Jump to content

Search the Community

Showing results for tags 'laptop'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 31 results

  1. Tired of Windows, Mac OS X, and other Operating Systems paid up gradation and support? Do you feel like trying out something new? Or perhaps you want to test the cutting edge in operating system design or find out what the platform of the future is going to be. Or you may simply want to try a system that your friends are using to see whether you can use it on your computer. There are plenty of operating systems available and introducing new OS day by day with so many features and fast processing capability. This page lists a variety of free operating systems available that you can download and install on your computer. Many of the systems are also open source so you can also tinker with the system, find out how it works, and learn from it. Here is the list of best 8 Free Light Weight Antivirus that can save Computer Memory and CPU Power. Related: 7 Best Portable Linux Distro to Boot and Run from USB Are you searching for a lightweight operating system for a netbook? Here is a list of the free lightweight operating system for old laptops that can operate without using much hardware resources and probably boot from the USB itself. Ubuntu Most Linux netbook operating systems seem to be based on this one, so it’s worth starting with Ubuntu. Ubuntu is an operating system built by a worldwide team of expert developers. This fast operating system contains all the applications you need: a web browser, office suite, media apps, instant messaging and much more. Ubuntu is an open-source alternative to Windows and Office that can speed up Netbook. This operating system for an old laptop wasn’t precisely designed from the ground up. Ubuntu is the Linux distro based on the Debian architecture. This ideal OS for old laptop comes with most of the built-in Ubuntu apps (Firefox, Open Office, F-Spot, LibreOffice, Firefox, Thunderbird, Transmission, etc.) that makes this setup different is the compatibility with computer hardware. The GUI is tailor-made to take advantage of the limited real estate laptop screens feature. The Ubuntu platform comes in two forms – LTS(Long Term Support) and non-LTS. The last stable LTS version is 16.04, and the non-LTS is the 17.04. The naming is done with respect to the year(16) and month(04) of the release. Most noteworthy is that this will be the final versions with the Unity-based desktop as the newer releases will switch back to the GNOME-based desktop. Furthermore, as Ubuntu has been the most popular Linux Distribution, it has an excellent hardware compatibility, and the users need not install additional drivers. The software is downloadable from the official Ubuntu Software Center. Download Link: Ubuntu for desktop/laptop | Ubuntu for Netbook | Ubuntu for Servers Related: 10 Best Android Antivirus & Mobile Security Apps with Antitheft Protection Linux Mint Linux Mint provides a modern, powerful and elegant operating system for notebook and netbook. Mint works out of the box, with full multimedia support and easy to use. This fast operating is based on the Ubuntu distribution and is currently the most popular operating system among experts and beginners alike. Based on Debian and Ubuntu, Mint provides about 30,000 packages and one of the best software managers with a unique Update Manager and the robustness of its Linux architecture. Updates come slower than Ubuntu, but for those who want better performance and visual aesthetics can surely go for Linux Mint. Download Link: Linux Mint Related: Please check our suggestions for the tools to clean your PC for better performance. Linux Lite Linux lite just as the name suggests was introduced for the systems with lower end hardware. This Linux Lite is a straightforward lite operating system that can benefit especially the news users who have limited knowledge of the Linux operating system as a whole. This Linux operating system is a right combination of programs, tools, desktop, and functionality. The Netbook Linux Lite is based on the Ubuntu distribution and presents a simple interface. As such it is quite stable and has update support for up to five years. The Linux distribution is fully functional right after installation, and the users need not worry about driver issues. As far as best lightweight operating systems are concerned, Linux Lite is right up there on the top. Download Link: Linux Lite Fedora Fedora is the second most popular Linux-based operating system as of early 2010, after Ubuntu. Fedora is an RPM-based, general purpose operating system built on top of the Linux kernel, developed by the community-supported Fedora Project and sponsored by Red Hat. One of Fedora’s primary objectives is not only to contain software distributed under a free and open source license but also to be on the leading edge of such technologies. Fedora developers prefer to make upstream changes instead of applying fixes specifically for Fedora—this ensures that their updates are available for all GNU/Linux distributions. The best lite Linux operating system has a GNOME desktop by default which you can change to your wish. Fedora’s latest projects include the Fedora Spins by which you can customize and implement variations in the operating system desktop environment and UI. It uses the RPM package management system. Fedora has a comparatively short life cycle: version X is maintained until one month after version X+2 is released. With six months between releases, the maintenance period is about 13 months for each release. Fedora had reasonably good support for PowerPC when he used that processor architecture. Fedora comes with the default DNF package manager or GNOME software to install software and software repositories Download Link: Fedora for Desktop / Laptop Kubuntu Kubuntu is an official derivative of the Ubuntu operating system using the KDE graphical environment instead of GNOME. This netbook OS is part of the Ubuntu project and uses the same underlying system. It is possible to run both the KDE desktop (Kubuntu-desktop) as well as the Gnome desktop (Ubuntu-desktop) interchangeably on the same machine. The Kubuntu desktop is supporting to full customization. Originally designed to ease the transition for users from other operating systems (such as Microsoft Windows) by allowing a similar desktop layout, and the KDE 4 Plasma Desktop incorporates widget-centric modularity that allows the user to integrate function identical to all other operating systems. It is also creating new functionality not found in other operating system desktops. 