Posts

Showing posts from April 16, 2008

"Now, I prefer to watch" - Interviews William Gibson

Image
Street always finds its own use of a variety of things. (c) William Gibson Up to the last moment not Hence, it will turn out. William Gibson, founding father of the genre "cyberpunk" blogger known as enthusiastic, but your e-mail on the Net is not disclosing - it is not even the writer's personal website. Therefore, any interviews with him are possible only through the publishing house Penguin Publishing and Random House, which is traditionally the first to publish works of Gibson. Yet interviews for " IT SECTOR " condition. And, as intended, at the dawn of 60 - anniversary of the writer, to be observed on March 17. -- Thank you agreed to be interviewed. As the mood on the eve of the anniversary? -- Not until the mood now. Jubilee - so troublesome! At the same time, a lot of issues have to deal with: publishers, the media, with a family and children ... And from the desk while reluctant disruptions. -- Can you explain what is working? -- No, I do not like to tal...

Conspiracy around Intel and Microsoft OS Vista

Image
During the trial on Windows Vista Capable program, in late February 2008 the court issued a 158 pages of internal documents of Microsoft ( blog.seattlepi.nwsource.com / microsoft / library / vistaexhibitsone.pdf ). At the thirtieth page text of these documents is an e-mail written by employees of Microsoft Kalkman named John (John Kalkman). It contains information on the certification program Capable company Intel chipsets. "We had underestimated the requirements specifically to help improve Intel quarterly profit figures. Thus, they could continue to sell motherboards with the 915 chipset, - wrote Kalkman. But later, after some market research that gave negative results, he noted that "it was a mistake, artificially understate the true image requirements". Not so bad news! Two mega-corporation, it turns out defrauded millions of its users, jointly providing false information on the compatibility of its hardware and software. Not surprisingly, opinions about Windows Vist...

IT-business: prior to the end of the year

Image
In the global IT industry over the past couple of weeks anything wrong, fortunately, did not happen. Horse racing world oil prices and the American financial crisis has not had a significant impact on the market of information technologies and telecommunications. But something important has happened yet. We begin, as usual, with global issues. According to the research company Pyramid Research, in a few years, the global market for mobile undergo unprecedented change, and to the existing 2.8 billion users of cell phones in the next three years by a new billion. Of these, 87% occur in developing countries amount. The majority of potential users do not give China and India. Overall, in those two countries will be about 35% of the promised one billion new users, and the rest pridutsya on the part of the world where the level of urbanization is less than 50%. By 2010, 74% of users live in countries with developing economies. However, due to low ARPU their share of 40% of total revenues. ...

Semiconductor issues

Image
Producers Association of semiconductor products (Semiconductor Industry Association, SIA), in early March released the results of the semiconductor industry in January 2008. According to the association, the growth of the industry, compared with the result of January 2007 amounted to 0.3% and reached to 21.5 billion USD. In comparison with the rate in December 2007, the market for semiconductors has lost weight 3.6%. Association experts argue that the main reason for such a flimsy results has been very poor state of affairs in the sector of dynamic memory. The growth, albeit modest, production of chips completely "eaten" continually falling prices. Prices are falling because of the extremely high competition among manufacturers. No rescues and the growth in demand for memory modules marked professionals association. According to experts, if the monthly analysis of the memory sector, the growth of the semiconductor industry amounted to 8.1%. Status of other sectors of the sem...

New solutions for the physical security of Cisco

Image
New IP-cameras and access control systems allow reliably protect complexes of buildings, corporate offices and mobile environments The company announced the expansion of Cisco family of products for physical security called Cisco ® Connected Physical Security. Now the product lineup includes new features of IP video surveillance and electronic access control, which facilitate the convergence of information technology and physical security systems, allowing customers to integrate existing systems for the physical protection of IT infrastructure. The company Cisco is going to bring to market new IP cameras and the first in its history, physical access control system. Sharing of these products provides an opportunity to clearly monitor the situation and take effective action. Advanced Cisco portfolio of products to help customers build security best-in-class cost mobile infrastructure physical protection of high flexibility and compatibility. The latest system for physical security strate...

Cisco develops technology samozaschischayuscheysya network and strengthens its position in the field of IT risk management, security and meet regulato

Image
Improved protection of end points, firewalls, a means of preventing intrusions, security routers, as well as management tools that improve the security of networks, end points, applications and content. San Jose (California), April 8, 2008 - To meet the growing demand for corporate solutions for the management of IT risks, protect data and meet regulatory requirements, the company announced the Cisco expand its proposals in this regard and make the network Self-Defending Network (samozaschischayuschayasya network) in the wider system solution that provides general protection of networks, as well as a wide variety of terminal devices, applications and content. New solutions to the security of Cisco empowers the protection of corporate information technology infrastructures from malicious programs and deal with the loss of data, corporate compliance with safety regulations and welcomed the legislative and regulatory requirements. Today, as the network becomes the platform for a variety o...