Intel forges ahead to 10nm, will move away from silicon at 7nm

This week at the 2015 International Solid-State Circuits Conference (ISSCC), Intel will provide an update on its new 10nm manufacturing process and new research on how it’s maintaining the march of Moore’s law to 7nm and beyond. The first chips based on Intel’s new 10nm process are expected in late 2016/early 2017, and the company says it’s hoping to avoid the delays that haunted the belabored release of 14nm Broadwell. To hit 7nm, Intel says new materials will be required—as in, it looks like 10nm will finally be the end of the road for silicon. The most likely replacement for silicon is a III-V semiconductor such as indium gallium arsenide (InGaAs), though Intel hasn’t provided any specific details yet. ISSCC 2015, being held in San Francisco this week, is where all the big players in silicon (Intel, Samsung, TSMC, IBM, etc.) meet to talk about their latest manufacturing processes and how they might go about overcoming the current barriers to smaller, faster, and denser computer chips. It’s not unusual for Intel to have one of the largest presences at the conference, and this year is no different: it will be presenting three papers on its 14nm technology, hosting sessions on a variety of topics, and Mark Bohr—one of Intel’s most esteemed researchers—will be sitting on a panel that discusses Moore’s law beyond 10nm. The steady march of new CMOS processes driving ever smaller transistors. Intel Read 4 remaining paragraphs | Comments

Taken from:
Intel forges ahead to 10nm, will move away from silicon at 7nm

Windows Defender now removes Superfish malware… if you’re lucky

First the good news. Microsoft today released a signature update for Windows Defender, the anti-malware software that’s built in to Windows, to enable it to both detect and remove the Superfish malware that Lenovo installed on some systems . Defender’s removal process seems to be quite robust, both uninstalling the software and removing the dangerous certificate that Superfish installs. However, it doesn’t appear to clean any contaminated installs of Firefox or Thunderbird; for that, you’ll want to check out our manual removal instructions . Uh oh… 2 more images in gallery Now the bad news. While Windows Defender is supplied as part of Windows and works well enough, Microsoft gave it some rather strange behavior  as a concession to third-party anti-malware vendors . If a third-party anti-malware product is installed, Windows Defender will automatically disable itself. Many Lenovo systems include trial versions of anti-malware software; during the duration of these trials, Windows Defender will be inactive. Read 2 remaining paragraphs | Comments

View article:
Windows Defender now removes Superfish malware… if you’re lucky

Linux has 2,000 new developers and gets 10,000 patches for each version

Nearly 2,000 developers started contributing to Linux in the past 15 months, making up nearly half of all developers writing code for the open source operating system kernel. The new developers are helping fuel an ever-bigger Linux community, according to the latest Linux Kernel Development report, which will be released today by the Linux Foundation. The report is expected to be available at this link . “The rate of Linux development is unmatched,” the foundation said in an announcement accompanying the report. “In fact, Linux kernel 3.15 was the busiest development cycle in the kernel’s history. This rate of change continues to increase, as does the number of developers and companies involved in the process. The average number of changes accepted into the kernel per hour is 7.71, which translates to 185 changes every day and nearly 1,300 per week. The average days of development per release decreased from 70 days to 66 days.” Read 16 remaining paragraphs | Comments

View article:
Linux has 2,000 new developers and gets 10,000 patches for each version

PSA: 51 classic Sega Genesis games on Steam for about five cents each

Over the years, we’ve gotten used to Sega porting much of its library of legacy Genesis title to every platform imaginable, from mobile phones to the PlayStation 3. For those looking for a nostalgic fix, paying a few bucks per game for one of these quick trips down memory lane hasn’t been an awful deal. But paying just about five cents each for a bundle of 51 classic Genesis titles is a bargain basement deal that’s too good for practically any gaming fan to pass up. Amazon is currently selling all five pieces of the “Sega Genesis & Mega Drive Classic” series as downloadable Steam codes for the ridiculously low price of $2.62 . Among the dozens of games in the five-part collection are highlights like Eternal Champions, Gunstar Heroes , Phantasy Star 2, 3 , and 4 , Shining Force 1 and 2 , all three Streets of Rage games, all three Golden Axe games, and Vectorman 1 and 2 . A complete list of included titles is available on these Steam pages . Sold individually, these games usually run $3 each on Steam, which is more than the entire 51-game collection will run you currently on Amazon right now. Even in bundles, the collection usually goes for $37.50 on Steam or $18.70 on Amazon. A a quick look at a Steam price tracker suggests the bulk of the collection (not including the fifth part) has never been offered for less than $14.98 on the service. So depending on how you look at it, the current Amazon price is so that’s anywhere from an 85 to 98 percent savings from what were already some pretty good bundle prices for such a massive selection of classic games. Read 2 remaining paragraphs | Comments

