Minggu, 16 Januari 2011

Computers Beat Human Brain

Jakarta - Watson, the super computer made by IBM managed to beat the man in agame that tests of intelligence. Wow!
In a quiz game popular in the United States (USA), Jeopardy, Watson lead aftersuccessfully kicking the winner of the previous edition of Jeopardy, Ken Jennings andBrad Rutter.
Reported by the Times of India, Sunday (16/01/2011), Watson considered significantvictory for the quiz game involving non-linear thinking and questions in natural language where computers lag behind men in
such capabilities.
"After four years, our scientific team believes that Watson is ready with challengessuch as the Jeopardy quiz show," said David Ferrucci as the scientist who led theresearch team that developed IBM's Watson.
The game takes place in an IBM computer labs that are decorated just like the studiowhere the quiz is usually held. Thanks to his intelligence, Watson have won U.S. $4400, while its competitors, Jennings and Rutter, who became
champion two-and three each got USD 3400 and USD 1,200.


Sumber : http://www.detikinet.com/read/2011/01/16/104036/1547521/511/komputer-kalahkan-otak-manusia/?i991102105

Firefox 4 Beta 9 more reliable

Jakarta - Mozilla will soon release Firefox 4. But before the final version comes, letusers try out Mozilla's latest browser is through beta. Through this trial version, Mozillabegan introducing the appearance as well as various new features that will be presentin Firefox 4.
As quoted from digitaltrends, Monday (17/01/2011), Firefox 4 Beta 9 comes with a faster starting time, including a new bookmark in it.
This version is made for users to find their browsing needs, through the latest featuresin the Mozilla browser. Described in his statement, Firefox Sync feature will laterdiinteregrasikan directly in the browser. As a result users would be able to access thelatest data, history, bookmarks, tabs, and passwords across PCs or smartphones.
For developers and web designers, Firefox 4 beta 9 will support HTML5, WebM, HDvideo, 3D graphics rendering with WebGL, hardware acceleration, and an API thatMozilla Audio to create a better web content.

2010, 170 Trillion Emails Sent from 2.9 Billion Account

WASHINGTON - Internet users are still struggling with the email. Of all Internet users, at least 170 trillion emails were sent last year. According to the company website on the internet monitoring service, Pingdom, as quoted by Yahoo News, on Saturday (15/01/2011), of the trillions of emails sent mostly identified as spam. Pingdom said in June 2010 and then there are approximately 1.97 billion Internet users in the world. This figure consists of 825.1 million users in Asia, 475.1 million came from Europe, 266.2 million came from North America, 204.7 million from Latin America and the Caribbean, approximately 110.9 million from Africa, 63.2 millionfrom the middle east, and 21.3 million came from Oceania and Australia. According to Pingdom average of approximately 294 million email messages sent every day. Of that number approximately 89 percent is spam email. Based on data from Pingdom also recorded in the virtual world there are approximately 2.9 billion email accounts and 152 million blogs. "The total number of sites on the Internet approximately 255 million, an increase rather than the number of sites last year that only 21.4 million," said the Pingdom. In addition, globally in the virtual world also has approximately 88.8 million domain names ending in. Com, approximately 13.2 million domain names that are equipped. Net, and 8.6 million domain ending. Org. For the domain name by country code like. Cn. Ru or. Uk, in total has approximately 79.2 million domain. In addition to these data, Pingdom also found at least there are approximately 100 million new accounts at Twitter last year. Therefore, until last September microblogging site that now has approximately 175 million users. Of the total of that, Twitter crammed approximately 25 billion messages 'tweet' that was sent since 2010.While up to get the addition of approximately 250 million users in 2010, confirmed the number of users to around 600 million by the end of last year.

Continued criticism, Applications Increase In fact Marketplace


NEW YORK - Despite continued to receive criticism related to sales that are not as expected, but it does not make developers reluctant to bring the application in theMarketplace.
Evidence, now a special application store for Windows 7 Phone is already reaches 6,000 applications. Though Windows Marketplace has just been releasedapproximately 3 months ago, it seems the developers still see things that arouse fromMicrosoft's OS.
In fact, as reported by TG Daily, Monday (1/17/2011) whereas two months ago, the number of applications on specific applications store WP7 is still amounted to 3000applications. Currently the number of paid applications on Windows 7 PhoneMarketplace dominate with a total of 71 persenaplikasi.
Meanwhile, an average of 500 new applications present in the Marketplace everyweek. Predicted there will be more than 10,000 applications available in mid-March.This figure will continue to increase over the number of mobile users in different partsof the world WP7.
As is known the software giant launched its ninth WP7 first handset-based handset in October, with devices from Dell, HTC, LG and Samsung.
Penjualaan this smart phone, as some companies have not mememuaskan whencompared with Android. Although Microsoft itself has confirmed the difference mostof WP7 is compared with the previous OS versions.

