Tag Archives: hardware

Researchers Discover Potential Key To Lowering Energy Costs of Cell Phones and Data Centers

AUSTIN, Texas — A systematic analysis of power usage in microprocessors could help lower the energy consumption of both small cellphones and giant data centers, report computer science professors from The University of Texas at Austin and the Australian National University.

Their results may point the way to how companies such as Google, Apple, Intel and Microsoft can make software and hardware that will lower the energy costs of very small and very large devices. (more…)

Read More

IBM Introduces New Systems to Bring More Efficiency to Data Centers Run Amok

*Continues Ongoing Investments in Innovative Workload-Optimized Systems*

ARMONK, N.Y. – 15 Feb 2011: IBM today announced workload-optimized systems to help companies manage a range of more demanding workloads that are placing new stresses on already over-taxed data centers.   

The offerings, which span IBM’s systems portfolio, represent IBM’s continued investment in systems integrated and optimized across chips, hardware and software, for a range of work at a time when companies face unprecedented amounts of data and are under pressure to become more efficient in managing and drawing timely insights from the information. (more…)

Read More

Hardware, Software Advances Help Protect Operating Systems From Attack

The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer – or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked.

At issue are security attacks in which an outside party successfully compromises one computer application (such as a Web browser) and then uses that application to gain access to the OS. For example, the compromised application could submit a “system call” to the OS, effectively asking the OS to perform a specific function. However, instead of a routine function, the attacker would use the system call to attempt to gain control of the OS. (more…)

Read More