AMD debuts first embedded GPU with support for OpenCL and six displays

Disappointed by the lack of support for multiple displays and OpenCL in embedded GPUs these days? Then AMD may have just made your day. It's just debuted its new "desktop level" Radeon E6760 discrete GPU, which packs both OpenCL support and Eyefinity-enhanced support for no less than six independent displays. AMD also notes that the GPU can be paired with its upcoming Llano APU for some additional graphics and parallel computing power and, while it might not wind up in many consumer devices, the company says it's ideal for everything from casino games to medical imaging. Head on past the break for the complete press release.

Continue reading AMD debuts first embedded GPU with support for OpenCL and six displays

AMD debuts first embedded GPU with support for OpenCL and six displays originally appeared on Engadget on Mon, 02 May 2011 17:12:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAMD  | Email this | Comments

Source: http://www.engadget.com/2011/05/02/amd-debuts-first-embedded-gpu-with-support-for-opencl-and-six-di/

cane corso braille london newspapers entertainment tonight reggie bush

Sony responds to Congress: all 77 million PSN accounts compromised, finger pointed at Anonymous

We've heard Sony explain itself at length regarding the gigantic PlayStation Network breach, but this might be the most useful version of the story yet -- it's the one that Sony's Kaz Hirai is forwarding to US Congress members concerned about your personal information. The official PlayStation.Blog has the full English document up on Flickr for your perusal, and we'll warn you it's much the same tale -- Sony says all 77 million PSN and Qriocity accounts have had information stolen, but the company's still not sure exactly which pieces have gone missing, whether credit card numbers are compromised or not, or who could be behind the hack. Sony does say, however, that it had 12.3 million credit card numbers on file, and 5.6 million of them from the US, and that investigators found a file on one of the servers named "Anonymous" with the words "We are Legion" inside it. Hard to draw many conclusions from that.

Sony responds to Congress: all 77 million PSN accounts compromised, finger pointed at Anonymous originally appeared on Engadget on Wed, 04 May 2011 12:40:00 EDT. Please see our terms for use of feeds.

Permalink PlayStation.Blog, Joystiq  |  sourcePlayStation.Blog (Flickr)  | Email this | Comments

Source: http://www.engadget.com/2011/05/04/sony-responds-to-congress-all-77-million-psn-accounts-compromis/

mao zedong npr abcnews usa today democracy now

Which of Us Dies First? [War]

What follows is unedited. These are the words of Teru Kuwayama, a photographer who has been to some of the most dangerous places in the world, at some of the most dangerous times to be there, taking the pictures that allow us to imagine what it's like. He is currently leading the project basetrack, which tracks the deployment of a battalion of US Marines in Afghanistan. The opinions in this piece are his own. The words are provocative. We ask that you read them with an open mind. —Editors More »


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/bMkDVmP6iu4/which-of-us-dies-first

legend bin laden video ge sweet home alabama dexter season 6

THQ brings uDraw Game Tablet to the PS3 and Xbox 360, redesigned for big boys

Bored of blowing stuff up on your PS3 or 360? Then take some time out to paint flowers, butterflies, fruit and other lovely things with the uDraw Game Tablet. It's coming to the big boys' consoles after a decent debut on the Wii. Don't worry though, you won't have to sully your hardcore gaming shrines with any soft-edged blue and white silliness -- manufacturer THQ says it has "exclusively designed" the tablet for the more serious platforms. Unfortunately the company paints a pretty ambiguous picture when it comes to a release date - it merely says the tablet will be out "this holiday". Fine, we'll just go back to blowing things up until National Applesauce Day rolls around.

THQ brings uDraw Game Tablet to the PS3 and Xbox 360, redesigned for big boys originally appeared on Engadget on Wed, 04 May 2011 07:28:00 EDT. Please see our terms for use of feeds.

Permalink joystiq  |  sourceTHQ  | Email this | Comments


Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/e7uFw9jGFec/

green bean casserole royal wedding guest list prime rib recipe kai mashed potatoes recipe

On Parade.com: The Osmonds Talk Vegas, Fame, and Justin Bieber

Music and TV icons Donny and Marie Osmond talked to Parade.com about their long career together, how their family keeps them grounded, why the sibling rivalry is real and much more. Here are some highlights: Their advice to today’s young stars like Justin Bieber and Taylor Swift? Donnie: It’s a bumpy rollercoaster ride. Hang in [...]

