Friday, November 8, 2013

Published 10:42 PM by

Lenovo increased its net profit by 36%

Lenovo increased its net profit by 36%

Manufacturer of personal computers Lenovo Group today reported a 36% rise in profits in the last quarter, and also confirmed the previously announced annual forecast of the financial results of the company against the improving sales of personal computers Lenovo. Analysts said the rise Lenovo profit comes amid growing concerns in the bright future of the PC industry. Most of the manufacturers of traditional PCs and laptops now feel a significant fall in both the finance and the number of vehicles sold to customers. In Lenovo said that to deal with falling sales the company develops smartphone business and trying to sell their own smart phones, not only in China but also outside it.

 Lenovo today announced that in the past quarter, the company reported net income of $ 219.7 million dollars that could be achieved through tighter cost controls and strong sales in the Chinese market is a stable generator of cash in the last four years, but then the yield is very low - in the last quarter margin was 6.8%, compared to 6% a year earlier. At the same time, the manufacturer recorded a drop in sales in North America and Latin America. Overall revenue increased by 13% to 9.77 billion U.S. dollars against 8.67 billion dollars a year earlier. Speaking about the company's smartphone business, it is for the year grew by 78% in the quarter, the company sold 12.3 million smartphones. Outside of the PRC company now sells its devices in a number of countries in Asia, Indonesia, Latin America, Russia, Middle East and Africa. In 2014, the company intends to enter the U.S. market.

Read More
      edit
Published 10:40 PM by

Groupon publishes quarterly data better than expected

Groupon publishes quarterly data better than expected

 Aggregator Groupon coupon offers today presented a quarterly report, which was slightly above market expectations amid intensification of management efforts. Note that the last quarter was the first for Groupon, which the company is fully finished with a new CEO Eric Lefkovski. During the reporting quarter, sales of Groupon rose 4.7% to U.S. $ 595.1 million, while net loss decreased to $ 2.58 million. Analysts on Wall Street had expected from Groupon 618 million dollars in revenue and $ 14 million net loss. Recall that formally the position of CEO of Groupon Eric Lefkovski was appointed on August 7, and before that for several months he served as CEO for the reconciliation. Lefkovski is also the co-founder and one of the first investors Groupon. The new CEO says he intends to position Groupon as a service that offers a huge number of single discounts, moving away from the classical principle of coupon services. According to him, the new model is more justified, since the work of the traditional canons kuponatorov already leaving. Following the publication of the quarterly data Groupon shares fell in price by 12.5% ​​to 9.50 dollars. Total since its IPO in 2011 paper Groupon declined in value by more than half. During the current quarter, a promotional service expects revenues of 690-740 million dollars, and operating income of 40-60 million dollars. Independent analysts expect Groupon revenue 723.7 million dollars, operating income of 46.1 million dollars.
Read More
      edit
Published 10:39 PM by

Twitter shares on the first day of trading increased by 73%

Twitter shares on the first day of trading increased by 73%


Microblogging service Twitter on Thursday completed its first day of trading on the Stock Exchange of New York NYSE. Starting traded at around $ 26 per share, the company made ​​the right marketing and financial account, since its shares to kontsk trading session up nearly 73% to 44.90 dollars per share, and in a moment of growth in the value of shares exceeding 85% of the price discovery. Investors say that during the IPO, the company earned in the sale of shares of U.S. $ 1.82 billion, while the holders of securities in the first day of trading at the expense of the sales transactions have earned another $ 1 billion on kursovom growth. According to statistics, the intraday rise more than 1 billion dollars of IT companies in the first trading day showed only Chinese company Alibaba Group.

Thus, micro-blogging service has been exposed at a higher assessment than Facebook, and its IPO has caused far less interest than the IPO Facebook . It is interesting to note that the interest of investors is on the background of the fact that Twitter is about five times less people than in Facebook, Twitter and the company has not yet become profitable since its inception in 2006. Nevertheless, investors are willing to evaluate it on the top rod cap, buying the company's shares initially high bar. According to the current market price of the shares, the total capitalization of Twitter is 24.9 billion dollars, accounting for 22 companies with annual revenue mark in annual sales of 1 , $ 14 billion.

