Acer ships Aspire ultraportable laptop for $779

Acer on Tuesday began shipping three new Aspire laptops, including a thin and light laptop about an inch thick and with a price of U.S. $ 779.99.

The Timeline Aspire X 3830T has a 13.3-inch screen and includes a dual-core Core i5, which is based in Sandy Bridge microarchitecture, Intel, Acer said in a statement. The laptop weighs about 1.87 kilograms (4.12 pounds) and varies in thickness between 22.1 mm and 29.1 mm.

The company also announced the X timeline notebooks with screens larger companies including Intel’s latest chip i3 and i5 Core microarchitecture-based Sandy Bridge. The timeline X 4830T has a 14-inch screen and weighs 2.21 kilograms, while the timeline X 5830T has a 15.6 inch screen and weighs 2.54 kilograms.

Companies such as Dell, Lenovo and Hewlett-Packard have announced the new lightweight laptop chips Core. Sandy Bridge chips are smaller and more energy-efficient than its predecessors, which has enabled notebook manufacturers to build thinner with the battery life.

The new timeline portable X provide a battery life of up to nine hours with integrated graphics processors and up to eight hours with a discrete graphics card, a company spokesman said. Acer offers an optional Nvidia 520M graphics card in laptops.

Laptops have strong multimedia features Dolby Home Theater v4, a set of technologies to process and deliver clear sound. The laptops also include an HDMI (High-Definition Multimedia Interface) port for laptop play content on HDTVs.

USB port 3. 0 allows laptops to connect to external storage devices and other high speed components. The 4830T, which is priced at $ 699.99, and the 5830T, which starts at $ 599.99, also have DVD drives.

The laptops are available now in the U.S. and Europe. A company spokesman could not comment on availability in Asia.

Acer has been affected by slower growth than expected in the PC market worldwide with the attack of the tablets. The company reiterated its commitment to the development of PCs, but now is putting more resources into developing the form of tablets. The company recently introduced its first tablet Iconia.

Linux vs. Windows

Recently, several outlets picked up the story that had hundreds of security flaws in the Android Linux kernel, with 88 of them classified as “severe” – but it was no surprise to me. All code has bugs and errors. What surprised me were the responses I’ve read in the forums.

Of course, Apple and Windows users were all over the fact that Android has 88 serious security flaws have recently been publicly disclosed and remain fixed. But the Linux faithful, as they frequently do, let me just shaking their heads and wondering how people can become so disconnected from logic and reality in the blind devotion to their favorite operating system or kernel.

In this case, arguments about the “many eyes” versus “security by obscurity” security models. The Linux defending noted that the problems were revealed, illustrating the superiority of the “many eyes” to patch the kernel. They further argued that while IOS, OS X, and Windows 7 / Windows 7 phones are undoubtedly countless security flaws – many of them serious – we can not compare to Linux, because these platforms are closed source and nobody knows total number.

This is where my mind starts to loop endless loop errors and smoke starts coming out of my ears. Maybe my mind is not evolved is simply incapable of understanding the complexities of logic thinner than the sacred Order of the Linux community – but there’s something in that logic that simply is not.

In bullet points, the argument seems to be:

Linux is open. Many eyes watching the code.
Looking at the code, the problems come to light quickly and dealt with immediately.
Other platforms are closed. Privileged eyes only see the code.
Since only privileged eyes to observe the code, problems can be buried and are less likely to be addressed.
Now, I do not disagree with these basic ideas. In fact, they make sense. But I think we need a couple of points.

Whom do we fear? No eyes would be privileged to bury and hide the security defects in code. We fear the people abroad. But the argument above, people abroad are in the same disadvantage as the “many eyes” to protect Linux and are unable to protect closed-source platforms.

The reason that “many eyes” model can not protect closed source is because the code is closed. Similarly, those who exploit security flaws in the closed-source platforms to the basic obstacle. They do not have access to the raw source code to scan for security flaws.

On the other hand, the same reason, the “many eyes” open source model works makes it inherently more vulnerable to people abroad that we are afraid to try to exploit security flaws. There is an inescapable logic here – the first points go hand in hand with the point of sale.

But there is still more below the surface, and that’s where it looks more like blind faith as a metaphysical and less rational logic, which is as dry and analytical as it is expected that the Linux community to be. It does not seem to be an implied threat here goes something like this:

“Linux can be self-policed by the community of developers who use, enjoy, and support for Linux. The source is open for them to review and correct, and this makes Linux a stronger, safer, more secure platform. Other platforms, on the other hand, can not be revised by the end user and developer community. ”

So far, so good … but:

“Closed-source platforms, however, can hide its serious security flaws, and poor (who have unlimited abilities the ability to find and exploit the closed-architecture platforms) will take advantage of it, and exploit knowledge of safety defects who knows how long, while the guardians of the faulty code hide the flaws and risks. ”

That’s where things go wrong. If open source is more secure, and enjoying the benefits of the “many eyes” security model is also more at risk because the evil eye is easier to discover and exploit security flaws that exist.

