen mit Bluetooth-Schnittstelle los und endet bei WLAN-Multiroom-Systemen, bei denen sich Komponenten über mehrere Stockwerke verteilen. Bleibt die Frage: Was ist für die eigenen vier Wände das Richtige?


Wer Musik vor allem über Handy oder Tablet hört und daheim nur in einem Zimmer einen etwas satteren Sound möchte, wird vielleicht schon mit einem Bluetooth-Lautsprecher zufrieden sein. Für diese Bedürfnisse ist es das ideale Einstiegsgerät, sagt Sven Hansen vom c't-Magazin. Die kleinen Boxen starten preislich schon bei rund 20 Euro, guten Klang kann man laut Hansen ab 80 Euro erwarten. Der günstige Preis ist nicht ihr einziger Vorzug. Meist ist ein kleiner Akku an Bord, so dass die Boxen auch unterwegs für Stimmung sorgen.Allerdings stoßen Bluetooth-Boxen im Eigenheim rasch an Grenzen. Die Reichweite des Funkstandards beträgt nur einige Meter, und die verwendeten Codecs sind in der Regel verlustbehaftet. Gerade bei teureren Boxen kann das ärgerlich sein. Je besser der Lautsprecher ist, desto stärker treten Störungen durch die stark komprimierenden Codecs hervor, erklärt Hansen.Sollen verschiedene Musikquellen und Boxen über mehrere Räume vernetzt werden, landet man bei Multiroom-Systemen. Die Signale werden dort per WLAN oder über ein eigenes Streaming-Netzwerk verteilt, erläutert gfu-Sprecher Roland Stehle. Die Systeme können beliebig erweitert werden - je nach Bedarf und Budget.


WLAN hat gegenüber Bluetooth nicht nur Reichweitenvorteile: Per WLAN lässt sich Musik auch verlustfrei übertragen. Selbst wenn es mal Probleme mit der Bandbreite gibt, bietet der Standard genug Reserven, sagt Hansen. Das ist wichtig, da ein Streaming-Trend High-Res (High Resolution) heißt. So werden meist Musikdateien bezeichnet, deren Bandbreite und Dynamik CD-Qualität übertreffen.Im Prinzip können heutzutage alle funkenden Musikgeräte per WLAN zu einem System vernetzt werden. Eine gute Orientierung bietet hier der Standard DLNA. Damit können die Geräte herstellerunabhängig untereinander streamen, erklärt Timm Lutter. Allerdings gibt es im Einzelfall Marken, die nicht miteinander funktionieren, warnt er.Soll die Musik in verschiedenen Räumen gleichzeitig laufen, setzt man lieber auf Produkte von nur einem Hersteller, empfiehlt Hansen. Damit wird die Steuerung zeitgenauer. Beim Kombinieren verschiedener Fabrikate komme es oft zu leichten Übertragungsverzögerungen, die zu unschönen Halleffekten führen. Und wer alles aus einer Hand hat, kann alle Komponenten bequem über Hersteller-Fernbedienungen oder über eine App für Smartphone und Tablet ansteuern.



Wem ein bestimmter Audio-Streamingdienst wichtig ist, sollte vor dem Kauf prüfen, welche Anbieter die WLAN-Box oder das Multiroom-System direkt unterstützt, rät Stehle. Zahllose Internetradios können die meisten Drahtloslautsprecher und Systeme ohnehin wiedergeben.Selbst der Plattenspieler kann zur digitalen Musikquelle werden: Es gibt Netzwerk-Verstärker, die sein Signal digitalisieren und drahtlos an die WLAN-Boxen im System schicken, erklärt Hansen. Alte Hi-Fi-Anlagen könnten oft mit Funkadaptern ins neue Musiknetz geholt werden. Und wer Probleme mit der WLAN-Reichweite hat, findet auf dem Markt Systeme mit sogenannter Mesh-Technologie: Jede Abspielstation arbeitet da als autonome Funkzelle und verteilt das Signal bei Bedarf unabhängig vom WLAN-Router an umliegende Komponenten weiter.Meerbusch (dpa-infocom) - Wer Microsofts neues Betriebssystem Windows 10 nutzt, kann nicht nur klassische PC-Programme ausführen, sondern auch Apps. Auf Wunsch können Nutzer die Programme auch im Hintergrund weiterlaufen lassen oder auch nicht.In den Einstellungen lässt sich festlegen, welche Apps im Hintergrund laufen dürfen - und welche nicht. Denn je weniger Apps im Hintergrund laufen, desto länger hält der Akku. Um festzulegen, für welche Apps die Ausführung im Hintergrund-Modus gestattet ist, im Menü Start die Einstellungen suchen. Hier zum Bereich Datenschutz wechseln. In der Liste der Unterpunkte nun nach ganz nach unten scrollen, bis die Option Hintergrund-Apps sichtbar wird. Hier lässt sich nun für jede App separat konfigurieren, ob sie im Hintergrund ausgeführt werden darf oder nicht.


Message déposé le 30.06.2017 à 05:53 - Commentaires (0)


Battery for SONY VGP-BPL26

That's generation on generation, though. These figures are only of use to snarks like us who want to see what Intel engineers have achieved in the past year, and for geeks who upgrade their machines every 12 months.Intel really hopes Kaby Lake prizes punters off their 2011-era PCs; anyone tempted to replace their computer will be blown away by the improvements in the past five years and crack out their credit card. At least, that's the dream."Most people who are going to buy a new PC are not buying to replace last year's – well, maybe we wish they were but they are not, they are replacing devices that are five or more years old," said Intel spokeswoman Karen Regis. "There are 400 million users who are using PCs that are five or more years old."Intel reckons today's seventh-gen Core i5 7200U is 70 per cent faster than its five-year-old Core i5 2467M equivalent in SYSmark benchmarks, can convert a 4K video to 1080p H.264 6.8 times faster, and score three times better in the 3Dmark gaming benchmark.More information on the individual chips, and their speeds and feeds, will appear, as always, on Intel's ARK closer to launch.Finally, there's an addition to Kaby Lake: a new media-processing engine. This performs VP9 and 10-bit HEVC/H.265 decoding in hardware, as well as the usual 1080p HEVC, to reduce power usage even when viewing high-res video – meaning more internet streaming before your battery runs out. Intel calls this "All Day 4K" where "all day" means "nine and a half hours."


Kaby Lake chips are able to decode up to eight 4Kp30 AVC and HEVC streams at a time – useful for signs and surveillance gear – and decode 4Kp60 HEVC at up to 120Mbps, which is handy for watching high-quality films and TV on the internet.This video engine also enforces anti-piracy DRM protections as required by the major studios. Hollywood bosses didn't want to stream 4K ultra high-def content from online clouds without mechanisms in place to thwart casual rippers, and so Intel gave the entertainment giants what they wanted."There are hardware-based protection mechanisms to make the studios comfortable with sharing high-quality content to PCs for the first time," said Regis. The son of a Russian member of parliament has been found guilty of stealing and selling millions of US credit card numbers using point of sales malware.Roman Seleznev, 32, is the son of ultra-nationalist Liberal Democratic Party MP Valery Seleznev. He was arrested in 2014 while attempting to board a plane in the Maldives, sparking anger from Russian authorities.Seleznev said at the time the arrest was a "monstrous lie and a provocative act".Roman Seleznev was convicted in a Washington court on Thursday, on 10 counts of wire fraud, nine of obtaining information from a protected computer, nine of possession of 15 unauthorised devices, eight of intentional damage to a protected computer, and two of aggravated identity theft.He faces a minimum of four years and a maximum of 34 years in prison when he is sentenced 2 December.



Seleznev, who used the handle Track2, scanned for vulnerable retailers across Washington and infected point of sales terminals with malware, prosecutors said.He stole some 2.9 million credit cards, according to prosecutors, wreaking some US$169 million in damages across 3700 financial institutions.The Yakkety Yak Beta 1 has images for Kubuntu, Lubuntu, Ubuntu GNOME, Ubuntu Kylin, Ubuntu MATE and Ubuntu Studio.In the release announcement, Set Hallstrom notes that this isn't yet a prime time release: these images are for Ubuntu flavour developers and “those who want to help in testing, reporting, and fixing bugs”. Plugging a Kindle Paperwhite into a PC running Windows 10 with the Anniversary Update installed sparks a full system meltdown, it is claimed.Connecting the Amazon e-reader to a fully up-to-date W10 machine via USB triggers an immediate Blue Screen of Death, according to complaints on Microsoft's support forum. All the trouble started when people downloaded and installed the Anniversary Update, which arrived at the turn of the month. That's the same upgrade that has knackered millions of webcams and caused some systems to freeze up.


The crash kicks off in the storage partition driver partmgr.sys, with a bugcheck code 0x7E (SYSTEM_THREAD_EXCEPTION_NOT_HANDLED) and cause code 0xC0000005 (STATUS_ACCESS_VIOLATION) – in other words, a kernel-level thread in the driver touched memory it shouldn't have, and blew away the environment. It sounds like Windows is trying to mount the filesystem on the Kindle as a removable storage device and getting completely confused.Some people say the BSOD only happens when they plug their Kindle into a USB 3.0 port, others say inserting it into a USB 2 interface triggers the crash too. Some people always get a crash, some most of the time, and others have reported experiencing no problems at all.I recently [installed] the summer Anniversary Update for Windows 10 on both my laptop and my desktop which went without any errors. Today I plugged in a Kindle Paperwhite and it immediately crashed my laptop to a blue screen.


I figured it might be a driver issue even though my laptop is fairly new, so I plugged it into my desktop and got the exact same thing. A Blue Screen of Death. Just for more info, it is a Kindle Paperwhite being plugged into USB 3.0 ports on a HP laptop and Dell desktop both running the latest Windows. It's pretty frustrating because I need to transfer some PDFs to the Kindle for my son's school classes.I have the same problem with my Asus K53SV laptop and my Lenovo 100S netbook after [installing the] Anniversary Update for Windows 10. I plug in the Kindle Paperwhite and both laptops almost always crash to a blue screen and then reboot. After they reboot, the Kindle is visible and usable as a USB device as if nothing happened. I can browse files on the Kindle and I can use Calibre with Kindle. After the crash and reboot, I can even eject the Kindle and plug it back in without any problems – at least during that session. If I then shut down my laptop, plugging in my Kindle the next time will crash my laptop again and reboot it, and then I can normally use Kindle again. Needless to say, this is annoying.



Same issue with two desktops and two Kindles: one PC is home built with Win10 Pro. The other, a Dell with Windows 10 Home. Both fail with a BSOD when I plug the Kindle into a USB 3 port. Both work fine when I plug the Kindle into a USB 2 port. Both worked with USB 3 ports prior to the Anniversary Update. Oddly, my Surface Pro3 which has only one USB3 port works fine.
All very mysterious. So far, there is no mention of any fix, and no word from Microsoft. One workaround is to plug the Kindle into the machine during boot-up or while the computer is sleeping. That seems to avoid crashing the operating system.Analysis Sprint and T-Mobile US are introducing "all you can eat" internet plans, and as you might expect, someone at the Electronic Frontier Foundation in San Francisco is horrified. Somebody always is.The EFF tut-tutted at dirt-poor Indian farmers getting Ceefax pages on their mobiles for free – and the Indians obligingly banned it. The EFF tut-tutted at Netflix peering directly with big ISPs to remove stutter from its movie streams, a much more efficient delivery arrangement that actually saved Netflix some money. The EFF tut-tutted at T‑Mobile US for working with video providers so videos wouldn't count against your bandwidth cap. But the Binge On deal proved so popular with customers, the EFF looked silly, and even sillier after Google joined Binge On.


Message déposé le 29.06.2017 à 06:31 - Commentaires (0)


Battery for Lenovo FRU 42T4783

Next, by writing sequences of '0' and '1', we're told you can create a carrier wave from the rapid voltage changes on the interface's data pins. You can then use binary frequency shift keying (B-FSK) to encode useful information into the wave.Guri reckons you can beam 80 bytes per second over the air using this technique, which is fast enough to send a 4,096-bit crypto key to a nearby receiver in less than 10 seconds.You then write the resulting buffer to, say, a mounted removable storage device to generate the signal. You don't need to be root or an administrator to do this; you just need permission to write to a file on the device."The actual data transmission is done by writing the byte pattern generated by fill_buffer_freq() to an arbitrary data block or stream in the USB device," Guri and his team said in a research paper that surfaced this week."The transmission process doesn't require special privileges (e.g., root or admin). It only requires permission to create a file on the removable device."In a video the team showed how the data can be picked up by a laptop with a $30 radio antenna from around 15 feet away. That's certainly enough to spy on someone working in the next hotel room, or in a crowded office.


