Random Post

Monday, August 11, 2014
no image
IBM has announced the latest version of its neurosynaptic processor -- that is, a processor whose workings are inspired by the human brain. Built on Samsung's 28nm process technology, it has 5.4 billion transistors and an on-chip network of 4,096 neurosynaptic cores. IBM claims it is the first neurosynaptic chip to achieve 1 million programmable neurons, 256 million programmable synapses, and 46 billion synaptic operations per second. The size of a postage stamp, the processor consumes just 70mW of power during real-time operations.


10:49 AM

IBM has announced the latest version of its neurosynaptic processor -- that is, a processor whose workings are inspired by the human brain...

Read more »
no image
Intel on Monday introduced its Broadwell processor platform to the world, and it is an impressive piece of technology. Stepping outside of its normal two-step process of first releasing the processor and then updating the platform, Intel is doing both this cycle, and the end result is a massive step forward in terms of size and power efficiency. Intel is stepping solidly into turf once owned by the ARM technology most commonly found in tablets and smartphones. Intel's prototype tablet actually is thinner and lighter than an iPad Air.


9:33 AM

Intel on Monday introduced its Broadwell processor platform to the world, and it is an impressive piece of technology. Stepping outside of...

Read more »
no image
Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this week told an audience at the Black Hat security conference in Las Vegas that Android, BlackBerry and some iOS devices are vulnerable. The problem lies in a device management tool using the OMA Device Management Standard, which carriers embed into mobile devices in order to configure them and push over-the-air firmware updates, among other things.


6:54 AM

Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this wee...

Read more »
no image
Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. The first approach has proven to be too complex, too time consuming and too risky -- in other words, "too hot." Meanwhile, network level security that consists of perimeter devices lacks the intelligence to know what's going on inside the application in order to be effective. This approach is "too cold." A third alternative is to place security inside the Java virtual machine.


6:33 AM

Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. T...

Read more »
Friday, August 8, 2014
no image
IBM has announced the latest version of its neurosynaptic processor -- that is, a processor whose workings are inspired by the human brain. Built on Samsung's 28nm process technology, it has 5.4 billion transistors and an on-chip network of 4,096 neurosynaptic cores. IBM claims it is the first neurosynaptic chip to achieve 1 million programmable neurons, 256 million programmable synapses, and 46 billion synaptic operations per second. The size of a postage stamp, the processor consumes just 70mW of power during real-time operations.


3:36 PM

IBM has announced the latest version of its neurosynaptic processor -- that is, a processor whose workings are inspired by the human brain...

Read more »
no image
The Peppermint OS is built around a concept that may be unique among desktop environments. It is a hybrid of traditional Linux desktop applications and cloud-based apps. This innovative approach puts the latest release, Peppermint OS 5, well ahead of the computing curve. It brings cloud apps to the Linux desktop with the ease and flexibility of a Chromebook. It marries that concept to the traditional idea of having installed software that runs without cloud interaction. However, the Peppermint OS is not tethered to Google Apps.


2:55 PM

The Peppermint OS is built around a concept that may be unique among desktop environments. It is a hybrid of traditional Linux desktop app...

Read more »
no image
Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this week told an audience at the Black Hat security conference in Las Vegas that Android, BlackBerry and some iOS devices are vulnerable. The problem lies in a device management tool using the OMA Device Management Standard, which carriers embed into mobile devices in order to configure them and push over-the-air firmware updates, among other things.


12:34 PM

Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this wee...

Read more »
 
Google Analytics Alternative