 At the time of IPO Facebook that has been estimated at 11.2 annual revenue (LinkedIn - 11.7 Proceeds). By the way, against 73% growth in Twitter, Facebook shares today on the Nasdaq fell 3,2%, LinkedIn - by 4.2%. Recall that Twitter was originally going to place their securities at the price band in the 17-20 dollars per share, while after meetings with investors, as well as the promise of a promotion in the area of mobile services, the price range of accommodation has been increased to 23-25 ​​dollars per share, and on the eve of the IPO and up to 25-28 dollars. Obviously, this was done in the wake of an understanding of investor interest in the securities of the company. Nevertheless, many people, including those in Western markets, believe that Twitter's stock price more than $ 40 - it's too high a mark and now to purchase these securities have no sense - their growth potential has already developed and further growth can only be against profit, a significant audience growth or the introduction of some new and revolutionary solutions. "I was expecting a very strong opening, but when you begin to approach such price levels, then it is absolutely unfounded. Nothing supports this level.

All of this is starting to resemble a speculative strategy that many investors make more time to think, "- said Jeffrey Sica, chief investment officer of Sica Wealth Management in the U.S. New Jersey. According to market research firm Pivotal Research Group, now adequate price for Twitter is in the range of 30 dollars per share. Here they say that they are both analysts and investors worried by the fact that the company for 7 years and has not learned to earn, and the fact that investors want to invest there at such a high valuation. During the IPO, the company raised 1.82 billion Twitter dollars, while in 2004, Google raised $ 1.9 billion, but the latter has been profitable at the time.
Read More
      edit
Published 10:38 PM by

LG starts selling smartphone G Flex

LG starts selling smartphone G Flex


 Korean LG Electronics today announced that the previously announced Ships smartphone LG G Flex in the Korean market from November 12 at a price of 999,900 won, or about $ 940. In Europe, the device will appear in December. It is unclear when and in which countries it is, but we know that the operator Orange smartphone will appear in early December of this year. Information about the price in Europe until there is none. Smartphone LG G Flex will receive a 6-inch curved display with a resolution of 720p implies announced by LG Electronics technical specifications. The device will weigh 177 grams, the smartphone will be available in two "loops" so the thickness of some models will be 7.9 mm, others - 8.7 mm.

The device will operate on the basis of the most powerful 2.26-GHz quad-core Qualcomm Snapdragon processor and 800 support 2 GB of RAM, and there will be a 13-megapixel camera and a fairly capacious battery on 3500 mA / h. Like the Samsung Galaxy S4, there will be a mode two windows that allow you to work on one screen with two applications at once. In addition, the LG reported that the smartphone's an interesting effect - depending on how the device is unlocked, it will change your desktop, which is useful when the device is used for home and office use immediately. On top of this, LG reports

This unit is equipped with a special coating that is resistant to scratches and greasy fingerprints. The specifications LG did not say when the G Flex can appear in global sales, but it is known that in Korea, the company has planned to present it in November. Recall that this summer, LG has already shown prototypes of flexible displays for mobile smartphones and tablets, but then the company did not informed about the specific equipment models based on them.

 Note that the company Samsung Electronics, LG main competitor in the mobile market, is also working on a smartphone with a flexible screen. It is expected that the company will release in November spetsversiyu Galaxy Note 3 with a flexible screen. It should be noted that the very notion of what the phone is based on a flexible display does not mean that the phone can be twisted together into a tube or folded in half. This, in the case of devices LG and Samsung, says only that the screen there may be some non-standard shape. For example, the phone is designed as a curved "arch" that encircles the outer surface of the screen.

Read More
      edit
Published 10:36 PM by

Russian PC market continues to be in free fall

Russian PC market continues to be in free fall

IDC summed up the study of the Russian PC market in the third quarter of 2013. According to the IDC Quarterly PC Tracker, for the reporting period in Russia received about 2.71 million desktop and laptop PCs. PC market as a whole decreased by 30.7% in unit shipments and 23.9% in value terms compared with the same period last year. The five leaders of the Russian PC market for the quarter included the following companies: Lenovo (19,7% of the total number of deliveries made ​​during the quarter PC), Hewlett-Packard (15,5%), ASUS (14,3%), Acer Group (11,4%) and DNS (6,5%). The list of leaders in the segments of desktops and laptops has undergone significant changes. Shipments of desktop PCs declined by nearly 14.8% over the previous year and amounted to 907 thousand units.

