Gigabyte launches P35X v3, the "lightest 15.6-inch gaming laptop"

Gigabyte has today launched its 15.6-inch P35X v3 ULTRAFORCE gaming laptop. The Taiwanese computer and components maker headlines the machine as the "the lightest 15.6-inch gaming laptop" available. However readers will be pleased to know that the lightness and thinness of the machine doesn't seem to have resulted in its specs being trimmed - you even get 'quad-storage' capacity including a hot swappable ODD/HDD slot.
A tasty selection of key components have been chosen for this gaming-focussed portable including. The CPU comes from Intel's fourth generation of Core chips; buyers can choose between the Core i7-4860HQ (2.4GHz-3.6GHz) and Core i7-4710HQ (2.5GHz-3.5GHz). The P35X v3 has two memory slots offering a maximum of 16GB of RAM.
For graphics performance an Nvidia GeForce GTX 980M GPU is paired with 8GB of GDDR5 RAM. Gigabyte are happy to point out that this mobile GPU offers a 12 per cent performance improvement over the GTX 970M and can achieve P10000+ in 3DMark 11. Users have an Intel HD Graphics 4600 GPU to use for lower energy consumption non-3D intensive application purposes. 'Supra-cool Technology' is provided by Gigabyte with dual heatpipes and dual fans to stop things getting too toasty.
The 15.6-screen is a wide viewing angle type LCD. Again buyers have a choice, this time you can opt for a WQHD+ 2880x1620 display or the more common Full HD 1920x1080. To complete your audiovisual experience Gigabyte has built-in a pair of 1.5W speakers, a subwoofer, Dolby Digital Plus, an HD webcam and a microphone. An ambient light sensing backlit keyboard is standard.
There are plenty of storage options available thanks to the quad-storage bays. A plethora of mSATA SSD, 2.5-inch HDD and also ODDs option are available. Plenty of ports round off the system including USB(3.0)*2, USB(2.0)*2, HDMI, D-sub, RJ45, Mic-in, Earphone-out (SPDIF), SD Card Reader, DC-in Jack, Mini DisplayPort. Networking is catered for by the 10/100/1000Mbps Ethernet, 802.11ac/b/g/n Wi-Fi and Bluetooth 4.0.
The Gigabyte P35X v3 measures 385(W) x 270(D) x 20.9(H) mm and weighs in at between 2.2 and 2.3Kg depending upon your storage choices. The included battery pack is a Li-Polymer, 11.1V, 75.81Wh type. Finally, buyers have a choice of operating systems including Windows 8.1, 8.1 Pro, 7 Home Premium and 7 Pro.
A quick check on the internet here in the UK shows the price for the P35X v3 to be in the region of £1,600 or $2,400 in the US.

Wednesday, 10 December 2014
Posted by christy

Qualcomm to challenge Intel's datacentre and server dominance

Qualcomm to challenge Intel's datacentre and server dominance


The dominance of Intel's products in the server and datacentre market is remarkable, it holds over 95 per cent market share. In the immediate future that's unlikely to change, but over the longer term Qualcomm is aiming to challenge Intel's rule.
Up until now Qualcomm and many other primarily-mobile processor manufacturers have steered clear of the datacentre and server markets; low overall compute performance and a lack of mature 64-bit designs explained this absence. Recently, that has started to change and now Qualcomm is eyeing a possible entry into datacenters and servers over the course of the next two to three years using ARM-powered chips.
Qualcomm's entry into the server market mirrors the situation Intel currently faces trying to forge its way into the mobile market, where Qualcomm holds a similarly-dominant position. At the World Internet Conference in Wuzhen, China, Qualcomm executive chairman, Paul Jacobs, stated that "[Data centers] are built with chipsets basically from one company, Intel, and they are quite high priced and they use tremendous amounts of power...We're going to change that."Qualcomm claims to already be in discussion with possible server customers.

