Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

ARM Seeing Growth

October 31, 2012 by  
Filed under Computing

ARM and Vivante have achieved significant market share gains in the system-on-chip (SoC) GPU market while Imagination and Qualcomm have seen their market shares fall.

ARM has been aggressively pushing its Mali GPU design for the last two years, while Vivante has ridden the surge in Chinese tablet sales, and these factors have resulted in both firms increasing market shares. Analyst outfit Jon Peddie Research claimed that ARM and Vivante scored first half 2012 SoC GPU market shares of 12.9 percent and 9.8 percent, respectively, while the SoC GPU market share leaders Imagination and Qualcomm both suffered declines.

ARM more than doubled its market share from the same period a year ago while Vivante went even better by almost quadrupling its market share. Not only were both firms claiming large pieces of the pie, Jon Peddie Research claimed the SoC GPU market had increased by 91.3 percent, suggesting that Qualcomm and Imagination are having a harder time getting new business. Jon Peddie told The INQUIRER that new vendors are entering the market, typically with lower prices to earn customers.

Nvidia’s SoC GPU operations accounted for 2.5 percent of the total smartphone and tablet market, which given that the firm doesn’t license out its GPU designs is pretty impressive. Nvidia could see its market share increase if Microsoft’s Surface tablet sells well.

Source…

October 30, 2012 by  
Filed under Computing

Apple, which was in all sorts of hot water when it was caught tracking its users, is up to its old tricks again.

Apple was slammed by privacy experts protested the use of a universal device identifier, or UDID, to track the online preferences of iPhone and iPad users. This made it a perfect target for hackers who broke into digital media firm Bluetoad and made off with close to a million device IDs.

It looks like Apple remains addicted to tracking its users. According to Naked Security iOS 6 has a new tracking system called IDFA, or identifier for advertisers. Like the UDID, the IDFA uniquely identifies your Apple device and any websites that you browse with your iPhone or iPad device can request the IDFA.

While UDID could be tracked to users the IDFA can’t be traced back to individuals, it merely links a pattern of online behaviour with a specific device. In other words, it knows all about you, just not your name.

Fortunately it can be disabled from within iOS, though Apple leaves it enabled, by default and hopes no one will notice. The IDFA acts like a persistent cookie on the phone: allowing advertisers to track user surfing behaviour on their phone and record interactions up to and including purchases or downloads.

Michael Oiknine, the CEO of mobile application analytics firm Apsalar said that IDFA offered many advantages over the discredited UDID. For a start the IDFA is reset when the device, itself, is reset. That will prevent user data from being corrupted when they sell or transfer their phone to a new owner, Oiknine said.

Source…

October 29, 2012 by  
Filed under Computing

The International Organization for Standardization (ISO) has ratified the Cloud Data Management Interface (CDMI), a set of protocols defining how businesses can safely transport data between private and public clouds.

The Storage Networking Industry Association’s (SNIA) Cloud Storage Initiative Group submitted the standard for approval by the ISO last spring. CDMI is the first industry-developed open standard specifically for data storage as a service.

“There is strong demand for cloud computing standards and to see one of our most active consortia partners contribute this specification in such a timely fashion is very gratifying,” Karen Higginbottom, chairwoman of the ISO committee, said in a statement. “The standard will improve cloud interoperability.”

The CDMI specification is a way to create an interface for accessing data in the cloud by preserving metadata about information that an enterprise stores in the cloud. With metadata associated with the information, companies can retrieve data no matter where it’s stored.

“With the metadata piece, it’s also complementary with existing interfaces. The standard can be used with Amazon, for file or block data and it can use any number of storage protocols, such as NFS, CIFS or iSCSI,” said SNIA Chairman Wayne Adams.

Based on a RESTful HTTP protocol, CDMI provides both a data path and control path for cloud storage and standardizes a common interoperable format for securely moving data and its associated data requirements from cloud to cloud. The standard applies to public, private and hybrid deployment models for storage clouds.

Source…

October 26, 2012 by  
Filed under Computing

ST Microelectronics reportedly is considering breaking itself up in order to offload its system-on-chip (SoC) business.