The share of candy bars accounted for 15% of all delivered in the period of desktop PCs. Hewlett-Packard, DNS and Lenovo topped the list of leaders in the desktop segment. Completing the top five leaders of DEPO Computers and Acer Group. notebook segment decreased by 36.7% compared to the third quarter of 2012, while supplies of $ 1.8 million. The first line in the list of leaders is by Lenovo. This is followed by ASUS, Hewlett-Packard and Acer Group. "In the third quarter the PC market there is a slight increase in sales compared to the previous. However, as compared with the third quarter of 2012 there was a decline, which suggests a continuing trend of reduction of the PC market. Notebook sales in the consumer segment continued to decline in the volume under the pressure of rising popularity of tablets. Corporate segment demonstrates the stability and balanced development ", - the analyst Natalya Vinogradova.

Read More
      edit
Published 10:34 PM by

Samsung promises a 64-bit mobile processor

Samsung promises a 64-bit mobile processor


 Korean Samsung Electronics follows the path of Apple and states that close to completing work on his own mobile microprocessor with 64-bit architecture. Stephen Wu, president of Samsung LSI, says that the company uses a two-step approach - first, the company intends to base its processing on the existing and licensed 64-bit technology company ARM, secondly, it will create its own 64-bit solutions. "A lot of people think, why do we need a 64-bit mobile devices. People have asked this question three months ago. Today, no one asks about it. People say, when we can get them? "- Says Wu. Recall that the market's first 64-bit chips for mobile devices was the company Apple, which presented a 64-bit processor A7, based on the core ARM, but significantly modified and adapted engineers Apple. He works in the iPhone 5 and iPad Air. Wu did not say when it will finalize the Samsung processor, but stated that it is in line with the plans of Samsung. "We will offer the first 64-bit processor cores based on ARM, then we present a more optimized solutions with support for 64-bit and on the basis of our own decisions," - he said. He also noted that the 64-bit chips, mobile devices will become closer to the PC on the properties and capabilities. Modern processors in mobile devices and tablets have a 32-bit architecture. If the amount of RAM on your smartphone or tablet than 4 GB, the device in any case need a 64-bit chip, because 32-bit can not address more than 4 GB. On the market today there is no chip with 4 GB of RAM or more. Also, the company stated that the overall plan to increase investments in research and applied research. Parallel to this, Samsung said it plans to double the size of dividends and discusses its ADR listing on the U.S. stock market. At present, the paper presents Samsung in Seoul. The last step will make the company more understandable for international investors and make it easier for Samsung to attract capital to the current operating needs. On the other hand, the company is in the not too traditional for the IT giant step - the company plans to open its shares for individual non-professional investors, as this will raise the volume of trading in shares of Samsung, making them more liquid and lifting the share price. Among say that this year they are planning to get a global revenue of 211 billion dollars, while in 2020 this figure increased to 400 billion dollars. If Samsung is not going to follow the path of Western companies are actively buying up startups with new technologies. The Samsung say they plan to develop through internal innovation. In 2014, the company plans to make a bet on one of these innovations - flexible displays, on the basis of which will be made ​​not only smartphones, but also tablets, readers, televisions and other developments.


Read More
      edit
Published 10:32 PM by

Microsoft has introduced a series of updates for Office 365

Microsoft has introduced a series of updates for Office 365

Microsoft introduced a number of updates to Office 365 to provide users with ample opportunities for collaboration, communication and problem solving. updated service to the Microsoft Office Web Apps have been added to the automatic saving Word documents and collaborate on documents in real time - multiple users can simultaneously make changes and edit documents in Word Web App, PowerPoint Web App or Excel Web App; Updated sharing capabilities of Office 365 for advanced home. As early as next month, users of Office 365 for advanced home can share a subscription with your family.

Each family will be able to install any available application on your computer, Macbook, or on a mobile device, and get an additional 20 GB of cloud storage SkyDrive. Manage your installed applications will be on your "My Account." Currently, all Office 365 plans are integrated with Yammer Corporate and all Office 365 subscribers will receive the appropriate license. Office 365 users no longer need to purchase additional licenses for users working within the external network. In addition, Microsoft is a program Yammer Partner Enablement, in which the corporation's specialists will share their deep expertise in the field of promotion and implementation of successful social enterprise projects in the first half of 2014 will be publicly available technology Power BI to Office 365.

