mix

mix150.com MIX150 DOWNLOAD GAMES PLAYSTATION RIP FILMS
Showing posts with label Laptops. Show all posts
Showing posts with label Laptops. Show all posts

Tuesday, March 27, 2012

New '3-D' transistors promising future chips, lighter laptops

 Researchers from Purdue and Harvard universities have created a new type of transistor made from a material that could replace silicon and have a 3-D structure instead of conventional flat computer chips.


The approach could enable engineers to build faster, more compact and efficient integrated circuits and lighter laptops that generate less heat than today's. The transistors contain tiny nanowires made not of silicon, like conventional transistors, but from a material called indium-gallium-arsenide.


The device was created using a so-called "top-down" method, which is akin to industrial processes to precisely etch and position components in transistors. Because the approach is compatible with conventional manufacturing processes, it is promising for adoption by industry, said Peide "Peter" Ye, a professor of electrical and computer engineering at Purdue.


A new generation of silicon computer chips, due to debut in 2012, will contain transistors having a vertical structure instead of a conventional flat design. However, because silicon has a limited "electron mobility" -- how fast electrons flow -- other materials will likely be needed soon to continue advancing transistors with this 3-D approach, Ye said.


Indium-gallium-arsenide is among several promising semiconductors being studied to replace silicon. Such semiconductors are called III-V materials because they combine elements from the third and fifth groups of the periodic table.


"Industry and academia are racing to develop transistors from the III-V materials," Ye said. "Here, we have made the world's first 3-D gate-all-around transistor on much higher-mobility material than silicon, the indium-gallium-arsenide."


Findings will be detailed in a paper to be presented during the International Electron Devices Meeting on Dec. 5-7 in Washington, D.C. The work is led by Purdue doctoral student Jiangjiang Gu; Harvard doctoral student Yiqun Liu; Roy Gordon, Harvard's Thomas D. Cabot Professor of Chemistry; and Ye.


Transistors contain critical components called gates, which enable the devices to switch on and off and to direct the flow of electrical current. In today's chips, the length of these gates is about 45 nanometers, or billionths of a meter. However, in 2012 industry will introduce silicon-based 3-D transistors having a gate length of 22 nanometers.


"Next year if you buy a computer it will have the 22-nanometer gate length and 3-D silicon transistors," Ye said.


The 3-D design is critical because the 22-nanometer gate lengths will not work in a flat design.


"Once you shrink gate lengths down to 22 nanometers on silicon you have to do more complicated structure design," Ye said. "The ideal gate is a necklike, gate-all-around structure so that the gate surrounds the transistor on all sides."


The nanowires are coated with a "dielectric," which acts as a gate. Engineers are working to develop transistors that use even smaller gate lengths, 14 nanometers, by 2015.


However, further size reductions beyond 14 nanometers and additional performance improvements are likely not possible using silicon, meaning new designs and materials will be needed to continue progress, Ye said.


"Nanowires made of III-V alloys will get us to the 10 nanometer range," he said.


The new findings confirmed that the device made using a III-V material has the potential to conduct electrons five times faster than silicon.


Creating smaller transistors also will require finding a new type of insulating layer essential for the devices to switch off. As gate lengths shrink smaller than 14 nanometers, the silicon dioxide insulator used in conventional transistors fails to perform properly and is said to "leak" electrical charge.


One potential solution to this leaking problem is to replace silicon dioxide with materials that have a higher insulating value, or "dielectric constant," such as hafnium dioxide or aluminum oxide.


In the new work, the researchers applied a dielectric coating made of aluminum oxide using a method called atomic layer deposition. Because atomic layer deposition is commonly used in industry, the new design may represent a practical solution to the coming limits of conventional silicon transistors.


Using atomic layer deposition might enable engineers to design transistors having thinner oxide and metal layers for the gates, possibly consuming far less electricity than silicon devices.


"A thinner dielectric layer means speed goes up and voltage requirements go down," Ye said.


The work is funded by the National Science Foundation and the Semiconductor Research Corp. and is based at the Birck Nanotechnology Center in Purdue's Discovery Park. The latest research is similar to, but fundamentally different from, research reported by Ye's group in 2009. That work involved a design called a finFET, for fin field-effect transistor, which uses a finlike structure instead of the conventional flat design. The new design uses nanowires instead of the fin design.


Recommend this story on Facebook, Twitter,
and Google +1:


Other bookmarking and sharing tools:


Story Source:



The above story is reprinted from materials provided by Purdue University. The original article was written by Emil Venere.


Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Note: If no author is given, the source is cited instead.


Disclaimer: Views expressed in this article do not necessarily reflect those of ScienceDaily or its staff.