Hackers Spread Trojan Through Kamasutra

SAN FRANCISCO - Bids pornographic content on the internet the more lucrative anddangerous. Because once trapped, the virus will spread and damage the PC.
A re-discovered virus. This time the guise offer a presentation about kamasutra inPowerPoint file format. The virus was to lure potential victims to see the view of sexual relations positions in the Kamasutra.
"Be careful with the mouse movements you use," said Graham Cluley, from networksecurity firm Sophos, was quoted as saying by the Straits Times on Saturday(15/01/2011).
"When you click on the file, you will indeed be awarded in the form of a PowerPointpresentation of the original. But the background of presentations had been infiltratedby a Trojan, identified as Troj / Bckdr-RFM," said Cluley.
The Trojan will then automatically infect a PC that has been compromised. From there, hackers will easily control the victim's computer remotely.
Cluley, once the computer is infected with malicious software so hackers can easilysteal personal information in it. Even they can spy on user activity that uses the deviceto the interests of other harmful, such as sending spam or attacking other sites.
The virus entered along with the movement of the mouse is used to display thepositions of the Kamasutra. Interestingly, the hacker really give the 'gift' drawing from the Kamasutra sex techniques in the form of a slide of more than half a dozen.

Storage Trends 10 Predictions in 2011

JAKARTA - Year 2011 which has just started this, of course demands a variety of changes, including in the IT industry segments. According to the Hu Yoshida, Chief Technology Officer (CTO), Hitachi Data Systems storage market trends will be colored with 10 primary storage data centers around the transformation. And the following 10 trends storage according to Hu Yoshida, who okezone quotes through its official statement on Sunday (16/01/2011). 1. Adoption of storage virtualization and dynamic provisioning faster. Both the foundation for the application of cloud computing and dynamic data center with high availability. Storage virtualization, virtualization of external storage arrays enable the migration from one array to another array without any interruption.Meanwhile, dynamic provisioning enables storage is provided in minutes. 2. The integration of server and storage virtualization more closely. This integration is necessary to increase the adoption of virtualized data center.Today, server virtualization has matured beyond consolidation cost reductions from the print server, file, test and development to support the application server tier 1.Virtualization servers require the integration of virtualization storage array that can reduce the 'bottleneck' I / O software such as SCSI, so they can meet the needs of enterprise-class applications. 3. Adoption of virtual tiering for lifecycle management. Currently, tiering is able to allocate virtual volumes to a single pool of storage (storage group) that contains the performance, cost and number of tiers of storage. Virtual tiering also has the intelligence to move the components of that volume to another tier based on the number of access. 4. Time to use the SSD (Solid State Drive) in a virtual configuration tier. SSD can improve performance while lowering the cost of a virtual configuration tier.Currently, 80 percent more volume classified as inactive, only a small number of SSDs that are needed in Tier 1 to serve the active components from a single volume.Most of the volume can use SAS or SATA drives are cheaper. 5. Adoption of Serial Attached SCSI (SAS) for systems of enterprise storage. Unlike Fibre Channel (FC) loop is used to support FC drives on the old storage systems, SAS is a protocol point-to-point. Most SAS drives currently 6Gbps speed and most of the FC loop is 4Gbps. Thus, SAS has faster performance with the access point-to-point, making them easier to find the drive that failed compared to FC loops. 6. Drive SFF (Small Form Factor), will be more easily found. Mainly because of the power and cooling efficiency SFF owned. SFF devices are 2.5-inch drives which consume power around 6 to 8 watts, compared to drive Large Form Factor (LFF) 3.5 inch which takes 12 to 15 watts. Thus, SFF cut dramatically the power and cooling, plus also savings from the use of the room. Some vendors package the 24 disks in a drawer SFF 2U-high 33.5 inches wide. Hitachi AMS package and Virtual Storage Platform (VSP) to be more compact. One drawer AMS has 48 drive 3U high by 24 inches wide. This drawer can be pulled for maintenance by 48 disk is still spinning. 7. Cloud (Cloud) was accepted as one of the infrastructure model. Cloud computing will begin to be accepted as one of the concepts tested. A number of foundation to the Clouds will encourage adoption by providing a number of device management and orchestration layer that provides transparency throughout the process. 8.Konvergensi data center soared. Convergence server infrastructure, storage and networking will simplify and accelerate application deployment. The use of servers, hypervisor, storage and network virtualization provides a way for an open platform that ensures investment protection and choice to users. 9.Aplikasi increasingly transparent in storage virtualization. Without this transparency, the user application can not know whether the target Service Level Agreement (SLA) has been reached, how to know their billing mechanisms, planning and utilization of health level of its infrastructure. 10. Managed services (managed services) Remote start is available. Remote Managed Services will reduce the burden of monitoring, reporting, warning and management of IT operations that prevent switching to new technology. For more than 10 years, the mandate given to IT is to do more with less so that the staff was busy with the maintenance of the same technology.

 
Powered by Blogger