Roadrunner - IBM supercomputer, World's fastest

Supercomputer created by IBM with the name of the Roadrunner, yesterday was namedthe fastest supercomputer in the world in the World's TOP500 Supercomputer.Supercomputer was built for Los Alamos National Laboratory NNSA's (National NuclearSecurity Administration) is, has a speed of 1.02 petaflops.
Roadrunner itself consists of 6562 AMD Opteron Dual Core processors. Another advantage of the Roadrunner is situated on the use of hybrid technology which is moreefficient in power consumption.

IBM's own party are proud of what they achieved, especially ranked number 2 and 3 wonby the Blue Gene / L at Lawrence Livermore National Laboratory California's NNSA withspeed and 478 teraflops Blue Gene / P in Chicago's Argonne National LaboratoryDepartment of Energy to speed 450 teraflops, the supercomputer from IBM is alsoartificial.

Selection of supercomputers is done during the International SupercomputerConference held in Dresden, Germany, in addition, also announced TOP500supercomputer on earth, which was announced on the site http://www.top500.org/


Author : Arief LS
FTI - Universitas Atmajaya

Ending of Sun Laboratories

Launched on August 20, 1977, Voyager 2 was sent to study space and surroundings.Only after 30 years later, Voyager 2 has reached what is known as the termination shock. Sun has consistently spew out particles all directions, like the particles that move into the Sun, they also like the solar wind. The wind is pushed back into the interstellar plasma that existed throughout the Milky Way.
End of the Sun, solar wind finally started to lose direction and kecepatanya down to the speed of sound, and produces a spherical wave is known as an attack from the front.More than 30 years after the launch day, between August 31 and September 1 at the end of the year, Voyager 2 passed a variety of wave attack, and capture the best results from information in the process.
This week's edition of Nature contains a series of five documents, plus a news and discussion about the article, the data sent by the Voyage 2 when passing wave attack.When Voyager 1 crossed the outer regions of space in recent years, from the calculation of telemetry to note an error occurred while sending data to earth, to the Voyager 2 became realistic expectations for the observation of outer space (through the years to come). Since the coverage check slightly different types of size, since the Voyager 2 has the ability of plasma sensors, magnetic field detectors, and a place of other equipment, so it can directly send a lot of data to Earth.
One difference between the observations and data obtained by Voyager 1 that Voyager 1 saw cosmik such anomalies of the light wave approaching, and this is not a peak as it passes through the wave. Voyager 2, on the other writings, see the facts of the anomaly cosmik rays, so this remains a mystery until now.
Voyager 2 has passed through a wave of attacks which illustrates a major advancement to identify geographically from the sun. Since no data is transmitted from Voyager 1, this illustrates only one realistic possibility for humans to get data directly from the region of space for years to come. When may produce effects of the solar wind, in the near future at the heliopause will provide the changes to send back information that is already held. BeritaNET


