AMD launches Trinity processors: the Ivy Bridge alternative

Trinity is being aimed at ultrathin notebooks (not to be confused with Intel Ultrabooks), smaller form factor desktops and All-in-Ones, though traditional mainstream laptops and desktops will also see Trinity APUs. AMD will be launching five APUs today. The A10-4600M, A8-4500M, and A6-4400M are aimed at larger, mainstream notebooks, while the A10-4655M and A6-4455M are destined for sleeker ultrathin models.

AMD’s Trinity APUs will mark the debut of the company’s Piledriver microarchitecture, the successor to the ill-received Bulldozer. Trinity is still based on a 32nm process — Intel, by contrast, recently moved to 22nm with Ivy Bridge. Trinity’s die size is actually a bit larger than Llano’s: 246 square millimeters, compared to the first generation APU’s 228 square millimeters. Trinity also features a higher transistor count at 1.3 billion, but dials the TDP for its notebook variants down to 17W for dual-core CPUs, and 35W for quad-core CPUs, the same as Ivy Bridge — Llano APUs required 35W and 45W for dual- and quad-core, respectively. Desktop Trinity remain at the same 65 to 100W of its Llano predecessors. AMD claims that the dual-core Trinity APU will perform at the same level as the dual-core Llano APU, effectively doubling the performance per watt with the new generation. AMD also claims that Trinity notebooks can expect as 12 hours of battery life (when idle) on their energy efficient Piledriver cores.

via AMD launches Trinity processors: the Ivy Bridge alternative | The Verge.

Narrative Science

Narrative Science helps companies leverage their data by creating easy to use, consistent narrative reporting – automatically through our proprietary artificial intelligence technology platform.

via Narrative Science | We Transform Data Into Stories and Insight.

From CNN:

Kristian Hammond, Narrative Science’s chief technology officer, said his team started the program by taking baseball box scores and turning them into game summaries.

“We did college baseball,” Hammond recalled. “And we built out a system that would take box scores and historical information, and we would write a game recap after a game. And we really liked it.”

If this works I see a huge future for this in business reporting as well.

HP unveils Ethernet-powered thin client

HP has unveiled an all-in-one thin client capable of being powered by an Ethernet cable. HP claims the t410 AiO is the first all-in-one thin client that supports the 802.3at Type 1 Power over Ethernet (PoE) standard, which means it is capable of drawing its power from a network connection.

via HP unveils Ethernet-powered thin client – thin clients, Power over Ethernet, HP – Hardware – Techworld.

12in1 SIM Card+USB Card Reader/Writer GSM Copier Cloner

The Sim card can clone all the data from your original Sim card including pin code

It can clone the ki and IMSI code

It can contain 12 different Sim card content, You may change your current phone number operation to another by the selection list

Easy to read the phonebook of Sim card and save to PC

Can write the phonebook saved in the PC to another new Sim card

Read, edit, backup telephone directory and SMS

Leisurely create, edit, backup mobile ring tones and pictures (only for Nokia phone)

Plug and play, easy to operation

via. http://www.lunershop.com/product_info.php?language=en&currency=USD&products_id=273

China plans national, unified CPU architecture

According to reports from various industry sources, the Chinese government has begun the process of picking a national computer chip instruction set architecture (ISA). This ISA would have to be used for any projects backed with government money — which, in a communist country such as China, is a fairly long list of public and private enterprises and institutions, including China Mobile, the largest wireless carrier in the world. The primary reason for this move is to lessen China’s reliance on western intellectual property.

via China plans national, unified CPU architecture | ExtremeTech.

The other option, of course, is developing a brand new ISA — a daunting task, considering you have to create an entire software (compiler, developer, apps) and hardware (CPU, chipset, motherboard) ecosystem from scratch. But, there are benefits to building your own CPU architecture. China, for example, could design an ISA (or microarchicture) with silicon-level monitoring and censorship — and, of course, a ubiquitous, always-open backdoor that can be used by Chinese intelligence agencies. The Great Firewall of China is fairly easy to circumvent — but what if China built a DNS and IP address blacklist into the hardware itself?

Intel Core i7-3770K Review: A Small Step Up For Ivy Bridge : Ivy Bridge: Was It Worth The Wait?

Intel built Sandy Bridge-based chips in three different configurations: one quad-core and two dual-core designs. The most complex implementation included 995 million transistors in a 216 mm² piece of silicon. In comparison, the biggest Ivy Bridge die incorporates 1.4 billion transistors on a 160 mm² die.

via Intel Core i7-3770K Review: A Small Step Up For Ivy Bridge : Ivy Bridge: Was It Worth The Wait?.

All told, Ivy Bridge is yet another highly integrated processor design from Intel. Its pieces were constructed by independent teams throughout the world—engineers in Israel are responsible for the IA cores, a team in Folsom, CA built the graphics engine, and a second team in Folsom implemented the interconnects, cache, and system agent. Of course, a process development group up in Oregon made sure it’d all come together on the new 22 nm node.

New targeted Mac OS X Trojan requires no user interaction

After infecting a given Mac, this Trojan is like most: it connects to a remote website using HTTP in typical command and control C&C fashion to fetch instructions from remote hackers telling it what to do. The backdoor contains functionality to take screenshots of the user’s current session, upload and download files, as well as execute commands remotely on the infected machine. Encrypted logs are sent back to the control server, so the hackers can monitor activity.

via New targeted Mac OS X Trojan requires no user interaction | ZDNet.

Mosh: the mobile shell

Remote terminal application that allows roaming, supports intermittent connectivity, and provides intelligent local echo and line editing of user keystrokes.

Mosh is a replacement for SSH. It’s more robust and responsive, especially over Wi-Fi, cellular, and long-distance links.

Mosh is free software, available for GNU/Linux, FreeBSD, and Mac OS X.

via Mosh: the mobile shell.

Amazon experimenting with front-lit display for next Kindle

With the display and battery life being such strong selling points, you may be surprised to hear Amazon is experimenting with adding a light source. In fact, Devin Coldewey of TechCrunch has actually seen a prototype new Kindle in action using a front-lit lighting method.

The result? Apparently the E Ink display is lit very evenly and softly. So this isn’t the same type of light you get from a typical tablet LCD unit. He describes it as a “blue-white glow” which may seem a bit peculiar, but could work when just viewing text and on a display lit from the front.

via Amazon experimenting with front-lit display for next Kindle – New Tech Gadgets & Electronic Devices | Geek.com.