ST Microelectronics has been losing sales as its traditional customers such as Nokia and Research in Motion struggle in the smartphone market, which has tended to favour chip vendors such as Qualcomm, Texas Instruments and Nvidia in recent years. Now Bloomberg is reporting that ST Microelectronics is considering breaking up to allow it to offload its SoC business and concentrate on the profitable analog business.

According to Bloomberg’s report the firm is mulling the division of the company into two distinct parts, the analog business and the digital business that designs chips for use in set-top boxes, televisions and smartphone handsets. ST Microelectronics’ analog business includes chips that end up in cars and white goods, areas where there is expected to be significant growth in the coming years.

ST Microelectronics moved quickly to try to put a lid on the report by denying “the existence of initiatives which can compromise the unity of the company”. Nevertheless, the firm’s stock price rose sharply on the rumour, suggesting that the market would welcome such a move and perhaps giving the firm’s board the incentive it needs to put through such a plan.

Source…

October 25, 2012 by  
Filed under Computing

Huawei has replied to US rival Cisco after the networking firm made allegations about the Chinese company relating to a lawsuit between the two firms.

The case dates back to 2003 and relates to the alleged theft of source code by Huawei from Cisco for use in its networking products. The case was settled confidentially out of court.

Cisco complained about what it saw as a willful distortion of the facts of the case after Huawei’s chief representative in the US, Charles Ding, claimed the outcome was that Cisco stood down over its allegations.

In response, Cisco released excerpts from a report by an independent analyst that was used to form the basis of a settlement, which Cisco said proved Huawei had used its source code in its products.

However, in a statement sent to The INQUIRER, Huawei said it was “disappointed with the continued rhetoric from Cisco” and claimed there was no basis to its argument.

“With respect to the lawsuit which took place about 10 years ago, the fact is the court dismissed the case, upon a joint stipulation of the parties, after the neutral expert’s review. This shows Cisco’s present allegations have no merit,” it said.

Furthermore, the firm also said it didn’t believe Cisco had the right to report elements of the review.

“We don’t think Ding violated the agreement between Cisco and Huawei, which had a negotiated confidentiality provision in it,” it said. “Cisco’s general counsel’s selective and misleading cropping of a confidential report from the Neutral Expert may have violated that provision.”

Huawei added that it would consider releasing more information on the case, though, in an effort to paint a more complete picture of the case.

“However, since Cisco has put selected snippets into the public domain, the truth may require that more than carefully selected quotes be put in the public record. Huawei is exploring the best way to accomplish that goal,” it said.

Source…

October 24, 2012 by  
Filed under Computing

AMD has cut its third quarter revenue and gross margin forecasts citing weak demand.

AMD’s lacklustre Bulldozer processor line has left the firm desperately trying to compete with Intel in the desktop market while its more impressive accelerated processor unit (APU) range has been rebuffed by Intel’s multi-million dollar ultrabook marketing push. Now AMD has revised down its estimate of third quarter revenues, which it says will be around 10 percent lower than the previous quarter.

Even more worrying for AMD is its lower forecast for gross margin, the difference between selling an item and the cost to make it, down from 44 percent to 31 percent. Effectively AMD said its cost of doing business has risen considerably higher, although it laid most of the blame on an $100m inventory writedown.

AMD couldn’t avoid admitting the blindingly obvious and said that its writedown of inventory was due to “lower anticipated future demand for certain products”. The firm has suffered through a disappointing 2012, and earlier this year it announced a $580m loss back in April.

Source…

October 23, 2012 by  
Filed under Computing

Qualcomm’s new Snapdragon S4 Pro quad-cores are slowly starting to show up in new phone and tablet designs, and in case you’ve been following the market, you know they will be the fastest thing around until A15 parts appear.

But aside from the custom Krait core, Qualcomm’s new chips feature new Adreno 3 series graphics and judging by some early benchmarks, this is a match made in heaven.

Tom’s Hardware put the new graphics core to the test, with some very impressive results. Basically Adreno 320 blows the competition out of the water. However, it does not manage to surpass the huge SGX543MP4, used on the third generation iPad.