Posted by christy

Intel chip will power the next Google Glass says report

Intel chip will power the next Google Glass says report

Posted by christy

Intel Broadwell and Skylake client CPUs both launching in 2015

Intel Broadwell and Skylake client CPUs both launching in 2015

Broadwell on track for 2015 client release

Kirk Skaugen, general manager of the Intel PC client group, confirmed that the 14nm Broadwell microarchitecture is now in full production and due to appear in mobile and desktop Core i3, Core i5 and Core i7 chips in early 2015. The announcement follows Broadwell's recent introduction on the Core M mobile processor designed for fanless tablets and 2-in-1 computers.
Due to be known as the 5th generation Core architecture, Broadwell brings minor CPU-side improvements along with enhanced integrated HD graphics and much-improved power efficiency. Though launching almost two years after Haswell, Broadwell's time as the premier architecture is to be short-lived. And if reports are to be believed, value-based Pentium and Celeron processors will miss out on Broadwell altogether.
Intel is therefore fast-tracking the next-generation architecture, Skylake, for the full gamut of desktop and mobile CPUs. Based on the same 14nm process as Broadwell but packing a fundamentally new core and graphics - details are sketchy at best right now - Skylake will be in production in early 2015 and in products by the end of next year. Skaugen showed a laptop equipped with a Skylake processor running 3D Mark.

Two architectures next year

Having two microarchitectures launching for client computing in one year makes us wonder if there's much reason to opt for delayed Broadwell-based processors when they become available in six months' time. Perhaps Broadwell's one redeeming factor is compliance with the current LGA 1150 socket used on Haswell chips/boards. Skylake, meanwhile, will use a new socket known as LGA 1151.
Keeping the industry ticking along, Intel's laptop partners, we must remember, are understandably eager to harness the first 14nm Broadwell silicon for mainstream devices, which they expected to be available very early this year.
Fortunately for Intel, the current-generation Haswell architecture has limited competition from AMD in the client andenterprise space. Now extended to Core i5 Y-series processors at the energy-efficient segment of the market to octo-core gaming chips and 18-core server processors at the high-end, Haswell has provided excellent scaling from 5W through to 150W.
Intel has been focussing on increasing energy efficiency from one architecture to the next, underscored by the significant improvement when comparing low-power Haswell Core i5 and Broadwell Core M chips. What remains to be seen is whether Skylake can give performance the same shot in the arm.

Sony Pictures malware tied to Seoul, “Shamoon” cyber-attacks Elements of the attacks show a common playbook—and possibly a common toolkit.

Sony Pictures malware tied to Seoul, “Shamoon” cyber-attacks

Elements of the attacks show a common playbook—and possibly a common toolkit.


There are similarities galore between the Seoul (left) and Sony Pictures (right) hacks, right down to the style of their tag image.

