Connect with us

Lisa Su became the first woman to receive the Robert Noyce Medal

Published

on

AMD CEO Lisa Su on Friday joined a limited list of individuals whose contributions to the semiconductor industry were deemed significant enough to be honored with the prestigious Robert N. Noyce Medal. The award, presented by the IEEE and funded by Intel, was presented to Lisa Su in recognition of her “leadership in innovative semiconductor products and successful business strategies that have propelled the microelectronics industry forward.” Lisa Su’s actions at the head of AMD played a large role in this recognition, which allowed the company to rapidly strengthen its position in many markets. Suffice it to say that AMD’s share price has risen from $ 2 in 2014 to $ 110 today.

Lisa Su has an education at the Massachusetts Institute of Technology and has worked in research and technology groups at IBM. After 11 years with the company, in 2006 she became vice president of the IBM Semiconductor Research and Development Center in New York. Lisa Su then moved to AMD as Senior Vice President in charge of the company’s global business units, where it took her only two years to become president and CEO of the company.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Laptops

Apple’s M1 Max SoC beats the $ 6,000 Radeon Pro W6900X. MacBook Pro Result Appeared in Affinity Photo

Published

on

Yesterday we saw what the graphics core of the Apple M1 Max SoC is capable of in one game and a couple of benchmarks. But this is not why they usually buy a MacBook Pro, especially in top-end configurations.

What can such a solution offer to professionals? The developer of the editor Affinity Photo shared the results of testing the new MacBook Pro with SoC M1 Max in full configuration, that is, with 32 GPU cores.

It turned out that in this case the possibilities of Apple’s solution are not just high – they are record-breaking. In the test, the M1 Max scored 32,891 points. In comparison, the top-end Radeon Pro W6900X available for the Mac Pro scores 32,580 points! That is, the GPU in a single-chip system performs at the level (and even slightly outstrips) the dedicated flagship video card with 32 GB of memory and a very high TDP. And such a Radeon card for Mac Pro in the Apple Configurator costs $ 5,600, and if you later buy it separately, then even $ 6,000. By the way, the performance of the Radeon Pro W6900X reaches 22.2 TFLOPS, that is, it is twice as high as that of the M1 Max.

Apple's M1 Max SoC beats the $ 6,000 Radeon Pro W6900X.  MacBook Pro Result Appeared in Affinity Photo

The developer notes that such a stunning result from Apple Silicon will not always and not in all tests. But even one is enough to understand how a worthy decision came out from the Cupertines.

Continue Reading

Security

Over 150 apps on Google Play secretly subscribed users to premium SMS services

Published

on

Among the most affected were users from Egypt, Saudi Arabia, Pakistan and the UAE.

Avast specialists published details of a massive fraudulent campaign using over 150 Android apps with over 10 million downloads to sign up for a premium subscription without the knowledge of users.

The programs distributed as part of the UltimaSMS campaign were uploaded to the Google Play Store under the guise of applications with catalogs of discounts, games, keyboards, QR code scanners, photo and video editors, spam blockers, etc. Experts informed Google about 80 fraudulent applications and, although the tech giant promptly deleted them from the Internet catalog, the attackers probably managed to earn millions of dollars on premium subscriptions.

When downloading the application, the user was prompted to enter a phone number and email address to access the program’s functions. After receiving the necessary data, the application signed an unsuspecting user for an SMS service with a monthly payment of $ 40, while the fraudsters received their share as an affiliate partner.

Interestingly, the apps included a system that determined the maximum subscription amount based on the user’s location.

Among the most affected were users from Egypt (2.6 million), Saudi Arabia (2.4 million), Pakistan (2 million) and the UAE (1 million).

Uninstalling a rogue app will prevent new subscriptions from being issued, but will not deactivate existing ones. To do this, the user will need to contact their mobile operator and request the cancellation of all SMS subscriptions.

For a complete list of rogue apps, see here

Continue Reading

Security

PT Network Attack Discovery detects 33 more suspicious network activities

Published

on

Positive Technologies has released a new release of the PT Network Attack Discovery (PT NAD) 10.2 traffic analysis system.

Positive Technologies has released a new release of the traffic analysis system PT Network Attack Discovery (PT NAD) 10.2, which automatically detects the types and roles of network nodes, detects scan, flood and DDoS attacks, and processes traffic losslessly at speeds up to 10 Gbps.

Detection of new threats

In PT NAD 10.2, the number of detected suspicious activities has been increased by 9 times – there are 37 of them now. All of them are displayed in a single feed [1]to help users respond faster to detected threats. The feed collects threats identified using analytics modules (non-signature method) on one page and makes it possible to manage them. PT NAD users will now know in a timely manner when:

Credentials are transmitted to the network in clear text (which can be used by an attacker during an attack);

· Active VPN and proxy servers are monitored (for example, if internal nodes access external OpenVPN or SOCKS5 proxy servers);

· Software for remote control is used (TeamViewer, AeroAdmin, RMS, etc.) or remote commands are executed using PsExec and PowerShell;

· There is malware activity on the network.

In addition, the Activity stream continues to display custom notifications, backtracking indicator of compromise messages, dictionary passwords, and information about unknown DHCP servers.


PT NAD’s activity feed includes 37 types of threats that require a response

PT NAD 10.2 has a built-in mechanism for detecting network scanning, flooding and DDoS attacks. During such attacks, many sessions are created on the company’s network. Instead of storing information about each connection separately, PT NAD now creates one session record and one attack record in the activity stream, which contains aggregated data about the entire attack session. Such a combination “saves” the system: protects against database overflow and increases the stability of the sensor.

Network Node Management: Roles and Types

In order for information security specialists to have complete information about which nodes are involved in the network interaction and how the network works as a whole, PT NAD began to automatically determine the types and roles of nodes. The type indicates whether a particular node is a server, printer, mobile device, or workstation. Role refers to a function that a device performs. Version 10.2 defines 15 roles, including DNS server, VPN, domain controller, proxy server, monitoring system. The user can manually reassign the device type and role.


With the help of the updated filter, the user can find the nodes of interest by IP address, type, role, group membership and other parameters

Knowledge of what constitutes a company’s infrastructure is necessary in order to properly protect it and accurately detect attacks in it., – comments Dmitry Efanov, head of development, PT NAD Positive Technologies… – This information in PT NAD gives security operators an understanding of what devices are on the network and what roles they play, thus helping to take inventory of the network.“.

Capture and analyze traffic

Starting with this version, PT NAD captures traffic on Linux using the DPDK engine (Intel library that provides the most efficient way to capture traffic on Linux among other mechanisms), which processes it losslessly at a speed of tens of gigabits per second.

For greater transparency of internal traffic, PT NAD 10.2 has expanded the list of defined and parsed protocols. The updated system now parses all existing SQL data transfer protocols: MySQL, PostgreSQL, Transparent Network Substrate from Oracle and Tabular Data Stream (the ability to detect it was added in the previous release). PT NAD also defines the protocols of the Elasticsearch system and PostScript printing – with the help of the latter, printers on the corporate network communicate. The total number of detected protocols has reached 86.

Other UX improvements

A number of changes in PT NAD 10.2 are aimed at improving the usability of the product. Now you can find out from the interface about the current status and validity of the license and add or change it yourself. Added the option to copy the link to the card of a specific session or attack, in order to quickly exchange information with other users.

[1] Added in release PT NAD 10.1

Continue Reading

Most Popular