|In a new era of gaming defined by Ultra HD displays, AMD(NYSE:AMD) has unveiled the AMD Radeon R9 290X, R9 290, R9 280X, R9 270X, R7 260X and R7 250 graphics cards. AMD also introduced Mantle and AMD TrueAudio technology which will redefine the GPU by enabling both gamers and game developers with unprecedented audio and performance enhancements for compatible games. These introductions are believed to strengthen AMD’s approach for providing a consistent gaming experience on the PC, in the living room or over the Cloud.
The award-winning Graphics Core Next (GCN) architecture in the AMD Radeon R9 and R7 Series graphics cards continues to serve as a driving force behind the Unified Gaming Strategy. The award-winning Graphics Core Next (GCN) architecture in the AMD Radeon R9 and R7 Series graphics cards continues to serve as a driving force behind the Unified Gaming Strategy. The four pillars of the Unified Gaming Strategy – console, Cloud, content and client – come together with the introduction of Mantle.
Matt Skynner, Corporate Vice-President & General Manager, Graphics Business Unit, AMD, said, “These graphics cards are new GPUs for a new era in gaming. This era is shaped by ultra-resolution gaming and an exciting new generation of highly-anticipated games like ‘Battlefield 4’. But it is also an era shaped in a very powerful way by our own Unified Gaming Strategy. We have teamed up with the world’s top game developers to establish a comprehensive portfolio of games that you can maximize to their full potential only with AMD Radeon graphics…….See More
Month: September 2013
|Kaspersky Lab’s security research team has published a new research paper on the discovery of “Icefog”, a small yet energetic APT group that focusses on targets in South Korea and Japan, hitting the supply chain for Western companies. The operation started in 2011 and has increased in size and scope over the last few years.
“For the past few years, we have seen a number of APTs hitting pretty much all types of victims and sectors. In most cases, attackers maintain a foothold in corporate and governmental networks for years, smuggling out terabytes of sensitive information,” said Costin Raiu, Director, Global Research & Analysis Team.
Based on the profiles of identified targets, the attackers appear to have an interest in the following sectors – military, shipbuilding and maritime operations, computer and software development, research companies, telecom operators, satellite operators, mass media and television. Research also indicated the attackers were interested in targeting defence industry contractors such as Lig Nex1 and Selectron Industrial Company, shipbuilding companies such as DSME Tech, Hanjin Heavy Industries, telecom operators such as Korea Telecom, media companies such as Fuji TV and the Japan-China Economic Association.
Kaspersky researchers have sink-holed 13 of the 70+ domains used by the attackers. This provided statistics on the number of victims worldwide. In addition, the Icefog command and control servers maintain encrypted logs of their victims together with the various operations performed on them. These logs can sometimes help to identify the targets of the attacks and, in some cases, the victims. In addition to Japan and South Korea, many sinkhole connections in several other countries were observed, including Taiwan, Hong Kong, China, the USA, Australia, Canada, the UK, Italy, Germany, Austria, Singapore, Belarus and Malaysia…..See More
dataserv APAC has reportedly partnered with CII on their conference “Green Growth: The Only Way Forward” with a view to bringing together important stakeholders like RWAs, students and industries and apprise them of their responsibility to dispose waste from electrical and electronic equipment responsibly.
Amit Sardana, Managing Director, dataserv APAC, addressed the conference and gave a presentation on “Partnership with Colleges and RWAs for e-waste Collection”. Following the presentation, members of RWAs and students at the conference signed a pledge to act as responsible citizens of the society and ethically recycle the waste from electrical and electronic equipment generated in the community or college with the support of dataserv APAC’s free pickup and recycling services. They all displayed a strong commitment towards environment sustainability by working jointly on management of end-of-the-life electrical and electronic equipment.
Amit Sardana further said, “At dataserv APAC, we believe that the very first step towards responsible disposal of waste from electrical and electronic equipment is awareness. Unless people understand the implications of improper disposal of e-waste, they will not be motivated to ensure ethical and environmentally friendly disposal. As a next step, we introduced a free pickup and recycling service for all residents and corporates of Gurgaon. After seeing the enthusiastic response of all the stakeholders in signing the pledge, I am hopeful that the e-waste menace can be effectively managed with their cooperation…..See More
LG has launched its latest flagship smartphone – the G2 – in India. The smartphone sports a dimension of 138.5 x 70.9 x 8.9mm, weighs 143 grams. The LG G2 features a 5.2-inch full-HD (1080×1920) display, with a pixel density of 423 pixels-per-inch (ppi). It is powered by 2.26GHz Qualcomm’s quad-core Snapdragon 800 processor and runs on Android Jelly Bean 4.2.2 operating system. The device comes with 2GB of RAM and offers 16GB and 32GB storage options.
