Wednesday 12 January 2011

"Revolution: The First 2000 Years of Computing" Exhibit Opens at the Computer History Museum

The Computer History MuseumWhether it be art museums, history museums, museums that focus on a specific event in history or some other kind, people love going to museums. However, the majority of museums are generally more fun for the elderly, buffs of the certain genre or elementary school field trips. But there is one museum that caters to a different type of visitor, a more technological visitor, the Computer History Museum, and this week they have something new for all the tech junkies out there.

This week the Computer History Museum opened a $19 million, 25,000-square-foot expansion with a new signature exhibition known as "Revolution: The First 2000 Years of Computing." This new exhibit, after being in development for over six years, represents the most comprehensive physical and online exploration of computing history in the world. It spans everything from the abacus and slide rules all the way to robots, Pong and the Internet.

According to John Hollar, CEO of the museum located in Mountain View, California, "Many times, people coming to the museum have very basic questions: 'How did that computer on my desk get there? How did that phone I've used for so long get smart?' It's an exhibition that's primarily aimed at a non-technical audience, though there's a ton of great history and information for the technical audience as well."

The exhibition has been specifically designed to be accessible to visitors in a multitude of ways. This includes documents, video presentations, over 5,000 images and 1,100 artifacts in 19 galleries. The exhibit also features hands-on interactive stations that will demonstrate the principles of computing like being able to pick up a 24lb Osbourne computer or playing a game of Pong, Pacman or Spacewar.

There are many key artifacts in the exhibit including a 1956 IBM 305 computer as well as its 350 hard drive, the first commercially available machine of its type which practically took up an entire room and only held 5MB of data. Guests will also get to see the console of a 1950 Univac 1, the first household computer, a complete installation of the original IBM System/360, the dominate technology in mainframe computing for nearly 20 years and a Cray-1 supercomputer which was the world's fastest from 1976 to 1982.

Guests will even get the opportunity to see "The Utah Teapot", the device graphics designer pioneer Martin Newell used as his 3D computer model at the University of Utah. The teapot became the standard reference for computer graphics and the more realistic the designers could make the teapot, the better their graphics engine was considered. The ENIAC, which was built during World War II and was the world's first large-scale computer to run at electronic speed, is also on display.

"This is one of the greatest electronic computers ever invented," stated Holler. "We've made this a very human story. We've tried to talk about not just what happened, but what mattered in history. What mattered often boils down to the people who were the great innovators and the problems they were trying to solve, and so much of the exhibit is devoted to those important stories."

The ceremonial opening, which took place yesterday, contained a number of technological legends like Apple co-founder and engineer Steve Wozniak, computer programming pioneer Donald Knuth, video game inventors Al Alcorn and Steve Russell and IBM's first female fellow Fran Allen. The galleries of the exhibit will have many legends of the computing world speak as part of a series entitled "Revolutionaries".

Guest can also partake of an oral history program with over 40 interactive stations featuring the legends of computing. The stations will contain archived interviews with pioneers like Chuck Thacker from Xerox's Palo Alto Research Center and John Atanasoff who built the first digital computer in 1939. Holler added, "We often say, 'wouldn't it have been great to have been able to talk to Michelangelo as he painted the Sistine Chapel?' We can do that."

The exhibit is open now and is sure to be the highlight of any computer or tech lover's trip to the museum. If you love technology, history, computers or all of the above, then this is one place you have to visit before you die. Put it on your bucket list or tattoo it to the inside of your eyelids. Do whatever it takes to remember to go and see this exhibit.

Source: PC World
Power Point Projectors
Most business class projectors will do a good job of displaying your PowerPoint presentation. If you have a small presentation group, a 2000 lumen LCD projector will be able to produce a nice and clear picture. For larger audiences you should consider a 5000 lumen LCD projector. Visit the Worldwide Technology Rental Company...Rentacomputer.com

Monday 3 January 2011

Intel's Second Generation of Core Processors

Second Generation Core ProcessorsThe second generation core processor family, otherwise known as the Intel Core 2011 processors, has finally arrived. There have been months of teasing accompanying on-stage demos, but the details on the Core i3, i5 and i7 processors are finally coming out and, considering the fact that there are a total of 29 new CPUs as well as a new integrated graphics options (processor graphics), there is a lot to mull over.