The “wiper” malware that knocked Sony Pictures’ corporate network offline for over a week, now being called Destover, bears a striking resemblance not only to the “DarkSeoul” malware that struck South Korean companies last year, but the Shamoon “wiper” that struck Saudi Aramco in 2012, according to analysis by Kaspersky Labs and other security researchers. While there is nothing in the analysis that would tie the three attacks to the same malware developers, they all used similar techniques, as well as some of the same commercial Windows drivers to attack the hard drives of their victims.
In an e-mail exchange with Ars, Kaspersky Lab security researcher Kurt Baumgartner said, “Of the three, the Shamoon and Destover implementations share the most similarities, and based on these similarities it is possible that there was shared guidance or expertise between the two projects. All three share operational similarities.”
The Sony Pictures malware used commercial software to do its damage to the victim computers’ hard drives—the RawDisk library from EldoS, which allows Windows applications to gain direct access to disk hardware without having to run in administrator mode. As EldoS advertises on its website for RawDisk, the library “offers software developers direct access to files, disks and partitions of the disks (hard drives, flash disks, etc,) for user-mode applications, bypassing security limitations of Windows operating systems.” This allowed the malware to skip past any restrictive security permissions in Windows’ NTFS file system and overwrite the data on the drive, including the master boot record (MBR). (Further details of the malware's behavior are in Ars' updated analysis article.)
This is the same technique used in both the 2013 Seoul cyberattack and the Shamoon attack in 2012, according to Baumgartner, who provided a detailed analysis of the similarities between the attacks in a blog post today. The Shamoon attack also used a trial licensed version of the commercial EldoS drivers. And there were other commonalities across all three attacks, Baumgartner noted:
Just like Shamoon, the Destover wiper drivers are maintained in the droppers' resource section. Just like Shamoon, the DarkSeoul wiper event included vague, encoded psuedo-political messages used to overwrite disk data and the master boot record (MBR). Just like DarkSeoul, the Destover wiper executables were compiled somewhere between 48 hours prior to the attack and the actual day of attack…The Shamoon components were compiled in a similarly tight timeframe prior to their deployment. In all three cases: Shamoon, DarkSeoul and Destover, the groups claiming credit for their destructive impact across entire large networks had no history or real identity of their own. All attempted to disappear following their act, did not make clear statements but did make bizarre and roundabout accusations of criminal conduct, and instigated their destructive acts immediately after a politically-charged event that was suggested as having been at the heart of the matter.
Even the visual elements of the Seoul and Sony attacks are similar. Destover used an internal webserver in the malware to display the message on the screen of affected PCs, just as DarkSeoul did, and the color schemes and themes of the messages displayed in both cases were the same.
The short timeframe between the compilation of the malware and the triggering of the attacks in each case would have precluded the use of shotgun methods like a phishing attack to infect the target networks. The malware would have to have been spread widely across the network days or even hours before it was triggered—indicating that the attackers may have been exploiting the targeted networks for long periods of time before they were brought down by the wiper bugs.
One major difference between the Sony and Seoul malware attacks is that the Seoul attacks included scripts to attack Unix and Linux systems; the Sony Pictures attack lacked these scripts, but it may have been because there were no Unix or Linux systems identified by the attackers prior to the installation of the malware. The Sony malware specifically sought out servers within the company's network by machine name to attack, demonstrating foreknowledge of the network's structure.
Baumgartner said that there was no proof that the three attacks were carried out by the same group, but the “operational and toolset characteristics all carry marked similarities. And it is extraordinary that such unusual and focused acts of large-scale cyber-destruction are being carried out with clearly recognizable similarities.

Posted by christy

RISK ASSESSMENT / SECURITY & HACKTIVISM This system will self destruct: Crimeware gets powerful new functions Refurbished BlackEnergy does Windows and Linux—even Cisco routers.

RISK ASSESSMENT SECURITY & HACKTIVISM

This system will self destruct: Crimeware gets powerful new functions

Refurbished BlackEnergy does Windows and Linux—even Cisco routers.








Researchers have discovered new capabilities in the BlackEnergy crimeware tool that significantly extend its reach. The ability to run on network devices, steal digital certificates, and render infected computers unbootable are just a few of new-found weapons in its arsenal.
BlackEnergy emerged as a tool for launching denial-of-service attacks. It later morphed into crimeware used to funnel banking credentials and most recently was observed as a refitted piece of software for espionage that targeted the North Atlantic Treaty Organization, Ukrainian and Polish government agencies, and a variety of sensitive European industries over the last year. In this last incarnation, BlackEnergy in some cases was installed by exploiting a previously unknown vulnerability in Microsoft Windows systems.
According to a report published Monday by security firm Kaspersky Labs, the breadth of BlackEnergy goes even further. A host of extensions customized for both Windows and Linux systems contain commands for carrying out DoS attacks, stealing passwords, scanning ports, logging IP sources, covertly taking screenshots, gaining persistent access to command and control channels, and destroying hard drives. Researchers Kurt Baumgartner and Maria Garnaeva also acquired a version that works on ARM- and MIPS-based systems and uncovered evidence BlackEnergy has infected networking devices manufactured by Cisco Systems. They are unsure precisely what the purpose is for some plugins, including one that gathers device instance IDs and other information on connected USB drives and another that collects details on the BIOS, motherboard, and processor of infected systems.
"We are pretty sure that our list of [BlackEnergy] tools is not complete," the researchers wrote. "For example, we have yet to obtain the router access plugin, but we are confident that it exists. Evidence also supports the hypothesis that there is a decryption plugin for victim files."
BlackEnergy has targeted victims in at least 20 countries, including Russia, Germany, Belgium, Turkey, Libya, and Vietnam. One unidentified victim was infected through a spearphishing campaign that exploited an unspecified vulnerability. Once the unknown attackers had reason to believe the victim knew of the infection, they activated "dstr," the name of a plugin that destroys hard disks by overwriting them with random data. A second victim was compromised by using VPN credentials taken from the first victim.
Monday's report from Kaspersky Labs comes a week after the Industrial Control System Cyber Emergency Response Team warned of critical vulnerabilities in industrial systems that are being actively exploited by several different advanced persistent threat groups. One such group, the advisory stated, is the Sandworm team suspected of hacking NATO.