All the fatal loop exists in this logic. In short, if closed source is less secure because it can not be reviewed by weak security, then it is safer because it can not be easily revised security weakness. If open source is more secure because it can be checked by the security weakness, then it is less secure because it can be checked by the security weakness.

Obviously, the conclusion that “Linux is more secure because it is subject to the eyes of many” security model “argument itself is a valid argument, inductive (but not necessarily true). It is only when it expands to include the assumption (implicit) that the closed-platform security model is therefore less secure than the argument becomes an invalid argument, deductive (and therefore false).

The Linux community is approaching this as a zero-sum gain Linux / other platforms lose “the debate, but only because the argument that” many eyes “security model is valid and inductive (not shown) does not mean that security “through obscurity” security model is invalid and denied. In fact, by itself, “security by obscurity” model of security is a valid argument, inductive – although it is ironic that this is only the case until it is compared against and disprove the “many eyes” security model .

Therefore, we can not support the Linux community solely responsible for paying insufficient attention to the logic of reason 101 classes when they earn their degrees SE. There are plenty of people in each camp, guilty of committing the same errors in logic to defend their own pet operating system. For some reason, however, I think the Linux community should be accountable to a higher level of expectations – certainly more than the uneducated masses of Windows users.

I guess there’s an argument here that a lot of Mac users have higher education and graduate degrees, and perhaps should know better, too – but I think that Linux brings to the class of devotees who take pride in your razor sharp intellect, superior, logic and reasoning. Is it just the risk of Ubuntu Linux’s gene pool?

In fact, when you reach the end, there are only a few places where people are willing to suspend logic and reason for blind faith. Many people in the Linux community are the first and most vocal to attack others who behave superstitiously or hopelessly biased along party lines. However, they quickly fall into the same behavior when defending their own platform.

The other thing that logic, of course, the reason I teach is that it is impossible to sustain a conclusion drawn from metaphysical belief. In the case of the superiority of the platform, it seems clear that the conclusions are drawn from the same pool of people to determine their spiritual beliefs or (often) the preference vote.

Ultimately, I’m not expressing my opinion about which is superior – the “many eyes” or “security by obscurity” security models. Instead, I am proposing that either is a mystical belief, spiritual, not an end user comes to believe that through logic or reason, but by blind faith.

Once you realize that, it becomes quite clear that it is futile to try to argue or reason with someone who has drawn his line in the sand on both sides of the argument. How do you know? “Because I’ve seen myself,” is probably the best answer is going to get, which is effectively the same, “because you can only feel inside.” Personal feelings drawn from personal experience do not provide truths.

I have not seen a compelling argument to convince me either way one way or another. I have read and heard many opinions and a lot of non-admitted “evidence” as long as a fact, but in the final analysis, the superiority of a security model to another is largely a matter of personal opinion and conclusions learned in the faith – and that reduces the platform / kernel-based flame wars bit binary holy wars.

MacBook Air review

The 11-inch MacBook Air is a good choice for travelers who want a high quality portable in a small package, super light and thin. Users interested in the Mac Book Air is required to access all business applications Mac OS X and be able to justify the price premium for superior build quality and portability.

Netbooks typically have had a good feature: small form factor. Meanwhile, the screens and keyboards were too small to be useful and low-power processors was slow and frustrating. The 11-inch MacBook Air is the first real exception to the rule. Its 11-inch LCD screen has a resolution of 1366 × 768 which is usable (but not super wide). It has a full-size keyboard that is almost identical to standard keyboards chicklet Mac And, the performance of the MacBook Air is surprisingly strong – faster than many full-size notebooks – mainly because it uses flash memory directly on the motherboard.


  • Mac OS X 10.6 (Snow Leopard): OS
  • Processor: 1.4 GHz Intel Core 2 Duo (1.6 GHz in the model of $ 1199)
  • Storage: 64 GB (128 GB model to $ 1199) built-in flash memory on the motherboard
  • Display: 11.6-inch LCD with LED backlight, 1366 x 768 resolution
  • Graphics: NVIDIA GeForce 320M GPU with 256 MB of shared SDRAM
  • Battery: 35 watt-hour lithium-polymer battery
  • Ports: 2 USB ports, Mini DisplayPort, headphone jack
  • Weight: 2.3 pounds
  • Dimensions: 0.11-0.68 (h) x 11.6 (w) x 7.56 (d) inches
  • Camera: FaceTime compatible webcam
  • Keyboard: Full sized 78 keys with 12 function keys
  • Mouse: Multi-touch trackpad
  • Wireless: 802.11 a / b / g / n, Bluetooth 2.1 + EDR
  • Price: $ 999 (64GB HDD) and $ 1199 (128)
  • Dell updates data center

    Dell has announced a brand spanking new release of storage, networking and server hardware, and services and systems management solutions focused on information center.

