十二月 2020
 << < > >>



成员: 0
游客: 5

rss Syndication

05 9月 2018 - 10:33:51

Dell Latitude E6520 Battery all-laptopbattery.com

It will be interesting to see how this all plays out, but for the moment, AMD is in transition and no one, including AMD, really knows.But the company has added some more techie brains to help sort out all of the complex issues it is facing. In a separate announcement today.Wayne Meretzky has rejoined AMD after a long and stories career. Meretzky is a hardware engineer with experience in early Unix and supercomputers back in the early 1980s and who was also the technical lead for MacOS at Apple in the 1990s.He was also co-author of the x86-64 spec for the Opterons at AMD, where he was made an AMD Fellow, and the he was director of hardware and software development at Power chip upstart PA Semi (the carcass of which ended up inside Apple). Meretzky took a position as corporate vice president of software development at AMD in December, as it turns out.Charles Matar, who worked on the PowerPC chip for the Motorola portion of the PowerPC alliance (which also included IBM and Apple back in the late 1980s and early 1990s), is also joining AMD as corporate vice president of SoC development.

SoC is short for system on chip, of course, and that means Matar is going to be helping AMD form its battle plan for both x86 and ARM SoCs for all kinds of devices. Matar worked on the HAL Computer Systems clone of Sparc processors way back when and for the past decade has been vice president of engineering at Qualcomm, working on various aspects of SoC design. Matar also did a stint at AMD working on the K8 processor, better known as Opteron in the server, Athlon in the desktop, and Sempron in the laptop."Charles and Wayne will serve as key members of our engineering brain trust, bringing with them years of expertise in SoC design and developing 64-bit software ecosystems, respectively," said AMD CTO Mark Papermaster in a statement."The fact that these computing experts have returned to the company underscores AMD’s unique position and opportunity, based on differentiated IP, to take a leadership position in low-power clients and dense cloud servers." With a new wave of low-cost tablets hitting the shelves of retailers globally last Christmas – some starting at as little as £100 – consumers of all ages and professions rushed out to grab their very own before the "sold out" sign appeared.

But as tablet prices decrease, the potential business impact of the consumerisation of IT trend weighs heavily on IT departments - and on channel businesses. After spending Christmas playing with their new tablets or smartphones, the thought of going back to the office and using the standard-issue PC or laptop doesn’t bear thinking about for some employees, and quite a few bosses too. But as IT departments look to replicate users' personal experience of technology in the workplace, what will this mean for businesses who sell and distribute enterprise IT gear in 2013? And what will it mean for the security of the corporate customers?End users are clearly driving the "consumerisation of IT" trend and businesses are finding themselves considering the use of employees' own iPads, Android tablet devices and smartphones.A recent Vanson Bourne survey on future working practices revealed that by 2020, European office-based workers will use an average of five network-connected devices during their working day. While this might be good news for tech-savvy employees, this could pose a challenge for IT departments struggling to keep control of how and when corporate information is accessed. Rather than condemn the use of personal tablets in the office, businesses can embrace the appetite for flexible working by enlisting the help of the channel to support the Bring-Your-Own-Device (BYOD) trend. As more of these devices enter the workplace, businesses will be faced with challenges that, with the help of the channel, can be easily overcome.

The new differentiator: Security The biggest challenge IT departments will face as a result of the tablet influx is the employee’s perception that personal devices are "plug-and-play" – that they can simply connect to the corporate network over Wi-Fi and are ready to go. Some IT departments will try to block access to the network in the fear that employees will be accessing corporate data in a less than secure manner.The channel has a central part to play in helping businesses implement a managed BYOD policy - perhaps in incorporating some additional hardware, but almost certainly opening a gap for selling in security software and services. Channel businesses can empower employees to work to the best of their ability, with the best tools available, without the IT department having to relinquishing governance of data, networks and connected devices.As a strategic advisor with in-depth knowledge, the channel can help businesses to make BYOD a practical reality for the organisation. Managed BYOD solutions not only protect sensitive information from loss and theft, in response to privacy, compliance and risk management standards, but they also reduce costs through self-service provisioning and automated management.

In terms of the data accessed on these devices, the channel also has the opportunity to demonstrate its expertise in supporting business compliance while at the same time helping to implement effective data management strategies. The clearest opportunity for the channel is within the trend towards "follow-me" data solutions that provide IT departments with complete control of employee data, irrespective of the end-user device.Potential nightmare for biz: Bring Your Own (malware-laden) Apps Linked to the data and business compliance issue is the concept of BYOA (Bring-Your-Own-Apps). In an employee’s personal life, mobile and PC apps are a convenience or useful tool. But in the office, they could be a potential compliance minefield, particularly if the download has not been authorised by the IT department. This BYOD trend threatens to steal control of the corporate network from the hands of IT. Recent research has shown that 91 per cent of European IT decision-makers report employees use their own apps for business use on BYO devices. Forty-four per cent of respondents were also concerned that IT departments were losing control over app procurement within their organisation.

The channel is in a good position to not only help businesses recognise the challenges that BYOD brings, but also tailor and implement solutions specifically for the needs of the enterprise. As part of a managed BYOD solution, the channel can also advise on a variety of workplace productivity applications that not only satisfy the needs of the employee but answer the question of corporate data storage and its security on roaming end-user devices. "Follow-me" data solutions mirror consumer storage solutions and applications in providing access to fully traceable enterprise data - wherever the employee is, whatever the device.Consumerisation is already well-established in the enterprise and will undoubtedly continue to affect working practices in 2013 and the years to come. BYOD has the potential to transform and simplify business models and encourage productivity, flexibility and efficiency in employees. By embracing the flurry of tablets due to enter the workplace after Christmas and by looking to sell in added-value services and software in advance of the trend, the channel can have a very happy 2013 rather than a post-Christmas headache. The organizers of the Pwn2Own hacking competition held at the annual CanSecWest security conference have upped the prize pool to $US560,000 and will now be offering prizes for hacking web plug-ins from Adobe and Oracle.

The contest, which dropped mobile phone hacking last year, has added web plug-in hacking to the prize pool. Contestants get $70,000 apiece for cracking Adobe Reader and Flash, and $20,000 for getting past Java. Based on the latter's recent parlous performance in the security arena that price discount seems justified."We've added browser plug-ins as a reflection of their increasing popularity as an attack vector," said Brian Gorenc, manager of vulnerability research at Pwn2Own sponsors HP DVLabs. "We want to demonstrate new hacking areas and design new mitigation techniques."For the more traditional hacks against browsers, a working Chrome exploit for Windows 7 will net $100,000, with the same again for an IE10 hack in Windows 8 or $75,000 for breaking IE9 in Windows 7. A Safari exploit in OSX Mountain Lion is worth $65,000 and Firefox on Windows 7 just $60,000, and all hacks must be completed in a 30 minute time frame.

Admin · 38次阅读 · 发表评论






新评论状态: 发布