It's an interesting hack, and one that could have some utility. Of course, to pull this off, you first have to get malware onto the air-gapped computer that then writes to a USB device, and you have to be nearby to pick up the signal – and hope no one notices. That's not outside the realms of possibility if you grease the right palms, threaten the right people, or exploit OPSEC screw-ups to get your espionage code onto the target machine. Obituary The creator of the world's first laptop, the GRiD Compass, has died at the age of 75 at his home in California.John Ellenby was born in the North of England in 1941 and educated at University College London, where he showed an early interest in computers. After a career designing mainframes he moved to the US, where he ended up joining the Xerox PARC brains trust that gave the world the PC, the graphical user interface (GUI), laser printing and the Ethernet.Ellenby was one of the team working on the Alto personal computer – which inspired Steve Jobs to rework Apple around the GUI – and also worked on the Alto II, which was a PC designed to be much cheaper to manufacture. While at PARC, he also worked on portable computers but had the idea for a clamshell laptop that would replace the portable model.



He and some PARC friends left the company in 1979 to set up GRiD Systems Corporation. The company initially designed portable computers but saw little success, thanks to competing companies like Osbourne and Compaq selling similar kit for less.But in 1985, the firm released the GRiD Compass 1101, an $8,150 laptop in a form factor that's now commonplace. The laptop ran an Intel 8086 processor, a 320×240-pixel electroluminescent display, had 340 kilobytes of magnetic bubble memory, and a 1,200 bit/s modem, all contained in a mag-alloy case.The Compass wasn't a perfect machine by any means. The power requirements were so high that the device had to be plugged in for use but, despite the high price, it was a hit among the well-heeled or government-funded buyer.Despite the high price, and the weight of the 5-kg (11-lb) machine, it sold very well in the military and government. NASA used the Compass as a backup computer for the space shuttle and one of the firm's laptops reportedly survived the 1986 Challenger disaster in working order.Hollywood also loved the futuristic look of the device – it was featured in numerous films, including the 1986 classic Aliens, where two Compass machines controlled the robotic sentry guns that briefly held off the savage beasts.Ellenby sold the company in 1988 to Tandy and started a portable tablet business, but never enjoyed the success he found with GRiD. He also founded GeoVector, an early pioneer in virtual reality systems.


He made his home in San Francisco and remained a tech tinkerer until his death earlier this month. He is survived by two sons and a grandchild. Intel's stop-gap Kaby Lake processors – aka the seventh-generation Core family – will ship in laptops starting from September, we're told.According to Chipzilla, the first wave of the new Cores will appear in 10mm-thick notebooks and two-in-one convertible tablets aimed at small businesses and normal folk. The CPUs will consume 4.5W to 15W, depending on the model, and go on sale in more than 100 laptop designs by the end-of-year shopping rush. They'll include Intel's usual integrated HD Graphics chipset.Come January, enterprise PCs, workstations and beefier notebooks and desktop systems will ship with the chips, some with Intel's Iris graphics chipset. Presumably that's when you'll be able to get your hands on individual processors to build you own rigs by hand.The processors are powered by the 14nm Kaby Lake microarchitecture. This is the Skylake microarchitecture – as used in 2015's 14nm sixth-generation Core family – with some tweaks and optimizations.Intel inserted Kaby Lake into its lineup after its tick-tock product cycle missed a beat. Usually, Intel shrinks a microarchitecture to a new process size and ships it (that's the tick), and later rolls out a new microarchitecture using that process size (that's the tock). There's a 12 to 18-month gap between the ticks and tocks.



The latest tock was the introduction of Skylake on 14nm. The next tick was going to be Cannonlake, aka Skylake on 10nm, but that was delayed to 2017 because Intel couldn't perfect the shrink in time. So in the meantime, we've been lumped with Kaby Lake, an optimized Skylake redux on 14nm. (Intel has now given up on the tick-tock approach, for what it's worth.)What do we mean by optimized? Well, for one thing, better physical manufacturing techniques. Intel says it has improved the fin design and the channel strain in its FinFETs. The shape of the fin has a massive effect on the operation of the transistor, potentially reducing the leakage current significantly. Increasing the strain in the channel increases performance and lowers power consumption by cutting the atomic forces that interfere with electron flow.
Intel's seventh-generation dual-core die with builtin GPU ... Click to enlarge any pics
According to Intel, these fabrication improvements from Skylake to Kaby Lake, plus some CPU enhancements, give seventh-generation Cores up to a 12 per cent performance boost over the sixth-generation – well, when running the SYSmark benchmark on a seventh-gen 15W 3.5GHz Core i7 7500U versus a sixth-gen 15W 3.1GHz Core i7 6500U. When running the WebXPRT benchmark on the same chips, the performance boost from Skylake to Kaby Lake can reach up to 19 per cent, we're told.
Generation debate ... How 2015 and 2016's Cores compare (Source: Intel)
So in other words, changing up from a 2015 Core i7 to the equivalent 2016 part can speed up web browsing by up to a fifth, in theory. Chipzilla also says its seventh-generation Cores are more power friendly when streaming vids: the new Core i7 7500U can play 4K VP9 video for seven hours on a 66Whr battery that a sixth-gen Core i7 6500U chomps through in just four hours when streaming the same material.


Message déposé le 29.06.2017 à 06:24 - Commentaires (2)


Battery for HP HSTNN-CB0X

From our Continuum hands-on – here – we concluded that some virtualization is mandatory to get any work done, given the dearth of UWP apps. Continuum also needs to mature to support overlapping windows, we found. Selling a computer with pre-installed software is not an unfair commercial practice and there is no requirement to list the costs of the software, the Court of Justice of the European Union (CJEU) has ruled.The CJEU, Europe's highest court, was ruling on a case between Vincent Deroo-Blanquart and Sony. Deroo-Blanquart bought a Sony laptop in 2008, but refused to subscribe to the operating system's end-user licence agreement, arguing that he wanted to be reimbursed for the cost of the pre-installed software.Sony refused to do so, but offered a refund if Deroo-Blanquart returned the computer.Deroo-Blanquart brought legal proceedings against Sony, looking for €450 for the pre-installed software, and €2,500 in damages.The French Cour de cassation, which is hearing the case on appeal, had asked the CJEU whether supplying a computer with pre-installed software, with no option to choose a version without it, constitutes an unfair commercial practice. It also asked whether it is a misleading commercial practice to fail to indicate the price of each item of software.


The CJEU said that it is not necessarily an unfair commercial practice to bundle computers with pre-installed software, so long as "such an offer is not contrary to the requirements of professional diligence and does not distort the economic behaviour of consumers".The national court will have to decide whether, when a consumer has been informed before the sale "that the model of computer is not marketed without pre-installed software and that he is therefore free to choose another model of computer, of another brand, with similar technical specifications and sold without software, the ability of that consumer to make an informed transactional decision was appreciably impaired," the CJEU said.As to whether Sony should have given individual pricing for the software, the CJEU said this was not necessary."A commercial practice is to be regarded as misleading if it omits material information that the average consumer needs in order to make an informed transactional decision," the CJEU said.Failure to indicate the price of each item of software is not "likely to cause the average consumer to make a transactional decision that he would not have taken otherwise", the court said, and so does not constitute a misleading commercial practice, it said.



It's been a number of years since an Apple PR staffer secretly admitted to one of our reporters that The Register was on a blacklist.We also learned that they were under strict instructions never to admit to the blacklist – presumably because it would make one of the world's largest companies look, you know, pathetically petty.And so, for a decade now, we have played a game where we ask Apple's US office for review products or to attend launches or go to events and they respond with silly expressions like "I'm sorry, but we cannot accommodate your request" or "all the seats are taken" or the current favorite "you are on our media waitlist."Back in June, I decided it was time to stop playing the game. Or, more accurately, play a different, more persistent game in which we encourage Apple to either get over itself and kill our blacklisting or simply admit it and stop the pretense.


Amid the Kaby Lake noise this week, Intel slipped out six processors, codenamed Apollo Lake, for cheapo netbooks, tablet-laptop mutants and small PC boxes.These are 14nm low-power system-on-chips that use the x86 Goldmont architecture, and are branded Pentiums and Celerons.In April, Intel axed its Goldmont-based Broxton Atoms that were due to go into smartphones, and separately canned the Goldmont-powered Willow Trail Atom line that was aimed at tablets – but it allowed the netbook-friendly Apollo Lake family to live on.The Pentium J4205, Celeron J3455 and Celeron J3355 are aimed at desktops, while the Pentium N4200, Celeron N3450 and Celeron N3350 are aimed at slabtops and netbooks.All of them have 2MB of cache, six PCIe 2 lanes, 12 to 18 GPU execution units depending on the model, LPDDR3 and LPDDR4 interfaces, and hardware decoding for H.264, HEVC, VP9, VC-1 and WMV9. The SoCs also have the usual builtin USB 2 and 3 controller, SATA ports, and so on.The kicker really is the included VP9 and HEVC/H.265 acceleration, allowing your battery-reliant device to stream high-def video from YouTube et al for longer before your charge runs out.Intel has had to down-clock its Apollo Lake CPU cores from the previous generation Braswell, also 14nm, to keep the power usage at a sensible level while integrating ninth-generation HD Graphics, the beefier video decoding, and other bits and pieces. Apollo Lake's max power consumption is 10W versus the 6.5W by Braswell, which uses eighth-gen HD Graphics.



To make up for this reduction in frequency – down from the Braswell's 1.6GHz base – Chipzilla has had to pack various optimizations into the Goldmont architecture. According to SYSmark 2014 benchmark figures seen by Anandtech, the Apollo Lake N4200 is 30 per cent faster than the top-end Braswell N3710 in terms of CPU performance, and 45 per cent faster in terms of GPU performance. Given that there's a decent improvement, Goldmont is obviously doing something right to offset the drop in clock speed.Our sister site The Next Platform has just published loads of interesting details on 64-bit ARMv8-compatible desktop, laptop and server processors designed by Chinese upstart Phytium.The first engineering samples for three 28nm CPUs – the Earth architecture FT-1500A/4 and the FT-1500A/16 and the Mars architecture FT-2000/64 – are back from TSMC's fab and were seen running Kylin Linux at California's Hot Chips conference last week. China's Google Baidu is among organizations testing them. We're probably going to see this in volume production in the final quarter of the year, or shortly after.


Message déposé le 27.06.2017 à 11:36 - Commentaires (0)


Battery for Lenovo Thinkpad R61

We all knew it was coming. In a conference call with investment analysts in April, Qualcomm CEO Steven Mollenkopf said he was "assuming" that a major customer – cough, cough, Apple – would use a second supplier. And in July, Intel CEO Brian Krzanich said he was "concerned about getting the leading-edge momentum going for us with the 7360" – that's the XMM 7360 modem that launched in 2015.And true enough, the XMM 7360 has turned up in some iPhone 7 and 7 Plus handsets. There's a catch: this chip doesn't support CDMA networks. So if you buy an Intel-modem phone, and you want to switch to a CDMA network, such as Sprint or Verizon in the US, you'll be out of luck. Qualcomm's X12 radio modems support CDMA so iPhones using those chips will work universally.Luckily, there's a handy guide on Apple's website listing the two variants of the iPhone 7/7 Plus. The A1660/A1661 works with GSM and CDMA networks, sports a Qualcomm MDM9645M X12 modem chipset, and works with Verizon and Sprint in the US. The A1778/A1784 supports GSM, sports an Intel modem chipset, and works with AT&T and T-Mobile US in America.


What the Apple website doesn't mention is that if you carrier unlock an A1660/A1661, you'll be able to use it on AT&T and T-Mobile US because the Qualcomm modem inside will support those networks. But if you carrier unlock an A1778/A1784, you won't be able to use it on CDMA networks.Basically, if you want a phone that works everywhere, get the A1660/A1661. If in doubt, check the model number against the aforementioned webpage for carrier compatibility. For what it's worth, in the UK, Apple will sell you an A1778/A1784 that supports 3, EE, O2 and Vodafone.Intel isn't insane for leaving out CDMA support, by the way: the standard is dying, and Qualcomm owns a load of CDMA patents, so Chipzilla decided to skip it.To further complicate things, potentially, Apple can switch out Intel's XMM 7360 in its GSM-only A1778/A1784 for the tried-and-tested Qualcomm X12 but use firmware to limit the phone to non-CDMA networks. This could happen if something goes wrong with the Intel supply – such as if the XMM 7360 isn't up to the X12's performance.One final thought: the new iPhone 7 and 7 Plus won't support the expensive AWS-3 radio bands, aka LTE band 66, which were cleared to make way for greater mobile broadband coverage in the US.



Episode 11 So I'm in the office by myself while the PFY is out doing... something... I guess... when one of our atypical difficult users comes in."Just one question," he starts, interrupting the thought I started when he walked in on potential loopholes in the gun laws. "My browser has an icon which is red.""What's the icon?" I ask, feigning... well everything. Interest, professionalism, the will to live, you name it.There are three very broad categories of user in my vast experience:a. People who think they know what they're doing but realise they don't - and eventually admit it,
and b. People who will never admit they don't know what they're doing. Ever. Because they have a degree and are much smarter than you. And computers. And the people on The Chase. And everyone they socialise with.
The only people worse than a 2b is a 1b - People who don't know what they are doing but don't want to take any risks - who will come and ask you about EVERY BLOODY MESSAGE BOX, WINDOW, WARNING, UNUSUAL BROWSER PAGE, TASKBAR BALLOON, ETC that comes their way.


