Saturday, January 30, 2010

The Dell Mini 5.........check it out!

Dell computers launched their own version of Tablet PC The Dell mini 5 to compete with the Apple iPAD.
The Dell mini 5 runs on the Android OS,1.6 Ghz SnapDragon CPU, has a 5-in-1. 800 by 480-pixel touchscreen,Wi-Fi, Bluetooth, 3G mobile broadband, a 5-megapixel camera with dual-LED flash, another front-facing camera, and a 1530mAh battery.Whats more, it has a SIM-card slot so that you can use it as a cellphone too.

Now run Moziila Firefox on your cellphone

Yesterday Mozilla launched the Firefox web browsers for cell phones, thus enabling the users to have the similar experience of the web that they have on their PC's now on the cellphone.The official Mozilla blog has follow details:-

The overall goals for Mobile Firefox are:
  • provide Mozilla’s standards-based open-source browser engine, optimized for mobile, that can be embedded by device manufacturers and others;
  • a full-featured mobile browser including support for XUL-based add-ons, delivering on Firefox’s key principles of ease-of-use, security and accessibility;
  • grow the Mozilla community in the mobile space;
  • provide tools and documentation to help developers develop, debug and deploy web applications;
  • do all of this work in the shared Mozilla source repositories so all platforms, desktop and mobile, benefit each other
For more background on our goals please see these blog posts.

Friday, January 29, 2010

Apple launches iPAD tablet PC

Apple on Wednesday announced the iPad, a 9.7-inch tablet computer that fits in between the iPhone smartphone and the MacBook computer.
The 0.5-inch thick device, which weighs 1.5 lbs., is intended to be used for web browsing, e-mail, photos, video, music, games and e-books -- pretty much everything that its pint-sized cousin the iPod touch can do, only bigger.
It consists of a 1GHz Apple A4 chip as well as flash memory ranging in capacity from 16GB to 64GB. Jobs claims its battery will last 10 hours with use and "more than a month" in standby mode.

The device is arsenic-free, BFR-free, mercury-free, PVC-free and "highly recyclable," Jobs said.
The iPad can also support documents, spreadsheets and presentations with a new, modified version of the company's iWork suite.
All iPad 3G models are unlocked devices and use GSM microSIM cards. International deals are expected to be announced sometime in June or July, Jobs said.
The iPad will start at $499 and scale to $829, depending on version:

  • 16GB Wi-Fi only: $499
  • 16GB Wi-Fi + 3G: $629
  • 32GB Wi-Fi only: $599
  • 32GB Wi-Fi + 3G: $729
  • 64GB Wi-Fi only: $699
  • 64GB Wi-Fi + 3G: $829
No date was set for availability.
Accessories are also available: a dock that functions like a picture frame, an external keyboard (effectively turning the iPad into a MacBook, sans Mac OS X) and a case.

Monday, January 25, 2010

Microsoft's Project Pink....Is it a rumour??


Microsoft is rumored to launch its own brand of cell phones this spring, which would be specifically targeted to age group in 20's & would be based on windows 7 mobile.The project is rumored to be called as Project Pink.
Though despite a lot of hush-hush on this, there has been no official word from Microsoft itself.
will keep you posted on latest developments.

Bluetooth 3.0.....awesome speed

The latest specification for Bluetooth was announced at the all hands meet in Tokyo japan on April 22 2009,the Bluetooth SIG formally adopted BluetoothCore Specification Version 3.0 High Speed (HS), or Bluetooth 3.0. This latest iteration of the popular short-range wireless technology fulfills the consumers’ need for speed while providing the same wireless Bluetooth experience – faster. Manufacturers of consumer electronics and home entertainment devices can now build their products to send large amounts of video, music and photos between devices wirelessly at speeds consumers expect. 
Bluetooth 3.0 gets its speed from the 802.11 radio protocol. The inclusion of the 802.11 Protocol Adaptation Layer (PAL) provides increased throughput of data transfers at the approximate rate of 24 Mbps. In addition, mobile devices including Bluetooth 3.0 will realize increased power savings due to enhanced power control built in. 
This newest version of Bluetooth technology builds on the inherent qualities of the current 2.1 EDR version, including Simple Secure Pairing and built-in, automatic security. And as with all versions of the Bluetooth specification, Bluetooth 3.0 HS provides developers, manufacturers and consumers with the benefit of backwards compatibility, enabling both the expansion and enhancement of this technology with every new specification release. Once products reach the market, the easiest way for consumers to learn which devices are compatible with other Bluetooth enabled devices is to visit the Bluetooth Gadget Guide.