RISK ASSESSMENT / SECURITY & HACKTIVISM Powerful, highly stealthy Linux trojan may have infected victims for years Backdoor tied to espionage campaign that has targeted governments in 45 countries.

RISK ASSESSMENT SECURITY & HACKTIVISM

Powerful, highly stealthy Linux trojan may have infected victims for years

Backdoor tied to espionage campaign that has targeted governments in 45 countries.

Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.
The previously undiscovered malware represents a missing puzzle piece tied to "Turla," a so-called advanced persistent threat (APT) disclosed in August by Kaspersky Lab and Symantec. For at least four years, the campaign targeted government institutions, embassies, military, education, research, and pharmaceutical companies in more than 45 countries. The unknown attackers—who are probably backed by a nation-state, according to Symantec—were known to have infected several hundred Windows-based computers by exploiting a variety of vulnerabilities, at least two of which were zero-day bugs. The malware was notable for its use of a rootkit that made it extremely hard to detect.
Now researchers from Moscow-based Kaspersky Lab have detected Linux-based malware used in the same campaign. Turla was already ranked as one of the top-tier APTs, in the same league as therecently disclosed Regin for instance. The discovery of the Linux component suggests it is bigger than previously thought and may presage the discovery of still more infected systems.
"The [Turla] operations are being carried out in broader environments than we previously knew," Kaspersky Lab expert Kurt Baumgartner told Ars. "All the other stuff we've seen from Turla has been windows based. This piece of the puzzle shows us that they do not limit themselves."

Magic Numbers

Like its Windows counterparts, the Linux trojan is extremely stealthy. It can't be detected using the common netstat command. To conceal itself, the backdoor sits dormant until attackers send it unusually crafted packets that contain "magic numbers" in their sequence numbers. The malware may have sat unnoticed on at least one victim computer for years, although Kaspersky Lab researchers still have not confirmed that suspicion. The trojan is able to run arbitrary commands even though it requires no elevated system privileges.
"It's a very interesting piece of code," Baumgartner said. "Not only does it run on Linux, but you can't detect it in the usual ways."
Even a regular user with limited privileges can launch it, allowing it to intercept traffic and run commands on infected machines. Capabilities include the ability to communicate with servers under the control of attackers and functions allowing attackers to run commands of their choice and perform remote management.
Even after its discovery, the Linux component remains a mystery. The underlying executable file is written in the C and C++ languages and contains code from previously written libraries, a property that gives the malicious file self-reliance. The code is also stripped of symbol information, making it hard for researchers to reverse engineer or analyze. As a result, Baumgartner said the trojan may have capabilities that have not yet been uncovered.
Administrators who want to check for Turla-infected Linux systems can check outgoing traffic for connections to news-bbc.podzone[.]org or 80.248.65.183, which are the addresses of known command and control channels hardcoded into the Linux trojan. Admins can also build a signature using a tool called YARA that detects the strings "TREX_PID=%u" and "Remote VS is empty !"
Given the power and stealth of the backdoor—not to mention its connection to one of the more sophisticated espionage campaigns discovered to date—it wouldn't be surprising for the discovery to open the door to discoveries of more infections or malware components.
"The research is ongoing," Baumgartner said. "I would assume at some point this is going to bridge into another finding because of the way this backdoor is used."

Intel demos next-next-gen “Skylake” processors, coming in late 2015 "Tock" on Intel's roadmap will bring a new architecture to the 14nm process.