"Did you take a picture of it?" I ask, trying to buy myself some time to send a text message to the PFY telling him the Swedish Volleyball Team is in Mission Control looking for him before making myself scarce..."Yes I did!" he says, showing me a blurred picture on his phone."That's just an icon to tell you your browser needs updating," I say. “Nothing to be worried about at all.""Well yes, but the internet has been running a bit slowly recently.""Nothing. When we update your browser it'll go away.""Oh. And when can you do that? I've got a meeting in 5 minutes so I'll be away from my desk for an hour or so.""Oh I'm sorry, I have some other installs that have become urgent," I lie."Hmmm, I'll just check the Helpdesk Queue and see if there's anything else urgent.""Oh, look," I say, pointing at the screen. “There’s about 100 urgent jobs stacked up in there.""That one's from 2008!" he gasps, almost discovering the secret of my outstanding urgent-job queue - Never, EVER close a job."Partly this is my own fault for isolating him from the update cycle as he did tend to go heavily 1b every time an automatic update was rolled out and his box told him it had rebooted to complete the install - Because it's probably a virus. Or a "hacker".


The other vexing thing about 1bs - and this guy in particular - is that he'll dash up to tell you that the Google picture has changed and "it's probably a website virus" yet he'll still spend his lunchtimes browsing an obscure hobby discussion board which is about 95 per cent zero-day exploits and 5 per cent content on his work desktop.I realise that it's probably time to update the image that gets flashed to his box every Monday and maybe verify that the scanning software that filters his file-sharing is up to date. Meantime, though, I just need him out of the office.“You say the internet was slow – was it faster or slower than your personal laptop?” I ask, putting a crowbar in the lid of Pandora’s Box and pushing real hard.I recall he once asked me to give his personal laptop a once-over to see if it needed more memory and I recall that the memory and cpu consumption was about 30 per cent browser toolbars, 30 per cent malware and 40 per cent virus scanners, all playing a massive game of Last Man Standing.He asked if we could plug it into our work network to do some updates because his home network seemed rather slow, but I didn’t want our mail gateway to implode from the influx of IPS warnings so accidentally nudged his machine out the office window that hadn’t been open about 30 seconds earlier.



The Cabinet Office is failing to coordinate the UK's government departments' efforts to protect their information according to a damning report by the National Audit Office.The NAO found that the Cabinet Office failed in its duty and ambition to coordinate and lead government departments’ efforts in protecting such information.The Cabinet Office has “tried to take a more strategic role in offering support and guidance to central government departments,” the NAO report found. “However, senior-level governance remains complex and unclear and, until recently, a wide array of central teams have been involved in information assurance and protecting information, sometimes offering overlapping and contradictory advice.”Reporting personal data breaches is chaotic, with different mechanisms making departmental comparisons meaningless. In addition, the Cabinet Office does not have access to robust expenditure and benefits data from departments, in part because they do not always collect or share such data. The Cabinet Office has recently collected some data on security costs, though it believes that actual costs are "several times" the reported figure of £300 million.As a result, NAO stated that GCHQ dealt with 200 “cyber national security incidents” per month in 2015, double the number of attacks it had addressed in 2014, though the result of these attacks has not been reported.The report certainly suggests that departments need to get their own houses in order before they start opening up access to even more of citizens' data, as per the porn-blocking Digital Economy Bill, with 8,995 data breaches in the 17 largest government departments in 2014-15.



Message déposé le 26.06.2017 à 07:46 - Commentaires (0)


Batterie pour Dell Latitude E6510

Alors que la fonctionnalité a été dévoilée pour tous les principaux navigateurs sur iOS et Android au mois de décembre de l’année dernière, maintenant, trois mois plus tard, elle est enfin disponible sur votre ordinateur de bureau.Elle fonctionne comme ceci. Disons que vous recherchez des « chats ». Après avoir trouvé une photo que vous aimez, tout ce que vous avez à faire est de cliquer dessus, et de cliquer sur l’étoile matérialisant la mise en favori de l’image. Dès lors, la photo sera ajoutée à vos collections. La prochaine fois que vous en avez besoin, il suffit de vous rendre sur google.com/save (cela fonctionne également sur mobile) et vous trouverez toutes vos images enregistrées afin d’y accéder très facilement.Comme vous l’imaginez, vous devez être connecté à un compte Google pour enregistrer les images afin d’y accéder depuis vos collections. Cette exigence peut également conduire la société à coupler cette fonctionnalité avec Collections, un service qui a été lancé pour Google+ plus tôt dans l’année, à une date ultérieure. Collections permet aux utilisateurs de consacrer une page Google+ au sujet de leur choix, et permet aux gens de le suivre, grâce à des vidéos, des photos, et d’autres types de contenus qui peuvent être ajoutés.


Google permet de marquer des images et les ajouter aux collections
« Par exemple, si votre jardin a besoin d’une petite replantation, il suffit d’aller à votre bureau, de rechercher une image et d’appuyer sur l’étoile pour ajouter vos potentielles nouvelles fleurs, vos buissons, ou même une piscine », a déclaré Mark Colbert, ingénieur logiciel chez Google Search, dans la publication sur le blog. « Quand vous êtes dans un magasin prêt à acheter, vous serez en mesure de récupérer vos images enregistrées sur votre smartphone et commencer à concevoir votre jardin ».Malheureusement, la fonctionnalité est disponible uniquement aux États-Unis, et l’on ne sait pas quand le géant de la recherche va la rendre disponible dans le monde entier.Alors que nous sommes à quelques heures du début de la conférence BUILD de Microsoft, la dernière rumeur à apparaître au sujet de la prochaine version Redstone de Windows 10 est centrée sur les cartes interactives qui feraient leur apparition dans centre de notifications et Cortana. L’information statique est censée être visible par une nouvelle interface utilisateur sous la forme de cartes, qui permettront d’afficher et de partager des informations entre Cortana et le centre de notifications, selon WinBeta.



Les nouvelles cartes devraient offrir une présentation plus propre que les affichages statiques actuellement utilisés par les deux services. Cortana et le centre de notifications vont partager un ensemble commun d’actions qui sont accessibles de plusieurs façons. Par conséquent, le centre de notifications et Cortana auront la possibilité de communiquer à travers ces cartes, et fournir une expérience plus personnalisée à l’utilisateur.D’autres applications pourraient également avoir accès à cette nouvelle fonctionnalité, afin de présenter des informations et des actions à l’utilisateur. Par exemple, WinBeta affirme que l’application Calendrier aurait la possibilité d’épingler des cartes de rappel pour des anniversaires dans le centre de notifications. Des fiches individuelles pour les réunions pourraient également être épinglées au centre de notifications, fournissant à l’utilisateur une indication visuelle s’il est possible de planifier une réunion.La publication poursuit en citant des sources anonymes qui prétendent que Microsoft expérimente des filtres dans le centre de notifications. Cela permettrait à l’utilisateur de choisir les notifications qui peuvent être vues dans le centre de notifications. Les notifications pourraient également être affichées en fonction des types d’applications, leur permettant d’être mieux organisées. Un bon exemple serait Facebook : toutes les notifications connexes seraient placées sous un en-tête spécifique. Ainsi, l’utilisateur pourrait filtrer le centre de notifications pour afficher seulement les notifications de l’application sociale.


La dernière rumeur provient d’une fuite interne, affirmant que la conception finale de l’interface des cartes pourrait changer ou non une partie ou tout de Windows 10. L’image obtenue dans la publication montre une carte représentant Foursquare, qui affiche plusieurs restaurants et leurs avis. Une autre carte est l’application Calendrier qui montre une réunion qui aura lieu à un moment précis. Une autre carte ressemble vraiment à une fenêtre de chat.La mise à jour Redstone est prévue d’être scindée en deux : Redstone 1 (RS1) qui arriverait au mois de juin, et Redstone 2 (RS2) qui serait disponible au cours du premier trimestre de l’année 2017. La RS1 devrait être révélée lors de la conférence BUILD ce jour, tandis que la RS2 devrait embarquer les caractéristiques qui ne seront pas présentes dans la première itération, et qui devrait arriver avec de nouveaux périphériques (Surface Pro 5 et Surface Book 2).Quoi qu’il en soit, je serais présent dans les locaux de Microsoft pour suivre la conférence BUILD, où l’on s’attend à avoir des informations sur Windows 10 Redstone.Comme prévu, le nouveau Chromebook 14 d’Acer peut être la combinaison parfaite entre des caractéristiques intéressantes, et un prix abordable, capable d’attirer les acheteurs d’ordinateurs portables Windows et Apple. Certes, la fidélité des consommateurs d’ordinateurs est généralement liée à autre chose que les fonctionnalités et les euros dépensés, mais un nombre suffisant d’éléments attractifs pourraient convaincre certaines personnes d’opter pour une autre plate-forme très attrayante. Si vous êtes prêt à tester quelque chose de nouveau, et que vous passez votre temps sur Chrome, le nouveau Acer pourrait vous faire de l’œil.



La nouvelle gamme Chromebook 14 d’Acer est maintenant disponible en précommande sur Amazon, et devrait arriver dans nos foyers à partir du mois d’avril. Malheureusement, ce devrait être le cas uniquement outre-Atlantique pour le moment.Pour ce qui est des spécifications, le Chromebook 14 a un écran IPS LCD de 14 pouces soit avec une résolution full HD (1 920 x 1 080 pixels) ou HD (1 366 x 768 pixels), et offre des angles de vision jusqu’à 170 degrés. Une webcam HD 720p (résolution 1 280 x 720 pixels) avec un microphone enregistre à la fois l’audio et la vidéo en HD, et s’avère être parfaite pour les selfies et la vidéoconférence.Le Chromebook 14 est le premier modèle d’Acer à avoir un châssis tout en aluminium, et le premier à avoir deux ports USB 3.1. Le châssis en aluminium a des coins arrondis et une finition brossée. Le Chromebook 14 est relativement léger, 1,55 kg, soit légèrement plus lourd que les modèles 11 pouces d’Acer. Non seulement il est léger, mais il est également assez mince, avec une épaisseur de seulement 1,7 cm — semblable au MacBook Air. La portabilité et la robustesse du Chromebook sont réellement intéressantes.



Message déposé le 26.06.2017 à 07:20 - Commentaires (0)


Akku für Apple A1079

Hürth (dpa) - Langsam rollt der vierrädrige Roboter über die zerklüftete Landschaft aus Geröll. Plötzlich hat er sich in einer leichten Vertiefung festgefahren. Minutenlang passiert gar nichts. Junge Männer tippen hektisch auf Computern herum, bis der Rover schließlich wieder losruckelt.Zehn Hochschul-Teams aus ganz Deutschland simulierten am Freitag in Hürth bei Köln die Erkundung eines fremden Planeten mit Robotern. Ein Jahr lang hatten die Teilnehmer Zeit, sich auf das sogenannte SpaceBot-Camp des Deutschen Zentrums für Luft- und Raumfahrt (DLR) vorzubereiten.Die Aufgaben sind anspruchsvoll: Der Roboter muss sich auf einer holprigen Planetenoberfläche orientieren, dort Gegenstände finden und greifen. Er muss einen Becher mit einer Bodenprobe zur Basisstation transportieren und einen Akku in einen Schacht stecken. Das alles soll der Roboter möglichst autonom machen, also ohne direkte Steuerung - zumal der Funkkontakt "zur Erde" verzögert ist und wie bei einer richtigen Weltraummission zwischendurch auch mal abbrechen kann."Das ist alles sehr schwierig", sagt Georg Heppner vom Team "Laurope" des Karlsruher FZI Forschungszentrums Informatik, dessen sechsbeiniger Roboter an eine grüne Heuschrecke erinnert. Wenn das Technikmonster an ein Hindernis stößt, kann es ein Bein heben, um darüberzusteigen. Unfassbare Datenmengen seien erforderlich, damit der Roboter solche Handlungen selbstständig ausführt, erklärt Heppner.