Source: http://www.celebritymound.com/on-parade-com-the-osmonds-talk-vegas-fame-and-justin-bieber/?utm_source=rss&utm_medium=rss&utm_campaign=on-parade-com-the-osmonds-talk-vegas-fame-and-justin-bieber

coupons online dallas cowboys beatification of john paul ii matilda steven seagal

Al-Qaida's Resilience May Mean Its Survival

Al-Qaida is going through its first leadership succession in more than 20 years.

Zawahiri is clearly poised to step into bin Laden's shoes. He has the street cred of being a dyed-in-the-wool terrorist ever since he was a teenager.

The terrorist group started in the summer of 1988 with two men at the top: Osama bin Laden as its head, and Egyptian Ayman al-Zawahiri as his second in command. And like any good management team, the two made contingency plans should anything happen to them. Just what those plans were is likely to become clear in the coming days and weeks.

"Osama bin Laden's death is something that he himself foresaw well over a decade ago," said Bruce Hoffman, a terrorism expert at Georgetown University. "In a series of interviews in the late 1990s, he had said that he not only welcomed his martyrdom but had prepared so there would be thousands of Osamas who would follow in his footsteps."

There may not be thousands of Osamas, but there certainly are a good number of followers, and U.S. officials are rushing to identify the group's new emerging leaders now. Certainly bin Laden's deputy, Zawahiri, is still a force in the organization. He has a rich terrorism pedigree, dating back more than 30 years when he was tried as one of the alleged masterminds of the assassination of Egyptian President Anwar Sadat.

"Zawahiri is clearly poised to step into bin Laden's shoes," said Hoffman. "He has the street cred of being a dyed-in-the-wool terrorist ever since he was a teenager."

Bin Laden's Shoes Will Be Quickly Filled

Zawahiri is hardly alone. There are others. U.S. officials say al-Qaida's arm in Yemen poses the most serious threat to this country. Among its members is a radical imam named Anwar al-Awlaki. He was born in the U.S. and has become the voice of the violent jihadi movement. He has a huge following on the Internet and is likely to goad young men to action in the coming days.

Terrorism experts say that Ayman al-Zawahiri, currently the No. 2 of al-Qaida, is well-positioned to take the helm of the terrorist group. This picture is from an online video released on Sept. 2, 2006.
AFP/Getty Images

Terrorism experts say that Ayman al-Zawahiri, currently the No. 2 of al-Qaida, is well-positioned to take the helm of the terrorist group. This picture is from an online video released on Sept. 2, 2006.

Hoffman says that while Awlaki may not have bin Laden's wide appeal, he has his fingers on the pulse of a core demographic that al-Qaida needs: young people.

"Terrorists depend on the young people to radicalize and recruit," Hoffman said. "And Awlaki speaks to them." While Awlaki doesn't have bin Laden's stature, he will likely be one of the key people to carry on his message now that he is gone.

Awlaki is thought to have quite a record already. U.S. officials say he helped recruit the young Nigerian, Umar Farouk Abdulmutallab, who tried to blow up Northwest Flight 253 on Christmas Day 2009. He is alleged to have played a key role in the cargo bomb plot late last year, which also originated from Yemen. U.S. officials expect an attack to avenge bin Laden's death in the coming days, and al-Qaida's arm in Yemen may be the best positioned to strike. Hoffman says the plot is probably already in the pipeline.

"The more professional terrorists already have the plans, and now they are going to move to implement them effectively," he said.

How Much Does Bin Laden's Death Really Matter?

Al-Qaida has called on affiliates do its dirty work in the past. In 2002, when the U.S. invasion of Afghanistan sent bin Laden and Zawahiri into hiding, al-Qaida leaders sent word to their affiliates. They told them to launch attacks against the West. That fall, a car bomb exploded in Bali outside a popular tourist nightclub, killing hundreds. An Indonesian terrorist group with ties to al-Qaida claimed responsibility.

Lt. Col. Reid Sawyer, the director of the Combating Terrorism Center at West Point, says the U.S. is already bracing for what will come next. "The attack may not be tomorrow, it may not be the next day, but it is almost certain there will be a retaliatory attack," he said. "So we need to maintain our vigilance against that and not let our guard down a week after the death has passed."

Which raises the question: If al-Qaida still has the ability to strike the U.S., how much does bin Laden's death really matter?

Sawyer says it is still too early to tell what bin Laden's death is going to mean to the organization in the long run. "Al-Qaida has always been and will remain a very much decentralized phenomenon," said Sawyer. "It is an organization that has lived for 24 years and has gone through several mutations. The question now before us is what is this next mutation and what will it look like into the future?"

Sawyer says if bin Laden had been killed in Afghanistan eight years ago in the caves of Tora Bora, al-Qaida might well have died with him. Now the organization is diversified enough it could weather bin Laden's death ? and hardly miss a beat.