View the original article here

Wednesday, September 14, 2011

LoJack for Laptops

You have a 1 in 10 chance of having your laptop stolen this year, according to Gartner Group, which also reports that one laptop is stolen every 53 seconds in the U.S. Even more disconcerting is an FBI statement that 97% of stolen computers are never recovered. Most of those computers, however, probably didn't have tracking and recovery software installed on them before they were stolen. Though uncommon, retrieving a lost or stolen laptop is possible, with a little luck and the foresight to enable or install an application to help you locate your missing device.

Laptop anti-theft applications are designed to trace your laptop's location so that local law enforcement can go retrieve it (the police are often motivated to do so because these substantial leads help them capture serial criminals). For laptop tracking to work, you have to install or enable the application before the laptop gets stolen; the software stealthily runs in the background unbeknownst to the thief. Also, the laptop would have to connect to the Internet (i.e., thief would have to go online) before its location could be updated.

Although some tracking and recovery applications can be circumvented if the hard drive is reformatted, laptops are typically stolen not for the hardware, but for the data that resides on them, so thieves are less likely to reformat the computer for resale than to try to get the valuable information off of it first (One study found that the value of the data on an average laptop hard drive is $250,000). Other laptop recovery applications are embedded in the computer's BIOS (firmware), which makes them difficult, if not impossible, for a thief to remove.

The most popular laptop retrieval software may be Absolute Software's Computrace LoJack for Laptops (leasing the LoJack brand name no doubt helps), which not only tracks your laptop via GPS/Wi-Fi but also allows you to remotely delete your data from the hard drive if your computer goes missing. Through partnerships with major OEMs like Dell, HP, and Sony, LoJack comes pre-installed on some new laptops and the first year of service may be free. Retail price of the PC- and Mac-compatible software is $40 per year or $60 with advanced tracking and a service guarantee of $1,000 if your stolen laptop is not recovered within 60 days of theft.

Another theft recovery application is GadgetTrack, which offers wi-fi positioning, location notification from a Web control panel, and webcam support to snap a photo of the thief. One year Mac or PC license is $34.95.

For Apple users specifically, Oribicule's Undercover offers protection for Mac OS X ($49 for single user license) and iPhone and iPad devices ($4.99). Orbicule states that they were able to recover 96% of stolen Macs with Undercover that were connected to the Internet, using the built-in iSight camera and screenshots from the stolen Mac. Only the individual users have the password that can initiate laptop/device monitoring -- a reassuring, additional privacy measure.

There are other location-based tracking services, like LocateMyLaptop.com and Loki.com, both free, but as these (and some of the above solutions) continuously announce your whereabouts to a central server, you may be concerned about privacy implications. Here's where Prey comes in -- it's a free, open source application that works globally on most operating systems. Since Prey is open source and location-tracking is only triggered by the user when needed, there may be fewer privacy concerns. As with other tracking software, Prey provides location reports, sits silently in the background gathering information like network/wi-fi details, and uses a laptop's webcam to photograph the thief. Besides protecting your privacy and working pretty well, it's free, so using Prey is pretty much a no-brainer for laptop users.

If your laptop is stolen before you install one of the recovery applications above, all may not be lost if you use remote access software, such as "Back to My Mac," which one tech-savvy Mac owner used to catch her laptop thief, or another remote desktop control program like pcAnywhere, GoToMyPc, LogmeIn, or SharedView. Tbe idea is you would remote into your stolen computer and use the webcam or other clues like information in open applications or IP address found in the network settings to find out where and who the thief is (most business laptop thefts are insider jobs).

Tracking and recovery software increases your chances of getting your laptop back if it gets stolen or lost, but it should be used in tandem with other important security measures. These applications, for example, don't actually prevent theft, the way using cable locks and alarms can deter physical theft, and they don't secure the data on the device or prevent sensitive information from being accessed -- for that you need to encrypt your data with programs like TrueCrypt and adhere to best of practice security policies so you don't have sensitive information stored on your portable device unless absolutely necessary.

Regular backups are also part of that essential maintenance; frequent traveler Casey Wohl, "the Getaway Girl," lost her laptop when it was stolen from under the seat in front of her on a flight to Puerto Rico. "Going through something like this," Casey says, "makes you realize how miuch of your life is stored on a computer and how important it is to back it up." ... And encrypt your data and install tracking software to hopefully recover your computer.

Sources: Institute for Cyber Security, Dell


View the original article here

Sunday, August 14, 2011

Friday, July 29, 2011

LoJack for Laptops

You have a 1 in 10 chance of having your laptop stolen this year, according to Gartner Group, which also reports that one laptop is stolen every 53 seconds in the U.S. Even more disconcerting is an FBI statement that 97% of stolen computers are never recovered. Most of those computers, however, probably didn't have tracking and recovery software installed on them before they were stolen. Though uncommon, retrieving a lost or stolen laptop is possible, with a little luck and the foresight to enable or install an application to help you locate your missing device.