Der orangefarbene Roboter des Teams "Nimbro" der Uni Bonn ist mit zwei Greifarmen, acht Kameras und einem rotierenden 3D-Laserscanner ausgestattet. Das Wunderteil könne auch Türen öffnen, Treppen steigen und einen Kreis aussägen, erläutert der Teamleiter, Prof. Sven Behnke. Wenn die Technik hakt und der Rover nicht von alleine macht, was er soll, greifen Menschen aus der Ferne ein. Mit einer Spezialbrille können die Studenten die Perspektive des Roboters einnehmen und sehen dann das, was er sieht: Farbige Punkte, die unterschiedliche Geländehöhen kennzeichnen, und die Greifarme, die wie die eigenen Arme erscheinen.Das Bundeswirtschaftsministerium hat jedes der zehn Teams mit 50 000 Euro unterstützt. Ziel sei es, die Forschung im Bereich der Weltraumrobotik zu fördern, erläutert DLR-Projektleiter Thilo Kaupisch. Dass die in Hürth gezeigten Roboter eines Tages tatsächlich auf einem fremden Planeten zum Einsatz kommen, ist indes eher unwahrscheinlich. "Aber die Veranstaltung soll zeigen, dass in Deutschland die Fähigkeit da ist, sich an internationalen Erkundungsmissionen zu beteiligen."



Der Krypto-Messenger Signal für verschlüsselte Chats und Anrufe ist nun auch für Android verfügbar. Das kostenlose Open Source Programm ersetzt die bereits vorhandenen Messenger TextSecure und RedPhone. TextSecure wird beim nächsten installierten Update automatisch durch Signal ersetzt, RedPhone wird nach Angaben der Entwickler nicht mehr als unabhängige App weitergeführt.Signal verwendet die Telefonnummer des Nutzers und verzichtet auf ein eigenes Log-in mit Benutzername und Passwort. Alle mit Hilfe der App übertragenen Textnachrichten und Anrufe sind Ende-zu-Ende-verschlüsselt. Das vom nichtkommerziellen Unternehmen Open Whisper Systems herausgegebene Programm wird nach eigenen Angaben auch von Whistleblower Edward Snowden benutzt. Für Apples iOS ist die App schon länger verfügbar.Gekaufte Games, Items und gespeicherte Spielfortschritte machen einen Account bei der Spiele-Plattform Steam unter Umständen sehr wertvoll. Das alles können Hacker via Phishing oder mit Hilfe von Trojanern zunichtemachen, wenn sie ans Passwort für das Konto gelangen, warnt der Verband der Internetwirtschaft (Eco). Nutzer sollten deshalb die Kontosicherheit erhöhen, indem sie einen zweiten Faktor zur Authentifizierung beim Einloggen aktivieren.


Diese Möglichkeit bietet die Plattform in den Einstellungen unter "Account/Steam-Guard-Accountsicherheit verwalten". Dort kann man einstellen, dass man zum Einloggen einen zusätzlichen Code per E-Mail geschickt bekommt oder diesen mit Hilfe der Steam-App auf seinem Smartphone oder Tablet erzeugt. Nur wenn Code und Passwort richtig eingegeben werden, bekommt man Zugriff auf den Account.Abstürzen und Fehlermeldungen beim neuen Tablet Surface Pro 4 und beim neuen Convertible-Notebook Surface Book begegnet Microsoft mit aktualisierter Firmware. Die Updates sollen nicht nur die Systemstabilität verbessern, sondern auch Probleme mit dem Grafiktreiber beheben, die sich den Angaben zufolge teils in Bildschirmflackern geäußert hatten. Das Surface Book ist in Deutschland noch nicht erhältlich.Mobile LTE-Router sind nicht größer und schwerer als ein Smartphone. Dank integriertem Akku können sie überall ein WLAN-Netz aufspannen und so beliebige Geräte ins Internet bringen.Beim Kauf eines solchen Routers sollten Verbraucher auf die Gerätekategorie (Cat) achten, berichtet das "c't"-Magazin (Ausgabe 25/15). Wer etwa auf sehr hohe Datendurchsatzraten angewiesen ist, wählt laut den Experten am besten einen Cat-6-Router, der im Gegensatz zu einem Cat-4-Gerät auch das 2600-MHz-LTE-Frequenzband unterstützt: Das übliche 1800-MHz-Band sei bereits gut ausgelastet.


Cat-5 ist den Angaben zufolge bisher weltweit kaum bei Mobilgeräten gebräuchlich, weil dafür vier Antennen und mehr Strom erforderlich sind. Beides bieten nur stationäre Router.Die Telekom will künftig verstärkt auf die integrierte SIM-Karte (eSIM) setzen. Statt einer auswechselbaren Chipkarte, mit deren Hilfe sich Mobilfunkgeräte seit rund 26 Jahren ins Netz einbuchen, kommt bei der eSIM ein fest eingebautes Modul zum Einsatz. Es kann von außerhalb programmiert werden, damit man etwa beim Anbieterwechsel nicht gleich eine neue SIM-Karte braucht. Laut der Telekom können mit der neuen Technologie auch einfacher mehrere Geräte unter einem Mobilfunkvertrag betrieben werden.Aktuell arbeiten Anbieter und der Mobilfunkverband GSMA an einem offenen Standard für die eSIM. Gegen Ende 2016 sollen erste Geräte auf den Markt kommen. Die SIM-Karte aus Plastik wird aber damit nicht sofort ausrangiert. In der Anfangsphase dürften laut Telekom Hybridlösungen mit eSIM und klassischer SIM-Karte zum Einsatz kommen. In rund zehn Jahren soll der Übergang abgeschlossen sein.



Berlin (dpa/tmn) - Jeder Akku erreicht eines Tages die Grenzen seiner optimalen Funktion. Die Hersteller geben in der Regel an, wie viele sogenannte Ladezyklen ihre Energiespeicher durchhalten.Apple gibt die Haltbarkeit der Akkus seiner neueren MacBook-Pro- und MacBook-Air-Modelle etwa mit rund 1000 vollständigen Entladungen und anschließendem Wiederaufladen an. Ältere Modelle kommen nur auf rund 300 bis 500 Zyklen. Wer nun wissen will, wie viele Ladezyklen noch übrig sind, kann das im Systembericht des Macs nachlesen. So lässt sich herausfinden, ob der Akku am Ende seiner Laufzeit angekommen ist, oder ob er eventuell einen Defekt hat, der vom Hersteller oder Händler behoben werden kann.Der Systembericht wird über einen Klick auf den Apfel oben links in der Menüleiste aufgerufen. Dort wird auf "Über diesen Mac" geklickt, anschließend auf "Weitere Informationen" und "Systembericht". Hier findet sich die Information im Unterpunkt "Stromversorgung", gemeinsam mit weiteren Informationen über Zustand und Kapazität des Energiespeichers.


Message déposé le 26.06.2017 à 06:55 - Commentaires (0)


Battery for Compaq 233343-001

Impala is an incubatory native analytic database on Apache Hadoop that runs in the cloud. It claims Impala offers elastic scalability, better flexibility, and direct Amazon S3 query-ability that are unavailable from traditionally-architected systems, such as Redshift, Amazon’s analytics database.Using TPC-DS benchmark queries Cloudera found Impala is over 200 per cent less costly and over 10x faster on S3 compared to a general purpose tuned Redshift. It also claimed Impala is eight per cent less costly and 90 per cent faster on S3 compared to a pre-tuned Redshift for specific fixed reporting queries. Something for the Weekend, Sir? The man on stage is baffled. It was his big moment, a chance to show off his company’s proficiency and expertise, but now he’s being made to look useless.Two huge screens on either side of the stage are supposed to be displaying his presentation. They remain resolutely blank.A 200-strong audience of paying conference attendees stare on impassively in disinterested silence.There used to be a time when an occasion like this would cause spectators to squirm in empathetic embarrassment, the shuffling of audience arses in their seats helping distract general attention from the presenter’s temporary discomfort.


Not this time. If anything, the conference room gets quieter. Fed on a diet of reality TV, the audience wastes not a second thinking about what it might be like to share the unfortunate man’s predicament.No, they want to watch what he is going to do next. Some members of the audience have even begun to lean forward for a better view of his emotional discomfort. Will he get angry? Will he burst into tears?The poor sod on stage is at a loss. While his grumbling colleagues back at the office were forced to work for their living, he spent the best part of the previous day dicking around in Powerpoint. Now that he’s in a position to demonstrate very publicly that this was not a misuse of his employer’s money, the Slide Transition Gods have thrown a spanner in his bullet points.Moments earlier, he had been observed head held high and striding confidently towards the podium where the AV team had already connected his laptop. Now with rapidly paling face, his eyes wide and his teeth bared in a terrified smile, the former strider was visibly shrivelling into a kind of besuited Gollum.



Taking a deep breath, the presenter summons all the technical skills acquired over his years of training and experience to diagnose the problem.He taps some keys on his laptop. He waggles the video cable. He pokes the trackpad. He rattles the spacebar like Humphrey Bogart trying to get a line to the operator.He looks up and mumbles something in a squeaky voice. One of the words sounded a bit like “help”.His call – or strictly speaking, a squeak – for help is eventually answered by a 5ft hobgoblin from the venue’s AV team.We know he’s from the AV team because he’s wearing a black polo shirt and a wireless earpiece. Either that or a lost polo player with a hearing aid has stumbled into the conference and thinks his horse might be hiding on stage among the autoprompts.Ah no, it’s definitely an AV man because he is applying recognisable technical skills to the situation: after some thoughtful chin-rubbing, he is now hammering on the laptop’s spacebar and waggling the cables.A joker at the back of the audience shouts: “Have you tried turning it off and back on again?”Charitable laughter followed by even deeper silence. Did the AV man hear that? Will he oblige? The suspense is broken 30 seconds later as we hear the familiar tones of the Windows startup bongs. Yes he did. Still nothing on the screens, though.


Still, it’s a welcome break for the audience, giving us an opportunity to try connecting to the venue’s Wi-Fi again. We’ve been trying all morning to no avail.The event hosts proudly gave us the SSID and password but when we try to connect, it insists on asking for a username too. No complaints about this little extra layer of security but when I ask any of the venue staff for a Wi-Fi username, they stare at me as if I’m speaking a foreign language.Actually, from their point of view, I am speaking a foreign language: they’re all Polish. But I don’t recall this being a documented root cause of Wi-Fi issues at central London conference venues.I’m reminded of a recent smartphone app launch to which I was invited, only to discover upon my arrival that nobody there knew how I might connect to the internet. Worse, they seemed utterly taken by surprise that anyone might need this.The event was held in the depths of a hotel beyond the reaches of any phone signal, so the lack of any type of cable-free internet access somewhat took the shine of the ability to do anything with the app, other than to admire its splash screen. Hmm, splashy.Back at the conference, another tech hobgoblin has accompanied the first on-stage, soon to be joined by a third.All three are stroking their chins, looking pensively at the presenter’s stubborn laptop. At one point, they stop and look at each other, and for a thrilling few seconds I think they are about to stroke each other’s chins.


Hobgoblin 2 trots off-stage and returns with a MacBook, plugs it in and – hey presto – the massive screens spring into life, revealing all the kind of crap that hobgoblins tend to keep on their Mac Desktops.Very audibly, he accuses the presenter: “It’s your laptop that’s the problem!”The accused does not take this well. “My laptop is fine!” he squeaks. “It was working earlier!”Defusing what we had hoped might develop into fisticuffs, one of the event hosts belatedly grabs a mic and suggests we take an early tea-break and watch the presentation afterwards.Foolishly, he suggests we use this time to check our emails. Members of the audience begin shouting out that they can’t because no-one can access the Wi-Fi without a username. It is turning ugly.Near the entrance to the tea-break area, a passing cleaner carrying a mop and bucket is able to inform me of the Wi-Fi username, and I pass it on through the crowd.Half an hour later, emails checked and refreshed with tea, we sit down to watch a much-relieved but still quite sweaty man on-stage deliver his presentation from his restarted Windows 10 laptop.“Thank you for attending Data Communications for the Future 2016. I have a few slides to show you…”Analysis Love rat Apple two-times its long-suffering squeeze Qualcomm with dishy Intel – and it's going to keep the baby but only let some of us see it.



Over a cheap bottle of chardonnay one dark night in Cupertino, Intel wooed Apple with flimsy promises. The pair felt a connection (around the 1.9GHz mark) after the iPhone maker opened up about its long-distance relationship with San Diego's Qualcomm."I don't want to get too tied down," Apple sighed. "I'm not ready for the commitment."Apple's heart melted like a Galaxy Note 7 in a child's hand. Now, thought Intel, if only it could scheme its way further into the MacBook maker's life to wreck any plans to move from x86 to ARM.I just can't understand why my screenwriting career hasn't taken off.A peek inside the iPhone 7 has confirmed that Apple is using a mix of Intel and Qualcomm radio modems in the new handsets. Typically, Qualcomm provides these communications chips, which are used to connect the device wirelessly to the cellular network for calls, texts and mobile internet. Apple hates being tied down to a single component source, so it decided to give Intel a shot.There's also the interesting dynamic of Qualcomm providing Snapdragon system-on-chips and modems to Apple's arch-rival Samsung. Couple that with Intel's desire to get its radio modem business a slice of the massive mobile world – while Intel's traditional PC world diminishes – and that Apple relies on Intel x86 processors for its desktop and laptop products, you can see why Apple let Intel in through the backdoor to its iPhone production.