Source: http://feedproxy.google.com/~r/NprProgramsATC/~3/rd_OtGCm2Rg/resilience-key-to-terrorist-groups-survival

hayden panettiere antoine dodson psu propaganda jesus christ superstar

Personalized Children's Books Put a New Spin on Nursery Rhymes and Fairy Tales

Do you remember the nursery rhymes and fairy tales of your childhood? How during a quiet time with a grandparent or a nightly bedtime ritual these beloved stories where shared with you over and over again. Are you now sharing them with your own children, creating special memories for them to look back on as they grow? Some say that these old time rhymes and fairy tales have fallen out of vogue and aren't read to today's children.

I hope that is not the case, for there are many lessons that can be taught to our children during those special readings of our youth. However, if your child's interest is waning at the old time classics but you would still like them to have exposure to some of these great childhood favorites there is a way to put a new spin on them. Personalized nursery rhymes and fairy tale books introduce the child to the great titles that we knew as children. However, you are able to put the child into the story so that now they become part of the classic experience.

With personalized children's books your child is able to be the star of the story. In old familiar titles such as Mother Goose your child meets Mother Goose, Humpty Dumpty, the Cat and the Fiddle and the rest of the favorite characters in this classic tale. In the Three Little Pigs, the wolf is still after the Little Pigs with your child being the hero and solving the dilemma in this classic, well loved fairy tale.

There are new titles as well but the same childhood delight as the favorites. In the Teddy Bear Land, your child joins a teddy bear in a magical journey through Teddy Bear Land. They play games and meet pink marshmallow bunnies. There is Dinosaur Land were your child magically travels back to the time of the dinosaurs and saves the giant creatures from an erupting volcano. The story, When I Grow Up shows your child different things they could be when they grow up; a dancer or cowboy, a doctor or chef. This book is full of fun choices. The sweet story of Farm Animals where your child spends an exciting day on the farm. They get to meet all the barnyard animals and help save them from a dangerous storm.

Personalized children's books that contain your child's name, age, where they live and friends and family members. Where your child is the star and can be part of the story along with the other characters will bring these old classics along with some newer titles fast friends during quiet and bed times.

Source: http://ezinearticles.com/6194052

sophia loren tequila i tunes vevo university of washington

The iPhone tracking fiasco and what you can do about it

By now you've no doubt heard about a certain iOS database file called consolidated.db. It made quite a splash yesterday when a pair of researchers, Alasdair Allan and Pete Warden, from O'Reilly Media announced the "iPhone tracking software" the duo had "discovered hidden on the phones." Here's the problem: they didn't discover it, at least not originally. The file, known to hold large amounts of geolocation data collected from WiFi access points and cell-towers, has been probed by forensic experts ever since the retail launch of the iPhone 4 back in June of 2010. Hell, Sean Morrissey and Alex Levinson published a physical book on the topic back in December 2010, entire excerpts of which can easily be found on Google. So either the team from O'Reilly is being disingenuous with its claims or it's being lazy.

Regardless, the story laid dormant for months until the O'Reilly team was able to visualize the data in a very personal way. Running the team's open-source iPhoneTracker software to see the detailed locations of our worldly travels is absolutely fascinating. Imagining the same data file in the hands of a stalker, misguided detective, or a jealous lover is downright creepy.

But how is it possible that an issue like this has avoided the tech community at large for more than a year? And more importantly, what can you do about it? Read on to find out.

Sure the visualization is powerful, but so is the emotive energy that surrounds any issue related to Apple. Toss in big brother privacy concerns and you've just unleashed the perfect storm into the blogosphere echo chamber. Yet, we heard nary a peep emitted outside of forensic circles until yesterday. Ryan Block, lover of fine coffee and Engadget Editor Emeritus, postulated an answer to our question over at GDGT, theorizing that perhaps the forensic community, unlike the security world, is so insular that it lacks the incentive to go public with such privacy concerns. After all, criminals will change their behavior if they know what you're tracking. But who's the so-called "criminal" in this case?

For that, we have to dig into Apple's privacy policy, something you accept every time you blindly click away Apple's terms and conditions. The policy was last updated on the 21st of June, 2010 -- the same day that Apple released iOS 4. Guess what? It talks a lot about collecting and using non-personal information, including location data. Here are a few choice paragraphs:

We also collect non-personal information ? data in a form that does not permit direct association with any specific individual. We may collect, use, transfer, and disclose non-personal information for any purpose.

Apple then cites several examples:

We may collect information such as occupation, language, zip code, area code, unique device identifier, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising.