The first generation of processors was released a little over a year ago, so what is it that makes the second generation different? Well, if you haven't been following the Sandy Bridge news, the new family of processors are all based on the 32nm microarchitecture from Intel. They are also the first to put processor, memory controller and graphics on the same die.

But what does that mean for you? Well, it means the package is smaller and the parts take advantage of each other more efficiently. While the graphics may not be as good as a discrete video card, they are a lot more powerful than before. According to Intel, the HD 2000 and 3000 processor graphics provide double the performance of Capella-based systems which coincides with early benchmark tests. Turbo Boost and Hyper-threading technologies have also been improved by Intel to a point at which the new chips enable higher levels of CPU performance. The new integrated chips reduce power consumption and can even turn off an idle optic drive activating "incredible battery life" according to Intel.

The new architecture means new CPUs, 29 to be exact, which include different versions of mobile and desktop Core i3, i5 and i7 models. Naming on the processors has changed. Now the processor's name is followed by four numbers as opposed to the previous three. The first processors to ship in physical systems will be the quad-core i7 CPUs and should be hitting this week with the dual-core versions coming in February. Ultra-low voltage versions for portable laptops are coming and should be introduced in the second half of the year. Be sure to keep an eye out for some specially marked overclockable "K" series processors that will allow you to individually set the clockspeed ratios for each individual core.

This new generation of processors is sure to create quite the buzz in the computer world, especially for people who are enthusiasts or are looking to build a custom rig. There are a lot more details out about the processors now than there have been, but I can only imagine what will be revealed about them later. Keep checking back here periodically for all the details on the second generation Intel processors.

Source: Engadget

Computers, Desktops, Laptops, Servers and the latest in Portable Tablet PCs are available from your computer rental company, Rentacomputer.com.

Talk to a Rentacomputer.com Tech Travel Agent Today!
Call Toll free 800-736-8772.

Saturday 1 January 2011

Microsoft Word Gets Hacked

Microsoft WordNo computer program is 100% safe. Any program, no matter how good the programmer behind it was, can be hacked. Even big companies, the ones that have hundreds of technicians and programmers, are still vulnerable to hackers. Just take a look at the most recent hacks on one of the most widely used pieces of software in the world, Microsoft Word.

According to Microsoft officials last Tuesday, hackers are now exploiting a vulnerability in Microsoft Word in order to plant malware on Windows PCs. The bug, found in Microsoft Word 2002, 2003, 2007 and 2010, was patched back on November 9th, 2010, as a part of Microsoft's monthly security update.

Word 2008 and 2011 for the Mac have been patched as well, however, Microsoft has not yet issued a fix for the same flaw in Word 2004. The attacks, on the other hand, only affect Windows versions of the suite.

According to the Microsoft Malware Protection Center (MMPC), which is the group that investigates attack codes and also issues signature updates for the company's antivirus software, the first exploits were found last week. When the Word patch was shipped last month, the bug was rated as a "1" on the exploitability index. What that number means is that a working attack would manifest within 30 days.

The attack uses a malicious Rich Text Format (RTF) file to generate a stack overflow in Word on Windows, according to MMPC researcher Rodel Finones. Once a successful exploit takes place, the attack codes download and run a Trojan horse on the PC. Microsoft rated this RTF vulnerability as "critical" in Word 2007 as well as 2010 last month. However it was only listed as "important" in all other affected versions.

It is thought that this bug was a hacker choice due to the fact that users running Office 2007 or 2010 could be attacked if they made the simple mistake of previewing a specially-crafted RTF document in the Outlook e-mail client.

According to Jason Miller, the Data and Security Team Manager for Shavik Technologies, "Once a malformed message hits the Outlook preview pane, remote code can be executed. You should patch this right away." This is what he said when Microsoft released the patch.

Finones stated that the code "reliably exploits this Word vulnerability" and also urged users who have yet to install the November patch to do so immediately.

Source: Computer World
A Copier Rental is a quick way to mass produce important documents for potential customers at an event or conference. Renting office equipment is simple and easy and it can also save you loads of time and money. Rentacomputer.com has been offering copier rentals to more than 1000 cities worldwide for over 20 years.