Message déposé le 24.06.2017 à 08:08 - Commentaires (0)


Battery for ASUS G75

On Thursday, the 30-year-old marched into the Apple store located in Toison d'Or shopping Centre in Dijon carrying the steel ball in a gloved hand. He was accompanied by someone videoing the scene, which suggests premeditation.He then proceeded to pick up iPhones, place them flat on the counter, and smash their screens in using the ball.While doing so he rails against the staff, claiming that he had bought a shiny new laptop from them that had failed and he wanted his money back.While this was going on, staff stood around doing nothing and keeping clear. He then moved on to some MacBooks and carried on his smashing activities before a security guard finally turned up and escorted him from the store.
Once outside, more security guards appeared and surrounded the man. After a full and frank exchange of views, the attacker put his hands around the throat of one of the guards and the others piled in to restrain him.The man has since been detained by police and is currently facing criminal charges. Dijon prosecutor Marie-Christine Tarrare said that the man had caused €50,000 worth of damage to the shop's stock.


Getting stiffed on a new purchase is never fun, but the gentleman involved should have taken a lead from we rosbifs and shown some sang froid. A disgraced former Territorial Army sergeant convicted of making indecent images of children has pleaded guilty to using private browsing mode on his iPhone and iPad.Paul Martin McGarrity, a 56-year-old of Mirabel House, Wandsworth Bridge Road, Fulham, appeared at Hammersmith Magistrates’ Court this morning to be sentenced, following his earlier plea at the same court.The former Royal Signals SNCO was ordered “not to use any device capable of accessing the internet unless it has the capacity to retain and display the history of internet use and he makes such device available on request to a police officer”, as part of a sexual offences prevention order (SOPO) made by a court martial at Bulford Camp in 2011.The SOPO was made after McGarrity, who was on full-time attachment to a regular Royal Signals unit, pleaded guilty to two counts of making an indecent photograph of a child. The order also said he "cannot take any photograph of a child under 18 unless authorised, expressed or implied, by a parent or legal guardian."



He pleaded guilty to breaching the SOPO, contrary to sections 103I(1) and (3) of the Sexual Offences Act 2003, in August. Sentencing was then adjourned for pre-sentence reports to be completed.According to the Crown at today's hearing, police were empowered to make spot checks on McGarrity to check his compliance with the SOPO. When they arrived unannounced at his flat on 19 February this year, they found him using a laptop and an iPad. McGarrity agreed to allow the police to inspect the devices “and within a couple of minutes it was noticed” that he was using the iPad in private browsing mode.Police took away the iPad, his iPhone and his laptop. The iPhone was found to also have been used in private browsing mode and the history had been “switched off”, the court heard.Three search capabilities were said to have been present on his devices: Safari, Chrome and DuckDuckGo, the anonymous search engine. DuckDuckGo, a web-based search engine that does not track your internet searches, is available as an iOS app.


Police interviewed McGarrity and it was said that he “didn't understand what was meant by private browsing”. He maintained that he hadn't altered the device settings, though the court heard this morning that he was warned in 2014 about using private browsing.Shaven-headed McGarrity, wearing a plain grey t-shirt with a small Union Flag at the back of the neck and blue Adidas tracksuit bottoms, leaned on the rail of the dock as his solicitor made his plea in mitigation to the judge.His solicitor, from London firm Dalton Holmes Gray – who refused to confirm his name after the hearing – said in McGarrity's defence that he “suffered from clinical depression” and was undergoing cognitive behavioural therapy, as well as receiving employment support allowance."No substantive offending has resulted from the breach," asserted McGarrity's solicitor.District Judge Susan Bayne, sitting alone, adjourned the sentencing hearing to a later date. Indicating that she wanted to make a new sexual harm prevention order against McGarrity, she said the court had insufficient information to do so this morning. A disgraced former Territorial Army sergeant convicted of making indecent images of children has pleaded guilty to using private browsing mode on his iPhone and iPad.Paul Martin McGarrity, a 56-year-old of Mirabel House, Wandsworth Bridge Road, Fulham, appeared at Hammersmith Magistrates’ Court this morning to be sentenced, following his earlier plea at the same court.



The former Royal Signals SNCO was ordered “not to use any device capable of accessing the internet unless it has the capacity to retain and display the history of internet use and he makes such device available on request to a police officer”, as part of a sexual offences prevention order (SOPO) made by a court martial at Bulford Camp in 2011.The SOPO was made after McGarrity, who was on full-time attachment to a regular Royal Signals unit, pleaded guilty to two counts of making an indecent photograph of a child. The order also said he "cannot take any photograph of a child under 18 unless authorised, expressed or implied, by a parent or legal guardian."He pleaded guilty to breaching the SOPO, contrary to sections 103I(1) and (3) of the Sexual Offences Act 2003, in August. Sentencing was then adjourned for pre-sentence reports to be completed.According to the Crown at today's hearing, police were empowered to make spot checks on McGarrity to check his compliance with the SOPO. When they arrived unannounced at his flat on 19 February this year, they found him using a laptop and an iPad. McGarrity agreed to allow the police to inspect the devices “and within a couple of minutes it was noticed” that he was using the iPad in private browsing mode.


Message déposé le 23.06.2017 à 07:39 - Commentaires (0)


Battery for Acer Aspire 5820T

One of customer got in touch to report that BT customers are currently being locked into their BT Yahoo email service.A recent screengrab of a customer attempting to use this function seen by The Register reads: “Sorry the delete feature is currently unavailable. This feature will become available by the end of September."The customer said BT/Yahoo! had also made it impossible for BT customers to configure the forwarding of emails to a third party address from their BT Yahoo addresses.He said: "BT is being about as communicative as Trappist monks about this."He added: "BT refuse to acknowledge any contractual responsibilities to customers with regard to email as they see email as a freebie add-on to the broadband service."Other customers have also complained on BT's forum. One said: "Help! I have tried to delete email sub accounts but unable to do so. Any help and or advice will be greatly appreciated."Another complained: "It's October BTYahoo get it sorted or did you mean September 2020?"Apparently these problems also affect customers who have migrated to the new BTMail email provider Critical Path/Openwave.


A BT spokesman told The Register: “We apologise to customers who have been unable to delete their Yahoo! account. We are working quickly to sort this out and expect to have this fixed soon.” US trade watchdog the FTC has terminated second-hand electronics reseller Laptop & Desktop Repair in Sparks, Nevada – after the biz shafted people out of millions of dollars.The company, operating under such names as cashforiphones.com, cashforlaptops.com, ecyclebest.com, smartphonetraders.com and sell-your-cell.com, offered online quotes for used smartphones and laptops.Once the quote had been calculated, people sent in their hardware for assessment and were given a much lower revised quote – typically between 3 and 10 per cent of the original amount offered.They had three to five days to request that their hardware be returned, but the FTC found that the company seldom answered its phones and was closed on weekends, even though the firm counted Saturdays and Sundays in its time limits."This is a classic case of bait-and-switch updated for the 21st century," said Jessica Rich, director of the FTC's Bureau of Consumer Protection."The defendants in this case lure consumers with false promises of generous payments, then hold consumers hostage once they have mailed their devices to the company."After an investigation by the FTC and the US state of Georgia, the biz has now been shut down and had its assets seized. The FTC said it had received thousands of complaints about the firm, which kind of makes you wonder what took them so long.



A pair of cybercriminals responsible for laundering millions of pounds stolen using a banking trojan have been sentenced to a combined total of 12 years in prison.Pavel Gincota, 32, and Ion Turcan, 35, are Moldovan nationals with Romanian citizenship. The duo made over £2.5m in criminal profits using the banking trojan Dridex, the National Crime Agency and London's Metropolitan Police Service revealed.The pair were charged with conspiracy to possess false identification and conspiracy to launder money, while Gincota was also charged with a separate money laundering offence in relation to a cyber fraud in Germany in 2012, in which the victim lost €25,000.Gincota and Turcan pleaded guilty to all of the charges against them and were sentenced yesterday at the Old Bailey to five years and eight months and seven years respectively.Over two years the pair “funded a luxury lifestyle” with their ill-gotten gains, garnered from more than 220 bank accounts which they had accessed after infecting their victims' machines.According to Court News UK (behind paywall), the investigation into the pair began in June 2015 "after more than half a million pounds was stolen from a medical research company and laundered through a series of Barclays accounts".


They were reportedly already under investigation by the National Crime Agency when they were arrested by the Met in February 2015 for being in possession of multiple false identity documents. During a search of their home in Yiewsley, West Drayton, the cops seized further fraudulent documents and several electronic devices.Forensic examination of these devices by the NCA's National Cyber Crime Unit (NCCU) confirmed that a laptop belonging to Gincota had been used to control the bank accounts through which the money was laundered.Steve Brown, senior investigating officer at the NCCU, said: “Pavel Gincota and Ion Turcan were serial money launderers who processed millions of pounds worth of stolen money through hundreds of bank accounts to fund their lifestyles.“Those involved in the most serious types of organised crime depend on the services provided by money launderers like Gincota and Turcan to hide their criminal profits."He continued: “The NCA will continue to work closely with our partners to prevent organised criminals from accessing the proceeds of their crimes and to bring them to justice.”


Google today announced new phones, VR kit and home gadgetry. But it didn't announce a tablet. And nobody cared.We've known for ages that tablet sales are declining. The most recent tablet sales data we've covered has the market at about 150m units a year. Apple has a quarter of the market and Samsung has about 15 per cent. Vendors in third through fifth place – Lenovo, Huawei and Amazon – won't sell ten million units a year.The tablet market's sliding even faster than the PC market – by about 12 per cent a year compared to five per cent for PCs.We can also see that it takes more and more effort to get a tablet off the shelf: Apple has teamed with Deloitte to point out how an iPad might make sense at work, having already allied itself with IBM. Microsoft, meanwhile, has bundled training with its Surface-as-a-service pay-by-the-month plan for its hybrid laptop/fondleslab Surface products. Those hybrids, by the way, are considered the sole bright spot in the PC market.



And now Google's act of omission shows us that the company's assault on our personal space does not include a frontline role for a tablet computer.Which is not to say that tablets are doomed. They are clearly very handy devices in many applications. But the lack of a Google tab clearly shows us the fondleslab's not a core component of the evolving connected home. And that their omission won't be mourned. Roundtable On the afternoon of Oct 12, in central London, we’ll be gathering a select group of senior IT leaders together to discuss the changing nature of end user computing.We'll kic off by exploring the digital workplace of the future and the likely shift from devices to users and infrastructure. We’ll touch on the realities of making the shift happen - not just the technology to create a modern and open environment, but also how to manage all the stakeholders and budgets.Fundamentally we'll explore how the increasingly heterogeneous world of multiple operating systems, devices and clouds are changing the way we think about end user computing.It promises to be both a lively and useful discussion. If you'd like to join us, please register your interest here and we'll be in touch to confirm your attendance.A French man has been charged after he stormed into an Apple store and smashed up iPhones and MacBooks using a metal ball that is more commonly used for the traditional game of pétanque.


Message déposé le 23.06.2017 à 07:25 - Commentaires (0)


Battery for SONY VGP-BPS21

The problem was that it had got to the point where he and his team were spending hours listening to stories from users and managers within the business justifying why they, or even their whole department, should be an exception. Some were adamant that the latest Apple MacBook, Microsoft Surface or some other clever convertible was the only thing that would solve their productivity needs.Others said it was essential to have an iPad with all the accessories, which would meet all of their requirements - though of course they would have to hang onto their Windows laptop “just in case”.Add to this the usual sob stories about how 18-month-old laptops really had to be replaced because they didn’t support the latest Wi-Fi standard, only had 4GB of memory, had a disk rather than an SSD installed, etc, and the process was getting wearisome. And with IT in control of the equipment budget, and users not giving up easily when told they couldn’t have what they wanted (even though it would cost twice what was in the plan), there was no escaping the wrangling.Fortunately, the IT department had been quietly investing behind the scenes in a VDI and digital workspace management environment.It hadn’t taken much working out that most employees were almost completely desk-based; even so-called "mobile" users were actually more "nomadic" in their working patterns - they were usually sitting on a company LAN in one office or another, or on their home Wi-Fi network.


This opened the door to switching many of them to server-hosted virtual desktops, and where this wouldn’t work (for genuine connectivity reasons) you could still centralise and "stream" a lot of what they needed. The workspace management software then allowed most essential resources to be accessed through tablets and smartphones.The pilot had been going well (despite some initial technical glitches and suspicion on the part of users), so our brave IT manager went for it. He got his guys to put together a service catalogue detailing what was available in terms of virtual desktops and application services.Guidelines were then issued highlighting the experience a user could expect given a particular type of device of a particular class. He then transferred the bulk of the desktop uipment budget to business unit managers, which most gleefully accepted – “Free from those killjoys in IT at last!”You can imagine the kind of conversations that took place from there on in.IT Manager: “Well it’s not a Windows machine, so there are some limitations in some areas, and access to some things will depend whether or not they are on the network. But it’s all written down in the guidelines we circulated. It’s basically up to you to decide whether your team can live with the constraints.”