Intel demos next-next-gen “Skylake” processors, coming in late 2015

"Tock" on Intel's roadmap will bring a new architecture to the 14nm process.



A Core M CPU package based on the Broadwell architecture
Intel's Broadwell CPU architecture has only just started rolling out, and most of the processors that use it aren't even supposed to launch until early next year. The new 14nm manufacturing process is causing the delay, but yesterday at the Intel Developer Forum the company tried to demonstrate that Broadwell's lateness wouldn't affect the rest of its roadmap.
To that end, Intel highlighted a couple of working developer systems based on the new "Skylake" architecture, as summarized here by Anandtech. The company didn't go into specific performance or power consumption numbers (both because it's early and because Intel probably doesn't want to take the wind out of Broadwell's sails), but it showed working silicon rendering 3D games and playing back 4K video to prove that the chips are working. The first Skylake processors are reportedly due out late in 2015 following the beginning of volume production in the second half of the year.
Here are the basic facts we already know about Skylake: it's a "tock" on Intel's roadmap, meaning it introduces a new architecture on a manufacturing process that's already up and running. In this case, that's Intel's 14nm process, which Intel insists has recovered from its early problems. Some of the CPUs in Intel's lineup—specifically mid-to-low-end socketed desktop CPUs—will get their next refresh using Skylake instead of Broadwell. Whether this is because Intel wants to reserve 14nm manufacturing capacity for lower-power, higher-margin chips or because it just doesn't think the power-consumption-obsessed Broadwell is a good fit for regular desktops is anyone's guess.
We aren't likely to hear much more about Skylake until after more Broadwell parts have rolled out, but we'll continue to report more information as we hear it.

Aiming High – Samsung Galaxy S6 To Allegedly Come With Blisteringly Fast Cat. 10 LTE On Board

Aiming High – Samsung Galaxy S6 To Allegedly Come With Blisteringly Fast Cat. 10 LTE On Board

With January and next year’s Consumer Electronics Show fast approaching, more and more news has started to become available about Samsung’s new hardware plans and specifications for its next flagship smartphone – the Samsung Galaxy S6. The Samsung Galaxy S6 has been the feature of quite a few news items over the past days, and thanks to these various leaks and rumors, we can get a rough idea of what Samsung’s next flagship device will come with.

446ac60f8dce48beb854bf3a75954334Samsung Developing In-House Cat. 10 LTE Technology To Go With The Exynos SoC.

The Samsung Galaxy S6 is expected to follow Samsung’s two-tier strategy of releasing its devices with two SoC variants. So far, the flagship is expected to come with the Snapdragon 810 and Samsung’s in-house, octa-core, Exynos 7 Octa on board. Both the Exynos 7 Octa and the Snapdragon 810 come equipped with Cat 6. LTE which can delier download speeds of up to 300 MB/s.

But if news out of Korea holds any water, Samsung plans to change that with the release of the Galaxy S6. Allegedly, the manufacturer is also developing its own in-house tri-band LTE Cat. 10 baseband, which will be able to deliver download speeds of up to 450 MB/s. To make things better, this Cat. 10 technology will be integrated with Samsung’s in-house Exynos SoC.
If true, then we could very well be seeing the Samsung Galaxy S6 coming with Cat. 10 on board. Qualcomm already has developed the technology, but has not introduced it on the Snapdragon 810. Cat. 10 on the Exynos could end up opening several doors for Samsung. This would include a lesser dependency on third-party suppliers for its devices and could allow the manufacturer to pursue areas of development it has not ventured into before. Nevertheless, its still too early to be making concrete speculations about Samsung’s development plans, so stay in touch and we’ll keep you updated. And let us know in the comments section about what you think.