 This technology makes it simple and convenient process of creating a bright and vivid illustrative materials, combining private and public information in the cloud, thus motivating people to rapid decision-making. Recent updates will complement a wide range of more than 100 improvements that were made ​​available to members in the Office 365 year.

Among them: the emergence of a mobile version of the service Office Mobile, through which subscribers can install and use the Office applications on different devices, including running iOS and Android, new ways to use gestures when working with applications Microsoft Office Web Apps and browsers that support touch control , on tablets running Windows 8, and iOS. Additionally, there were significantly increased volumes available to users for data storage : Professional SkyDrive cloud storage - c 7 GB to 25 GB mailbox on the server Exchange Online - from 25 GB to 50 GB. OneNote has become a popular application available on iPhone, iPad, and Android-powered devices and for devices running Windows RT was released, Outlook 2013 RT.
Read More
      edit
Published 10:30 PM by

I stole bitcoin resident of Australia for $ 1 million

I stole bitcoin resident of Australia for $ 1 million

Australian resident claims that he was the victim of a major, but virtual, robbery. According to him, unknown hackers have stolen his nearly $ 1 million, which he kept in virtual currency Bitcoin. Bitcoin wallet files located on its website. Australia, whose name was not disclosed, said that hackers stole his 4100 virtual coins Bitcoin, each of which costs about $ 270, that is, the total amount stolen is a little over $ 1 million. In an interview with the Australian TV channel ABC, a man who introduced himself as TradeFortress says he was "a little more than 18 years," play money were his property, but the police in Australia, he will not apply, as the bitcoin-transaction can not be traced. "Police have access to my financial data is no more than the rest of Bitcoin users "- said the young man. Note that the system is based on a peer to peer bitcoin haraketere transactions, so it does not have a central server, which would coordinate the transaction. Online are several exchange offices, which can lead Bitcoin from the Internet, exchanging them for real money or to reverse the operation. newspaper Sydney Morning Herald, citing its sources reported that the Australian TradeFortress kept online resources at the service of digital wallets Inputs.io that including acting and as a repository for bitcoin.
Read More
      edit
Published 10:29 PM by

Snowden has used other people's usernames and passwords to access the data NSA

Snowden has used other people's usernames and passwords to access the data NSA

A former employee of the National Security Agency (NSA), USA Edward Snowden, who became famous after the exposure of Western intelligence agencies have used other people's usernames and passwords to get access to classified material, which he later gave to the media, said Friday the agency  Reuters  , citing unnamed sources.

This became known during the investigation that the U.S. government carried out to identify vulnerabilities in security intelligence, and find out what other data is not made public by journalists, were in the hands of Snowden. Sources told Reuters that the investigation was delayed because the debunkers were able to "cover up" their tracks by hiding information on what documents he downloaded. In particular it could be possible through the use of foreign credentials to log into the system.

According to a source familiar with the investigation, several employees of the NSA Operations Center in Hawaii, where before fleeing to Hong Kong has worked Snowden, were questioned and taken off the tasks that they perform. Sources were unable to answer whether they had been fired or have other tasks not relating to access to private databases. We are talking about approximately 20-25 analysts, said one official. According to investigators, Edward Snowden ugovarivaril them to provide him with their usernames and passwords to gain public documents to which he had access, said another source. Their requests Snowden, Acting System Administrator, explained by the fact that the passwords are necessary for it to carry out its work.

The representatives of the NSA and the Office of the Director of National Intelligence declined to comment. Snowden has worked at the center of the NSA in Hawaii for a month in the spring of 2012. During this time, he copied tens of thousands of internal documents of the service, which in June 2013 to journalists for publication, according to  Forbes .
Read More
      edit
Published 10:28 PM by

In the Internet Archive was a fire

In the Internet Archive was a fire

Non-profit organization Internet Archive, managing network project of the same name with a giant data warehouse damaged by fire. The group that manages the archive of web pages total size of more than 364 billion pages, notes that the data in the fire were not injured, but the overall damage to the building, more than 600 thousand dollars. "Now it is difficult to assess the situation, we will announce later on what exactly have been damaged, "- said the Internet Archive founder Brewster Kahle.