author: Andi Gunawan
FTI - University of Atma Jaya

Kevin Mitnick, the hacker Lagenda

A knock sounded from the door of his apartment, Kevin Mitnick opened the door and found dozens of FBI agents and other law enforcement agencies are preparing to arrest him. This is the final journey of a hacker who was forced to run in order to avoid a prison sentence. Hackers who during the buronannya it has gained legendary status, has grown into an even bigger myth than himself
The arrest happened in 1995 that marked the beginning of the most controversial cases of detention of a cyber criminals. Mitnick is an intruder on a computer system emerged as America's Most Wanted Hacker.
Computer Addiction
Mitnick is easy to learn computer by hanging out at RadioShack store or diperpustakaan general, his family was not rich enough to own a computer. His fondness for developing computer until he is mature.
In the period of the 1990s, Mitnick is easy to get out into the computer system. But in the late 1980s he had wanted to leave hobynya and began looking for a legitimate job.Unfortunately, before he could do that, in 1987 he was arrested for infiltrating a company Santa Cruz Organization, a software company that mainly engaged in the Unix operating system. When the lawyers succeeded in reducing crimes mitnik into action that is not good, Mitnick was only in Ganjar 3 years probation.
Less than a year Mitnick's return trip lawsuits. Because of garanya a friend whose computer he uses to break into other computers Mitnick reported to the authorities once it is burglarized Mitnick is owned by Digital Equipment Corporation. Every time breaking into computers that do mitnik is to take code from the software compiler. The code was then he learned with earnest, sometimes found several weaknesses in it. In a chance Mitnick admitted only take the code of the software compiler that he liked or that interested him.
In the case of DEC Mitnick get a heavier prison term. When the lawyers mentioned have Mitnick, 'addiction to the computer that can not be stopped'. He was rewarded a year in prison.
In prison Mitnick get a bad experience. At that time the legend Kevin Mitnick or better known under the pseudonym 'The Condor', is getting bigger. His reputation as a
Computer criminals are also increasingly soar beyond reality. Warden at Lompoc, the prison where Mitnick was, thinking that Mitnick could sneak into the sound armed with only a computer and telephone. As a result
Mitnick is not only not allowed to use the phone, he also spent many months in isolation.No wonder then if he is rumored to be a little mental disorders while serving his sentence at Lompoc.
In 1989 Mitnick was released from prison. He tried to find a formal job, but his status as former prisoners make Mitnick is difficult to maintain employment. Eventually he worked as
miners office information for the private investigator's office. Surely this is dragging Mitnick's return to the world that the gray and black. In the early 1990s, the Mitnickpun searched again by the FBI. This time the fear will enter isolation rooms for years, Mitnick decides to run away.
Hacking The Human Side
Skills as a hacker Mitnick is not limited to mere technical Traffic. He is the sheer technical ability. He is someone who understands very well that the security of computer systems consisting of both policy and organization, human resources, process involved and the technology used. If he seoarang superheroes main kemapuannya seoarang Mitnick is the practice of social science engginering aka social engineering. This is a technique to get vital information, such as passwords, by exploiting human weakness.
Ability Mitnick is best illustrated in the following story, story told Mitnick himself on an online forum Slasdot.org
"On one occasion, I was challenged by a friend to get the number (phone) Sprint Foncard her. He said he would buy dinner if I could get that number. I will not refuse to eat well, so I berusahan by contacting Customer Service and perpura off as one of the information technology. I ask the officer who answered whether he had difficulty in systems that are used. He said no, I ask the system used to access customer data, I pretended to want to verify. He mentioned the name of the system. "
"After that I again called Customer Service and was associated with a different officer. I said that my computer is broken and I would like to view data for a customer. He said the data had been lots of questions. What is your name? You work for whom? What is your address? Well, something like that. Because of my lack of research, I made up names and places. Failed. He said he would report this phone call in security. "
"Since I recorded the name, I take alone and tell friends about the situation. I ask that friend to masquerade as 'investigator keamaman' to record the statements of officials Customer Service and speak with officers earlier. As the 'investigator' he said that he received reports of people trying to obtain personal information of customers. After the questions and answers about the phone, 'investigation menyakan what the caller had requested information. The officer said the number Foncard.' investigators' to ask, is how the number? And the officer gave the number. Oops. The case is finished "
Fugitive