Tuesday 28 December 2010

McAfee's 2011 List of Threats

With the New Year fast approaching, tech enthusiasts are very excited about all of the latest technology that is being introduced in 2011, but what about the possible security concerns that come with all the new technology? On Tuesday, December 28, 2010, McAfee released their 2011 list of threat predictions. The company said, "The list comprises [the] most buzzed about platforms and services, including Google's Android, Apple's iPhone, Foursquare, Google TV and the Mac OS X platform, which are all expected to become major targets for cybercriminals."

"We've seen significant advancements in device and social network adoption, placing a bulls-eye on the platforms and services users are embracing the most," said Vincent Weafer, senior vice president of McAfee Labs, in a statement. "These platforms and services have become very popular in a short amount of time, and we're already seeing a significant increase in vulnerabilities, attacks and data loss."

McAfee will have to work especially hard to fend off the increasingly sophisticated malware that will be targeting Apple in 2011. So far, the Apple Mac OS platform has been decently secure, said McAfee. The iPhone and iPad are growing increasingly popular in the business realm though, and McAfee is afraid that with the general lack of knowledge about how to secure these Apple devices Apple botnets and Trojans could be a frequent occurrence and become a serious issue.

The biggest thing that people need to be really careful about is social networking sites. McAfee said that sites like Twitter and Facebook can easily fall prey to problems like URL shortening scans. They continued saying that they knew that utilizing abbreviated links does make it easier to condense your 140 character limit Tweets, but sometimes these links are also an easy way for criminals to mask and direct users to malicious Web sites. Each minute there are more than 3,000 tiny URLs created. Due to these astronomical numbers, McAfee said that they expect to see an increasing number of URLs that will be utilized for spam, scamming, and other malicious purposes.

Although a recent study showed that only 4 percent of adults really use location-based services, companies are continuing to release location-based features including Foursquare, Google Latitude, Facebook Places, and more. McAfee warns that the information that is shared on sites like these could easily enable cyber criminals to formulate a targeted attack. They also predicted that in 2011 there will be an increase in the use of this type of tactic across most of the popular social networking sites.

A lot of these location-based services that people utilize are used via their mobile phones. Because of this, McAfee is also predicting a “rapid escalation” in the number of mobile attacks due to “widespread adoption of mobile devices in business environments, combined with historically fragile cellular infrastructure and slow strides toward encryption."

McAfee also said that the increased use of Internet TV connections could pose a serious security risk. If manufacturers just rush into releasing their products, they could run into some major issues with suspicious and malicious apps on platforms such as a Google TV device. "These apps will target or expose privacy and identity data and will allow cybercriminals to manipulate a variety of physical devices through compromised or controlled apps, eventually raising the effectiveness of botnets," McAfee said.

These weren’t the only things that McAfee had on the threat list that they released. The list also included:

Hacktivism: McAfee is predicting that there will most definitely be a rise in the number of possibly politically motivated cyber attacks. "More groups will repeat the WikiLeaks example," McAfee said. They continued saying that unlike WikiLeaks though, the strategy will be much more sophisticated and leverage social networks.

Friendly Fire: McAfee is saying that there will also be a rise in the use of malicious content that is disguised as an e-mail from a source that you know. There is “signed” malware that works to imitate legitimate files that McAfee is afraid will be much more prevalent. They also said that “friendly fire,” which is a threat that seems to come from your friends but really is a virus such as Koobface or VBMania, will become a much more prevalent choice by cybercriminals. McAfee also said that these attacks go hand-in-hand with social network attacks and that these social network attacks could quite possibly eventually overtake e-mail attacks.

Botnets: McAfee Labs is predicting that with the merger of Zeus and SpyEye that there will be more sophisticated bots that will be produced because of the advancements for bypassing security mechanisms and law enforcement monitoring. McAfee Labs also says that they expect to see an increase in botnet activity that begins to adopt data-gathering and data removal functionality, instead of the more common use of sending spam.

Well, one thing that can definitely be taken from McAfee’s 2011 list of threats is that there are definitely threats out there that users want to avoid. Security is a big issue that many people tend to avoid, including myself. Protection and caution is necessary and is something that people really need to pay a little more attention to.

