Overview of GeForce GTX 280 press releases
A day later than usual as I was on a small trip, but during the GeForce GTX launch a lot of board-parners issued press releases announcing them. Here's a small excerpt of some of them in random order:
BFG Technology GeForce GTX 260 & 280 (watercooled)
Next to the regular models, the BFG GeForce GTX 280 H2OC 1GB graphics card with ThermoIntelligence water cooling solution offers exceptional thermal performance in a single slot design. Co-developed by BFG and Danger Den, the ThermoIntelligence custom copper water block is totally silent and allows the GTX 280 GPU to be factory overclocked to the highest stable level
AMD claims cinema-real Radeon HD 4800 video
The video chipset maker doesn't provide exact details of the scenes, which include a robot attack in a lifelike city and a scorpion near a desert home, but cites them as thresholds that will let movie makers potentially release titles on computers or simply speed up production work. As camera angles can change in real time, a computer version of a movie could let users pick their view of a scene, while cinematographers for traditional videos can get a scene right on the first take by choosing the camera angles and actions while live, AMD argues. Games should also benefit by recreating scenes from some movies almost shot-for-shot.
No clues are given as to the release date of consumer hardware capable of supporting the level of visual effects shown in the Cinema 2.0 presentation, though AMD confirms that the chipsets will appear in ATI Radeon HD video cards. Leaks point to an initial release of the Radeon HD 4800 series using the chipset in late June.
We have a small movie, click here.
Apple, GPU makers team on OpenCL standard
The Khronos Group late yesterday established a new alliance between vendors that could see standards for high performance computing such as OpenCL gain a foothold across many operating systems and hardware platforms. Called the Computer Working Group, the team includes graphics rivals 3DLabs, AMD, and NVIDIA, processor makers such as ARM, Freescale, Intel, and Qualcomm, and end product manufacturers such as Motorola and Nokia, all of whom hope to create and maintain genuinely open and royalty-free standards for using newer graphics hardware to process very demanding compute tasks.
The Working Group isn't limited to a specific standard but is likely to start with the OpenCL standard expected to appear in Mac OS X Snow Leopard. The format is now known to have been proposed by Apple and would let developers tap into both the unused resources for e video chipset as well as the multiple cores of a standard CPU to improve not just business tasks but also more common uses. A fast-enough system using OpenCL could accelerate physics in games or use it to boost image processing speeds, Khronos says.
The move potentially sets up OpenCL as a true standard and could give Macs and mainstream PCs access both to the inbuilt general computing performance of existing video chipsets as well as to imminent graphics and computing cards that are specifically tailored to these tasks. Both NVIDIA's GeForce GTX 200 series and AMD's still unofficial Radeon HD 4800 will both explicitly support non-video processing but are currently tied to proprietary languages that limit the incentive to accelerate specialized code.
OpenCL also potentially broadens the usefulness and operating system support of both AMD's FireStream and NVIDIA's Tesla add-in cards and servers, both of which transform graphics chipsets entirely into dedicated processors for workstation and supercomputer-level tasks.
While Khronos has not said if or when it expects OpenCL to be ratified as a standard by the members of the Computer Working Group, Apple itself plans to launch Snow Leopard in mid-2009 and effectively kick off public accessibility for the technology.
Transcend launches High-Speed 64GB 2.5 SSD
Transcend today released its all-new high speed 64GB 2.5-inch Solid State Disk (SSD) for consumer electronics as well as industrial systems and military applications. Transcend
NVIDIA Medusa technology demo download
With each launch of a major new GPU, NVIDIA will release a technology demo which is designed to showcase the power of its new graphics chips. It creates some early excitement for their upcoming product.
Check this one out, one of the best tech demo's ever made.
Download - Click here
Quantum crypto targeted in attack of the clones
Japanese researchers have put another dent in Quantum cryptograpy's reputation as the final word in secure communications.
Transmissions sent using the technique are protected from eavesdroppers by the fundamental rules of quantum physics, at least in theory.n practice, implementation weaknesses can leave a narrow door for attackers, and Japanese boffins have developed an idea for a quantum eavesdropping device that can exploit one such weakness.
Quantum cryptography is designed to allow users to exchange secret keys. The polarisation of individual light photons determines one bit of a key. The rules of quantum mechanics mean that any attempt to intercept this data irreversibly alters it.