Dept head: “Yeah, I saw that document, but it says the iPad won’t run some of the things we use, and they’ll have trouble directly accessing some of our document shares. So, I think they’ll still have to have laptops as well, and some of those machines are pretty old and need replacing.”Dept head: “But there isn’t enough allocated to give everyone an iPad and upgrade the laptops.”IT Manager: “Then go and talk to the FD make the case to him for more budget.”Apparently, some of these conversations got pretty heated, but they did succeed in getting business managers to start to appreciate the difference between "want" and "need".During the subsequent discussion at our roundtable, we agreed that what our hero had done was a pretty good start, but that the real point of all this was a need to rethink how we tackle the whole end user computing need.Some of the pushback received during the above type of conversations was around why the IT department couldn’t make the same capability available regardless of whether the user chose a Windows machine, Mac, iPad, iPhone, android device or whatever.While the obvious response to this is that they are all different, and run different flavours of software, if we consider the question from a business perspective, particularly if we look forward over the next five to 10 years, it’s pretty clear that we need to drive towards making IT systems in general as device-agnostic as possible.


In practical terms, this essentially means that end user computing is rapidly becoming less about devices per se (which will come and go over time), and more about the infrastructure that enables the application services delivered to them. Obvious when you say it, perhaps, but the truth is that the infrastructure options we ideally need are still a big work in progress from an industry perspective.Mobile application frameworks and middleware are becoming more enterprise ready, and digital workspace solutions are now getting pretty good at presenting services and resources coherently to users across a range of devices. But if vendors are honest, they’ll own up to some aspects of the technology still being a work in progress.The possible exception is VDI, which has matured quite nicely over the last couple of years. Today you can get a hyperconverged platform from pretty much any mainstream vendor, or cartridge-based system (such as Hewlett Packard Enterprise Moonshot), that comes out of the box designed for virtual desktop serving. It’s no longer the black magic art it used to be.



Specific technology to one side, though, the main takeaway from all of this is that things need to change. Right now, too many organisations have one thread of activity around Windows desktops, and another totally different thread around mobile devices and applications. Meanwhile, they just muddle through on things like Macs and possibly Linux machines as best they can. Then to cap it all, the IT team is too often left in the untenable position of having to referee on the conflicting wants and needs of users within the business.Against this background, separating device decisions and budgets from those relating to the infrastructure and back-end systems may be something for more IT teams to aim for. It might not be the answer for everyone, and you certainly wouldn’t want to go down that route before you get your act together on some infrastructure basics, but users are constantly pushing for device freedom, so it’s something to consider as you transform the way things work in your environment.If you have tried any of this yourself, or have other ideas on how best to deal with the increasing complex problem of delivering services into a heterogeneous device estate, we’d love to hear from you.


Message déposé le 22.06.2017 à 12:37 - Commentaires (0)


Battery for Apple A1495

Besides, there’s little chance of Siri being able to hear me over the noisy racket of my MacBook’s fans going apeshit crazy so as to prevent my keycaps from melting. This must be what it feels like for Ontarian hipsters teleworking from a cafe at Niagara Falls, except with less humidity and better tea.Honestly, if the fans blew any harder, my MacBook could technically be classified as a drone.If only I could do something about its 2kg payload, I could hire my aluminium Apple drone out to run errands, delivering lightweight goods such as paperbacks and condoms. I could even get it to spy on my dickhead neighbour who has spent the last 12 years of weekends in his back garden noisily assembling a gigantic rotting wooden shed that looks like Santa’s chalet shitehouse.So, great. I’ve updated my laptop to an operating system that guzzles a full battery charge in less than half an hour. To my horror, I discovered that it does this even when asleep. Perhaps Sierra gives it nightmares.This not a good thing for a computer supposedly designed to be used away from a mains power source. Need. Solution. Now.I checked the user forms at Apple and elsewhere, but found only the same old suggestions that never work such as zapping SMC and NVRAM.


Oh for the love of gaaahd. Who are these helpful souls who go around the forums insisting that every Mac issue ever encountered can be solved by restarting the computer with your fingers held down on keys at opposite ends of the keyboard like a double-jointed cellist? You may as well hold another finger in the wind and thrust one up your arse for all the good it’ll do.Indeed, on my forum visits, offers of solutions were far outweighed by posts by people like me, asking why their MacBooks have suddenly begun blowing sheets of paper off their desks. Some of them didn’t even know that laptops had fans until now, and boy do they know now.Another suggestion is that the updated OS is indexing itself, as if my MacBook was constructed by Heath Robinson and that the indexing process isn’t done in software at all but by fans, and probably a host of cogs, string and spoons holding eggs.Look, if it hasn’t finished indexing my 14 photographs by now after a week, it never will. Time to take the solution into my own hands.A quick peek into Activity Monitor and there it is: the culprit is my old friend, the Safari web browser.Safari is apparently chomping its way through “99%” of my CPU resources. Er, and open web pages are eating up another “105%”... each.Something tells me that either Safari is a jolly demanding mistress or Activity Monitor doesn’t quite understand the concept of percentages.I close a web tab. The fans become quieter. I close all my web tabs. The fans are quieter still. I quit Safari. The fan noise fades away to silence.



Uh-oh, later in the day, the fans are back with a whoosh! What’s up, Activity Monitor? I see, this time it’s iTunes, which launched automatically when I began recharging my phone, and is now taking up “103%” of the CPU. Within seconds of me quitting iTunes, the fans die away again.So I’ve discovered the fix all by myself: under macOS Sierra, make sure you don’t launch any Apple software and you’ll be fine. Bang, solved.Last month’s Mr Chow ransomware attacks serve as a timely reminder that security should be at the top of any business IT strategy. Ransomware is on the increase, at least according to the FBI and while it is not all email borne, it is an example of how sophisticated hackers and criminals are getting with technology.Certainly the recent spear phishing attack at sports anti-doping agency WADA was a clear indication of the lengths attackers will go to creating detailed and personal emails to hoodwink targets. Clearly, email is still one of the biggest threats to business security and will continue to be so for a very long time.In some ways it’s no surprise. Email use is as healthy as ever. According to research company Radicati Group’s Email Statistics Report (PDF) 2015-2019, over 205 billion emails were sent and received every day last year. A six percent increase is expected this year and although numbers vary dramatically from report to report, it seems to average out that around one billion of those emails are spam or malicious emails.In security terms email is of course just the delivery vehicle but it has history. Computer viruses date back to the days of the mainframe and early IBM PCs in the 70s and 80s but it wasn’t until the increased proliferation of email in the late 90s and 2000s that email started to really kick off as a security threat. The Michelangelo virus, Melissa worm and Anna Kournikova virus all became synonymous with computer security threats during the internet boom and dotcom years. Spam email was rocketing too.


In fact, according to Professor Alan Woodward from the Department of Computer Science at the University of Surrey, all that we see on email is exactly what has happened on regular snail mail. The big difference is that it can be done on a massive scale, and you can deliver electronic payloads that once opened are harmful, unlike the normal spam mail you get through the letterbox.“I have to say I think things have become a great deal better. In many ways junk mail filters on corporate mail servers like Exchange are something of an unsung success story,” he says. “Sadly it takes only a few to get through to cause problems but these servers are routinely blocking vast amounts of junk, spam, phishing and malware.”It’s a good point. We often forget about the good work and how quickly security firms react to new threats. Of course, email is not about to disappear from business either. It’s too useful and is a good way of storing a messaging dialogue but as Woodward points out, it’s not the only messaging form that can be open to abuse.“I’ve seen scams only this week using WhatsApp, and phishing using SMS,” he says. “If anything I suspect people who have learned about the dangers of email will end up learning all over again (probably the hard way) that other messaging vehicles can be used to deliver a variety of attacks as well.”


For businesses this is a perennial problem. Threats from email are as old as, well email and keeping pace with any technology change is a constant challenge. Security is however a unique challenge with increased remote working, a variety of devices with an ability to roam networks and an increasingly sophisticated cybercriminal.Prevention, as security firms have been saying for years, is better than cure. Ask US presidential candidate Hillary Clinton. She is something of an email security expert now, especially when it comes to understanding the consequences of not taking email security seriously. After being caught using a personal email server for official communications while acting as the US Secretary of State, Clinton has also been hacked, supposedly by the Russians.She is not alone of course. Large businesses and government departments, as well as well-known names, are consistent targets for hackers.Consequently, says Joe Diamond, Director of Cybersecurity Strategy at Proofpoint, “Customers demand more from their security solutions today more than ever before. That’s why we see security in board level conversations. Visibility about who is attacking you, what they are using, who in the organization they are targeting… and even understanding whether your organization is being singled out or caught in the crossfires of a broad attack campaign, are all insights to help organizations respond.”“I think companies can do only more of what they are already doing,” says Woodward. “Use of up to date mail servers, anti-virus and so on is an obvious point. Education is equally important, especially with BYOD muddying the waters. One has to be careful to educate users that not all mail clients are the same.”



Education or lack of it has of course led to human error enabling threats to sneak through cyber defences. Interestingly the number of security breaches reported to the Information Commissioner’s Office (ICO) has doubled this year, up to 2,048 from 1,089 in 2015. Around 70 per cent of these reports were due to human error.“It does suggest that the protection is best done at the server but that is not always possible,” adds Woodward. “Plus if one person is hacked their system can send emails that will appear perfectly valid to any automated system, so the human in the loop has to be on guard. I don’t think any technology is leading the charge but what you are seeing is a more sophisticated scoring system for spam emerging and some of that is being supplemented by heuristics. The systems are learning from what you delete, what is junk.”“Giving away budget never felt so good." Those were the words of an IT manager attending one of our roundtables recently. But why was he so happy about losing control of a chunk of his IT funding?The topic of the roundtable was end user computing, and he was explaining how the annual budget negotiations around desktop equipment were becoming so miserable. For many years, his IT department had defined a range of standard desktop and laptop machines to meet the needs of different types of user, refreshing a subset of kit on an annual basis. It’s a familiar model that many will recognise, and from an IT perspective it’s not a bad way of making sure everything stays manageable.



Message déposé le 21.06.2017 à 07:49 - Commentaires (0)


Battery for Samsung NP-R460

Both M-Series and S-Series have a serious amount of processing power.Capacity can be expanded with E-Series expansion trays or by adding S-Series boxes.There have been hundreds of Swarm software deployments on PowerEdge servers, so Caringo is confident the hardware will do the business. We're told enterprise-class 24x7 on-site hardware support is provided by the Caringo and Dell support organizations working as one team.Swarm 9 is available now. Pricing for the M1000 is $20,000, and the S3000 is $48,000. Both include 3 years of hardware and software support and maintenance.Swarm Servers will be available from Caringo, its global channel, Dell Direct or Dell's channel. That means one more object storage product is available from Dell EMC on top of the EMC products, such as the long-standing Centera, Atmos, and ECS. Let a million object flowers bloom seems to be the idea here, for the time being anyway.


Of all the agile practices out there, “pair programming” is the one that elicits the most heckles, confusion, and head-scratching. The idea is that rather than having one person sitting at a screen, coding, you have two who program together. Those who practice it speak of it like most people do of their first time at Burning Man, while those who have never had the “experience” just can’t see what the big deal is.While finding them are hard, over the years studies of pair programming have consistently shown that it’s an effective way to keep bugs out, write code faster, manage the risk of developer churn, and actually raise morale.But – really? Looking at surveys, I’d estimate that somewhere south of 20 per cent of people do pair programming. If pair programming was so great, why do people find it so odious? I mean, who wants to work so close to someone that you can smell the effects of coding?And as if it wasn’t enough to keep that foetidly in the developer cubes, it’s been wafting into the server room despite those cyclopean fans in there: operators are starting to pair as well.The theory behind pair programming is straightforward: programming is difficult and error prone. It’s much better to have a buddy helping along. In addition to actually coding together, it sometimes means having one developer write code and the other write tests right next to each other, in co-ordination. With two heads together, the thinking is that you write less bugs and get better test coverage.



Indeed pairs in studies over the past 20+ years have consistently written higher quality code and written it faster than solo coders. So, while it feels like there’s a “halving” of developers by pairing them up, as one of the original pair programming studies put it: “The defect removal savings should more than offset the development cost increase.”If the pairs rotate frequently, the theory says you’ll get better diffusion of knowledge across the team: no one person builds up a fief of knowledge around, say, builds, or how the “Print Invoice” function works. This means there’s a lower “bus factor,” helping protect against team churn and brain-drain.Large organisations I talk with - who’re all trying to figure out the footwork for that “digital transformation” dance - use rotating pairing as a way to spread new technical knowledge, but also change that oh so mysterious “culture” in their organisation.Much like alcohol and black coffee, pairing tastes awful at first... until you start imbibing of it repeatedly. In most of the studies, and the feedback I hear from organisations doing it nowadays, pairing practitioners end up liking it after just a few weeks. At first, true, the usually solitary programmer has to, you know, talk to someone else. They even have to get used to be corrected by someone else – horrors of all horrors!