In GLBenchmark 2.1 the SGX543MP4 ranks first, with 251 and 139 points in Pro and Egypt tests. Adreno 320 comes in second, with 191/137, the SGX543MP2 scores 147/90, while the Tegra 3 TL30 scores 82/63. However, in fill rate tests Adreno 320 trails both the SGX543MP4 and SGX543MP2, but it is still miles ahead of the Tegra 3, SGX540 and Adreno 225.

However, in off-screen GLBench 2.5 Adreno 320 manages to squeeze ahead of SGX543 parts and the rest of the competition, but once again it loses in fill rate tests.

Source…

October 22, 2012 by  
Filed under Computing

Lenovo hopes that computers made in its first U.S. manufacturing plant will draw more consumers, while also making the delivery of ThinkPad laptops and tablets faster to U.S. customers.

The company, which is based in China, earlier this month announced it would open a factory to make computers in Whitsett, N.C. — its first such facility in the U.S. Lenovo said the factory would create about 115 manufacturing jobs. A spokesman later added that the company may expand the facility in the future, which could create more jobs.

Manufacturing in the U.S. will help Lenovo get its products to customers more quickly, said Peter Hortensius, senior vice president of the product group at Lenovo, in an interview at a company event in New York on Tuesday evening.

The company will manufacture ThinkPad laptops and tablets starting early next year, and with the new factory, Lenovo hopes computers could reach customers within a week, or in some cases, overnight. But initial supplies of products like the ThinkPad Tablet 2, which will become available in October, will not be made in the U.S. factory.

Many Lenovo computer shipments originate from China and are supposed to reach customers in 10 days, but in some cases take weeks. The company also has factories in Japan, Brazil, Germany and Mexico.

The “Made in USA” tag on computers manufactured in North Carolina will resonate with some buyers, Hortensius said. Lenovo’s main U.S. operations are in that state, and the company also has a distribution center there.

Source…

October 19, 2012 by  
Filed under Computing

The Core i7 2700K, an unlocked 3.5GHz Sandy Bridge part, will meet its marker even sooner than many expected. Intel has decided that this processor launched in Q4 2011 and currently priced at $342 for boxed version is ready for processor discontinuance notice as soon as Q4 2012.

This means that in this quarter Intel plans to take last orders for the processor and will continue to ship them to customers until the EOL or end of lifecycle for this product that is planned in Q2 2013, or two quarters later.

If Intel ends up with some extra stock, it will surely ship it to customers but these are the official rules.

Core i7 2700K is not alone in PDN and EOL plans. Core i7 2600 and 2500K will also get product discontinuance notice in Q4 2012 and will reach the end of its professional career in Q2 2013 and it’s no coincidence that this happens days before scheduled Haswell launch.

Source…

October 18, 2012 by  
Filed under Computing

Windows 7′s malware infection rate soared by as much as 182% this year, Microsoft said on Tuesday.

But even with that dramatic increase, Windows 7 remained two to three times less likely to fall to hacker attack than the aged Windows XP.

Data from Microsoft’s newest twice-yearly security report showed that in the second quarter of 2012, Windows 7 was between 33% and 182% more likely to be infected by malware than in the second quarter of 2011.

The infection rate for Windows RTM, or “release to manufacturing,” the original version launched in Oct. 2009, was 33% higher this year for the 32-bit edition (x86), 59% higher for the 64-bit (x64) OS.

Windows 7 Service Pack 1 (SP1) — the upgrade that shipped in Feb. 2011 — saw even larger infection increases: 172% for x86, 182% for x64.

Microsoft blamed several factors for the boost in successful malware attacks, including less savvy users.

“This may be caused in part by increasing acceptance and usage of the newest consumer version of Windows,” said Microsoft in its latest Security Intelligence Report. “Early adopters are often technology enthusiasts who have a higher level of technical expertise than the mainstream computing population. As the Windows 7 install base has grown, new users are likely to possess a lower degree of security awareness than the early adopters and be less aware of safe online practices.”

Source…

Comments