Intel’s next-generation Broadwell CPUs delayed due to yield problems

Intel’s next-generation CPUs will arrive slightly later than expected. Intel During the company’s third quarter earnings call yesterday, CEO Brian Krzanich announced that production of Intel’s next-generation Broadwell CPUs would be delayed slightly due to manufacturing issues. CNET reports that a “defect density issue” in the new 14nm manufacturing process was causing lower-than-expected yields, and that Intel’s first round of fixes didn’t improve the yields by the expected amount. Krzanich expressed “confidence” that the issue had been fixed and that it was just a “small blip in the schedule,” and that the CPUs would begin mass production in the first quarter of 2014 rather than the fourth quarter of 2013 as expected. Broadwell’s successor, codenamed Skylake and due in 2015, will apparently not be affected by the delay. Broadwell is a “tick” on Intel’s CPU roadmap, a refined version of the current Haswell architecture built on a new manufacturing process. Intel typically doesn’t introduce a new architecture and a new manufacturing process simultaneously to reduce the likelihood and severity of manufacturing issues like these. Even with the delay, Intel will still be producing 14nm chips while most of its chipmaking competitors (including TSMC and Samsung) are rolling out their 20nm processes. Intel hasn’t gone into much detail on what Broadwell will bring to the table, but smart money says that it will further reduce power usage over Haswell while also increasing CPU and integrated GPU performance incrementally. The company announced at its Intel Developer Forum this year that it was seeing a ” 30 percent power improvement ” over Haswell in early production samples, a number which may stand to improve as the process matures and yields get better. Read 1 remaining paragraphs | Comments        

More:
Intel’s next-generation Broadwell CPUs delayed due to yield problems

New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

For nearly a decade now, TrueCrypt has been one of the trusty tools in a security-minded user’s toolkit. There’s just one problem, though. No one knows who created the software, and worse still, no one has ever conducted a full security audit on it—until now. Since last month, a handful of cryptographers have newly discussed problems and alternatives to the popular application, which lead on Monday to a public call to perform a full security audit on TrueCrypt. As of Tuesday afternoon, that fundraiser reached over $16,000, making a proper check more likely. Much of those funds came from a single $10,000 donation from an Atlanta-based security firm. “We’re now in a place where we have nearly—but not quite enough—to get a serious audit done,” wrote Matthew Green , a  well-known cryptography professor at Johns Hopkins University, on Twitter. Read 3 remaining paragraphs | Comments        

See original article:
New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

Obamacare site hits reset button on passwords as contractors scramble

Getting to this page on the Healthcare.gov site is just the start of the battle for would-be insurance customers. Sean Gallagher Amid all the attention, bugs, and work happening at Healthcare.gov in light of the Affordable Care Act, potential registrants talking to phone support today have been told that all user passwords are being reset to help address the site’s login woes. And the tech supports behind Healthcare.gov will be asking more users to act in the name of fixing the site, too. According to registrants speaking with Ars, individuals whose logins never made it to the site’s database will have to re-register using a different username, as their previously chosen names are now stuck in authentication limbo. The website for the Affordable Care Act (aka “Obamacare”) launched just last week. With all the scrutiny and debate happening, if ever there was a website launch that was “too big to fail, ” this was it.  So, of course, it did—depending on how you define “failure.” The inability of Obamacare portals to keep up with the traffic demands initially put upon them has been seized by politicians and conservative pundits as evidence that Obamacare “is not ready for prime time” in the words of Sen. Orrin Hatch (R-Utah). Now, a week later, the site appears to be stabilizing, with waiting times dropping dramatically for those who haven’t been able to register before. A test of the site this morning had me waiting four minutes to get to the signup page; others got on instantly. But problems persist beyond the front door. The contractors responsible for the exchange—CGI Federal for the website itself, Quality Software Systems Inc. (QSSI) for the information “hub” that determines eligibility for programs and provides the data on qualified insurance plans, and Booz Allen for enrollment and eligibility technical support—are scrambling to deploy more fixes. Technical support call center operators continue to handle an onslaught of calls from users who can’t get back into the system after registering. Read 13 remaining paragraphs | Comments        

Continue reading here:
Obamacare site hits reset button on passwords as contractors scramble