But, with a rigorous enough schedule that allows for breaks and bounds the programming time to normal 9-to-5 schedules, most people end up liking pairing after a while. It only takes a few pints to dedicate your life to it.It’s hard to say why people like it more, but I suspect it has something to do with the fact that humans, fundamentally, like being social, so long as it feels safe. Also, most programmers and operations people take pride in their craft: they want to do good work (despite what those overflowing tickets queues are doing to them). If pair programming increased quality, there’s more to be proud of.Managers of these programmers should also like the quality, speed, and predictability of pairing.That predictability comes from an interesting side effect of how exhausting pair programming is. For one, it’s harder to goof off – er, “check email” – and attend meetings when you’re pair programming. As the man from downtown said: “Always Be Coding.”And, on that kind of schedule, developers are straight up pudding-headed after seven or eight hours of pair programming. As one practitioner put it: “This makes pair programming intense, especially at the beginning. At the end of the first day, I couldn't go home. Before I could face humans again, I put my phone on airplane mode, ignored my usual online accounts, and went to the gym for two hours of self-imposed isolation.”Developers can only pair so long. They have to stop, so you just close up shop at 5. No more playing Doom until 10pm and then coding – er, I mean “working late".



It can come off as sounding a bit like nanny-management, but pair programming seems to induce developers to actually do the work.While the research is sparse (and, really, when it’s “n=whatever students enrolled in my CS class” it’s a little fishy), from where I sit and what people keep telling me, pair programming works. Should you be doing it all the time, though?I’ve heard practitioners say that you should at least do it for complex, difficult tasks. If it’s some routine coding or operations tasks, then pairing may not be the nitro-charge you’re expecting. Indeed, one of the studies suggests that pairing is the most beneficial for “challenging programming problems".Put another way, if the task is “boring,” maybe it’s better to solo it. Still, I can’t help but think that it’ll be the boring tasks that end up biting you, especially when it comes to pair sysadmining. After all, how many systems have come down because of the boredom of DNS configurations? "Open is always going to win," states Ed Hemphill, CEO of WigWag, a company that hopes to make sense of the ever-expanding and ever-more-complex Internet of Things market.WigWag is named after the traditional flags used by the US military's Signal Corps to communicate messages. Hemphill and his cofounder Travis McCollum both served in the Signal Corps before starting up their company in Austin, Texas.


Message déposé le 20.06.2017 à 07:11 - Commentaires (0)


Battery for Acer Aspire 5820T

You may not need HP Workspace at all to make use of the Elite x3, it runs some UWP surprisingly well. It’s just that many applications are missing in UWA format – as we found when we tried to use Continuum for real work.HP has built a comprehensive hardware and software package around the promise of Windows 10 – including a laptop dock (basically a shell of a laptop with a 12.5 inch HD display – pdf), and a desk dock. Orders can be placed with HP for the phone but Microsoft has yet to fulfil its side of the bargain, as Continuum remains resolutely single window for now.Comment Red Hat is the biggest – and one of the oldest – companies in the Linux world, but despite the difficulty of accurately measuring Linux usage figures, Ubuntu and its relatives seem to be the most popular Linux distributions. Red Hat isn’t sitting idle, though. Despite its focus on enterprise software, including virtualisation, storage and Java tools, it’s still aggressively developing its family of distros: RHEL, CentOS and Fedora.Fedora is the freebie community-supported version, with a short six-month release cycle, but it’s still important. Although RHEL is the flagship, it’s built from components developed and tested in Fedora. According to Fedora Project Lead Matthew Miller told this year’s Flock to Fedora conference this summer its future looks bright.After the major "Fedora.next" re-focus in early 2014, Fedora's numbers are up. Both new downloads and updates to installed systems are rising. External involvement – that is, from non-Red Hat staffers – is sharply up: two-thirds of Fedora's contributors are from outside the company these days. And yes, that's counting 'Hatters using non-company email addresses.


It's getting better as a distro, too, benefitting from the improving fit-and-finish of Linux and its manifold supporting components: desktops, applications and their less-obvious underpinnings. Fedora 24 is significantly more usable than it was five or six releases ago. Rather than just being the testbed for future RHEL releases, the project now has wider aspirations – Miller identified the project's primary target as developers.I must confess, I lean more towards Ubuntu, only periodically dipping a toe into the waters of the RPM world. So when looking at Fedora, it’s sometimes irresistible to draw comparisons with the more orangey-purple side of the fence.And these days it's a family rather than a single distro. The old structure of Fedora Core plus additional rings of functionality has been discarded in favour of multiple "flavours", "spins" and "labs"."Flavours" are akin to Ubuntu's editions: as well as the standard GNOME 3 desktop, there's Fedora Server plus the ultra-minimal Fedora Cloud. Fedora's "spins" resemble Ubuntu's remixes, offering KDE, Xfce, LXDE, Maté-Compiz and Cinnamon. An interesting addition is SOAS, a live USB drive with the One Laptop Per Child's Sugar environment.Fedora's Labs are a more versatile equivalent to Ubuntu's handful of special-purpose editions. Labs are pre-assembled bundles of functionally related software, which can be installed as standalone distros or added into existing installations. Finally, COPRs are directly analogous to Ubuntu's PPAs: ad-hoc supplementary repositories to facilitate adding new software that isn't part of the main distro.The overall structure of the software is changing, too. Platform Architect Langdon White’s talk at the conference introduced the Modularity initiative, an attempt to restructure the entire project down into functional modules which can be installed and updated independently, in different ways – for instance as classic RPM packages or container images.Atomic Workstation represents another possible future direction – a smartphone-like OS, with a read-only root partition, installed and updated via OSTree, with all applications in Docker containers.



As of the version 25, standard Fedora will support the Raspberry Pi 2 and 3. Fedora is an all-FOSS distro, with no proprietary drivers, firmware or plugins, so it doesn't support the Pi 3's Wi-Fi and Bluetooth, as these require binary blobs. (We're told there are efforts underway to help people install closed-source components, such as Chrome, by the way.)There are still downsides to Fedora relative to Ubuntu. There are no long-term support releases, as that's the role of the technologically much more conservative CentOS. Ubuntu's more pragmatic attitude to including proprietary binaries means more hardware works out of the box, and installing the "restricted extras" package enables Flash, MP3 and so on in one easy operation. But the Red Hat family has come a long way. The 7mm 2.5-inch drives are for standard laptop drive bays, while the 15mm ones are for desktops. We're led to believe that these thicker, higher-capacity 2.5‑inch drives will feature in upcoming external storage products.Seagate says all disk drives in the BarraCuda family have Multi-Tier Caching Technology (MTC) to speed data reads and writes. This uses a hierarchy of NAND Flash, DRAM and media cache technologies to optimise the data flow.


Apparently the drives have new firmware that checks how data accesses are operating and spins the platters down when it can, to reduce power consumption without affecting performance. This might seem of not that much consequence to consumers and small businesses, but it matters more to larger businesses with bigger electricity bills.The 2.5‑inch BarraCudas spin at 5,400rpm, have a 6Gbit/s SATA interface, transfer data at up to 140MB/sec and come with a 2‑year limited warranty. Get a PDF data sheet here. The 7mm thick 2.5‑inch drive has two platters, and the 15mm model has five 1TB platters.The 3.5-inch BarraCudas and BarraCuda Pros are faster, spinning at 7,200rpm, and have a longer, 5‑year warranty. Seagate claims the BarraCuda Pro is the fastest 10TB desktop drive available.The 500GB – 4TB BarraCudas have 1, 2 or 3 1TB platters, a 64MB cache and 55TB/year workload rate limit. The highest sustained transfer rate is 210MB/sec (180MB/sec for the 4TB model). Get a PDF data sheet here.BarraCuda Pros have either 6 platters (6TB and 8TB) or 7 (10TB). Their maximum sustained transfer rate from the data sheet [PDF] is 210MB/sec, while the workload rate limit is 300TB/year.The FireCuda 2.5-inch accelerated drives can be viewed as 7mm BarraCudas with added 8GB cache. Their sustained transfer rate is the same as the BarraCuda; 140MB/sec, though. Seagate isn't revealing the spin speed in the data sheet [PDF], but we figure it's 5,400rpm again.


Sticking these FireCudas in a 3.5‑inch case gets you a 7,200rpm spin speed and a 210MB/sec sustained transfer rate.FireCudas have a 5‑year warranty and, like the BarraCudas, use MTC to speed their operation. They are not given a workload rate limit by Seagate.FireCuda drives operate in the performance gap between basic disk drives and SSDs. We can't expect them to get significantly faster, particularly as the per‑GB cost of flash is dropping with 3D TLC NAND. Caringo has updated its Swarm object storage software and will flog the code on appliances based on Dell PowerEdge servers.Deployments of Caringo's object storage is used for applications such as bulk storage, analytics, archiving, backup, cloud storage and content distribution. The software provides NFS, SMB, S3, HDFS and Rest APIs for native object storage access methods to data.Swarm 9 is the latest release of Caringo's software. It has an NFS protocol converter and the OEM hardware platform in addition to its availability in software-only form. The software features:Data is managed through creation to expiration via administrator-defined policies called Lifepoints, which are stored as metadata that automatically manages the number of replicas, erasure-coding scheme, and deletion.



There can be metadata annotations, made without modifying the reference object, and these are searchable through the SCSP API.The company says Swarm Servers are a fully-supported hardware and software system starting at 288TB and scaling linearly in 96TB increments (just add another S-Series server) to hundreds of petabytes of capacity with a pay-as-you-grow pricing scheme.The system includes M-Series Management Servers and S-Series Storage Servers. The M-Series is a 1U, rack-mountable appliance with a Dell PowerEdge R630 inside it. It has a Xeon E5-2695v4 processor with 18 cores, 128GB DDR4 DRAM, 8 x 1TB, 7,200rpm SAS disk drives, 2 x 10GbitE data access ports and a 1GbitE management port. VMware's ESXi is booted off an internal SD module.The management software is Swarm VMware APP, with a vCenter Server Appliance and ESXi 6.0U2. There is a scale-out, stateless NFS protocol converter for high performance and high availability.The 2U, rackmount, S-3000 Storage Servers use a PowerEdge R730xd platform, with CPU, memory and network resources, plus 96TB capacity. The CPU resource is 2 x Xeon E5-2640v4 10 core processors; 20 cores total, plus 128GB DDR4 DRAM and 12 x 8TB, 7,200rpm SAS disk drives. There are 2 ports of 10GbitE (Intel x540) for data access and a 1GbitE management port.


Message déposé le 19.06.2017 à 08:05 - Commentaires (0)


Batterie pour Compaq Presario CQ40

Pour ceux qui ont encore de l’argent à dépenser, Acer fournit un kit sans fil HD en option. Cela permet un flux en 1080p sans fil et sans perte, de sorte que les utilisateurs peuvent projeter du contenu sans le tracas des fils gênants et disgracieux.Le Predator Z850 sera disponible dans le courant du mois d’avril, au prix de 5 999 euros. Ce sera donc un achat où il faudra réfléchir avant de passer à la caisse…Besoin d’un peu de jus pour votre Apple Watch ? Ou peut-être voulez-vous un peu plus de mémoire ? Bientôt, vous pourriez être en mesure d’obtenir ce dont vous avez besoin, simplement en échangeant le bracelet de la montre.L’Apple Watch dispose d’un petit port caché sous le bracelet, qui sert de « port de diagnostic ». Apple a uniquement utilisé ce port pour la vérification des problématiques sur l’appareil, mais il peut également être utilisé pour le transfert de données et même pour charger la montre connectée. Un nouveau brevet indique que les futures versions de l’Apple Watch peuvent en effet utiliser ce port pour ajouter des fonctionnalités supplémentaires.Le brevet intitulé « modular functional band links for wearable devices », découvert par Apple Insider, suggère qu’Apple lui-même pourrait offrir différents « bracelets intelligents » pour l’Apple Watch par le port diagnostic. Ces bracelets pourraient embarquer des batteries supplémentaires, des caractéristiques liées à votre activité physique, tels que des capteurs de pression artérielle, et même des processeurs supplémentaires pour accélérer le dispositif.