Applications
With the availability of Bluetooth version 3.0 HS, consumers can expect to move large data files of videos, music and photos between their own devices and the trusted devices of others, without the need for cables and wires. Some applications consumers will experience include:

Wirelessly bulk synchronize music libraries between PC and music player or phone
Bulk download photos to a printer or PC
Send video files from camera or phone to computer or television.
most  probably you may expect this technology into devices built in the next quater of 2010(Q2)

Saturday, January 23, 2010

Shift from Internet Explorer for Safe Browsing

The recent attacks carried out by Chinese hackers were possible due to a flaw in the Internet Explorer.

Though Microsoft has released a patch to fix the flaw, But many technology consultants argue that surfing the web is unsafe with IE.
Browsers like Google Chrome, Mozilla, Opera provide better security such as protection against Phishing, process SandBoxing,anti Spamming & data theft protection etc.
It is also worth noting the Chrome & Mozilla & other browsers provide better & faster browsing speeds as compared to IE.

So is shifting from IE a better option for you? tell me what do you think??

UHarc Super file compression

UHarc created byUwe Herklotz is a high compression DOS & windows based compression software.

What makes UHarc different from other file compression softwares such as Winrar & Winzip, is its ability to efficiently compress even multimedia data efficiently, which is not possible with other file compression softwares.
UHarc is termed as super high file compression archiver because of its ability to compress large files into a very small file without much loss of data & efficiently. 
It is estimated on an average UHarc can compress approx 1Gb data into 200Mb compressed file.
The latest version of UHarc is 0.6c(19th sept 2009) & can be downloaded here

Thursday, January 21, 2010

USB 3.0........Coming soon!



In September 2007 at the Intel's developer forum the concept of USB 3.0 was demonstrated.
USB 3.0 is the newer specification which is to replace the older USB 2.0 h/w specification.
USB 3.0 offers much faster speeds than USB 2.0. It provides Data rates upto 3.2 to 4.8 Gbits/s, which is more than double of the older usb 2.0 specification.
The following details on USB 3.0 are provided by Intel:-



  • A new major feature is the SuperSpeed bus, which provides a fourth transfer mode at 4.8 Gbit/s. The raw throughput is 4 Gbit/s, and the specification considers it reasonable to achieve 3.2 Gbit/s (0.4 GByte/s or 400 MByte/s) or more after protocol overhead.[49]
  • When operating in SuperSpeed mode, full-duplex signaling occurs over 2 differential pairs separate from the non-SuperSpeed differential pair. This results in USB 3.0 cables containing 2 wires for power and ground, 2 wires for non-SuperSpeed data, and 4 wires for SuperSpeed data, and a shield (not required in previous specifications).[50]
  • To accommodate the additional pins for SuperSpeed mode, the physical form factors for USB 3.0 plugs and receptacles have been modified from those used in previous versions. Standard-A cables have extended heads where the SuperSpeed connectors extend beyond and slightly above the legacy connectors. Similarly, the Standard-A receptacle is deeper to accept these new connectors. On the other end, the SuperSpeed Standard-B connectors are placed on top of the existing form factor. A legacy standard A-to-B cable will work as designed and will never contact any of the SuperSpeed connectors, ensuring backward compatibility. However, SuperSpeed USB cables, with their extended plugs, will not fit into legacy receptacles.
  • SuperSpeed establishes a communications pipe between the host and each device, in a host-directed protocol. In contrast, USB 2.0 broadcasts packet traffic to all devices.
  • USB 3.0 extends the bulk transfer type in SuperSpeed with Streams. This extension allows a host and device to create and transfer multiple streams of data through a single bulk pipe.
  • New power management features include support of idle, sleep and suspend states, as well as Link-, Device-, and Function-level power management.
  • The bus power spec has been increased so that a unit load is 150 mA (+50% over minimum using USB 2.0). An unconfigured device can still draw only 1 unit load, but a configured device can draw up to 6 unit loads (900 mA, an 80% increase over USB 2.0 at a registered maximum of 500 mA). Minimum device operating voltage is dropped from 4.4 V to 4 V.
  • USB 3.0 does not define cable assembly lengths, except that it can be of any length as long as it meets all the requirements defined in the specification. However, electronicdesign.com estimates cables will be limited to 3 m at SuperSpeed.[28]
  • Technology is similar to a single channel (1x) of PCI Express 2.0 (5-Gbit/s). It uses 8B/10B encoding, linear feedback shift register (LFSR) scrambling for data and spread spectrum. It forces receivers to use low frequency periodic signaling (LFPS), dynamic equalization, and training sequences to ensure fast signal locking.
USB 3.0 is expected to be implemented in PC's by the end of 2010.