A Tech Travel Agent from Rentacomputer.com, the Worldwide Technology Rental Company will schedule installation of projectors, computers, and office equipment on a permanent or temporary basis in over 1000 cities worldwide. Call 800-736-8772

We have 3987 Installers, Technicians and Engineers stationed worldwide to serve you.

Wednesday 22 December 2010

Browser Wars Heat Up for Microsoft

"I fear all we have done is awaken a sleeping giant...", those were the words of Admiral Isoroku Yamoto after the attack on Pearl Harbor, and it also seems to be the feeling people have toward Microsoft and the company's entrance into the "browser wars" we are seeing today.

Back when Internet Explorer first came out, it was a high performance browser with a lot of useful functions. However, those days were finite, and Microsoft got branded with the reputation of producing crappy browsers, a reputation that IE7 and IE8 did nothing to improve upon.

In 2010, however, a long effort to reactivate the company's browser projects showed promise in IE9. As of right now, the application is still in beta form, but it has already shifted the browser market dramatically.

Internet Explorer 9 supports any and every kind of Web standard including a ton of HTML5 features like built-in video, CSS3 for advanced formatting, professional typography and SVG for smoothly resizable graphical elements. IE9 also speeds up the execution of web-based JavaScript programs. This development did manage to alert browser rivals for one top priority today, hardware acceleration. The software itself is accompanied by a push by the industry where Microsoft is educating Web developers and contributing to the development of standards.

It does appear that it may take a little while before web developers trust that Microsoft is serious about browsers again. It also seems that people still using the ancient IE6 will still be wary of upgrading. One thing is clear, Microsoft is paving the way for a new browser future where web sites as well as web applications become more fluid, interactive, polished and powerful.

In terms of Microsoft, Internet Explorer 9 has come in at exactly the right time. The battle with IE has always been against Firefox, however, Google's Chrome has brought in a new era of fierce competition. I think it is safe to say that Google knows a little something about the internet, and the company has a major agenda of web applications to pursue as well as a big enough presence on the web to allow it to make new technologies relevant by building them into its browser and web site.

Early in 2010 Chrome passed Safari by Apple for third place in the rankings of browser usage, and its growth carried to almost 10% of usage in November. A new phase of Google browser ambition is just taking off as well. The Chrome Web Store, which was designed to promote web-based applications and Chrome OS, allows people to find and purchase nearly any web app they want.

Chrome OS is much more of a departure from existing technology than just a browser. Google only offers it built into hardware. Google has done a good job with Android, but it is still unclear as to how well Chrome OS will fare with consumers and businesses.

Firefox's percentage of browser usage has remained consistently flat for most of 2010 thanks to Chrome. There are big things planned for Firefox 4 including many new features and performance enhancements. The problem is that Mozilla failed to meet a 2010 deadline and has since been pushed into 2011.

Apple's Safari has steadily increased in usage share with a few signs that the Windows version is catching on. Safari has been the principle sponsor of the open-source WebKit project, the same project both Safari and Chrome are based on. However, Google is steadily increasing.

One notable feature of Safari 5 that arrived in July was extensions that have the ability to customize the browser's behavior. Opera, the browser currently ranked 5th, is building them into Opera 11 which is the upcoming version of the browser which will match Chrome and Jetpack, the upcoming browser from Mozilla.

Adobe Systems, maker of Flash Player plug-in, had a particularly difficult year but ended on a good note. Apple, not surprisingly, did not budge on their ban of Flash from iOS devices directly, however, it did relent on blocking an Adobe tool that allows you to convert Flash apps to native apps. Google and Adobe forged an alliance due to the very public fight between Apple and Adobe which resulted in Flash support and promotion within Android.

The browser market combines competition between makers with cooperation as all the companies seek to advance the possibilities that can occur on the web. HTML5 standardization has sprouted emotional clashes between different groups involved as the specification moves more under the control of corporate powers.

The mobile market is also a big challenge to the web. Native software can offer better interfaces as well as faster performance than traditional web apps on mobile devices. However, it is still clear that the web as well as the tools for using it are clearly on the rise.
Make your next corporate business meeting really shine with a Projector Rental from Rentacomputer.com. They offer a wide range of projectors including Benq Projector Rentals. Rentacomputer.com has been in the projector rental industry for over 20 years and delivers to more than 1000 cities worldwide.

