Leaked roadmap claims Intel will bring six-core chips to mainstream PCs with upcoming Coffee Lake

CPU-Wafer1
Leaked roadmap slides imply that Intel might be prepping six-core chips for the mobile segment — but the new cores won’t arrive until the second-generation refresh of Intel’s upcoming Cannon Lake 10nm technology.

The original article can be found here: http://www.extremetech.com/computing/235664-leaked-roadmap-claims-intel-will-bring-six-core-chips-to-mainstream-pcs-with-upcoming-coffee-lake

Powered by WPeMatico

Future Intel Skylake Xeons could pack up to 28 cores, 6 memory channels

CPU-Wafer1
Leaked slides from Intel suggest the company will ship a 28-core Xeon by 2018, substantially outstripping its current 18-core versions — and six memory channels per CPU socket.

The original article can be found here: http://www.extremetech.com/computing/206659-future-skylake-xeons-could-pack-up-to-28-cores-6-memory-channels

Powered by WPeMatico

New leak hints at AMD Zen’s architecture, organization

AMD logo
More rumors and official-looking slides are leaking around AMD’s upcoming Zen CPU. If accurate, the new core could have real promise. We dive into the details.

The original article can be found here: http://www.extremetech.com/gaming/204523-new-leak-hints-at-amd-zens-architecture-organization

Powered by WPeMatico

Google bolsters iOS productivity suite with Slides, updates to Docs and Sheets

Google on Monday released presentation app Slides alongside updates to existing iOS apps Docs and Sheets, offering a free Web-connected alternative to similar productivity suites from Microsoft and Apple.



The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/3dd96bbe/sc/15/l/0Lappleinsider0N0Carticles0C140C0A80C250Cgoogle0Ebolsters0Eios0Eproductivity0Esuite0Ewith0Eslides0Eupdates0Eto0Edocs0Eand0Esheets/story01.htm

Powered by WPeMatico

NSA Document From 1996 Warns Of 'Insider-Gone-Bad'

NSA Powerpoint Slide
Even the slides get redacted.
NSA

A story quietly titled “Out of Control,” published in a special 1996 issue of the National Security Agency’s professional journal Cryptologic Quarterly, warns that one of the best ways into a computer system doesn’t involve any hacking at all. The article foresees exactly the kind of threat Edward Snowden would pose to the agency in 2013.

The report opens:

In their quest to benefit from the great advantages of networked computer systems, the U.S., military and intelligence communities have put almost all of their classified information “eggs” into one very precarious basket: computer system administrators. A relatively small number of system administrators are able to read, copy, move, alter, and destroy almost every piece of classified information handled by a given agency or organization. An insider-gone-bad with enough hacking skills to gain root privileges might acquire similar capabilities. 

Snowden apparently sought out just such a job as a contractor with the NSA because, in his own words, “My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked.”

Thanks to the way electronic communication works, system administrators have access to a whole range of information stored on the networks they oversee. “Out of Control” also provides an almost quaint look at early 1990s use of systems like email and servers. The report is written for an audience that understood how to keep paper documents safe in the Cold War but needs help understanding the risks that come with new technology.

Intelligence personnel can no longer lock the draft versions of their Top Secret SCI reports in their safes at night and go home feeling reasonably secure. Instead, those reports and almost everything else they have done is out of their control, stored electronically on some server in some other room or even in another building.

Curiously, the policy recommendations made at the end of the report might all be valid security techniques, but they radically reduce the usefulness of computers for the people using them. One recommendation is for personal passwords that system admins cannot access, with the acknowledged risk of reports permanently lost when the user forgets their own password. Beyond encryption, the report recommends that hard drives used by analysts be “encrypted and stored in a three-combo safe,” which would certainly make logging into work every morning a pleasant and totally enjoyable ordeal.

Another recommendation is that users be physically separated from the local network or the internet while working, only plugging the cables into the computer when needed to quickly send out messages and then staying offline the rest of the time. And, as with most any set of recommendations, there is a call for an increased budget. As the unknown author of “Out of Control” writes, budget cuts lead to low morale, and low morale makes it likelier a system administrator could be bribed by another country.

Finally, “Out of Control” hits at the main problem with private, compartmented, or secret information held somewhere outside the individual’s control:

Yes, it is less expensive and far more convenient to store everything on servers, but just because it can be done does not mean that it should be done. If individual computer users are going to be held accountable for the classified information that each personally handles, then they must have more control over how and where their information is stored and who has access to it.

Two different versions of this report are available online: one from the NSA, and another from George Washington University’s National Security Archive. Cryptome has a side-by-side comparison, so the differences in redactions are easy to see. 

[h/t @DaveedGR]

The original article can be found here: http://www.popsci.com/article/gadgets/nsa-document-1996-warns-insider-gone-bad

Powered by WPeMatico