processor

Thu
25
Jul
John Lister's picture

Quantum Computing Could Be Reality Soon

Quantum computers could be practical in just three years from now according to a manufacturer. The technology could transform the speed and capability of computers. Oxford Ionics says it has not only produced a quantum computer chip with twice the ... performance of any existing chip, but that it could mass-produce its new design without needing specialist facilities. The idea of quantum computing has been explored for many years and aims to overcome one of the biggest limitations of traditional computing. Ultimately existing computers simply store data as either a 0 or a 1 (a bit), usually ... (view more)

Mon
25
Mar
John Lister's picture

3D Wi-Fi Could Boost Capacity

A "3D" processor could make wireless communication more efficient according to scientists at the University of Florida. It could benefit both WiFi and cellular data services. One of the limitations of current WiFi tech is that it uses a "planar ... processor" to handle the wireless signal. Because these processors are (in practical terms) two-dimensional, they can only work with a limited range of wireless frequencies. Expanding the range of frequencies planar processors can handle is only possible by making them wider, a little like increasing capacity on roads. But making the ... (view more)

Wed
12
Aug
John Lister's picture

1 Billion Android Phones At Risk due to CPU Flaw

Security researchers spotted a major flaw in a processor that's in more than a billion Android phones. It's been fixed now, but highlights the importance of a couple of key security measures users should take. Researchers at Check Point say they ... spotted the errors on a processor from Qualcomm that's used on more than 40 percent of cellphones. The processor is known as a "system on a chip" (SoC) because it combines hardware and software in a single unit. The processor controls some key functions on a phone including charging, video and audio. Because it's a system on a chip, it runs partially ... (view more)

Wed
20
Mar
John Lister's picture

Report: Microsoft Bugs 'Most Exploited' by Hackers

According to a recent report, Microsoft products made up eight of the ten most exploited software bugs last year according to a security company. That's higher than in recent years, largely because Adobe Flash is becoming a less rewarding target for ... hackers as it loses popularity. As recently as 2015, most of the top ten involved bugs with Flash. Microsoft took the unwanted lead in 2017 with seven entries on the list. (Source: bleepingcomputer.com ) Internet Explorer Tops The List The top spot for 2018 went to a bug in the Windows VBScript engine . That's a tool that handles code designed for ... (view more)

Tue
12
Feb
John Lister's picture

New Google On-the-fly Encryption Ultra Fast, Secure

Google has developed a new type of encryption that could run on any Android device. It means added security even for the most basic phones, smart watches and smart TVs. The encryption in question isn't for transmitting data, but rather for data ... stored on a device. The data is controlled by unlock methods such as passwords, pin codes and fingerprints. The idea is that if somebody gets hold of a device and doesn't have the correct login credentials, they can't simply extract files from the device and access personal data. At the moment Android devices with encryption use Advanced Encryption ... (view more)

Tue
06
Nov
John Lister's picture

CPU Hyper-threading Reverse Engineered to Spy on Processes

One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information. All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the ... computer that physically carries out these calculations. Each modern-day CPU has one or more cores , which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task. Many processors also use a technique called ... (view more)

Wed
18
Jul
John Lister's picture

Chrome to become Slower, Use More Memory to Tackle Malware

Google is updating the Chrome browser to give it better defenses against major security threats. It comes at the price of reduced performance and a larger memory footprint. The changes are to address two security bugs labeled Meltdown and Spectre by ... researchers. They take advantage of a flaw in almost every computer processor built since 1995, which is (as of this day) 100% of all computers, tablets, smartphones, laptops - and anything else that uses a processor. The flaw is in regard to a processor feature, which is designed to speed up a computer's response time. It works by using spare ... (view more)

Wed
23
May
John Lister's picture

Microsoft: New Processor Bug Could Leak Data

Both Microsoft and Google are warning of another bug in computer processors. It's similar to previous bugs known as 'Spectre' and 'Meltdown'. For now the new issue has the less dramatic codenames 'Speculative Store Bypass Variant 4' and ... 'CVE-2018-3639'. As with Spectre and Meltdown , it involves a processor function known as speculative execution that's meant to improve computation processes. Unlike some bugs, it's classed as a low risk to users but is significant because of the sheer number of computers that could be affected. The processor is the part of the computer that physically carries ... (view more)

Thu
11
Jan
John Lister's picture

Intel and IBM Demo Quantum Computer at CES 2018

Intel and IBM are battling to show off some of the most advanced 'quantum computers' ever made. It's a big step towards incredibly powerful computers that could even replicate the workings of a human brain. A quantum computer takes advantage of one ... of the most curious aspects of physics: that tiny particles can exist in two different states at the same time. This essentially allows a complete rewrite of the mathematics behind computing. Ordinary computers work by turning data into binary code: a string of 0s and 1s. In traditional computers, that involves a series of electronic 'gates' that ... (view more)

Fri
26
May
Dennis Faas's picture

How to Fix: Disable 'Unsupported Hardware' Error when attempting to Download Windows Updates

Infopackets Reader Sam T. writes: " Dear Dennis, I recently upgraded my motherboard and CPU to the Intel Core i7 7700k processor which is very fast! I loaded Windows 7 onto the machine and everything was working great - that is, until I went to ... check for Windows Updates and I received the error: ' Unsupported Hardware / Your PC uses a processor that is designed for the latest version of Windows. Because the processor is not supported together with the Windows version that you are currently using, your system will miss important security updates.' Is there any way to prevent this 'unsupported ... (view more)

Pages

Subscribe to RSS - processor