Read more: http://wccftech.com/galaxy-s6-specifications-pop/#ixzz3LTmWxKLe

Install WhatsApp on Desktop Using Continuity-Like Feature – Windows & OS X

Install WhatsApp on Desktop Using Continuity-Like Feature – Windows & OS x

Considering the immense popularity of WhatsApp, there are many users who want to be able to use the messaging app on bigger screens of tablets and desktops. While it is possible to get the app on tablets, you will have to workaround to get the app on Windows PC or Macs.
install WhatsApp on desktop

Install WhatsApp on desktop:

If you want to install WhatsApp on desktop, don’t expect any official way. One of the ways to install WhatsApp on desktop is to use a third party app like AirDroid which lets you transfer files and access data from mobile devices. The latest version of the app called AirDroid 3 includes a new look and native support for Mac and Windows desktops bringing in better notification handling and remote device controle
AirDroid is solution for Android users who are perhaps envying the Continuity feature Apple started offering this year. By having this app on your Android phone or tablet and connecting with your Windows or OS X computer, you can only use WhatsApp on your bigger devices but also have complete remote access. Using the AirMirror feature of the app, you can control your device completely right from your desktop. Use the camera, play with files, use map, access photos, take screenshots, or any other such tasks, it is now possible to have complete remote access of your Android devices through desktops.

Seagate Debuts 8TB Archive HDD For $259 – Shipping in January

Seagate Debuts 8TB Archive HDD For $259 – Shipping in January
hours ago by 
It’s been quite sometime since we last heard anything exciting in the mechanical hard drive arena. The past couple of years have primarily been about the SSD revolution in the world of data storage. Despite that Seagate and WD have continued to work on improving traditional mechanical hard drives.
Seagate-8-TB-HDD-Going-Retail-for-Only-260-210-466896-2Although unlike past years the focus has turned primarily on increasing capacity rather than improving speeds. That comes back to the fact that it isn’t really possible for HDDs to catch up to solid state drives in terms of speed. However hard drives remain unrivaled in the area of capacity / cost.

Seagate Pushing The Boundaries of Mechanical Hard Drives

Seagate has been pushing really hard to maintain this competitive advantage of hard drives over SSDs, especially since the cost of SSDs has been steadily going down. The company has just announced three new hard drives with capacities of 8 Terabytes, 6TB and 5TB.
seagate labels these new drives as “Archive” HDDs. The new drives make use of a new technology called Shingled Magnetic Recording or SMR for short. Which improves capacity per platter by 33%, allowing for 1.33TB per platter compared to the previous limit of 1TB. Seagate has put six of these 1.33TB platters together for the 8TB model, which means a 10TB+ model is quite possible with eight platters.We’re still looking at very decent performance at 150MB/s of average read/write speeds and up to a maximum rating of 190MB/s , which is plenty enough for media consumption. The drives include a 120MB cache and the platters max out at 5,900 RPM, which is below the usual 7,200.  Seagate offers a three year warranty on these new drives. The company will also offer regular and secure versions with hardware based encryption via an integrated security processor.
The new drives will begin shipping in January. Pricing for the 8 TB model sits at an MSRP of $260 which translates to 30GB+ per dollar. In other words 15 times more capacity / cost compared to SSDs.
I can think of a really fun way to make use of these new drives paired with Asrock’s insane X99 Extreme11 motherboard which can support up to 18 individual drives for a total of 144TB of storage.

Intel Skylake 2015 Platform Details Revealed – Compatible With 100 Series Chipset And Supports DDR4, GT4e Graphics Chip On Desktop

Intel Skylake 2015 Platform Details Revealed – Compatible With 100 Series Chipset And Supports DDR4, GT4e Graphics Chip On Desktop


Some interesting details regarding the next generation Intel Skylake platform have been revealed by VR-Zone. The details show that the x86 Skylake architecture which would be based on a completely new 14nm node will feature several enhancements and will be supported by a new chipset, details of which are provided below.Intel Skylake Platform Details