Because of this effect, any attempt to eavesdrop a key would be detected as a unacceptably noisy communications path.
The loophole exploited by Japanese boffins is that it might be possible to make a partial copy of a quantum key without tripping an alert that a communications path has been compromised. This partial copy might be used in subsequent cryptoanalysis. The technique relies on constructing an optical cloning circuit and a measuring device, as explained in a paper by the researchers here (pdf).
Boffins led by Yuta Okubo at the University of Tskuba in Japan have not yet built a device that implements the approach. Nonetheless the research is a concern for banks and government agencies that bought quantum cryptography systems in the belief they were inherently secure.
The Japanese research follows an earlier study by boffins in Sweden examining another practical shortcoming with quantum cryptography systems. As previously reported, the weakness identified by the Swedish team involved shortcomings in how systems verify that the content of a message has not been altered in transit.
Stunned commuter finds more secret papers on train
Are governments trying to instigate fear for more control or what is going here? (imo)
Whitehall was left combing its season ticket loan records this weekend as another set of top secret papers did the rounds of the 5.45pm from Waterloo.
Just days after a Cabinet Office worker left a stack of top secret anti-terrorist papers
NVIDIA GeForce GTX 280 review
NVIDIA GeForce GTX 280 review
Today Guru3D brings you a review and test on the GeForce GTX 280. NVIDIA launches this new flagship along with the GeForce GTX 260. In this review you can read all you need to know about them. And yes, the rumor was right; 1.4 Billion transistors slapped onto a piece of silicon. Crazy, but oh so much fun. We finally found a product that can play Crysis at a decent resolution with high-image quality settings.
Be sure to check out the review, which you can find right here:
NVIDIA nForce Driver 15.17
The included binaries are:
- Ethernet Driver (v67.80) WHQL
- SATAIDE Driver (v10.3.0.21) WHQL
- SATARAID Driver (v10.3.0.21) WHQL
- RAIDTOOL Application (v10.3.0.21)
- SMU Driver (v1.45) WHQL
- SMBus Driver (v4.64) WHQL
- Installer (v5.93)
Thanks go out to forum visitor Applejack who reported the new updates. We have a discussion thread open on these drivers right here.
AMD FireStream 9250 breaks one teraflop barrier
AMD today introduced its next-generation stream processor, the AMD FireStream 9250 at the International Supercomputing Conference. AMD FireStream 9250 is specifically designed to accelerate critical algorithms in high-performance computing (HPC), mainstream and consumer applications. AMD FireStream 9250 breaks the one teraflop barrier for single precision performance. It occupies a single PCI slot, for unmatched density and with power consumption of less than 150 watts; the AMD FireStream 9250 delivers an unprecedented rate of performance per watt efficiency with up to eight gigaflops per watt. The AMD FireStream 9250 stream processor includes a second-generation double-precision floating point hardware implementation delivering more than 200 gigaflops, building on the capabilities of the earlier AMD FireStream 9170, the industry
Rise of the Argonauts - Full Motion Video
Auzentech HDMI 1.3 PCI Express Audio Card
Auzentech reveals today its non-downsampling, HDMI 1.3-native, PCI express audio combo card: Auzen X-Fi HomeTheater 7.1. The Auzen X-Fi HomeTheater 7.1 accepts video from either an internal or external connection, mixes it with digital audio, and outputs the combined video and lossless multichannel audio via a single HDMI
Guru3D Driver Sweeper 1.5.5 download released
Guru3D - Driver Sweeper is a fast tool to remove driver leftovers from your system. Driver Sweeper is very easy to use. You only have to select the drivers you want to clean.
The best way to clean drivers is to first uninstall the drivers using the official uninstallers, reboot in Safe Mode and run Guru3D - Driver Sweeper. However, rebooting and not going into Safe Mode also works, but can cause some files not to be cleaned.
What can it be used for ?
The current supported drivers are NVIDIA (Display and Chipset), ATI (Display), Creative (Sound), Ageia (PhysX), MMouse and Realtek (Sound).
All the settings are saved in an ini file. Nothing is created in the registry, so it's possible to use it as a portable program. Log files can be saved to the harddisk and viewed as well. You can find the logs under the Tools menu.
The Guru3D - Driver Sweeper is fully tested on Windows 2000, XP and Vista. Both 32-bit and 64-bit versions are supported.