I Sebaga fugitive Mitnick berusahan best not to get caught. He moved around a lot and always took shelter habits. Various ways he did so as not tracked by the pursuers. But he could not abandon his hobby mengoprek computer and its Internet network. Even some supposedly used his skills to get a new identity.
Legend Mitnick during the run in less than two years, he became increasingly menjelama as 'Cyber ​​Ninja' who supposedly could break into Pentagon computers only with the television remote, a rumor that exceeds any fictional story.
Why Mitnick, a fugitive in the case of computer break-ins, could become the most wanted criminals? It could not be separated from the role of mass media. In particular is a series of sensational articles from John Markoff that was published in the New York Times.
Mitnick Markoff condemn as a terrorist. In a statement released after a long time, Mitnick calls his self-image that is displayed Markoff seoarang like a terrorist who tried to control the nuclear world. "I seemed to be an Osama bin Mitnic," he joked.
Markoff describes Mitnick as a deadly, unstoppable and deserves to be wanted by the FBI and the big ten other law enforcement agencies. Articles Mafkoff, who sometimes appeared on the front page, make the strongest candidate Mitnick pilot project on cyber crime. So the future of Mitnick in prison saati arguably already written it, too.
During a fugitive Mitnick also continue to carry out the action. He broke into the various computer companies. Including Sun Microsystems. He uses, and maksutnya here is to break into an account at an online storage service to store backups of the action.Actually Mitnick does not work alone but when caught he never revealed who his partner.
Mitnick is one of the victims T. Shimomura, a computer scientist who in some writings on the Internet doubtful cleanliness. There are allegations that Shimomura was also a hacker who often perform illegal acts. One thing that many agreed was Shimomura has an arrogant attitude and seems to want to appear as a hero in the story of the hunt Mintick.
Shimomura, Markoff and the FBI hand in hand to catch the fugitive. Guidance from sensational news Mafkoff, hacking ability Shimomura and the FBI legal force eventually track down Mitnick's residence.
As usual story seoarang capture of a fugitive, Mitnick did ketledoran. Storage service that he uses seems to have automated programs to check the contents of files stored.Mitnick used the account owners get a warning from the system of excess capacity. This is the beginning of the capture of Mitnick.
Mitnick admitted that he was reckless because they do not suspect that the FBI, Shimomura, Markoff, and cellular telephone service providers working together so closely and integrated.
"Mobile operators do a search in their billing database of dial-up connection to Internet service Netcom POP. This, as might be expected, making them able to identify areas of calls and number MIN (mobile identification number) that I use at the time. Since I am often switching numbers They oversee any data calls happening at the site. Then, by means Cellscope 2000 Shimomura, my phone signals to track down to the exact location, "Mitnick said.
Two weeks before the capture of Mitnick recently moved to Raleigh. The new location makes it less alert and he forgot to keep track of dial-up lines that digunakannnya.Several hours before the capture of Mitnick's new something was going on, tracking and surveillance is being carried out on the path he used. As he was trying to track the extent to which surveillance has been conducted up to tracing those who dilbalik, he heard a knock at the door. Mitnick opened the door and confronted with dozens of U.S. Marshall and the FBI.
Four Half Year Hanged
Once caught Mitnick detained without possibility of bail. He also was submitted to the court. Approximately four years he spent without any certainty. This really makes Mitnick frustrating.
During the FBI prison he did not get a chance in his case. Even Mitnick and his attorney could not see the case as there are data on laptops and laptop access to Mitnick is considered dangerous. Mitnick was accused can make a missile armed with a laptop or just slide the phone. Larangn it remains valid even if his lawyers are using a laptop without a modem and the ability of any network.
Mitnick eventually accused of causing harm to hundreds of millions of dollars of losses by Mitnick is not true, because the company that allegedly harmed even those not reported losses in their annual reports.
Mitnick is the final agreement for the admission of guilt. Guilty in the case of computer break-ins and tapping phone lines. Mitnick gave up and followed it, in exchange for more time in 4 years in prison are treated as prisoners mas. Total Mitnick was sentenced to 5 years in prison, 4 years in prison hanging and 1 more year remaining.
He was released in 2000 on condition must not touch a computer or telephone. In 2002 he was allowed to use a new computer but not connected to the Internet. New in 2003 he used the Internet again for the first time.
Since the release Mitnic trying to fix his life. He wrote two books on hacking, he also founded his own security consulting company. "Hackers are the only crime whose expertise could be used again for something that is unethical. I never saw it the other field, eg ethical robbery," said Mitnick.
Author: Antonius Fran Setiawan
Product Manager IT Books, Design, and Multimedia a Company Publishers