According to him, the Internet Archive copies of the data are carried on different datacenters, so even if the main building is a fire, then the integrity of the data that should not affect. At the same time, Kale noticed that some data were still lost, damaged equipment as the repository. Kale said that after the completion of the research building, they begin to identify exactly what was lost.

Internet Archive was founded in 1996 for the purpose of storing digital content such as web pages, music, pictures and e-books. In October last year, the band announced that the total volume of its storage exceeded 10 petabytes (10 million gigabytes). In addition, the archive contains a record of some news reports, television shows, different TV shows. basis of representation Internet Archive, where there was a fire in San Francisco. The Fund exists on donations, as well as provides services for commercial digitization of content.
Read More
      edit
Published 10:23 PM by

"Kaspersky Labs' patented recognition technology packed and encrypted malware

"Kaspersky Labs' patented recognition technology packed and encrypted malware

"Kaspersky Lab" has received a patent for a system that helps detect malware, modified by c not seen before or packers shifrovschikov. The technology is already integrated into the core of security solutions for home and business users. Packers and shifrovschiki (which can be considered as a special case packers) create a container file, which is placed in the original version of the malware and it needed to decompress or decrypt the code. Attackers use these tools to modify malware in order to impede his search for security solutions. Such modification can change the binary form of the program, which is one of the ways to bypass the signature verification.

Even if the anti-virus database contains the signature of the initial sample of malware, then use it to not be able to detect a compressed version of the program. On the other hand, programs that have changed popular wrappers can be detected using heuristic rules. But if an attacker will create its own wrapper with a unique algorithm, the detection of a threat would be much more difficult. patented technology is a method of analysis, in which each new wrapper, a special profile - a general description of its behavior. Using this profile, then lets you detect malicious program using a modified packer, for transactions which it produces after launch. In practice, the technology works as follows: first anti-virus solution, guided by its own set of rules determines that a suspicious file, got to his analysis, can be modified by a previously unknown packer, and then turns to the patented "Kaspersky Lab" technology.

 She, in turn, triggers each file in the emulator and logs all actions performed by the code responsible for decoding and running malicious software. These operations are machine-sorted and analyzed to identify patterns that describe the behavior of the packer. At the final stage on the basis of the data profile is created, which will then be possible to successfully detect other files modified by this wrapper. "Previously, the behavior of the Packers for the most part remained hidden for analysis, and our technology makes possible a full scan objects and, as a consequence, increases the level of protection of the user.

In addition, the technology allows us to describe the behavior of an unknown packer in a form that is suitable for use in a protective solution and at the same time, the analyst will understand, "- says Maxim Golovkin, the expert" Kaspersky Lab "on the malware and the author of the patented technology. Patented already working in such products "Kaspersky Lab" as Kaspersky Internet Security for all devices and Kaspersky Security for business. Patent number 8,555,392, confirming the novelty of technology, issued by the Registrar of Patents and Trademark United States.
Read More
      edit
Published 10:21 PM by

The third quarter was a slight drop in spam

The third quarter was a slight drop in spam

In the third quarter of 2013, "Kaspersky Lab" noted reduction in the overall level of spam in mail traffic of 2.4%. However, the final figure of 68.3%, only 0.3% lower than the average for the first half, so to speak of a stable trend of decline in the share of spam in email is not necessary. In addition, for the period from July to September is 3 times the share fishinovyh letters, as well as significantly increased the level of messages with malicious attachments - up to 3.9%, which is one and a half times more than in the previous period.

As noted by analysts of "Kaspersky Lab "the most creative in the third quarter of 2013 were spammers, promoting, perhaps the most famous product of the spammer advertising - a means to increase potency. The letters on similar subjects were used as tricks to bypass filters and techniques of social engineering. For example, in one of the mailing lists, spammers have taken the following trick: in the subject header they indicated a word that looked like Viagra, that's just made ​​up that word was the most different symbols used, including a very rare and even dead languages. Combining hundreds of different signs, eye catchy word can be written to hundreds of millions of ways - and each of these sets of characters will not cause suspicion among the spam filters, and the recipient will easily recognize the advertised goods so.   detected malicious emails in the third quarter of 2013, mainly with the simulated distribution news resources, good reasons for this were many: and the birth of a child from the UK royal couple, and the FBI hunt for Edward Snowden, and the accident on the railway in Spain.