More info and revision history can be found here:
- Official Guru3D - Driver Sweeper homepage click here.
- Official Guru3D - Driver Sweeper forums click here.
Today is that time ... article 1 out of 3
Network Status Sunday 15th - A little Downtime
Earlier this morning we had we've been offline for a little while. This was not related to our server farm yet due to a problem at our host. Once the problem was detected support staff went to the datacenter and discovered that one of the optical glassfibers was not passing thru data.
The passive backupline was activated and everything popped back on-line. The issue has thus been resloved.
My apologies for the downtime folks !
OCZ Diesel USB drives released
Core 2 Quad Q8200 Information Revealed
Intel is planning to launch a Core 2 Quad Q8000 CPU series, offering entry-level prices to counter AMD's triple-core CPUs in the mainstream market, according to sources at motherboard makers.
Intel will launch the Core 2 Quad Q8200 in the third quarter this year, supporting FSB up to 1333MHz, L2 cache of 4MB and a core frequency of 2.33GHz. Pricing will be set around US$203 in thousand-unit quantities
In order to separate the Q8000 series from Intel's Q9000 CPU family, the Q8000 CPU series will not support Intel's VT and TXT technology.
Disgruntled admin gets 63 months for massive data deletion
An IT manager who sought revenge for an unfavorable job evaluation
was sentenced to more than five years in federal prison after being
convicted of intentionally triggering a massive data collapse on his
former employer's computer network.
Jon Paul Oson, 38, of Chula Vista, California, was sentenced to 63 months behind bars and ordered to pay more than $409,000 in restitution, according to federal prosecutors in San Diego. He was immediately taken into custody after the sentence was handed down on Monday. It is one of the stiffest penalties ever for a computer hacking offense.
Oson was hired in May 2004 as a network engineer at the Council of Community Clinics in San Diego, a nonprofit that provides various services to 17 regional health clinics in Southern California. He performed well in that role and five months later was promoted to technical services manager. He ended up bitterly resigning a year later after a performance evaluation cited interpersonal difficulties, according to court documents.
On December 23, Oson logged onto servers belonging to his former employer and disabled the program that automatically backed up medical records for thousands of low-income patients. Six days later, he logged on again, and in the span of 43 minutes, methodically deleted the files containing patients' appointment data, medical charts and other information.
The dollar cost of Oson's rampage was pegged at $409,337.83 and accounted for expenses for technical investigations and moving to a paper-based system in the weeks following the attack. But the real toll came when doctors at North County Health Services no longer had medical records for thousands of low-income patients who sought medical care. North County Health Services contracted with Oson's employer to store the records.
By destroying the records, Oson threatened the health of patients who visited the clinic immediately after the attack, prosecutors argued. They cited two examples, including a nine-year-old who had been diagnosed with an ear infection several days before Oson's rampage. When he returned a few weeks later, doctors had no record of the previous diagnosis, and they also had no idea he was due for a routine physical exam.
"Patients who visited the clinic in the weeks following the network disruption were kept waiting hours and sometimes futilely while their charts were located and delivered to the appropriate clinic and doctor," prosecutors said in court documents. "With the shutdown of its Practice Management system, NCHS had to shift to a paper-based system."
After ransacking his former employer's network, Oson took pains to cover his tracks. When FBI agents raided his home in May 2006, they found all but one of his PCs had been wiped clean, irretrievably destroying data that might have shown he was behind the attacks.
But Oson slipped up and left other clues. One was an HP 2100 LaserJet printer he kept at his home and another was an HP LaserJet 4M printer physically located near the workstation Oson used at his new job.
It just so happened that in the weeks leading up to the data meltdown, an intruder had cased the network by logging in from at least three different machines. One was a computer named "TEMP3" that was equipped to work with an HP 2100 LaserJet printer. A second PC happened to contain drivers for the HP 2100 and a LaserJet 4M.
Even more incriminating, the nickname of this second PC was "kuku" and one of the printers it was configured to work with was named "mike2003 HP Laserjet 4M". That just happened to match the name of Oson's son and the network name of the printer sitting by his workstation.
"At the sentencing hearing, the court talked about the impact of Oson's actions and his arrogance," Assistant US Attorney Mitchell Dembin, who prosecuted the case, wrote in an email to The Reg. "The court said that Oson seemed to think that he was the smartest guy around but, as often happens, he ran into someone smarter (the FBI)."