Leaked Intel Slide Reveals Coffee Lake CPU Lineup


A leaked slide points to significant performance uplifts between Kaby Lake and the upcoming Coffee Lake. These new chips could prove potent competitors to AMD’s Ryzen family.

The post Leaked Intel Slide Reveals Coffee Lake CPU Lineup appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/computing/254351-leaked-intel-slide-shows-coffee-lake-cpu-lineup-performance-boosts?source=Computing

Powered by WPeMatico

Pay TV Firms Eke Out Tiny Gains in Customer Satisfaction

After two years of declining customer satisfaction, the telecommunications sector has halted the slide, according to the ACSI Telecommunications Report 2016, released Wednesday. There was a 1.9 percent gain — to 70.1 on a 100-point scale — in satisfaction with pay TV services, Internet service providers, fixed-line telephone services, wireless phone services and mobile phone makers, based on the American Customer Satisfaction Index’s recent survey.

The original article can be found here: http://www.ecommercetimes.com/story/83564.html?rss=1

Powered by WPeMatico

Tablets Losing Ground to Big Smartphones, Light PCs

Global demand for tablets continued a year-long slide, as shipments fell for the fourth consecutive quarter amid signs of market saturation in North America, Asia and Western Europe, IDC noted in a report released Thursday. Worldwide shipments fell 12.6 percent year-over-year to 48.6 million during the third quarter, according to IDC’s Worldwide Quarterly Tablet Tracker. The installed base of tablets at the end of 2014 was 581.9 million, a 36 percent increase from the prior year, but there are signs that growth will slow down soon.

The original article can be found here: http://www.ecommercetimes.com/story/82682.html?rss=1

Powered by WPeMatico

Shares of Apple dip more than 2% following downgrade from Japanese bank

Shares of Apple stock took an unexpected slide on Thursday, and dragged the larger market down as a whole with it, after a high-profile Japanese bank downgraded its rating on the iPhone maker to “neutral.”

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/425da8cb/sc/30/l/0Lappleinsider0N0Carticles0C150C0A10C150Cshares0Eof0Eapple0Edip0Emore0Ethan0E20Efollowing0Edowngrade0Efrom0Ejapanese0Ebank/story01.htm

Powered by WPeMatico

Samsung warns of massive 60% decline in profits for Q3, cites stiff smartphone competition

Apple rival Samsung on Tuesday warned investors of an upcoming slide in quarterly profits that could amount to a 60 percent decline from the same time last year, blaming the slump on a squeeze in both high and low ends of the mobile phone sector.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/3f2f4b4d/sc/2/l/0Lappleinsider0N0Carticles0C140C10A0C0A60Csamsung0Ewarns0Eof0Emassive0E60A0Edecline0Ein0Eprofits0Efor0Eq30Ecites0Estiff0Esmartphone0Ecompetition/story01.htm

Powered by WPeMatico

Downward PC Sales Spiral to Slow

The years-long PC sales slide will slow somewhat this year, Gartner has predicted. “After declining 9.5 percent in 2013, the global PC market is on pace to contract only 2.9 percent in 2014,” Gartner research director Ranjit Atwal said. The company lumps in desktops, notebooks and premium ultramobiles under the “PC” category. However, the skyrocketing demand for tablets will slow, Gartner forecast. Shipments will grow only by 24 percent over 2013, to total 256 million units. Mobile phone sales are expected to grow 3.1 percent over 2013.

The original article can be found here: http://www.ecommercetimes.com/story/80699.html?rss=1

Powered by WPeMatico

Next-gen Thunderbolt details: 40Gbps, PCIe 3.0, HDMI 2.0, and 100W power delivery for single-cable PCs

Light Peak (Thunderbolt)
A leaked slide points to a double-bandwidth Thunderbolt coming in 2015 with up to 40Gbps of bandwidth. Will this kick TB into the mainstream, or is Intel chasing a fundamentally different market?

The original article can be found here: http://www.extremetech.com/computing/181099-next-gen-thunderbolt-details-40gbps-pcie-3-0-hdmi-2-0-and-100w-power-delivery-for-single-cable-pcs

Powered by WPeMatico

Intel's next-gen Thunderbolt rumored to hit 40Gbps transfer speeds with new connector

In a purported presentation slide leaked to the Web on Monday, Intel outlines its next-generation Thunderbolt specification — “Alpine Ridge” — that will boast double the throughput of current Thunderbolt 2 interface, while bringing massive gains in power efficiency.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/3998d224/sc/15/l/0Lappleinsider0N0Carticles0C140C0A40C210Cintels0Enext0Egen0Ethunderbolt0Erumored0Eto0Ehit0E40Agbps0Etransfer0Espeeds0Ewith0Enew0Econnector0E/story01.htm

Powered by WPeMatico

NSA Document From 1996 Warns Of 'Insider-Gone-Bad'

NSA Powerpoint Slide
Even the slides get redacted.

A story quietly titled “Out of Control,” published in a special 1996 issue of the National Security Agency’s professional journal Cryptologic Quarterly, warns that one of the best ways into a computer system doesn’t involve any hacking at all. The article foresees exactly the kind of threat Edward Snowden would pose to the agency in 2013.

The report opens:

In their quest to benefit from the great advantages of networked computer systems, the U.S., military and intelligence communities have put almost all of their classified information “eggs” into one very precarious basket: computer system administrators. A relatively small number of system administrators are able to read, copy, move, alter, and destroy almost every piece of classified information handled by a given agency or organization. An insider-gone-bad with enough hacking skills to gain root privileges might acquire similar capabilities. 

Snowden apparently sought out just such a job as a contractor with the NSA because, in his own words, “My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked.”

Thanks to the way electronic communication works, system administrators have access to a whole range of information stored on the networks they oversee. “Out of Control” also provides an almost quaint look at early 1990s use of systems like email and servers. The report is written for an audience that understood how to keep paper documents safe in the Cold War but needs help understanding the risks that come with new technology.

Intelligence personnel can no longer lock the draft versions of their Top Secret SCI reports in their safes at night and go home feeling reasonably secure. Instead, those reports and almost everything else they have done is out of their control, stored electronically on some server in some other room or even in another building.

Curiously, the policy recommendations made at the end of the report might all be valid security techniques, but they radically reduce the usefulness of computers for the people using them. One recommendation is for personal passwords that system admins cannot access, with the acknowledged risk of reports permanently lost when the user forgets their own password. Beyond encryption, the report recommends that hard drives used by analysts be “encrypted and stored in a three-combo safe,” which would certainly make logging into work every morning a pleasant and totally enjoyable ordeal.

Another recommendation is that users be physically separated from the local network or the internet while working, only plugging the cables into the computer when needed to quickly send out messages and then staying offline the rest of the time. And, as with most any set of recommendations, there is a call for an increased budget. As the unknown author of “Out of Control” writes, budget cuts lead to low morale, and low morale makes it likelier a system administrator could be bribed by another country.

Finally, “Out of Control” hits at the main problem with private, compartmented, or secret information held somewhere outside the individual’s control:

Yes, it is less expensive and far more convenient to store everything on servers, but just because it can be done does not mean that it should be done. If individual computer users are going to be held accountable for the classified information that each personally handles, then they must have more control over how and where their information is stored and who has access to it.

Two different versions of this report are available online: one from the NSA, and another from George Washington University’s National Security Archive. Cryptome has a side-by-side comparison, so the differences in redactions are easy to see. 

[h/t @DaveedGR]

The original article can be found here: http://www.popsci.com/article/gadgets/nsa-document-1996-warns-insider-gone-bad

Powered by WPeMatico