17 year old windows Flaw, still a serious vulnerability


Google researchers discovered a serious security flaw in the windows NT kernel, that allows a hacker to execute malicious code on the victims computer in the kernel mode.This flaw affects all windows Nt based Operating systems, including win NT 3.1 to win7.
Microsoft also issued an advisory regarding this flaw, But also noted that this flaw does NOT affect Windows OS for x64 based architectures such as the Itanium-based computers.

A possible workaround to this situation is to turn of/disable MSDOS & WOWEXEC subsystems of the OS to prevent further attacks & this can be done from GROUP POLICY Editor in windows

Tuesday, January 19, 2010

HTC Nexus One review



Plus points: The Nexus One has a beautiful display, a very fast processor, and a loaded feature set. The enhanced voice capabilities works flawlessly, and the phone delivers solid performance.

Minus Points:Like other Android phones, the Nexus One forces you to store apps on the internal memory. The media player is average, and has some important features missing like multitouch support, dual-mode capability for GSM and CDMA networks, and hands-free Bluetooth dialing. Currently, Outlook calendar syncing is not available.

The End Result:  It may not have all the features we'd like, but the Nexus One greatly enhances the Google Android family with a fast processor, good call quality, and improved voice control features. What's more, that all versions of the phone will be unlocked.

Apple invites the PRESS for a launching event on 27th Jan

Apple has sent out email invitations to prominent Press people for an event to be held at the Yerba Buena Art Center in San Francisco, with the theme  “Come See Our Latest Creation,”.

It is expected that Apple may introduce the much rumoured tablet PC at this even

Hackers Targeted the Google internal SPY System

Google uses internal systems to collect user data, which maybe presented to the governments, if required.
Google used to provide information of certain individuals/activists to the Chinese government on warrant basis.


The question arises, then why would the Chinese govt hack google, if Google was already complying with them, the answer probably is to get data more data on other individuals.According to the google official blog, several gmail accounts of activists in Europe & china were accessed by third parties, here's the complete detail from the official google blog:-  1/12/2010 03:00:00 PM
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident--albeit a significant one--was something quite different.

First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses--including the Internet, finance, technology, media and chemical sectors--have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U.S. authorities.

Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists. Based on our investigation to date we believe their attack did not achieve that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves.

Third, as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers.

We have already used information gained from this attack to make infrastructure and architectural improvements that enhance security for Google and for our users. In terms of individual users, we would advise people to deploy reputable anti-virus and anti-spyware programs on their computers, to install patches for their operating systems and to update their web browsers. Always be cautious when clicking on links appearing in instant messages and emails, or when asked to share personal information like passwords online. You can read more 
here about our cyber-security recommendations. People wanting to learn more about these kinds of attacks can read this Report to Congress (PDF) by the U.S.-China Economic and Security Review Commission (see p. 163-), as well as a related analysis (PDF) prepared for the Commission, Nart Villeneuve's blog and this presentation on the GhostNet spying incident.

We have taken the unusual step of sharing information about these attacks with a broad audience not just because of the security and human rights implications of what we have unearthed, but also because this information goes to the heart of a much bigger global debate about freedom of speech. In the last two decades, China's economic reform programs and its citizens' entrepreneurial flair have lifted hundreds of millions of Chinese people out of poverty. Indeed, this great nation is at the heart of much economic progress and development in the world today.

We launched Google.cn in January 2006 in the belief that the benefits of increased access to information for people in China and a more open Internet outweighed our discomfort in agreeing to censor some results. At the time 
we made clear that "we will carefully monitor conditions in China, including new laws and other restrictions on our services. If we determine that we are unable to achieve the objectives outlined we will not hesitate to reconsider our approach to China."

These attacks and the surveillance they have uncovered--combined with the attempts over the past year to further limit free speech on the web--have led us to conclude that we should review the feasibility of our business operations in China. We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China.