3-D effects are available in the standard KDE4 installation. Download Link: Kubuntu for desktop/laptop Mandriva Linux Mandriva Linux (formerly Mandrakelinux or Mandrake Linux) is a French Linux distribution, distributed by Mandriva (formerly Mandrakesoft). Mandriva OS uses the RPM Package Manager. The product lifetime of Mandriva Linux releases is 18 months for base updates (Linux, system software, etc.) and 12 months for desktop updates (window managers, desktop environments, web browsers, etc.). Server products receive full updates for at least 24 months after their release. Download Link: Open Mandriva Lx Editors Note: There are new OS on the market and growing up the user base of these New Operating System in the year 2017 and deserve to list them here. LXLE OS ‘Revive your Old Pc!’ is the LXLE OS main motto and we can see why. This is the most resource efficient Linux operating system that you can ever find. It offers a ton of features and functionality that can help you get your work done without any hiccups. The LXLE OS is based on the Ubuntu LTS distribution so the stability and security are very much on point. Using an optimized LXDE interface, the best lightweight operating system delivers the best possible performance and memory management information. The boot and startup take less than 1 minute, make your laptop fast with this fastest operating systme for laptop! If you want to make your old device perform brand new, LXLE OS is surely the way to go. Download Link: LXLE OS Manjaro Linux Manjaro Linux is based on the highly popular Arch distribution which is the go-to system for Linux experts. But the Arch distribution is very hard for the beginners and presents a steep learning curve for the entry-level users who are just stepping into the Linux world. This is where the Manjaro Linux comes in. Manjaro Linux concentrates on the user perception and the user-friendliness. The best lightweight Linux operating system presents fast, stable and powerful functionality with the bleeding edge software. The simplified approach to the Arch distribution means that even beginners can harness the power of the Arch repository and architecture to the fullest. The system hardware is automatically analyzed and the necessary drivers have downloaded accordingly. Having dedicated software and an easy installation means that this free Lite operating system is a must-have. Download Link: Manjaro Linux Crunchbang / Cruncheee This one’s not exactly a netbook operating system per se, but it can make a pretty good one. Crunchbang is based on Ubuntu but focuses on “speed, style, and substance” to quote their website. Based on the lightweight open box window manager, Crunchbang certainly fast and could run well on your netbook. I highly suggest trying this out if traditional netbook operating systems don’t work out for you. It’s worth noting that in 2008, a group of EEE enthusiasts made a custom Crunchbang for EEE users: CrunchEEE. Check out Cruncheee here, but know that it’s over a year out of date. Download Link: CrunchBang Linux Moblin/MeeGo Moblin Linux is the light-weight Linux distribution Intel developed to run on low power netbooks with small screens and Intel Atom processors. The Meego is the lightweight Linux distribution that Nokia developed to run on its handheld internet tablets including the Nokia N900 and N810. Both of these operating systems are made way to Samsung’s Tizen OS. Download Link: Moblin | MeeGo Editors Note: There are few of the OS discontinued their support and further development. If you have any of them on the give list below, it is time to select another one from the top list of Operating Systems. EasyPeasy (Update: EasyPeasy has been discontinued).The Ubuntu Netbook Edition is an excellent fast operating system for laptops, but a lot of things don’t work out of the box. MP3s, for example, can’t be played until you install the codecs. EasyPeasy aims to be simple by offering proprietary applications and codecs out of the box. You’ll be pleased to find your favorites including Skype and Picasa included by default. Installing EasyPeasy is rather straightforward. Check out downloads and installation instructions over at easypeasy.com Download Link: EasyPeasy RemixOS (Android Based Build) (Update: RemixOS has been discontinued).The perfect solution for those who want to make an Android PC. Whether it is desktop or laptop, you can run this Android-based OS from USB or direct from PC hard disk. Instead of installing Remix OS direct on PC, you can boot from USB; there is an .exe file available to convert USB that can load Remix OS later. Remix OS is not limiting you to doing the PC activities; you can still browse the web, office applications, prepare presentations, Taskbar, File manager, etc. With Remix OS, you can enjoy all the Android Apps and wonderful games on your Desktop or Laptop PC. Download Link: RemixOS for PC Jolicloud Update: Jolicloud OS discontinued. Do you have a small memory low-speed netbook? Then Jolicloud is the best operating system for you. It is a Linux based operating system that is currently