Tuesday 14 December 2010

Kingston Digital Unveils Second Generation Colorful Mini Fun USB Flash Drives

Kingston DataTraveler Mini Fun G2USB flash drives are some of the most convenient pieces of technology around today. They allow you to add anything from data files to word documents and even movies or music to them and transport them to any USB device for instant access. But just because you have a cool piece of technology doesn't mean it has to be boring.

That is why Kingston Digital unleashed their DataTraveler Mini Fun not too long ago, a device that added color and fun to your everyday USB flash drive. Well, everything deserves an upgrade now and then which is why Kingston Digital has just unveiled the next generation of the DataTraveler Mini Fun USB flash drive.

This latest release from Kingston features a ton of colors as well as a rubber casing and a miniature size which is reviving one of Kingston's favorite designs. According to Jim Selby, Manager of European Product Marketing for Kingston Digital Europe, "These multicolored fun devices can be 'snapped' to each other in order to construct different objects and cool shapes. Users can take apart their designs and build something new and creative every day. The versatile Kingston DataTraveler Mini Fun G2 is the perfect storage companion to help store your favorite documents, photos and music in a mini-sized drive. It's so small that you can take it anywhere."

There are three different color designs for the Kingston DataTraveler Mini Fun G2. This allows users to mix and match different sticks. The mini design and bright colors make this USB drive ideal for your home, school and travel. There are three models of this device currently available, a 2GB, 4GB and 8GB, each of which come with a different color combination.
Looking for a meeting room projector? Get your best deal at RentOurProjectors.com

Wednesday 1 December 2010

Breakthrough by IBM May Bring Us Exascale Supercomputers

If you are one of the people out there that doesn't think that a supercomputer seems good enough, then you probably work at IBM. Researchers at IBM have just made a breakthrough in using light pulses to help accelerate the transfer of data between chips. If this works out like the people at IBM think it will, then it could quite possibly increase supercomputer performance by more than a thousand times.

This technology, dubbed CMOS Integrated Silicon Nanophotonics (I feel smarter already), integrates optical modules as well as electrical modules on a single piece of silicon. This allows electrical signals created at the transistor level to be transformed into light pulses, seemingly allowing chips to communicate faster according to IBM silicon photonics research scientist Will Green.

IBM believes that this new technology will lead to massive advances in supercomputer power. The fastest supercomputers we have around today max out at nearly 2 petaflops which, for us lay people, registers into two thousand trillion calculations per second. The photonics technology could increase this number to a staggering trillion million calculations per second. Yeah, a MILLION TRILLION calculations per second, otherwise known as an exaflop. This would help IBM achieve their goal of building an exascale computer by the year 2020.

According to Green, "In an exascale system, interconnects have to be able to push exabytes per second across the network. This is an interesting milestone for system builders who are looking at building exascale systems in 10 years."

The possibility of integrating multiple photonics modules onto a single substrate or onto a motherboard is here, according to Green. Newer supercomputers already use optical technology for chips in order to communicate. However, this usually occurs at the rack level and mostly over a single wavelength. This breakthrough will allow optical communication simultaneously at multiple wavelengths.

The good thing about this technology is that it can be manufactured on a standard chip production line. Another benefit is that it also needs no special tools, making it extremely cost-effective. The current demonstration used a 130-nanometer CMOS manufacturing node. However, IBM plans on pursuing integration into "deeply scaled sub-100 nanometer CMOS processes," according to Green.

The technology aims to replace copper wires. As you know, copper wires are widely used today for data transfer between chips. Optics can get a speed increase for distances as short as a few centimeters to as long as a few miles and even consumes less power. Eventually, IBM hopes to use optics for on-chip communication between transistors as well. According to Green, "There is a vision for the chip level, but that is not what we are claiming today."
A Laptop Rental is perfect if you are hosting a classroom training session or if you are just headed to another convention. Take the hassle out of your business trip. Rentacomputer.com has been offering quality laptop rentals for over 20 years to more than 1000 cities worldwide.