The decision to review our business operations in China has been incredibly hard, and we know that it will have potentially far-reaching consequences. We want to make clear that this move was driven by our executives in the United States, without the knowledge or involvement of our employees in China who have worked incredibly hard to make Google.cn the success it is today. We are committed to working responsibly to resolve the very difficult issues raised.

Monday, January 18, 2010

It is confirmed, It was the CHINESE!

Today the NSA (National Security Advisor) to Indian Prime Minister Confirmed that the attempts to hack sensitive Indian Networks was carried out & generated from CHINA.
GOOGLE also hired forensic Experts from a washington based consultants who confirmed that such kind of attacks, that were carried on 30 US companies including Google, Yahoo & Adobe, would have not been possible without the support of chinese authorities. The investigating consultant noted that the sophistication of the code used for the attack was of very high level, which would not have been possible for some 16 yr old hacker to write or execute. McAfee also pointed out that the code used was of very sophisticated level.
The consultant also said that the techniques of the attackers allowed them to masquerade as legitimate users “so traditional means of, for example, intrusion detection or antivirus security are for the most part ineffective.”

Saturday, January 16, 2010

KDE Ships First Release Candidate of New 4.4 Desktop, Applications and Development Platform for Linux


January 8th, 2010. Today, KDE has released the first release candidate of the next version of the KDE Software Compilation (KDE SC). KDE SC 4.4 Release Candidate 1 provides a testing base for identifying bugs in the upcoming KDE Software Compilation 4.4, with its components the KDE Plasma Workspaces, the Applications powered by KDE, and the KDE Development Platform.
The list of changes between 4.3 and 4.4 is especially long. Important changes can be observed all over the place, here are some listed changes:-

  • The Nepomuk Semantic Search framework has made leaps: A new storage backend makes it a lot faster. New user interfaces to interact with the Nepomuk database are first delivered with KDE 4.4.0. A timeline view of your files makes finding files used in the past easier.
  • The Plasma Desktop has been further polished. Many user interface elements have received attention by developers and designers. The new widget explorer provides a richer experience for managing desktop widgets. Plasma widgets can now be shared with other users over the network and the handling of storage devices in the desktop shell has been streamlined. Also, in 4.4 Plasma's little sibling, the Netbook shell debuts as a technology preview.
  • New applications on the horizon range from Blogilo, a rich-client blogging tool toCantor and Rocs, two scientific applications for advanced math and graph theory needs. Many other applications, such as the Gwenview image viewer and the Dolpin file manager have been further improved.
  • The KDE Development Platform adds the new KAuth authorization framework for easy and secure privilege escalation, printing of odd and even pages, scanner support for the Windows platform and the first pieces of integration of the popular webkit rendering engine.
These are only some of the new features one can expect from the new KDE Software Compilation 4.4, there is also a longer list of the changes. The long list of changes also comes with an even longer list of smaller and bigger bugfixes and performance enhancements which lead to a noticable improvement of the user experience.

The release is named after Cornelius Schumacher, who is and continues to be one of the cornerstones of the KDE community.
KDE SC 4.4 RC1

AMD launches the new Radeon HD 5670, below 100$ & DirectX 11

After a long interval, AMD’s staggered launch of the Evergreen family picks back up today with the launch of the Radeon HD 5670. The 5670 marks the desktop launch of Redwood, the 3rd chip in the Evergreen family, designed to fit in below the Juniper chip that powers the Radeon HD 5700 series.Here's the specification:


ATI Radeon HD 5750
ATI Radeon HD 4850
ATI Radeon HD 4770
ATI Radeon HD 5670
ATI Radeon HD 4670
Stream Processors
720
800
640
400
320
Texture Units
36
40
32
20
32
ROPs
16
16
16
8
8
Core Clock
700MHz
625MHz
750MHz
775MHz
750MHz
Memory Clock
1.15GHz (4.6GHz data rate) GDDR5
993MHz (1986MHz data rate) GDDR3
800MHz (3200MHz data rate) GDDR5
1000MHz (4000MHz data rate) GDDR5
1000MHz (2000MHz data rate) GDDR3
Memory Bus Width
128-bit
256-bit
128-bit
128-bit
128-bit
Frame Buffer
1GB / 512MB
1GB / 512MB
512MB
1GB / 512MB
1GB / 512MB
Transistor Count
1.04B
956M
826M
627M
514M
TDP
86W
110W
80W
61W
59W
Manufacturing Process
TSMC 40nm
TSMC 55nm
TSMC 40nm
TSMC 40nm
TSMC 55nm
Price Point
$129 - $149
$99-$129
$129
$99 / $119
$60-$90

IE flaw helped hackers hack Systems of more than 30 US based companies





The attack by chinese hackers on many corporate networks Including that of Google, Adobe, Yahoo was carried out based on an unpatched flaw in the Internet explorer the can permit remote execution of code.The attack was targeted on Win XP machines running Internet explorer 6.
Microsoft has issue following advisory regarding the vulnerability: The vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.
The flaw affects Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are affected.