More:
PSA: 51 classic Sega Genesis games on Steam for about five cents each

Password cracking experts decipher elusive Equation Group crypto hash

Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about Monday, password crackers have deciphered a cryptographic hash buried in one of the hacking crew’s exploits. It’s Arabic for “unregistered.” Researchers for Moscow-based Kaspersky Lab spent more than two weeks trying to crack the MD5 hash using a computer that tried more than 300 billion plaintext guesses every second. After coming up empty-handed, they enlisted the help of password-cracking experts, both privately and on Twitter , in hopes they would do better. Password crackers Jens Steube and Philipp Schmidt spent only a few hours before figuring out the plaintext behind the hash e6d290a03b70cfa5d4451da444bdea39 was غير مسجل, which is Arabic for “unregistered”. The hex-encoded string for the same Arabic word is dbedd120e3d3cce1. “That was a shock when it popped up and said ‘cracked,'” Steube told Ars Monday evening. He is the developer behind the free Hashcat password-cracking programs and an expert in password cracking. Read 6 remaining paragraphs | Comments

Read More:
Password cracking experts decipher elusive Equation Group crypto hash

Samsung’s first 14nm SoC is a 64-bit, 8-core Exynos aimed at high-end phones

Samsung has just announced a new high-end Exynos 7 Octa SoC . It uses eight CPU cores—a combination of four high-end Cortex A57 cores and four low-end, power-saving Cortex A53 cores in a big.LITTLE configuration—and supports the 64-bit ARMv8 instruction set. However, its most significant new feature is Samsung’s new 14nm manufacturing process, which promises performance and power consumption improvements compared to the existing 20nm process. Samsung is already shipping eight-core 64-bit Exynos chips on its older 20nm process, most notably in the Galaxy Note Edge and some variants of the Galaxy Note 4. Compared to those chips, Samsung claims that the 14nm version “enables up to 20 percent faster speed, 35 percent less power consumption, and 30 percent productivity gain.” Those numbers don’t tell us much in terms of actual clock speeds or performance-per-watt numbers, but it’s safe to assume that the 14nm Exynos 7 will be able to run at higher clock speeds for longer while consuming less power. We don’t know anything about the new Exynos’ GPU yet. The 20nm Exynos 7 Octa uses a high-end Mail-T760 GPU from ARM, and we’ll probably see something similar in the 14nm version. Read 2 remaining paragraphs | Comments

More:
Samsung’s first 14nm SoC is a 64-bit, 8-core Exynos aimed at high-end phones

Deaf group sues Harvard, MIT over online courses

The National Association for the Deaf (NAD) filed a lawsuit  (PDF) against Harvard and MIT yesterday, saying the two universities are violating the Americans with Disabilities Act because they don’t properly caption their online course offerings. Harvard’s online courses aren’t really intended for students at the Ivy League university. Rather, the thousands of videos made available are part of the University’s “commitment to equity,” an effort “to create effective, accessible avenues for people who desire to learn but who may not have an opportunity to obtain a Harvard education.” The problem with Harvard’s offering, NAD lawyers say, is that it leaves out hard-of-hearing people. “Much of Harvard’s online content is either not captioned, or is inaccurately or unintelligibly captioned, making it inaccessible for individuals who are deaf or hard of hearing,” the complaint reads. “Just as buildings without ramps bar people who use wheelchairs, online content without captions excludes individuals who are deaf or hard of hearing.” Read 6 remaining paragraphs | Comments