Les bracelets intelligents pour les smartwatches pourraient servir à plusieurs fins. Comme indiqué dans le brevet d’Apple, ils pourraient étendre les fonctionnalités d’un dispositif déjà fonctionnel. Cependant, ils pourraient aussi inclure des parties intégrantes de la montre. Par exemple, au lieu d’avoir une batterie à l’intérieur du châssis de la montre, la batterie pourrait être située à l’intérieur du bracelet, permettant au fabricant de rendre le dispositif plus mince. L’une des principales critiques pour les smartwatches est qu’elles sont trop épaisses par rapport à leurs homologues analogiques.Les bracelets intelligents pourraient également vous donner plus de chance de personnaliser votre appareil. Dans le cas de l’Apple Watch, vous pourriez échanger le bracelet pour répondre à vos besoins en fonction de l’utilisation que vous en faites. Si vous allez à une séance d’entraînement, l’idée serait de prendre le bracelet capable de prendre votre pression artérielle, mais pour le reste de la journée, vous pouvez inclure un bracelet avec une batterie supplémentaire pour prolonger l’autonomie de la montre.Tout le monde sait que les écrans flexibles pour les smartphones sont sur le point d’être la prochaine grande caractéristique des futurs flagships. Cependant, ils n’ont toujours pas fait une apparition sur le marché du grand public, en dépit d’avoir fait tourner les têtes en 2011 à divers salons sur la planète. Néanmoins, à cette époque, il n’y avait rien de plus que des rumeurs sur leur lancement, ce qui a été à peine suffisant pour convaincre les consommateurs que la technologie était prête à entrer en production.



Mais en 2016, il y a déjà eu des preuves d’une production de masse. Pourtant, aucun produit n’a encore été poussé au grand public. Mais, selon une récente publication relayée par ETNews, tout cela pourrait changer l’année prochaine.Le dispositif actuellement en test va être une tablette de 7 pouces une fois dépliée, qui va devenir un smartphone de 5 pouces une fois les bords repliés. Si de tels dispositifs ont déjà existé par le passé, mais le résultat était très maladroit. En effet, les utilisateurs avaient deux écrans distincts, qui pouvaient être conjointement pliés pour afficher qu’un seul écran. Dépliée, une bande de métal sépare les deux écrans, offrant une expérience visuelle plutôt désagréable. Parmi les modèles commercialisés, on peut citer la Kyocera Echo ou la Sony Tablet P de Sony.La source indique également qu’un prototype est déjà terminé. Samsung aurait des plans pour produire en masse l’écran pliable à la fin de cette année, et le commercialiser l’année prochaine.Samsung Electronics et Samsung Display, la division responsable de la production et le développement des écrans de Samsung, auraient établi un partenariat avec les entreprises nationales et étrangères pour développer l’appareil.


Même compte tenu de l’incertitude qui entoure les informations fournies par une source anonyme, il y a encore des raisons de croire que ces écrans peuvent être commercialisés l’année prochaine. Le plus évident de tous est que Samsung a davantage investi dans des installations de production d’écrans OLED flexibles. Et, LG a exprimé son désir de lancer ses propres écrans flexibles sur le marché en 2017. Nul doute que Samsung ne veut pas subir la concurrence.L’industrie de la technologie mobile est arrivée à un seuil où les fabricants optent pour des résolutions 1080p. À ce jour, seule une sélection limitée de smartphones disposent d’un écran Quad HD, et encore moins ciblent le 4K. Alors que l’industrie du smartphone connaît quelques ralentissements dans les ventes, on peut supposer que les écrans pliables offriront aux consommateurs une raison suffisante pour aller de l’avant et faire des achats.Avec une épaisseur de 6,9 mm, vous seriez pardonné de penser qu’Apple est allé aussi loin que possible dans le fait d’amincir son flagship, l’iPhone 6, mais apparemment non selon les dernières rumeurs entourant son futur smartphone phare, l’iPhone 7.Apple a même légèrement augmenté l’épaisseur du châssis avec son iPhone 6S, passant celle-ci à une très respectable épaisseur de 7,1 mm. Mais, des sources de l’industrie évoquant le sujet à ETNews, et relayées par Apple Insider affirment que le rétrécissement du châssis de l’iPhone 7 est l’une des principales priorités de l’entreprise.



Néanmoins, bien que cela puisse être bénéfique, la principale crainte en ce qui concerne l’amincissement de l’épaisseur d’un smartphone est la capacité de la batterie qui s’en voit diminuée. Mais, toujours selon ces mêmes sources, l’iPhone 7 va embarquer une batterie d’une meilleure capacité.Comment est-ce possible vous dîtes-vous ? Le raisonnement fourni est l’utilisation d’une nouvelle technologie « fan out packaging », qui permet de réduire la taille et l’espace qu’occupent les composants. ETNews prétend qu’aucun autre fabricant de smartphones n’a utilisé cette technologie jusqu’ici. C’est très bien, mais pourquoi ne pas garder l’épaisseur actuelle, qui est plus que raisonnable, et augmenter davantage l’autonomie d’un iPhone qui souffre de quelques lacunes sur ce secteur ?ETNews précise également que le développement va même améliorer la force du signal, en rendant certaines puces plus puissantes et efficaces.


Message déposé le 16.06.2017 à 09:35 - Commentaires (0)


Battery for DELL Alienware M17x

But whereas Motorola's Atrix was a fling-it-against-the-wall-and-see caper from a company in turmoil, HP has put quite a lot of wood behind this arrow. It’s narrowcasting it at the businesses where it's appropriate, rather than splurging, though.
The selling point is not cost of hardware – the full kit is a quid short of a grand. It partly comes from convenience, with less material to lug about:
But mainly from back-office savings. From dispensing with the BOFHs. There's a lower TCO, HP reckons, from a phone that's a VDI hub, as it doesn't require an employer to hire so many highly trained IT staff and manage them, Daniel Barham, Mobility Business Development Manager for HP, told us.
It's not going to replace every device, but within multiple verticals it's going to be a strong proposition. Such as? Healthcare, it can enable nurses and doctors to access patient records. Field services sectors, such as engineers; logistics for packing and shipping and inventory tracking. And public sector: law enforcement and blue light (first responders) staff.Not everyone will need or be sold HP Workspace, the VDI service, said Barham. HP Workspace was for SMBs and lower mid-market businesses, in practice meaning companies with 20 to 200 staff. That's because larger enterprises have generally got their own VDI setup established, such as Citrix or VMWare.


HP argues that Windows 10's desperate app gap doesn't really matter so much in the enterprise. Most important apps are covered.There's a range of subscription models, but if you require the Win32 apps and don't have your own VDI setup, the most attractive route is striking a long-term deal with HP Financial Services. If you do, then magically, the headline price plummets. The headline price tag for a HP Workspace offering getting you 40 hours of Win32 app time a month is £603 per year. But that falls to £19 per user per month for 40 hours (the 80-hour tier is £679 a year, which falls to £25 per month per user via HPFS).The x3 deal will be sold through traditional IT reseller channels primarily, although some system integrators are working with HP.A 21 year-old Dutch man has been jailed for one month with another year suspended for infecting more than 2,000 computers to spy on minors via webcams.The man known as Jair M was arrested in October 2013 after he infected the machines with remote access trojans and recorded and captured footage of minors in compromising positions.Court documents reveal he identified vulnerabilities in target computers using the infamous Black Shades remote access trojan (RAT), along with DarkEye, Dark Comet, Cammy, and Cyber ​​Gate.Prosecutors revealed M, who suffers a form of autism, had built phishing sites since the age of 11 and was expelled from high school at 15 for hacking a teacher's computer.


In 2013 the hacker published online a variant of the Dutch national secondary school exam taken by about one fifth of the student population before it was available. Worse still, he posted the exam using another student's laptop.His deception led to the student spending a night in jail and remaining a suspect for months.At the end of April my home was broken into by a professional who silently and systematically looted my residence of all my portable wealth while I slept.In the morning, as I looked around for a phone to call the cops (there wasn’t one, so I had to Skype them from a desktop machine), I saw he’d used an entrance that offered just enough space to enable someone bold and flexible to gain entry.After the police had come, dusted for fingerprints (we found his gloveprints everywhere, but no fingerprints), filled out their reports, and left me to deal with the intricate process of rebooting the credentials of my existence, I had a good think about how I’d overlooked the obvious.A few months earlier the cops had rung my bell and told me my neighbour had been robbed. If I was wise, they advised, I’d keep my place locked up tight.I took their advice, when I was away from home. That was my big mistake, because I refused to believe that I could sleep through a robbery. Until it happened.



For the first few nights after the robbery, I slept uneasily. But fairly quickly I fell into a nightly pattern of walking the perimeter of my home, checking and securing each of the windows and doors before I retired to bed. Rob me once, shame on you. Rob me twice...?Which brings me to last night when friends invited me over for dinner and to revel in their new ultra-high-speed broadband connection. By fits and starts, Australia’s National Broadband Network has finally made it to their residence, and they signed up the day it became available. A hundred megabits of downstream goodness - enough, even, for a few Netflix 4K streams.When I arrived all was in chaos, as one of my friends - who had been a sysadmin in an earlier career - worked to reconfigure the router installed by the ISP. The router had booted with default username and password settings – the same default username and password settings used for every other connection in their apartment buildings. We could see all their remarkably similar SSIDs beaming through the walls of their flat.“Wow, my friend said, “I wonder if any of those folks changed their default username and passwords. Or if they even know they need to.


It’s not hard to be a paranoid in a world that seems to be insecure by design. It isn’t terribly difficult to load up factory firmware that generates a random password, assigns it to a device, then prints a label with that information to go into the box with the gadget. It’s more work than just slapping a default username and password into the software - but not much. And the cost, amortised against tens of thousands of units, can’t be more than a penny or two.Or we can rely on users - who expect, in the era of Apple, that things will ‘just work’ with minimal intervention. Where ‘it just works’ means ‘opens your network to attack’, that’s a sure sign we’ve missed the point, that we’ve grown too lazy, that it’s been too long since the last time we woke up to find ourselves robbed by a thief in the night.Every device - every desktop and laptop and smartphone and connected widget of any sort - must be secure enough against attack that we never need worry that we’re doing enough if we do nothing at all.Is that hard? Maybe. Making devices that are secure by design requires more forethought than we currently allow in product development. That’s the first thing we need to change.


Message déposé le 15.06.2017 à 08:15 - Commentaires (0)


 Livre d'Or

 Contact



Tous les messages
Battery for Amilo Pi 1505
Battery for Acer Aspire one 532
Battery for DELL XPS L321X
Batterie pour HP Probook 4431s
Akku für ASUS UX42A Ultrabook
Battery for Acer TravelMate 8572G
Battery for Dell Inspiron Mini 1012
Battery for Acer AL10BW
Batterie pour ASUS N75SV
Akku für Dell Inspiron 9200
Battery for Apple MacBook Pro 15 inch
Battery for Lenovo ThinkPad Edge E120
Battery for Acer Aspire 4736
Batterie pour Samsung AA-PB9NC6W/E
Akku für ASUS Eee PC 1225B
Battery for ASUS G73S
Battery for Acer Aspire 4736
Battery for Fujitsu FPCBP282
Batterie pour Toshiba PA3356U-3BAS
Akku für Samsung AA-PB4NC6W
Battery for ASUS G73S
Battery for Apple 13 inch MacBook Air
Battery for Acer Aspire One 531
Batterie pour ASUS N51A
Akku für Lenovo ThinkPad X201
Battery for SONY VGP-BPL26
Battery for Samsung AA-PB9NS6W
Battery for DELL Alienware M17x R3
Batterie pour Acer AS09A90
Akku für HP COMPAQ 2740p Tablet PC
Battery for SONY VGP-BPL26
Battery for Lenovo FRU 42T4783
Battery for Apple PowerBook G4 15 inch
Batterie pour LENOVO ThinkPad X220T
Akku für Dell XPS M1330
Battery for HP HSTNN-CB0X
Battery for ASUS A32-K53
Battery for Lenovo Thinkpad R61
Batterie pour Dell Latitude E6510
Akku für Apple A1079
Battery for Compaq 233343-001
Battery for HP COMPAQ 6830s
Battery for ASUS G75
Battery for Acer Aspire 5820T
Battery for Toshiba Satellite L650
Battery for SONY VGP-BPS21
Battery for Apple A1495
Batterie pour Samsung AA-PB2VC6W
Akku für Dell Alienware M14x R2
Battery for Dell 7FJ92
Battery for Samsung NP-R460
Battery for Acer Aspire 5820T
Battery for Acer Aspire 5820T
Batterie pour Compaq Presario CQ72
Akku für Samsung AA-PL9NC6B
Battery for Acer TravelMate 6592G
Battery for Asus G74
Battery for Samsung NP-R520
Batterie pour Compaq Presario CQ40
Akku für Acer Aspire 4S820TG
Battery for DELL Alienware M17x
Battery for HP Compaq 6515b
Battery for Dell Inspiron 1525
Batterie pour FPCBP281
Batterie pour Sony VGP-BPS13
Akku für ASUS A32-K55
Battery for lenovo IdeaPad Z575
Akku für IBM ThinkPad T60
Batterie pour Toshiba PA3817U-1BRS
Batterie HP COMPAQ NX9040
Akku für Dell Inspiron N7010
Akku Dell Latitude D830
Akku Dell Latitude D430 kaufen-akku.com


Créez votre blog sur Blog-grossesse.com