To exploit, an attacker could host a specially crafted Web site, or take advantage of a compromised website, and then convince a user to view the Web site. In all cases, however, an attacker would have no way to force users to visit these malicious Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message, that directs users to the attacker’s Web site. It could also be possible to display specially crafted Web content using banner advertisements or other methods to deliver Web content to affected systems. The Microsoft investigation concluded that setting the Internet zone security setting to “high” will protect users from the vulnerability addressed in this advisory.
Microsoft is considering an emergency patch to fix this vulnerability. 

Friday, January 15, 2010

Chinese hackers hack deep into sensitive Indian Network


Yesterday news broke out about Chinese hackers hacking into Indian PMO's (Prime Minister's Office) systems & stole sensitive information ,which may include that of the NSA (National Security Advisor).
The question arises how was all this possible & what methods/technology were used?
         From the nature of the attack (as described on NEWS channels) & according to my understanding, the chinese used advanced BOT-NET technology to gain backdoor access & steal sensitive information.
          For those who may not know about BOT-NETS, here's a brief description:- hackers infect computers with advanced spywares called BOTS(in this case through email).These bots install themselves silently into the Master Partition of your harddrive & load into your system's main memory even before the OS is loaded, during the boot sequence. These BOTS open backdoor PORTS of your computer & are also intelligently programmed to send sensitive data such account ID's, passwords by recording your keystrokes, to their authors,who are also termed as BOT-MASTERS.
    Not only this, the BOT-MASTERs also controls the functioning of such infected Computers over the internet through the BOTS, for such reasons in Hackerz term, the infected PC is also called as ZOMBIE-PC (ZOMBIE, coz the system is controlled remotely).
    Now hackers use thousands of such ZOMBIE-PCs as a network (also called as ZOMBIE Network) to direct attack on organizations, corporations or even countries.
One famous example was TORPIG BOT-NET which consist of on an average 100,000 infected PC's & was used for stealing credit card records & banking details of infected users & transfered almost 70GB of data evry day from infected Systems to the BOT-MASTER.Using such large quantity of infected system, gives the hackers computing power nearly equal to a mainframe or maybe a supercomputer & thus is possible to hack into protected military or corporate networks
you can read more about the torpig botnet by clicking here

Wednesday, January 13, 2010

Can Linux run windows software/Games??





Over the past few years, there has been a common question on the Linux vs. Windows desktop front: does the Linux desktop have the ability to play various major release games, and if so what is the performance difference between the two? Linux is commonly overlooked as a viable gaming platform in most communities. Our intention today is to shed some light on what does and does not work inside Linux, as well as give solid performance data for those looking for another option in the gaming world. Each OS has areas where it shows superiority over the other, but for the sake of staying true to the purpose of this article we will only be focusing on the game performance/functionality differences.
Unfortunately there are very few game releases that support running inside Linux natively. To combat this issue there are a few Linux projects that will allow Linux users to run Windows applications - note that we did not say "emulate Windows". We have selected three Linux projects in order to complete our initial round of testing. Our open source project selection "Wine" is a free, easily downloadable project that is created to support both Windows games and applications. The second selection, "Cedega", is a closed source implementation of Wine focused on gaming. The final selection is Crossover Games which like Cedega is a closed source implementation of Wine allowing for enhanced usability and gameplay over Wine.
Some are probably asking at this point, what is Wine? The Wine project was started in 1993 to allow Windows applications to be run under Linux. Wine takes the Windows API (Application Programming Interface) and implements it in the Linux user space. Since Wine is running in user space and is not a part of the Linux Kernel, it relies on the wineserver daemon to provide your basic Windows kernel functionality as well as other various tasks of X integration.
What's the answer to the initial question, "Is Linux ready for gaming?" As you probably expected, the answer is both yes and no. If you're looking for an out-of-box solution for running older games, Linux is a decent alternative to Windows. The longer a game has been around, and the more popular the game, the better the odds that someone has already taken the time to get it working properly under one of the Wine projects. Naturally, that means the reverse is true: newer titles are less likely to work without some extra effort (and sometimes not even then). Even if you do manage to get a new release running, you should expect to see anything from graphical glitches to completely unplayable gameplay.

