Windows 8 sales are good, if not great, at 40 million copies in the first month

Tami Reller, corporate vice president (and chief financial officer and chief marketing officer) for Windows and Windows Live, announced today that Microsoft has sold 40 million Windows 8 licenses after its first month of retail availability. Is that number good, bad, or merely mediocre? Probably good, but perhaps not great. Microsoft sold 60 million copies of Windows 7 in the first ten weeks of that operating system’s availability, with the Wall Street Journal estimating that 40 million copies were sold in the first month. With Windows 8 selling 40 million copies in five weeks, it seems to be selling at about the same pace as Windows 7. Considering the different market dynamics—Windows 7 was an iterative release that fulfilled substantial pent-up demand as businesses chose to ignore Windows Vista whereas Windows 8 is a more controversial update being brought to a market that is generally happy with Windows 7 anyway—this is a healthy performance. Windows 7 sold very well and matching it is no mean feat. The apparent failure to surpass Windows 7’s launch could explain the mixed reports on early sales. Strong sales can still be disappointing if they were expected to be stronger still. Read 4 remaining paragraphs | Comments

Read More:
Windows 8 sales are good, if not great, at 40 million copies in the first month

Romney campaign got its IT from Best Buy, Staples, and friends

http://www.flickr.com/photos/paulhami/ Imagine you’re launching a company and only have six months to deliver a product. You face a competitor that has been in your industry four years longer than you with twice your staff and twice the budget. If you don’t make your deadline, you’re out of business. That, in a nutshell, was the situation facing the technology team for Mitt Romney’s presidential campaign. The Obama for America (OFA) organization had the advantage: it didn’t have to wade through the primary season first, allowing OFA’s technology team to focus on building an infrastructure. Based on an Ars analysis of the Romney campaign’s financial reports, Romney’s team had less to work with and passed the lion’s share of technology-focused spending directly to advertising companies and telemarketers. This left Team Romney’s tech squad with only a fraction of the budget for consulting, services, and infrastructure. So, the campaign did what a lot of small businesses would do: they went to Best Buy. Or more accurately, they went to Best Buy’s subsidiary, MindShift Technologies, a managed service provider that specializes in small and medium business consulting. And when they were in a pinch for tech help, they called Staples’ subsidiary ThriveNetworks and a collection of small consulting firms with links to Romney and the Republican Party. Read 14 remaining paragraphs | Comments

See more here:
Romney campaign got its IT from Best Buy, Staples, and friends

Apple’s stock price falls to lowest point in six months

On Friday Apple’s stock price closed at $527.68 per share , the lowest it’s been in six months . Since September, the company has lost about 25 percent of its value from its peak of $702 per share. So what’s gone wrong? Analysts say that Apple has had a string of misfortunes lately, ranging from missed  earnings estimates ,  management shakeups , missteps on mapping software , supply chain problems , and increased pressure from competitors. “I think it’s the perfect storm for Apple,” Van Baker, an analyst with Gartner Research, told Ars. “There’s a combination of a lot of things, and add to that, people are starting to think that Apple won’t bring out something that’s truly innovative every few years.” Read 20 remaining paragraphs | Comments

Excerpt from:
Apple’s stock price falls to lowest point in six months

Notorious BitTorrent tracker Demonoid back online, website still down

As of Monday, well-known BitTorrent tracker Demonoid is back online . Three months ago, the tenacious tracker was chased out of its Ukrainian host, likely under pressure from American authorities. It may also have been driven offline due to a denial of service attack. According to the IP address linked to the tracker, the new host appears to be physically located in Hong Kong . The website, meanwhile, remains down. TorrentFreak points out that in previous closures, Demonoid’s tracker appeared before its website came back online, indicating that the site’s return may be coming soon. Read 2 remaining paragraphs | Comments

See the original article here:
Notorious BitTorrent tracker Demonoid back online, website still down

Best of both worlds: Setting up Wi-Fi for iOS on 2.4 and 5GHz

For a while, it seemed that Wi-Fi was becoming a victim of its own success. In many cities, there are numerous active Wi-Fi networks on those preciously few non-overlapping channels—that’s in addition to microwaves, bluetooth, cordless phones, and baby monitors, which all share the 2.4GHz band. But since about 2007, Apple has also built support for 802.11n Wi-Fi on the 5GHz band into its computers and Airport line of Wi-Fi base stations. Now, the iPhone 5 and the latest iPod touch also have that support. (The iPad has had it since day one.) So, how do you set up a Wi-Fi network that makes the most of this confluence of Wi-Fi bands? Not created equal First of all, it’s important to realize that the two bands are created very differently. The 2.4GHz band suffers from lack of non-overlapping channels and interference from other devices. But the lower frequencies pass through walls and floors reasonably well. The 5GHz band on the other hand, has a much larger number of channels—and they don’t overlap—but the higher frequencies have reduced range, even in open air. In addition to this, Apple only supports using two channels as a single, double-speed wide channel in the 5GHz band. If all else is equal, 5GHz is twice as fast as 2.4GHz. Read 12 remaining paragraphs | Comments