in development and Pre-Final testing. This Operating system is built upon Debian and Ubuntu 9.10 but is tweaked to be more suitable for computers that have weaker specifications regarding disk storage, memory, and screen size, like netbook computers. Jolicloud relies heavily on Chromium-based packages for running web-based applications. For Windows-only products it uses Wine. Download Link: Jolicloud Website There are many great operating systems worth trying out. I have only highlighted a few of them worth checking out, but there’s a lot more beneath the surface if you’re willing to dig around. If you want to try any of these OS without altering your current PC setup, please check our article to try a new operating system without harming my computer? No matter how high-speed your processor, the latest motherboard, or the most recent operating system you get or the best brand name, your Windows PC performance may degrade day by day. These fast operating system for the laptop can improve the speed and work fats with even low resource laptops. Source
  2. Hi all, I am in need of a good laptop, my budget is around 600-700 EUR (Prefer to spend 600), and the best deal I can find is this laptop: Acer A315-53G-551Y https://www.amazon.it/gp/product/B07FWBPJM4/ref=ox_sc_act_title_1?smid=A11IL2PNWYJU7H&psc=1 At time of posting, 610 EUR. Yes, I know that the screen is HD not FHD, but my budget is limited. I will use the computer for internet browsing, watching videos, playing games like AOE, and some light PS work. Is the graphics card able to handle PS or should I look at an Intel HD 520-620? I like NVidia but I am uncertain if this particular card is powerful enough. (It does say 2GB dedicated though). Any thoughts? I need to purchase a laptop very soon. Thanks in advance all! .
  3. As smartphones transitioned to becoming all-touchscreen faces, these newer keyboard-free designs were still considered smartphones. But remove the keyboard from a Windows laptop and you strip its identity, leaving you with a whole other class of device: The tablet. Indeed, the term "2-in-1" for a laptop with a detachable screen is a construct to accommodate iPad-inspired notions of what a laptop should be from a company that argued there really wasn't a standalone tablet category. Still, the term is particularly paradoxical. Microsoft did the most to popularize keyboards as integral parts of tablets, yet those products (like the Surface Pro), with nearly identical functionality, are not considered "2-in-1s" even when the keyboard covers are in the box. In any case, the convention highlights the historically strong association of laptops with keyboards. At the launch of the BlackBerry Key2, TCL Mobile justified the continued importance of keyboards on phones were by praising their primacy on laptops. As I argued in my last column, it's not an apples-to-apples comparison. Despite that, some momentum in the great keyboard debate has begun to flow the other way -- from smartphone to laptop. After all, some of the same justifications for keyboard elimination apply -- more flexibility, larger display area, fewer moving parts, and a thinner profile. Already, the attack on the bezel has already convinced a few laptop makers to relocate their cameras although convertible momentum remains strong. Still, there have been experiments. The first Surfaces, for example, said as much about the optional nature of a keyboard for a laptop as it did about the value it brings to a tablet. Microsoft even teased the possibility of a range of purpose-built covers such as a music mixing design. In 2016, Lenovo experimented with a flat, outlined keyboard area that doubled as a stylus drawing area on its Yoga Book clamshell devices for Android and Windows. To be sure, typing on those devices entailed a learning curve, and Lenovo plans for a Chromebook version never bore fruit. Still, when I wrote about the Yoga Books, I found them to be the first convertibles that could compete with slates as tablet form factors. Asus' "Project Precog" announcement at Computex -- a clamshell that replaces the input half with another display -- recalls an earlier effort by Acer with its first Iconia device in 2010. Indeed, even Apple's oft-maligned touch bar can be seen as clearing some runway for "bifold tablets." Once, the idea that Apple would remove the MacBook's keyboard was the stuff of Onion parodies. But the company, which has done more than any other to acclimate us to typing on glass, has filed a patent for a way to minimize reflection on the keyboard-area portion of a laptop that might lack one. Source
  4. With Yandex browser Your laptop will work longer The battery is always discharged inappropriately. Only enjoy the movie or find an interesting article — have to look for an outlet or turn off the notebook. Now it will happen less frequently if You use Yandex browser which has received a power-saving mode. We tested energy saving and compared it with normal mode Yandex browser, and other browsers (Edge, Chrome, Opera and Firefox). For this purpose we used a Dell Latitude 6330 with the operating system Windows 10. A special program simulated the operation of the Internet: open and scrolling, switching tabs. Our results: iXBT.com repeated this test using Asus ZenBook Flip S UX370UA and got the same result: New Yandex browser is the most energy-efficient browser on the market of the popular browsers. In the power saving mode Yandex browser: - reduces the activity of the background tabs; - always use the graphics card for video playback; - reduces the frequency of rendering the page; - disable animation in the interface elements browser, if she spends a lot of CPU resources; - disables the background animation on the new tab; - performs other functions to optimize power consumption. Energy saving works in the current version of Yandex browser (18.4.1.871). Energy saving starts automatically when you disconnect the laptop from the power source, but you can change this in the settings. Saving energy does not affect the level of comfort when browsing the Internet. Sources: https://browser.yandex.ru/blog/battery-saver/ https://www.ixbt.com/portopc/battery-life-browsers-test-part-1.html https://github.com/oneumyvakin/browser-efficiency-test-binaries