source: BeritaNET

World's Smallest flash

Do you have a flash? How much capacity? 128 Mb, 256 Mb, 1 Gb, or even more? Howbig in size? A sum of matches, or for an eraser?





Now there is the world's smallest flash. Its size is no larger than your fingertips.Thickness of less than 4 mm. Its capacity can reach 8 to 16 Gb.

When measured by the number of files, the flash is capable of storing eight movies(probably DVD format), songs that might be playedover 10 days ,8000 fruit photos witha resolution of 5 megafixel . So small, so the flash needs to be given a chain, that are not easily lost.

Details

1. The smallest physical size with large capacity ever made
2. 8-16 Gb capacity.
3. Waterproof
4. Velocity up to 200x, 30 Mb / sec
5.Kompatibel with Windows Operating System, Mac and Linux





iPad 2


Are you a fan of gadgets? Prepare to welcome the latest gadget made ​​by Apple. Yes,this is iPad2.Gadget is equipped with a faster processor, thin design and there are 2pieces of the camera.
IPAD is the best gadget of 2010. Until late last year, Apple managed to sell 15 millionunits iPad. It's beyond previous predictions. While this year's estimated sales of the entire tablet computers reached 50 million units.

There is a rumor that this iPad2 will be available starting March 11 in the U.S. and 25March in the UK and Europe, iPad2 runs on dual-core processor chip new A5, whichclaimed Apple will provide twice the speed of CPU performance, but can reach ninetimes the graphics performance of the original iPad. On the camera there are featuresthat support Apple FaceTime, namely video calling application, and a gyroscope likethe iPhone 4.

This IPad2 Design-third thinner than the old model, which is only 8.8mm, and is also lighter at 1.3 pounds. However, it is claimed to have the same battery life at around 10jam.Seperti owned by generations of previous IPAD, IPAD 2 comes with Wi-Fi or Wi-Fiand 3G versions, each available with a memory capacity of 16GB, 32GB or 64GB.However, the price remains the same as for first generation iPad

Steve Jobs said at the time of the launch of this iPad2, that the tablet is a rival not topursue advantages of Apple's latest gadget, even for first-generation iPad any! He alsosaid that they think the year 2011 will be the year iPad2 property.

Unfortunately, iPad new model is expected to disappoint a lot of potential buyers,because Apple does not mention any USB port or SD Card slot, two features that manyexpected by the fans.

Apple mengumumkan aksesoris baru berupa kabel HDMI, dan Smart baru yang menggantikan casing iPad yang asli. Cover Smart ini berfungsi hanya menutupi layar, tapi bisa melipat ke dalam sebuah tabung berbentuk segitiga yang berfungsi sebagai alat untuk perangkat agar bisa berdiri. Cover ini melekat melalui gesper magnetik yang secara otomatis sejajar untuk menutupi layar. Apple juga mengungkapkan bahwa iPad2 ini akan menggunakan IOS baru versi 4. Untuk iPad2, mereka akan menambahkan beberapa perbaikan.



Intel Acquires McAfee

Finally, the merger was completed approximately six months after the first Intelannounced that it has agreed to acquire 7.68 billion worth of McAfee. The deal wouldcombine the largest CPU manufacturer in the world with the second-largest securityvendor computer.


In making acquisitions, Intel cited a need to improve security at the level of siliconintegration. The company has said that it would look to integrate McAfee's security products are not only to the PC, but also in the embedded computing space
Intel has added security as the third pillar of what people demand from their experiencewith personal computers and other related devices," said Renee James, vice presidentand general manager of Intel's senior.

"The acquisition of McAfee add not only the world's leading security products andtechnologies for Intel's portfolio of computing, but also bring highly talented peoplefocused on delivering products and services that help make the connection to the mobile Internet a safer and more secure."

Approval of giant deals are not always guaranteed. Shortly after the companyannounced the merger, regulators in the European Union warned to be careful on theplan and possible anti-trust implications.

Finally, the merger was approved after Intel agreed that he would not use his position toprevent other vendors of security products for the development of chip.

source: Intel