Meltdowns at NSA spy data center destroy equipment, delay opening

The NSA’s Utah Data Center. Swilsonmc A massive data center being built by the National Security Agency to aid its surveillance operations has been hit by “10 meltdowns in the past 13 months” that “destroyed hundreds of thousands of dollars worth of machinery and delayed the center’s opening for a year, ” the  Wall Street Journal reported last night . The first of four facilities at the  Utah Data Center  was originally scheduled to become operational in October 2012, according to project documents described by the  Journal . But the electrical problems—described as arc fault failures or “a flash of lightning inside a 2-foot box”—led to explosions, failed circuits, and melted metal, the report states: The first arc fault failure at the Utah plant was on Aug. 9, 2012, according to project documents. Since then, the center has had nine more failures, most recently on Sept. 25. Each incident caused as much as $100, 000 in damage, according to a project official. It took six months for investigators to determine the causes of two of the failures. In the months that followed, the contractors employed more than 30 independent experts that conducted 160 tests over 50, 000 man-hours, according to project documents. The 1 million square foot data center is slated to cost $1.4 billion to construct. One project official told the  Journal that the NSA planned to start turning on some of the computers at the facility this week. “But without a reliable electrical system to run computers and keep them cool, the NSA’s global surveillance data systems can’t function, ” the newspaper wrote. Read 2 remaining paragraphs | Comments        

More:
Meltdowns at NSA spy data center destroy equipment, delay opening

US indicts suspected Anonymous members for leading 2010 “Operation Payback”

Back in 2010, “Operation Payback” involved a series of distributed denial of service (DDoS) attacks against anti-piracy websites as a way to protest what some members of Anonymous viewed as an overly greedy intellectual property industry. The attack was later revived in early 2011. On Thursday, 13 men were indicted (PDF) in federal court in Virginia on one count of Conspiracy to Intentionally Cause Damage to a Protected Computer. They are accused of using the well-known Low-Orbit Ion Cannon application to conduct DDoS attacks on the Recording Industry Association of America, the Motion Picture Association of America, the United States Copyright Office of the Library of Congress, Visa, MasterCard, and Bank of America. According to the indictment, the victims suffered “significant damage, ” noting specifically that MasterCard suffered at least $5, 000 in losses during a one-year period. (For the record, MasterCard profited $415 million in 2010.) Read 8 remaining paragraphs | Comments        

View post:
US indicts suspected Anonymous members for leading 2010 “Operation Payback”

Ubuntu’s controversial Mir window system won’t ship with 13.10 desktop

Ubuntu 13.04. Ubuntu 13.10 (“Saucy Salamander”) is scheduled for a final release on Oct. 17, but the OS won’t include what was perhaps the biggest and most controversial change planned for the desktop environment. Canonical announced in March that it would replace the X window system with Mir, a new display server that will eventually work across phones, tablets, and desktops. It has proven controversial, with Intel rejecting Ubuntu patches because Canonical’s development of Mir meant it stopped supporting Wayland as a replacement for X. Mir will ship by default on Ubuntu Touch for phones (but not tablets) this month, allowing a crucial part of Ubuntu’s mobile plans to go forward. However, it won’t be the default system on the desktop, because XMir—an X11 compatibility layer for Mir—isn’t yet able to properly support multi-monitor setups. This is a step back from Canonical’s original plan to “Deliver Mir + XMir + Unity 7 on the [13.10] desktop for those cards that supported it, and fall back to X for those that don’t.” Read 5 remaining paragraphs | Comments        

Link:
Ubuntu’s controversial Mir window system won’t ship with 13.10 desktop

Blackberry warns of near-$1 billion loss this quarter

Blackberry released a statement on Friday saying that it expects to report an operating loss of almost $1 billion in the coming days. According to The Wall Street Journal , Blackberry overestimated the number of new phones it would sell and is facing an “inventory charge of as much as $960 million and a restructuring charge of $72 million.” Specifically, the company said that it would likely report a loss of $950 million to $995 million for the second quarter. Earlier this week we reported that Blackberry was planning to lay off up to 40 percent of its employees, taking the company from 12, 700 full-time employees to about 7, 620 employees. The WSJ reported today that 4, 500 people will be laid off, lower than earlier estimates. (Is that a silver lining we see?) The Canadian company also reported today that it only sold 3.7 million smartphones in the last quarter, most of which were older phones. To stem the bleeding, Blackberry said that going forward, its “smartphone portfolio will transition from 6 devices to 4; focusing on enterprise and prosumer-centric devices, including 2 high-end devices and 2 entry-level devices.” As Quartz writer Christopher Mims wrote , it’s probably too late for Blackberry to turn around its share of the enterprise market given the latest moves made by Apple and Samsung to get their hardware into the hands of businesspeople. Read 1 remaining paragraphs | Comments        