The LG G2 sports a 13.0-mega pixel rear camera with Optical Image Stabilization, 2.1-mega pixel front shooter and is powered by a 3,000mAh battery. It comes with a design that features the power buttons and the volume rocker at the back of the phone, below the rear camera, instead of the sides of the phone, as is usually the case. As per LG, this smartphone is completely devoid of side buttons. The rear key is the only physical key on the LG G2.
Soon Kwon, M.D., LG India explained, “Our focus with G2 is to give our customers a phone that is smart and convenient, in every way- a unique design, a large display, high quality camera with Image Stabilizer, true studio like sound and compelling user experience. LG G2 is a perfect phone that epitomizes our DNA, innovation.”
“With the launch of G2 our aim is of capturing 10% market share of the Smartphone category by the end of 2014. We are targeting 150 Cr turnover from G2,” added Kwon……See More
There is a sigh of relief for those electronic companies who have not got the BIS certification for their products yet. As per the latest information, the Indian Government has decided to extend the deadline for mandatory registration of all the products they sell.
Earlier, companies were given a deadline till 3rd October to get their products (including videogames, microwave ovens, laptops, tablet computers, projectors, servers and LCD televisions) certified by theBureau of Indian Standards (BIS), a compulsory requirement for the sale of such products in India.
The crucial decision was taken at a meeting between Kapil Sibal, the Union Minister for Communications and Information Technology (IT), and the representatives of the industry along with some other trade lobby groups.
It is worth noticing here that the Government has already extended the deadline twice because of absence of enough labs where the products can be registered. A person familiar with the matter informed the VARINDIA team that only 50 per cent of the products have got BIS certification, as of now.
According to J. V. Ramamurthy, President of the Manufacturers’ Association of Information Technology (MAIT), and President and Chief Operating Officer of HCL Infosystems Ltd, “With new applications being submitted every day, it is impossible to clear the entire backlog before 3 October.”
However, it is difficult to say anything confirmed on this as no official from the Indian Government has announced anything about the extension of the due date for BIS certification. So, stay tuned to varindia.com to get further update on this…….See More
A high-performance corporate network storage solution named TeraStation TS3400D has been launched by Buffalo Incorporation for small businesses, branch offices, home offices, and power users, at an affordable price. As a NAS (Network Attached Storage), the TeraStation TS3400D allows users to access data faster. It is simple to configure and easy to administer. These units also support iSCSI, feature over the Ethernet. ISCSI feature used to add virtualized storage to the network, optimizing resources while reducing costs.
The dual-core Marvell ARMADA XP 1.33 GHz processor and 1GB DDR3 RAM of TeraStation provides faster transfers and backup of data-intensive files and stall-free imaging and recording with IP cameras.
With the transfer speed of over 90 Mbps, the users of TeraStation have to spend less time waiting for transmissions and backups while enjoying better quality video and vastly enhanced overall performance. This also increases the efficiency of operations and improves the business.
The TeraStation TS3400D comes with different RAID modes that can be selected for optimizing failure resistance, speed, capacity, or a combination. The internal drives of TS3400D are hot-swappable and can be replaced in the event of a hard drive failure without switching off the power. It also comes with hot spare function…….See More
According to Kaspersky Lab figures, it has been reported that in August, unsolicited emails made up 67.6% of all global email traffic which has gone down 3.6 percentage points as compared to July. Further, it was found that the rate of phishing messages rose more than ten times compared to July, while the volume of spam messages containing malicious attachments rose 2.5 times, accounting for 5.6% of all email traffic.
August also saw a ten-fold increase in the proportion of phishing messages. Kaspersky Lab reported mass mailings that appeared to come from an official Apple address that asked recipients to confirm their iTunes account details by following a link. The favourite target of phishing attacks, however, remains social networks.
The names of popular international delivery services such as FedEx, UPS or DHL, also appear frequently in spam messages. In some cases, the attached files supposedly contain information about the non-existent parcels.
In summer, spam becomes much more dangerous. The number of scam messages increases and so does the number of messages containing malicious attachments. Remember, it is very rare for reputable organizations to ask you for your private data, to confirm account details without advance notice, or to open email attachments. If this happens, it is advisable to contact the support line of the organization named in the email, and ask if they actually sent it, commented Tatyana Shcherbakova, Senior Spam Analyst, Kaspersky Lab.
In August, Kaspersky Lab continued to record mass-mailing adverts for online learning courses…….See More