 References in all such letters were predictably to hacked sites that redirect the user to a page with one of the most popular sets of exploits - Blackhole. In the case of this vulnerability exploit downloaded to your computer, several malicious programs, including Trojans, spyware, stealing personal data. Meanwhile, leader of the rating the more common e-mail traffic of malware in the third quarter by a wide margin was the Trojan Spy.HTML. Fraud.gen, which is an HTML-page, mimicking the registration form on-line banking service. With this malware scammers steal financial information users. third quarter of 2013 was a record year in the number of spam emails short - their share has reached 80% of the total e-mail traffic. Throughout the year, the experts "Kaspersky Lab" noted that each quarter of letters of no more than one kilobyte is growing. And the third quarter confirmed this trend. Today, most spam messages almost no text, spammers are placed only link that usually leads to a site-redirector service or short links.

These e-mails, on the one hand, complicate the work of the spam filters, and on the other, due to the small size can be quickly sent out in huge numbers. Regarding phishing, during July, August and September 2013 attackers traditionally most often counterfeited notice the different social networks. In addition, the center of their attention got mail and search services. Totally on these three categories accounted for more than 60% of all phishing attacks from the TOP-100 attacked organizations.

This impressive figure confirms that the monetization of phishing occurs largely through the sale of stolen accounts, which, in turn, can be used to send spam on the contact list. leaders among the countries of spam, for the third quarter of 2013 to remain China (-0.9%), the USA (+1.2%) and South Korea (2.1%). Together, these three countries sent more than 55% of all spam in the world. , in turn, Russia has increased its stake in the rating of one and a half times, and eventually finished fifth. It is interesting that despite the increase in spam from Russia decreased the number of unsolicited messages sent from the former Soviet republics - Belarus (-0.9%), Ukraine (0.9%) and Kazakhstan (1.5%) - which the results of last quarter in the ranking ahead of Russia. This may be caused, for example, that instead of one botneta spammers responsible for some rather large distribution began to use another.

Read More
      edit
Published 10:18 PM by

"Kaspersky Lab" has updated security solution for small businesses

"Kaspersky Lab" has updated security solution for small businesses

"Kaspersky Lab" has updated security solution for small businesses of up to 25 jobs - Kaspersky Small Office Security. This new version includes advanced protection mechanisms and significant improvements in the previously existing features. Among the innovations - technology "Secure Payment", which provides security of financial transactions on the Internet at all stages, automatic protection against exploits, which prevents the execution of attacks using zero-day vulnerabilities, password manager, automatic backup service, including the option's backup Internet using popular cloud services.

 As part of the acquired licenses for the first time a client receives protection for mobile devices running on the platform of Android, including the blocking of malicious software, internet security, privacy and the ability to customize mechanisms to detect and block a stolen or lost device. distinctive feature of Kaspersky Small Office Security is easy to set up and manage IT-security company. The Setup Wizard provides a quick deployment of solutions in several steps, offering a choice of a minimum set of parameters. Through an intuitive user interface to easily configure the operation of complex mechanisms, such as encryption, data backup , the policy of access control.

Read More
      edit
Published 10:16 PM by

Huawei invests $ 600 million in 5G-technology

Huawei invests $ 600 million in 5G-technology

Huawei is planning to invest in technology research 5G in 2018 of $ 600 million is projected Huawei, the first 5G network will be launched into commercial operation in 2020, will allow for data transfer rates of over 10 Gbit / c, which is 100 times higher than the rate Today's networks 4G . Eric Xu (Eric Xu), CEO of Huawei, said: "Along with the fact that we continue to expand the capacity of existing networks to 4G, over the next 5 years, we plan to make significant investments in research technology mobile network 5G, that will allow us to meet customer requirements for speed and quality of connections.

In the ad does not include the investments made ​​to develop the equipment. 5G network with a maximum data transfer rate in excess of 10 Gb / s per second will download HD-video and implement a realistic video ". Huawei has invested into the development direction of 5G networks in 2009. At the Mobile World Congress in 2011 and 2012, Huawei demonstrated a prototype 5G base stations with a maximum bandwidth of 50 Gbit / s.