    The new product offerings are intended to enable businesses to add open-standard systems to extend existing information centres or for new deployments, with pre-configured solutions allowing companies to basically deploy virtualization solutions. The launch includes new Dell EqualLogic storage products, Dell PowerConnect networking solutions and Dell PowerEdge blade servers, new systems management updates and new storage, virtualization and support services from Dell.

    “Organisations benefit from Dell’s approach to open, capable and affordable technologies that preserve choice and free up budgets for innovation and today they are introducing several new product and solution offerings to reinforce that direction,” said Brad Anderson, senior vice president, Enterprise Product Group, Dell.

    “With new solutions for virtualization management, new innovations in our server and storage product lines and expanded service offerings our customers can utilise Dell for the benefits of a converged architecture – dynamic workload allocation, faster time to deployment, seamless management – but they don’t require to be locked in to a closed expertise stack,” he added.

    The new solutions have been designed for faster deployment, with less resources and risk involved in rolling out solutions, along with integrated management solutions across, servers, storage and networking, to reduce the amount of resources involved in maintaining and managing solutions.

    Among the new launches are Dell EqualLogic and PowerVault storage platforms, with automated information tiering, improved performance and scalability, and PowerVault systems for SMBs; and blade and rack PowerEdge servers, optimized for virtualisation, and updates to the LifeCycle Controller, Chassis Management Controller, and Integrated Dell Remote Access Controller (iDRAC) systems management solutions. The launch also includes new networking solutions, including PowerConnect-J series switches, gateways and chassis, produced through Dell’s OEM agreement with Juniper, and PowerConnect B-series chassis switches, produced through an OEM agreement with Brocade.

    Microsoft conference held in New Orleans has the technology

    About 10,000 computer professionals and software developers across the country are flocking to the Ernest Morial Convention Center this week as part of Microsoft Tech Ed 2010 North America conference. The event will showcase the latest Microsoft software, with a special focus on cloud computing.

    Matthew Hinton / The Times-Picayune

    “We are on the cusp of a major change in the cloud computing industry,” said keynote speaker, Bob Muglia, President of Server and Tools Business at the technology giant. “We are looking forward to moving with you in the cloud.”

    Cloud computing is an emerging standard in which information is stored and accessed on demand via the Internet rather than locally hosted servers. Muglia said that “cloud computing”, which can be performed using Microsoft Azure platform is the future for companies because it reduces costs, increases processing power and storage capacity, and lets you create and use applications easier and more efficient .

    Muglia showed video testimonies of workers in information technology for the Chicago Tribune and the production team of the film Avatar – Tribune workers said that the measure of Azure and cloud computing has drastically reduced the space, effort and energy required to keep your servers, while technical Avatar said technology has allowed them to organize, store and easily access the enormous amount of data needed to create the film massive computer-generated effects.

    Muglia asked several senior Microsoft to show some of the new technologies that use cloud computing: Intellitrace Visual Studio, enabling developers and testers to accurately record when errors occur; Communications Server 14, which allows employees in a network to communicate through mail, phone and video chat and upload documents to each from each other, and your Windows 7, which allows direct access cloud-based email accounts and servers.

    Other presenters gave examples of the power granted to computers using Azure. A portable computer running the spreadsheet software loaded with millions of rows. annual charity auction Microsoft gathered twice as much money when it was incorporated in the platform, as more applications has been processed. Muglia said cloud computing and makes the most efficient machines, and therefore less pollution. “We can get a refrigerated container with 200 computers with a garden hose”, he boasted.
    The keynote address began a convention that will last until Thursday. Attendees will hear speakers give more in-depth tutorials on products and other highly technical – the sessions have names like “New IDE and language features in Microsoft Visual Studio 201 Using Visual Basic and C #,” and ” integration of dynamic languages in your business applications. ”

    Attendees will also have the opportunity to show rooms hands on experience with products – with hundreds of computers were created and filled to capacity – as well as workshops led by company officials at both conventions and companions.

    The event is a typical local color with some New Orleans – Dopsie Rockin ‘, Jr. & the Zydeco Steppers played before the opening address, accompanied by slides give a brief history of Zydeco and Jazz. Participants were encouraged to visit the restaurants and shops nearby.

    The conference concludes Thursday evening with a closing party in style after Mardi Gras.