The company later expounds on location services specifically:

To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device. This location data is collected anonymously in a form that does not personally identify you and is used by Apple and our partners and licensees to provide and improve location-based products and services. For example, we may share geographic location with application providers when you opt in to their location services.

Problem is, the location data is very personal and hardly anonymous because it's stored right on your phone -- the most personal device we own. The consolidated.db is also replicated (unencrypted by default) to any PC or Mac your iPhone syncs with, and subsequently any additional backup devices you might use (Windows Home Sever, Time Capsule, etc.).

Apple's not alone in this behavior, either. Just last month, The New York Times ran a story titled, "It's Tracking Your Every Move and You May Not Even Know." In this case, however, "it" does not refer to Apple, it references the cellphone companies who have to track your location in order to provide the best possible service. That meant 35,000 longitude and latitude coordinates collected over a six month period for one very unhappy Deutsche Telekom subscriber who had to go to court in Germany to find out what his provider knew. See, like the United States, German carriers are not required to report the data they collect.

Don't get us wrong, we're not letting Apple off the hook here -- we also want to know why the company needs to collect and maintain so much of our location data for such a long time. But we, as consumers, have to pay better attention if we want to reserve the right to scream foul.

If this issue really concerns you, then there are a few things you can do right now to take control of your privacy. First, you can go into iTunes and start encrypting your iPhone and iPad backups. Second, you can purge the consolidated.db files sitting on your various hard disk drives. Lastly, if your device is jailbroken, you can install the free Untrackerd app to continuously clean the consolidated.db file. That should keep you busy while we wait for Apple to respond.

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/UJFPm7HpJxI/

bruce springsteen jim caviezel mononucleosis pandas the village

Osama bin Laden's death key topic on Internet

May 02, 2011

By John Ribeiro | IDG News Service

The announcement late Sunday of the death of al-Qaeda leader Osama bin Laden has set the Internet abuzz, as users searched for information and shared their thoughts on the killing of one of the world's most wanted men.

In a late-night appearance at the White House, U.S. President Barack Obama said that bin Laden had been killed in a U.S. operation in Pakistan on Sunday.

[ Discover what's new in business applications with InfoWorld's Technology: Applications newsletter. | The Web browser is your portal to the world -- as well as the conduit that lets in many security threats. Learn how to secure your Web browsers in InfoWorld's "Web Browser Security Deep Dive" PDF guide. ]

An IT consultant in Abottabad, the town where bin Laden was killed, inadvertently "live blogged" an early sign of the military operation on Twitter, without realizing its importance until much later.

Sohaib Athar, who uses the id @ReallyVirtual on Twitter, wrote "Helicopter hovering above Abbottabad at 1AM (is a rare event)," followed shortly after by "A huge window shaking bang here in Abbottabad Cantt. I hope its not the start of something nasty :-S."

He now has over 14,000 followers on the micro-blogging site. He moved to Abottabad from Lahore for some "peace and quiet," he said.

The events will provide an opportunity for malicious websites to infect computers by tricking users into visiting their sites for more information, warned security experts.

Cybercrooks can trick the search-ranking algorithms of popular search engines by feeding them fake pages to make their sites seem legitimate, increasing the chances that Internet users searching for news land on a site dispensing malware, warned Paul Ducklin, head of technology at IT security firm Sophos, in a post on the company's web site.

Athar himself seemed aware of the risks, joking in another Twitter message: "It is a good thing my blog server is infected with malware today, I guess :-/"

Fabio Assolini, an expert at IT security company Kaspersky Lab, already had examples of malware-laced pages cropping up in response to a Google image search for "osama bin laden body." Users clicking on some of the images in the results are redirected to one of two malicious domains offering a copy of the rogueware known as "Best Antivirus 2011", Assolini said in a blog posting.

Twitter reported that its site carried more than 4,000 messages per second at the beginning and end of Obama's speech. The death of bin Laden, Abottabad, and Navy Seal, the special operations force that killed bin Laden, were among the top topics being discussed on Twitter a couple of hours after Obama's announcement.

Google Trends also reported that "osama bin laden dead" was the hottest search on May 1 in the U.S., followed by some other search items that are related to the death of bin Laden.

On Facebook, a page "Osama Bin Laden is DEAD" had 258,400 people who "liked" the page, many of whom commented on bin Laden's death. The page appears to have been set up before the death of bin Laden was announced, and subscribes to the theory that bin Laden was already dead a long time ago.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's email address is john_ribeiro@idg.com

Source: http://www.infoworld.com/t/internet/osama-bin-ladens-death-key-topic-internet-643

weather radar national weather service new york marathon lionel messi brewers