See the original post:
Blackberry warns of near-$1 billion loss this quarter

The new lifecycle of your old iPhone

Clifford Joseph Kozak After handling the entire digital expression of your life for one, two, or more years, the most mercenary and practical end that a smartphone can meet is to be sold off secondhand. Wheeling and dealing with used personal electronics is not a new business, but in the last few years, it’s been writ very large with the glut of tiny hand-computers we’re all using lately. Where those devices go after you sell them into wanting hands (Gazelle and NextWorth are two services that make their business on these transactions) has shifted a bit over the years. In the early days of the iPhone, companies were built on the activity of breaking down old iPhones into parts for repairing those still in use (or so some of the shadier companies claimed). Per a report in the New York Times back in 2008, one company named PCS Wireless claimed that 94-95 percent of the second-hand phones it obtained were broken down into parts. The source claimed at the time that the screens alone could fetch $200. Read 12 remaining paragraphs | Comments        

Continue reading here:
The new lifecycle of your old iPhone

Intel’s Atom CPUs finally get serious with the new Bay Trail architecture

Intel News from a certain other company has overshadowed the 2013 Intel Developer Forum a bit this week, but Intel is hardly sitting still. For well over a year now, the company has been intensifying its efforts in the mobile space, first with Android phones and later with both Windows and Android tablets. The chips the company has been using to make these strides into mobile have all used the Atom branding, which has come a long way since its inclusion in the low-rent netbooks of years past. Chips like Clover Trail and Clover Trail+ have proven that an Intel phone’s battery life can hang with ARM chips from companies like Qualcomm and Nvidia, even if their performance sometimes leaves something to be desired. Now, Intel is ready to take the next step. We’ve talked about its next-generation Atom system-on-a-chip (SoC) for tablets (codenamed Bay Trail ) before, and at IDF this week the company finally announced specific Bay Trail SKUs and devices that will include the chips when they ship later this year. Read 25 remaining paragraphs | Comments        

Continued here:
Intel’s Atom CPUs finally get serious with the new Bay Trail architecture

Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict (Updated)

Chad Miller Of all the new features of Apple’s new iPhone 5S , few have drawn more attention than the built-in fingerprint scanner known as Touch ID. Apple billed it as an “innovative way to simply and securely unlock your phone with just the touch of a finger.” More breathless accounts were calling it a potential ” death knell for passwords ” or using similarly overblown phrases . Until the new phones are in the hands of skilled hackers and security consultants, we won’t know for sure if Touch ID represents a step forward from the security and privacy offered by today’s iPhones. I spent several hours parsing the limited number of details provided by Apple and speaking to software and security engineers. I found evidence both supporting and undermining the case that the fingerprint readers are an improvement. The thoughts that follow aren’t intended to be a final verdict—the proof won’t be delivered until we see how the feature works in the real world. The pros I’ll start with the encouraging evidence. Apple said Touch ID is powered by a laser-cut sapphire crystal and a capacitive touch sensor that is able to take a high-resolution image based on the sub-epidermal layers of a user’s skin. While not definitive, this detail suggests Apple engineers may have designed a system that is not susceptible to casual attacks. If the scans probe deeply enough, for instance, Touch ID probably wouldn’t be tricked by the type of clones that are generated from smudges pulled off a door knob or computer monitor. In 2008, hackers demonstrated just how easy it was to create such clones when they published more than 4, 000 pieces of plastic film containing the fingerprint of a German politician who supported the mandatory collection of citizens’ unique physical characteristics. By slipping the foil over their own fingers, critics were able to mimic then-Interior Minister Wolfgang Schauble’s fingerprint when touching certain types of biometric readers. Read 15 remaining paragraphs | Comments        

Original post:
Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict (Updated)