More:
Best of both worlds: Setting up Wi-Fi for iOS on 2.4 and 5GHz

Apple’s @me and @mac e-mail users now have @icloud, too

Owners of @me.com and @mac.com e-mail addresses—relics of Apple’s past attempts at offering cloud services—now own an @icloud address too. The company began sending out e-mails to those who have accounts on the old domains on Tuesday, letting them know they can now take advantage of Apple’s latest e-mail service in the form of iCloud. But worry not: if you’ve been using your old addresses but moved your account to iCloud earlier this year, you’ll still be able to keep using them (whether or not you choose to use the new @icloud.com address). The move was foreshadowed earlier this year as part of an iOS 6 prerelease beta to developers. In the iOS 6 Beta 3 changelog, Apple stated those signing up for new Apple IDs, as well as those enabling Mail on iCloud for the first time, would automatically receive an @icloud.com address. But if you had an existing @me.com address from the MobileMe days, or even a @mac.com address from the .Mac days, you would receive an iCloud address that matched the username you previously had. That appears to be the case now with Apple alerting users to the change. As pointed out by our friends at TidBITS , there’s no difference in implementation—if you want to make use of the new address, you just have to add it to your mail client. If you don’t want to use the new address, however, you don’t have to. You can stick to the old ones, as long as you weren’t one of the stubborn few who didn’t move your MobileMe account to iCloud before the beginning of August. Read on Ars Technica | Comments

Read more here:
Apple’s @me and @mac e-mail users now have @icloud, too

Researcher advises against use of Sophos antivirus on critical systems

Antivirus provider Sophos has fixed a variety of dangerous defects in its products that were discovered by a security researcher who is recommending many customers reconsider their decision to rely on the company. “Sophos claim that their products are deployed throughout healthcare, government, finance, and even the military,” Tavis Ormandy wrote in an e-mail posted to a public security forum . “The chaos a motivated attacker could cause to these systems is a realistic global threat. For this reason, Sophos products should only ever be considered for low-value non-critical systems and never deployed on networks or environments where a complete compromise by adversaries would be inconvenient.” A more detailed report that accompanied Ormandy’s e-mail outlined a series of vulnerabilities that attackers can exploit remotely to gain complete control over computers running unpatched versions of the Sophos software. At least one of them requires no interaction on the part of a victim, opening the possibility of self-replicating attacks, as compromised machines in turn exploit other machines, he said. The researcher provided what he said was a working exploit against Sophos version 8.0.6 running Apple’s OS X. Attackers could “easily” rewrite the code to work against unpatched Sophos products that run on the Windows or Linux operating systems, he said. Read 7 remaining paragraphs | Comments

Original post:
Researcher advises against use of Sophos antivirus on critical systems

How Georgia doxed a Russian hacker (and why it matters)

Aurich Lawson On October 24, the country of Georgia took an unusual step: it posted to the Web a 27-page writeup  (PDF), in English, on how it has been under assault from a hacker allegedly based in Russia. The paper included details of the malware used, how it spread, and how it was controlled. Even more unusually, the Georgians released pictures of the alleged hacker—taken with his own webcam after the Georgians hacked the hacker with the help of the FBI and others. The story itself, which we covered briefly earlier this week , is fascinating, though it remains hard to authenticate and is relayed in a non-native English that makes for some tough reading. But what caught my eye about the whole cloak-and-dagger tale is the broader points it makes about hacking, jurisdiction, and the powerful surveillance devices that our computers have become. It’s also an example of how hacks and the alleged hackers behind them today play an increasing role in upping geopolitical suspicions between countries already wary of one another. Georgia and Russia have of course been at odds for years, and their conflict came to a head in a brief 2008 war; Russia still maintains a military presence in two tiny breakaway enclaves that Georgia claims as its own. Read 29 remaining paragraphs | Comments

See more here:
How Georgia doxed a Russian hacker (and why it matters)

Better on the inside: under the hood of Windows 8

Windows 8’s most obvious—and most divisive—new feature is its user interface . However, it would be a mistake to think that the user interface is the only thing that’s new in Windows 8: there’s a lot that’s changed behind the scenes, too. Just as is the case with the user interface, many of the improvements made to the Windows 8 core are motivated by Microsoft’s desire to transform Windows into an effective tablet operating system. Even those of us with no interest at all in tablets can stand to take advantage of these changes, however. For example, Windows 8 is more power efficient and uses less memory than Windows 7; while such work is critical to getting the software to run well on low-memory tablets with all-day battery life, it’s equally advantageous for laptop users. The biggest single piece of technology that is new to Windows 8 is, however, squarely Metro focused: it’s a large set of libraries and components called WinRT. I’ve already written extensively about what WinRT is, so I won’t be getting into that here, but there are system capabilities that WinRT apps can use (or are forced to use) that are interesting in their own right. Read 77 remaining paragraphs | Comments

See more here:
Better on the inside: under the hood of Windows 8

IBM prepares for end of process shrinks with carbon nanotube transistors

Carbon nanotubes sit on top of features etched in silicon. IBM Research The shrinking size of features on modern processors is slowly approaching a limit where the wiring on chips will only be a few atoms across. As this point approaches, both making these features and controlling the flow of current through them becomes a serious challenge, one that bumps up against basic limits of materials. During my visit to IBM’s Watson Research Center, it was clear that people in the company is already thinking about what to do when they run into these limits. For at least some of them, the answer would involve a radical departure from traditional chipmaking approaches, swithching from traditional semiconductors to carbon nanotubes. And, while I was there, the team was preparing a paper (now released by Nature Nanotechnology ) that would report some significant progress: a chip with 10,000 working transistors made from nanotubes, formed at a density that’s two orders of magnitude higher than any previously reported effort. During my visit to Watson, I spoke with George Tulevski, who is working on the nanotube project, and is one of the authors of the recent paper. Tulevski described nanotbues as a radical rethinking of how you build a chip. “Silicoon is a solid you carve down,” he told Ars, “while nanoubes are something you have to build up.” In other words, you can’t start with a sheet of nanotubes and etch them until you’re left with the wiring you want. Read 9 remaining paragraphs | Comments

Continue reading here:
IBM prepares for end of process shrinks with carbon nanotube transistors