Sunday, March 7, 2010

6-core Gaming Chip


Weeks from now, Intel is expected to introduce a 6-core processor designed to crunch through the most 3D-intensive games.

Napoleon: Total War and alike 3-D-intensive games could be first seen this year’s Developer’s Conference a week from now. While the official Intel’s 6-core “Westmere” processors can be expected later this March.

Primarily, Core i7-980X is Intel’s first 6-core “Extreme Edition” processor based on the chipmakers cutting0edge 32 nanometer process technology. Its performance depends on how small the manufacturing process. The smaller, the more circuitry can be packed onto the chip making it better.

Core i series processors features hyper-threading. Hyper-threading can double the number of task or threads a processor can execute. This enables 6-core processor to be able to handle 12 threads. However this technology is not offered to Core 2 chips.

by: Ella May Galindez
Source:http://news.cnet.com

New and Improved Facebook Pictures


Photo’s that brings more people on using facebook has now improved.

Facebook has improved their photo storage which has started just three days ago and is now well operating. From 604 pixels that can be uploaded, it has now improved to 720.

It is good news for facebook users. They can now view their friends and fb friends clearer and even larger. They could also upload bigger photos. And larger number of pictures coukd be added in their albums.

by: Ella MAy Galindez

Source:http://www.msnbc.msn.com

Rootkit: New Threat

Smart phones are now becoming regular PC with further development and changes on its features. Recently, new models of cellular phones offer internet accessibility just like e-mails and other variety of programs or applications commonly known as “apps”. This makes cell phone susceptible of malware.

Rootkit attacks the heart of a computer’s software. It could cause a smart phone to eaves drop, track the owner, and drain the battery which makes the phone of no use. This happens without the owner‘s knowledge.

Rootkit can only be detected from outside a corrupted operating system or through its external. Virtual machine monitor is the specialized tool that examines every system operation and data structure.

Its effect could be very harsh. Smart phone users tend to carry their phones most of the time or almost all the time for personal and business use. This gives the attacker great chance to eaves drop, or on worst case, extract personal info from phone directories or even know the exact location of the owner through querying the phones Global Positioning System (GPS) receiver then finally drains the battery leaving it dead.

by:Ella May Galindez
Source: http://www.sciencedaily.com/

New Code: Algorithm


Computers have been vexed by computer worms for so many years now. Worms are malicious computer programs which if it infected the computer, can spread throughout the network without human control. Once the worms have penetrated in the system, it then pest the computer by stealing or erasing hard drive data, interfering with pre-installed programs causing it to become slow, and it even crash home and work computers.
A new code has been developed just as to solve the problem on these computer worms. Yoon-Ho Choi, a postdoctoral researcher in information sciences and technology together with his colleagues created the new code or commonly known as algorithm which helps protect computers from malicious worms.
Algorithm works by estimating the size of the suggestive host population. From there, it monitors the occurrence of infections within the area. Then, it sets a threshold value just enough the average numbers of scan necessary to infect a host by an infected host.
by: Ella May Galindez
Source: http://www.sciencedaily.com/

Making “SMART” Technology

For years now SMART Communications Inc. has served us with good technology to get in touch with our loved ones. They have not stopped and developed furthermore for our benefits. And their hard works have not failed them for bragging 3 out of 11 awards during the Mobile Asia Congress held in Hongkong by the GSM association (GSMA) – the global trade group for the mobile industry.
“Being recognized for our efforts to bring the benefits of mobile- based financial services to the grassroots through Smart Money as well as Smart’s Island Activation Program and make a difference in people’s lives is as much challenge as it is an honor.” Smart chief wireless advisor Orlando B. Vea said dedicating the awards to the Filipino people.
SMART MONEY
Through Smart money, the world has first benefited from cash payment card linked to a mobile phone. It has now reached the Philippines and launched the countries first mobile- based internet security lock feature that enables Smart subscribers to make more secure online purchases with the help of mobile phones.
Online fraud and other potential abusers are not to be frightened of. It is prevented by the new security feature that unlocks the Smart money account prior to a purchase and then automatically locks it after the transaction.
Input of Personal Identification Number (PIN) via mobile phones are required to all card holders that purchases online via Smart Money to signify that an online transaction has been sanctioned.
Another good feature of Smart Money is that it gives the Smart subscribers the opportunity to manage their money from their mobile phones whenever they want, wherever they maybe as Smart Money insure to notify account holders via SMS whenever transactions are made on their account.

by: Ella May Galindez