Laptop anti-theft applications are designed to trace your laptop's location so that local law enforcement can go retrieve it (the police are often motivated to do so because these substantial leads help them capture serial criminals). For laptop tracking to work, you have to install or enable the application before the laptop gets stolen; the software stealthily runs in the background unbeknownst to the thief. Also, the laptop would have to connect to the Internet (i.e., thief would have to go online) before its location could be updated.

Although some tracking and recovery applications can be circumvented if the hard drive is reformatted, laptops are typically stolen not for the hardware, but for the data that resides on them, so thieves are less likely to reformat the computer for resale than to try to get the valuable information off of it first (One study found that the value of the data on an average laptop hard drive is $250,000). Other laptop recovery applications are embedded in the computer's BIOS (firmware), which makes them difficult, if not impossible, for a thief to remove.

The most popular laptop retrieval software may be Absolute Software's Computrace LoJack for Laptops (leasing the LoJack brand name no doubt helps), which not only tracks your laptop via GPS/Wi-Fi but also allows you to remotely delete your data from the hard drive if your computer goes missing. Through partnerships with major OEMs like Dell, HP, and Sony, LoJack comes pre-installed on some new laptops and the first year of service may be free. Retail price of the PC- and Mac-compatible software is $40 per year or $60 with advanced tracking and a service guarantee of $1,000 if your stolen laptop is not recovered within 60 days of theft.

Another theft recovery application is GadgetTrack, which offers wi-fi positioning, location notification from a Web control panel, and webcam support to snap a photo of the thief. One year Mac or PC license is $34.95.

For Apple users specifically, Oribicule's Undercover offers protection for Mac OS X ($49 for single user license) and iPhone and iPad devices ($4.99). Orbicule states that they were able to recover 96% of stolen Macs with Undercover that were connected to the Internet, using the built-in iSight camera and screenshots from the stolen Mac. Only the individual users have the password that can initiate laptop/device monitoring -- a reassuring, additional privacy measure.

There are other location-based tracking services, like LocateMyLaptop.com and Loki.com, both free, but as these (and some of the above solutions) continuously announce your whereabouts to a central server, you may be concerned about privacy implications. Here's where Prey comes in -- it's a free, open source application that works globally on most operating systems. Since Prey is open source and location-tracking is only triggered by the user when needed, there may be fewer privacy concerns. As with other tracking software, Prey provides location reports, sits silently in the background gathering information like network/wi-fi details, and uses a laptop's webcam to photograph the thief. Besides protecting your privacy and working pretty well, it's free, so using Prey is pretty much a no-brainer for laptop users.

If your laptop is stolen before you install one of the recovery applications above, all may not be lost if you use remote access software, such as "Back to My Mac," which one tech-savvy Mac owner used to catch her laptop thief, or another remote desktop control program like pcAnywhere, GoToMyPc, LogmeIn, or SharedView. Tbe idea is you would remote into your stolen computer and use the webcam or other clues like information in open applications or IP address found in the network settings to find out where and who the thief is (most business laptop thefts are insider jobs).

Tracking and recovery software increases your chances of getting your laptop back if it gets stolen or lost, but it should be used in tandem with other important security measures. These applications, for example, don't actually prevent theft, the way using cable locks and alarms can deter physical theft, and they don't secure the data on the device or prevent sensitive information from being accessed -- for that you need to encrypt your data with programs like TrueCrypt and adhere to best of practice security policies so you don't have sensitive information stored on your portable device unless absolutely necessary.

Regular backups are also part of that essential maintenance; frequent traveler Casey Wohl, "the Getaway Girl," lost her laptop when it was stolen from under the seat in front of her on a flight to Puerto Rico. "Going through something like this," Casey says, "makes you realize how miuch of your life is stored on a computer and how important it is to back it up." ... And encrypt your data and install tracking software to hopefully recover your computer.

Sources: Institute for Cyber Security, Dell


source from about.com

Intel Predicts the End of Tablets and Laptops as We Know It

Within a decade, people may no longer use distinct laptops, netbooks, or tablets, according to a prediction by Intel. V3.co.uk reports Rama Skukla, VP of Intel's architecture group, as saying:

The lines between a netbook, laptop and tablet are disappearing faster than designers today realise. It's going to be very difficult to see where one device goes and the next one takes off.

We're starting to see the lines becoming blurred already, with more powerful tablets that dock into laptop-like keyboards, laptops getting even smaller and thinner and more portable, and netbooks straddling the line between both.

Skukla also said that graphics performance on mobile chips will advance by a factor of 12 in the next four years.

It's incredible to think how rapidly technology is advancing, and exciting to (try to) imagine the kinds of gadgets and devices we'll be using in the next few years.

What do you think? Will multi-purpose computing devices replace the laptops and tablets we use now?


source from about.com