Nvidia introduces the newTEGRA SoC(System on Chip)

NVIDIA announced its second generation Tegra SoC. It's creatively named the Tegra 2 and this is what it looks like in block diagram form:

The SoC is made up of 8 independent processors, up from 7 in the original Tegra. The first two are - a pair of ARM Cortex A9 cores. These are dual-issue out of order cores from ARM running at up to 1GHz.
The next processor is an audio decode core. NVIDIA acquired PortalPlayer in 2007 for somewhere around $350M. PortalPlayer SoCs were used in the first five generations of iPods. PortalPlayer contributed to much of NVIDIA's know how when it came to building SoCs and audio decoders. NVIDIA is particularly proud of its audio decode core, claiming that it can deliver system power in the low 10s of mW while playing an MP3. It's difficult to quality that claim. Microsoft lists Zune HD battery life at 33 hours while playing MP3s, while Apple claims the iPod Touch can do the same for 30 hours. 
Tegra's video decode processor accelerates up to 1080p high profile H.264 video at bitrates in the 10s of megabits per second. The Samsung SoC in the iPhone 3GS is limited to only 480p H.264 decode despite Samsung claiming 1080p decode support on its public Cortex A8 SoC datasheets. NVIDIA insists that no one else can do 1080p decode at high bitrates in a remotely power efficient manner. Tegra's 1080p decode can be done in the low 100s of mW. NVIDIA claims that the competition often requires well over 1W of total system power to do the same because they rely on the CPU to do some of the decoding. Again, this is one of those difficult to validate claims. Imagination has demonstrated very low CPU utilization 1080p H.264 decode on its PowerVR SGX core, but I have no idea of the power consumption.



The GPU in Tegra 2 is the same architecture as Tegra 1 (OpenGL ES 2.0 is supported), just higher performance. NVIDIA expects a 2 - 3x performance increase thanks to improved efficiency, more memory bandwidth and a higher clock rate.
The original Tegra only supported LPDDR1, while Tegra 2 supports LPDDR2. The Zune HD's Tegra SoC had a 32-bit 333MHz datarate LPDDR1 memory bus, resulting in 1.33GB/s of memory bandwidth. Tegra 2 in a single package with integrated memory should deliver about twice that.


Popular PC game breaks 1Billion$ sales record

Today Activision announced that Infinity Ward’s Call of Duty: Modern Warfare 2 has broken the $1 billion in retail sales worldwide.
The game generated more than $550 million in worldwide sales over the first five days of its release. this beats the worldwide box office gross figures for movies as Avatar, Harry Potter and the Half-Blood Prince and The Dark Night.
Call of Duty:Modern Warfare 2 has exceeded our expectations and shattered theatrical box office and video game records.





For additional information about the game, visit www.modernwarfare2.com.

Tuesday, January 12, 2010

Now Google throws open online data storage space(GDRIVE) for you

Along with Google Docs now a new feature will be added, also called as GDRIVE that will allow users to store upto 1GB of data free, online on google servers

Instead of emailing files to yourself, which is particularly difficult with large files, you can upload to Google Docs any file up to 250 MB. You’ll have 1 GB of free storage for files you don’t convert into one of the Google Docs formats (i.e. Google documents, spreadsheets, and presentations), and if you need more space, you can buy additional storage for $0.25 per GB per year. This makes it easy to backup more of your key files online, from large graphics and raw photos to unedited home videos taken on your smartphone. You might even be able to replace the USB drive you reserved for those files that are too big to send over email.

Can Business/Colleges/Organizations Adopt OSS/FOSS

Open source community provides wide variety of softwares from Complete office applications like OpenOffice.org to CAD/CAM to scientific softwares,finance, engineering based, to programming IDE's ,to animation. The question is can colleges/Organisations go completely open source?
          