Intel Skylake Platform Details Revealed – Compatible With 100 Series Chipset

The first thing we are most excited to learn is that Intel Skylake processors would be compatible with the latest 100 Series chipset which will replace the (soon to launch) Z97 and H97 chipsets which will be part of 9-Series chip-sets. This means that the upcoming processors will require a new motherboard that features the 100-Series chip-set and we will probably see a new socket too that replaces the current LGA 1150 socket. This is good news but this also means that current users or those who are upgrading to Z97 soon will have to upgrade their PCs again moving in 2015 if they want to take advantage of the new processors and DDR4 memory.
It should be pointed that the Intel will launch their Haswell Refresh processors on 10th May followed by Devil’s Canyon on 2nd June 2014 which is the codename for the Haswell Refresh K-Series featuring better TIM between the IHS and CPU die to circulate heat efficiency and better packaging components so that they can overclock to more extent as compared to Haswell. Soon after Haswell, we will see the launch of Intel’s HEDT Haswell-E plat-form which will replace Ivy Bridge-E and introduce DDR4, X99 Chipset and the latest LGA 2011-3 socket based motherboards. Moving in 2014, we will see the first 14nm Broadwell processors for desktop in Q1 featuring the support on current Z97 chipset motherboards.
The platform roadmap pits Skylake desktop parts in 2015 which means that Broadwell would be short lived and we probably won’t see a Refreshed platform like Haswell for Broadwell and instead move directly towards the Intel Skylake processors which will feature new architectural enhancements compared to Haswell and Broadwell.
Advertisements
Moving on with the details, there are several CPU configurations mentioned in the chart not only of Skylake but also Haswell Refresh and Broadwell. The configurations list the following:

Intel Skylake / Broadwell / Haswell Refresh Configuration Chart:

Haswell Refresh U (BGA)Haswell Refresh (LGA)Broadwell H (BGA)Braodwell Y (BGA)Broadwell U (BGA)Broadwell H (LGA)Sykake U  (BGA)Skylake H (BGA)Skylake S (LGA)
CodenameHSW-WHSW RefreshBDW-HBDW-YBDW-UBDW-HSKL-USKL-HSKL-S
Cores24 / 24 / 42242 / 24 / 44 / 2 / 4
GraphicsGT2GT2 / GT2GT2 / GT3eGT2GT3GT3eGT2 / GT3eGT2 / GT4eGT2 / GT2 / GT4e
Now these are interesting considering that Skylake will feature GT4e graphics in addition to support for DDR4 memory. Intel Skylake processors will boast a totally new architecture considering they are a Tock when it comes to the Intel Tick-Tock model. The GT4e graphics will feature graphics improvement with more execution units compared to Broadwell which from leaked details is said to mention 48 EUs on GT3e and 24 EUs on GT2 level processors. Broadwell will also be the first processor to introduce GT3e graphics with on-die eDRAM cache on desktop level. Haswell refresh series will also come in different variants such as H/Y/U/S series but will not have many improvements since its based on the same Haswell architecture which launched last year.
The most notable thing is that Intel will actually feature support for DDR3 memory on the Y and U series Skylake chips while the others including desktop processors will support DDR4 memory as confirmed several times before.
We will also get several new Wireless technology on the 100-Series chipset such as Snowfield Peak (WiFi + Blue-tooth) replacing Wilkins Peak, Douglas Peak (WiGig+ WiFi + BT) replacing Stone Peak and Maple Peak and the Pine Peak plus WWAN LTE chips (XMM 726x) replacing the WWAN XMM7160) for wireless connectivity.  Intel is also introducing the latest Alpine Ridge thunderbolt controller with Skylake pushing speeds of 40Gb/s, double that of last generation. For LAN, Intel will introduce Jacksonville to replace Clarksville.


Read more: http://wccftech.com/intel-skylake-2015-platform-details-revealed-compatible-100-series-chipset-supports-ddr4-gt4e-graphics-chip-desktop/#ixzz3LTj0Jmmh

Intel 14nm Skylake Processors To Feature PCIe 4, DDR4 Memory and SATA Express

Intel 14nm Skylake Processors To Feature PCIe 4, DDR4 Memory and SATA Express


We know that Intel’s Haswell-E “HEDT” platform will bring quad channel DDR4 memory functionality in 2H of 2014 but what about the mainstream LGA115* lineup?. From previous reports we know that Intel would release their Haswell Refresh platform for the desktop market while Broadwell micro architecture would be limited to Xeon and Mobility parts.
Skylake