To date, Huawei has participated in research projects of the European Union, worked on the creation of the Innovation Center 5G (5GIC) in the United Kingdom and has been involved in joint research programs with more than 20 universities around the world. "There are a number of tasks that need to be resolved before 5G incarnation in life - said Xu. -

 It is the presence of the frequency spectrum and technological issues, such as the development of a network architecture capable of processing large volumes of data and support transfer rates required to support large numbers of users. By 2020, 6.5 billion people worldwide will use mobile data networks, and 100 billion devices, such as cars, measuring, medical and household appliances will also be connected to the network through 5G. We have already achieved a major technological breakthrough in this area, but the main achievements are yet to be. "

Read More
      edit
Published 10:11 PM by

The release of Slackware Linux 14.1

The release of Slackware Linux 14.1

 Project Slackware Linux Project today announced the release of the operating system Slackware Linux 14.1. As the curator of Slackware Patrick Volkerding, the new version of the long-running Linux-distribution developers have implemented a number of improvements, while maintaining the traditional Slackware for stability and security, which are waiting on this operating system. A new version of the distribution developers have included the latest version of the popular desktop environments like Xfce 4.10.1 and KDE 4.1.0.5.

Both versions of the graphical environments support graphical version of the popular Linux-tools udev, udisks, udisks2, as well as all of the canonical specification freedesktop.org, allowing wrappers to work with different equipment, as well as a wide range of USB-carriers, cameras, music players and other application solutions . As the kernel is used in Slackware 14.1 Linux Kernel 3.10.17, where developers have added support for the new journaling file systems, hardware acceleration X DRI, allowing means "iron" computer accelerate three-dimensional graphics on algorithms implemented in X DRI.

 Recall that traditionally Slackware supports two types of Linux-kernels, "giant" core, where all the drivers are supported, and it is used to determine the proper installation and hardware filling systems, as well as "normal" nucleus where drivers are loaded as modules, and the core itself is quite compact. Among Other features of the OS can provide support for compilers gcc-4.82, and the LLVM and Clang. In addition, the developers say that Slackware 14.1 can be installed on systems equipped with UEFI podderdzhkoy at the motherboard.
Read More
      edit
Published 10:10 PM by

Microsoft wants to cooperate with the club Real Madrid

Microsoft wants to cooperate with the club Real Madrid


Microsoft Corp. confirmed that it is negotiating with the Spanish football club Real Madrid on getting the name of his rights to the Bernabeu Stadium. Sports arena for 85,454 seats is now called after the former president Santiago Bernabeu. President of the Spanish division of Microsoft has confirmed that negotiations are conducted between the parties, but they are at an early stage.

"We just asked the club that possibility," said Maria Gara, head of Microsoft in Spain. How exactly will be called, according to Microsoft, the arena is not yet clear, but the users in the network already in full joke on the matter - The Gates Ground, Microsoft Estadio or Christiano RonalDOS. At the same time, many fans of the Spanish club say they do not like the product of an American company and they would not like to have their home stadium somehow associated with the corporation.

 At the same time, by themselves neymingovye such transactions are not what something totally unexpected. For example, in the English Premier League Emirates airline cooperates with club Arsenal and Etihad sponsors Manchester City, the German Bayern plays home games at the stadium called the Allianz Arena, after the club signed a 30-year agreement with Allianz.

Read More
      edit
Published 10:06 PM by

Mega file sharing out of beta

Mega file sharing out of beta




 After nearly a year after the launch of a secure file hosting Mega, Kim Dotcom today announced that the project is officially out of beta stage. He said that the innovative Mega distributed file system is ready for storage of large volumes of data, and in the coming months, users of the project will see new functionality. Following the withdrawal of beta-testing the basic structure of the site and the user interface has not changed. It still has a navigation bar, the main look-up area, service buttons at the top and the structure of files and directories on the left. 

If you omit the brackets some interface innovations such as a more stylish buttons, the engine Mega become more nimble, users have new opportunities quickly control settings profiles. accompany the release of the stable version, the draft said that became available to users Firefox-extension Mega, which allows from the browser to work with the repository on the basis of a remote folder.

 In many ways, Firefox-like extension of the extension for Chrome, which was released in July. Dotcom also said that by the end of this month, users can download a separate desktop client Mega and iOS-application to work with the system. In the longer term (if Dotcom, of course, will not give the U.S.), the service promises to put into operation a system of secure e-mail and encrypted messaging. Now when Mega encrypts only the stored files.

Read More
      edit