View post:
Deaf group sues Harvard, MIT over online courses

Wheel of Time TV pilot producers sue Robert Jordan’s widow for defamation

The tale of the late-night Wheel of Time pilot that aired in a paid infomercial slot on FXX has taken another odd turn. Producers Red Eagle Entertainment LLC and Manetheren LLC have filed a lawsuit in the United States District Court for central California against Harriet McDougal (widow of James Rigney, who wrote the Wheel of Time novels under the pen name Robert Jordan), her company, Bandersnatch Group Inc., and twenty unnamed other persons (“Does 1-20”). The suit alleges that McDougal’s statements about her lack of involvement in the pilot’s production constitute breach of contract, slander, and interference with contractual relations and prospective economic relations; the suit demands declaratory relief and a jury trial. With the pilot coming essentially out of nowhere and airing with no fanfare, very few fans of the series were even aware of its existence until after the fact; it was clear that the production was accomplished in very little time and on a minimal budget. The resulting effort (titled “Winter Dragon”) did not resemble the series prologue very closely, and it quickly drew strong rebuke from McDougal, who claimed the pilot was made “without my knowledge or cooperation,” and that no one from Robert Jordan’s estate has been involved in any way with it. McDougal claims that Universal currently holds the rights to the Wheel of Time TV series, not Red Eagle Entertainment, and that the pilot made no mention of Universal or her own company, the Bandersnatch Group. That statement was apparently interpreted by Red Eagle Entertainment LLC—the corporate entity that produced the pilot and also claims to hold the television rights to The Wheel of Time —as fighting words. Read 4 remaining paragraphs | Comments

More:
Wheel of Time TV pilot producers sue Robert Jordan’s widow for defamation

Apple increases the maximum size of iOS app binaries for the first time ever

For the first time since the introduction of the App Store in 2008 , Apple is increasing the maximum size of the app binaries that developers can upload to iTunes Connect. The company announced today that the cap would increase from 2GB to 4GB , though this doesn’t affect the 100MB limit imposed on apps downloaded on cellular networks. iOS app binaries contain both the executable file and all of the images, sounds, and other assets that the app needs—everything from icons to splash screens to UI is all included in one big file. Because of how they’re packaged, these binaries can get rather large. Binaries include all the assets for all the devices they support. If you’re shipping a universal app that supports all iOS 8 devices, for example, you’ve got Retina iPhone assets, Retina and non-Retina iPad assets, and special “3x” assets specifically for the iPhone 6 Plus (Apple’s got a table here ). Universal apps include all of those assets, and the binary you download from the App Store is the same whether you’ve got an old iPhone 4S or a brand-new iPad Air 2. If you’re running on an iPhone, for example, a universal binary will still contain assets for other iPhones and iPads, increasing the amount of space the app needs even though some of those extra assets aren’t needed for your device. Xcode 6 partially supports vector graphics to ease the developer burden of maintaining and generating all these assets, but they’re still stored as PNG files when the binary is built and uploaded. Read 1 remaining paragraphs | Comments

Read More:
Apple increases the maximum size of iOS app binaries for the first time ever

15-year-old bug allows malicious code execution in all versions of Windows

Microsoft just patched a 15-year-old bug that in some cases allows attackers to take complete control of PCs running all supported versions of Windows. The critical vulnerability will remain unpatched in Windows 2003, leaving that version wide open for the remaining five months Microsoft pledged to continue supporting it. The flaw, which took Microsoft more than 12 months to fix, affects all users who connect to business, corporate, or government networks using the Active Directory service. The database is built into Windows and acts as a combination traffic cop and security guard, granting specific privileges to authorized users and mapping where on a local network various resources are available. The bug—which Microsoft classifies as MS15-011 and the researcher who first reported it calls Jasbug—allows attackers who are in a position to monitor traffic passing between the user and the Active Directory network to launch a man-in-the-middle exploit that executes malicious code on vulnerable machines. “All computers and devices that are members of a corporate Active Directory may be at risk,” warned a blog post published Tuesday by JAS Global Advisors, the firm that reported the bug to Microsoft in January 2014. “The vulnerability is remotely exploitable and may grant the attacker administrator-level privileges on the target machine/device. Roaming machines—Active Directory member devices that connect to corporate networks via the public Internet (possibly over a Virtual Private Network (VPN))—are at heightened risk.” Read 4 remaining paragraphs | Comments

View post:
15-year-old bug allows malicious code execution in all versions of Windows