Intel Skylake 14nm Processors Feature PCIe 4, SATA Express and DDR4

Only in 2015 would the mainstream LGA 115* lineup get the first 14nm Skylake processors which bring some interesting new features. While Broadwell is a die shrink of Haswell built on a 14nm process and featuring a Gen8 integrated GPU, Skylake would be built around a totally new 14nm process design as an update over the Tri-gate architecture. Skylake would feature the latest Gen9 integrated HD graphics along with the being the first main-stream platform to get Dual channel DDR4 memory functionality. Haswell-E and Skylake would be the only two desktop platforms with native support for DDR4 memory from Intel and would ditch the much older DDR3.
Other than DDR4 memory, Skylake would also feature PCIe 4.0 functionality which doubles the bandwidth over PCIe 3.0 but it is known that no GPU currently takes benefit from the extra bandwidth available on PCIe 3.0 or even 2.0 so only if NVIDIA’s Maxwell requires massive bandwidth from the PCIe 4.0 slots would we see any real time performance benefit. Skylake would also get SATA Express functionality which has  a bandwidth of around 10-16 GB/s enhancing the transfer speeds of hard drives and SSDs. Intel’s Skylake would feature the latest AVX 3.2 instructions over AVX 2.0 in current Haswell processors. The new micro architecture would launch in the first half of 2015 and would replace the Haswell refresh platform that arrives for desktop PCs next year.


PCIe 4 PCIe 3.1 specifications
Intel is aalso planning to release a new HEDT platform for the LGA 2011 socket in Q3 2013 codenamed Ivy Bridge-E. The Core i7-4800 and Core i7-4900 series processors would bring new enhancements and a 22nm architecture. More details can be found here.
Note – The Skylake platform listed under the roadmap which arrives in 2016 is the Xeon platform which includes Intel’s Xeon E7/E5 processors. Mainstream desktop parts would arrive early in 1H of 2015.
Intel Skylake

Internet Download Manager Universal Crack


Internet Download Manager Universal Crack
Internet Download Manager aka IDM developers release a new build of  their well-known Download Accelerator ; Internet Download Manager  regularly. So everybody who uses pirated versions get so pissed off that they have to find a new version of crack every time when an IDM update comes. So we made a really awesome fix for that
An Universal Web Crack. A new era in scene world. Web crack is a new concept of cracks that download and update crack content as the target program gets updated.
So whenever IDM releases a new version.Update your crack using built-in updater and apply crack. Easy as that ! You can simply trust On HAX IDM crack because it has a history of more than 3 year with regular updates,and also it has more than 10000k worldwide downloads.
How to Crack any IDM Version ?
  1. Install the latest version of IDM / Or update via quick update (yes its possible now)
  2. Download and Run IDM Universal Web Crack.exe
  3. Update IDM Universal Web Crack (if it asks)
  4. Select IDM Installation path
  5. Click Crack button and wait till it say IDM activated successfully !
  6. Now open IDM and enjoy lifetime full version license
How to Update / When a new version of IDM comes
Update IDM via IDM’s quick update.Then  run the IDM Universal Web Crack and follow above steps from step 3.
Direct Download Links
Click Here to Download
Screenshots
Downloads & Links (not blocked for any country)
IDM 621 build 15 Manual Crack.rar (1.2 MB) / Mirrors – (if the normal crack doesn’t work/xp users)
Notes and Info
  • update.bin file will be created after crack update process.do not delete it if you want to keep the crack uptodate.
  • perfect cracking will be done once, you get all three ticks in green or purple in the crack status (purple tick means update.bin found and loaded)
  • if a new crack version release becomes late, you will see a notice about it in the bottom of crack :)
  • Click Read Me button in crack to get information about all the functions in Crack App.
  • No, you cannot remove that smiley face comes after registration name :)
  • Crack is 100% clean. Detection ratio 5/55 is due to exe compression
If you have any problems on this or found a bug, comment below. Cheers ツ

Translate

Popular Post

Powered by Blogger.

Followers

amazon.in

amazon.in
todays deals

- Copyright © Cyber Bird - Posting For You - Powered by Blogger - Designed by christy m thomas -