Colleges & other business organisation pay every year thousands of dollars as licensing fees for the proprietary software. whereas OSS applications are free of cost, have wide community based support,have no licensing hassles & are updated much frequently than proprietary software.




for the list of wide variety of OSS for any field  Click here

Monday, January 11, 2010

AMD unveils the ATI Mobility Radeon 5000 Series

At CES,AMD is taking this opportunity to announce the next version of their Mobility Radeon lineup


Performance with ATI's mobile graphics chips has generally been competitive with NVIDIA products in recent years. In fact, ATI is keen to point out that their market share for discrete mGPUs has increased to over 60% in 2009, with a whopping 13% increase in 2Q09. Since NVIDIA is the only other discrete mobile graphics solution, ATI's win is NVIDIA's loss.


The Specifications of the 5000 Series is as follows:




considered as one of fastest mGPU's on mobile platform & Based on DIRECTX 11 technology, the new ATI 5000 series are set to be the best in the block. whats ur view, let me know




Applet tablet PC-iSlate release

The Apple tablet is expected to be released within next few weeks
will keep you posted on new developments








Intel showcases two Devices based on Moretown & Moblin

At CES intel displayed two devices based on it s ATOM chip codenamed MORETOWN, which is expected to be released in the second quarter(Q2) of 2010.The first device Was an OpenPeak Tablet




The other one is a smart phone by LG runnin Moblin based On Atom  processor.The UI is looks same as that of Moblin Desktop, with some changes

Mozilla Firefox3.6 RC available

Mozilla releases Firefox 3.6 just six months after release of Firefox 3.5
you can download it Firefox 3.6 RC

Here’s the features, as listed by the Firefox team:
  • Users can change the browser’s appearance with a single click usingPersonas.

  • Firefox 3.6 alerts users about out of date plugins to keep them safe.

  • Changes to how third-party software integrates with Firefox to increase stability.

  • Improved automatic form fill provides better options from your form history.

  • Open, native video can now be displayed full screen, and supports poster frames.

  • Support for the WOFF font format.

  • Improved JavaScript performance, overall browser responsiveness and startup time.

  • The ability to run scripts asynchronously to speed up page load times.

  • Support for the HTML5 File API

  • Support for new CSS, DOM and HTML5 web technologies.



  • Sunday, January 10, 2010

    Intel showcases 3D holographic displays

    At CES LAS VEGAS intel displayed its latest milestone in technology with its holographic display, which can display images,videos in 3dimension. check out the demonstration video at CES at http://www.youtube.com/watch?v=73CGOjkwKdQ



    It seems after HiDef TV(HDTV) 3DTV may be the next big thing in display technology? wots ur say???

    Light peak technology

    Light Peak is the code-name for a new high-speed optical cable technology designed to connect your electronic devices to each other. Light Peak delivers high bandwidth starting at 10Gb/s with the potential ability to scale to 100Gb/s over the next decade. At 10Gb/s, you could transfer a full-length Blu-Ray movie in less than 30 seconds. Optical technology also allows for smaller connectors and longer, thinner, and more flexible cables than currently possible. Light Peak also has the ability to run multiple protocols simultaneously over a single cable, enabling the technology to connect devices such as peripherals, displays, disk drives, docking stations, and more.

    cell phone encryption algorithm cracked

    A5/1 is d algorithm dat is used to protect ur telephone calls from being tampered easily, it has been cracked. read more abt it at this link--->http://en.wikipedia.org/wiki/A5/1

    Have you tried Moblin???


    Moblin is a linux based OS, developed by Intel & maintained by Linux community, the User Interface is great. it supports all new hardware, specialy made for laptops & netbooks & the greatest thing of all its FREE!!!!!!!

    i've been using it from quite sometime now & believe me, itz awesome, to download & try it email me & i'll send u the ISO or check out the offical mobin website www.moblin.org

    Slate PC's



    At CES LAS VEGAS,a new form of PC's were launched,called the slate PC's, to be ready for production in next quarter of 2010 & would be full PC's loaded with Windows7, but without any physical keyboards. Expected to compete with Apple's tablet PC's. what do you think, would you prefer it for a conventional laptop/Desktop??? express your views...

    Google nexus one


    Google has launched its own Smartphone-->Nexus one based on the Android platform. tell me what do you think, can it beat iphone or Windows Mobile?? post ur views

    Can you go completely open source??

    I have been using open Source software(OSS) for quiet long time now, OSS offers wide variety of software for every reqiurement, from making a presentation to Vector 3D Graphics,imaging,animation,programming CAD/CAM,manging Servers.....etc you name it & OSS has it.So here's a challenge, enlist me the name of any proprietary software & i will suggest you an OSS equivalent to it(infact a much better one!)...

    Search This Blog