  5. There is a lot of distrust surrounding the Intel brand at the moment largely due to a sequence of events which included a slow disclosure of a serious security flaw (which appears to be getting worse), a secret early disclosure of this flaw to China (which has technical ties to North Korea), related patch problems, their CEO apparently fleeing Intel stock. This damaged trust and raised the question of why anyone would want to invest in a company, for product or stock, that the firm’s own CEO didn’t think was a good investment and this comes on top of the insider trading concerns raised by the activity. In the meantime, AMD released their strongest set of processors in their history, generally equal to or better than Intel’s offerings, and providing unique values in areas like single socket servers. Against that launch Dell, HP, and Lenovo brought out new products. However, it is interesting to note, that of the 3 HP was by far the most aggressive releasing entire lines of offerings. Let’s talk about why this could play particularly well for HP. The Importance of a Line When looking at what could become an industry pivot—Intel is struggling at the moment, buyers like to see a solid commitment on competing technology rather than tentative moves. If they are going to invest in the pivot early or take advantage of point price incentives, they like to see the vendor they are using is fully in. While single product targeted sales can be very powerful, as Apple has repeatedly showcased, that approach comes with a massive marketing requirement which only Apple, and occasionally Samsung, have been willing to step up to. And even then, it has rarely worked in the commercial space generally being more effective with consumer offerings. These new AMD-based lines are commercial offerings. Thus, releasing lines for both desktop and mobile use better fit within the traditional PC OEM’s product model and should perform better than the single or dual product offerings of HP’s competitors. HP Stepping Ahead of Their Competitors HP stepped ahead of their competitors to release 4 new notebooks and a whopping 5 new desktop systems with this launch. Standing out from the group were the HP EliteBook 735 G5 with a 13.3-inch screen which is arguably the most compelling AMD based laptop ever produced and more than comparable to its Intel counterpart and the small form factor HP EliteDesk 705 Mini G4 which provides a near perfect blend of size and performance for most desktop implementations. Across the board, the products are both well-priced and have unusually attractive designs easily equaling their Intel based counterparts but priced so that, effectively, the user is getting discrete Vega graphics for free. Given how increasingly applications are using GPU compute over CPU compute this not only provides an initial performance advantage but should allow these products to remain in service longer, further lowering the total cost of ownership for an AMD-based system. One Life The attractive designs surrounding both desktop and laptop lines flow out of HP’s unique One Life strategy, which speaks to the fact that users aren’t either employees or consumers, they are both. This means, and this has proven particularly true of Millennials, that users want tools they can be proud of. Surveys have highlighted that potential employees will favor companies that give them better tools. This learning has driving IT buyers to allow for more attractive offerings and speaks to why HP is outgrowing their competitors of late. They are simply more aggressively providing the tools that users want and IT buyers are increasingly driven by those user wants (something many of us have been tracking for over a decade). Security Given Intel’s weakness surrounds some unfortunate security decisions made by that company, HP’s security first strategy appears to also be resonating. Surrounding their offerings is a unique set of security tools that provide self-healing for BIOS and Firmware, assures that malware can’t shut down critical services, helps the user avoid contaminated web sites, provides multi-factor authentication, and even has a surprisingly unique privacy camera option to prevent spying. One other feature I’m surprised is unique to HP is an integrated optional electronic privacy screen. I think every laptop should have one of these as it prevents the person sitting next to you on a plane, or other public space, from seeing what you are working on. These things should have been a requirement years ago but, currently, only HP is offering them broadly. Wrapping Up: HP Steps Up Markets are often defined by companies that step up to a challenge and—against the current Intel crowd—only HP is fully stepping up to the opportunities represented by AMD alternative PCs. With two strong PC lines that are both attractive and well-secured they have taken the unusual path to being what is likely the safest product heaven for business PC buyers. I expect the market will reward their risk given the growing concerns surrounding Intel. There is an old saying “go big or go home” apparently HP is following it with their new AMD lines which are helping define HP as the PC company to beat this decade. Source
  6. One of my friends brought a Lenovo laptop, Lenovo ThinkPad E41-15 yesterday to my attention requiring to install windows 7 in it. I did that and went to lenovo support for drivers. The strange thing is I can install all the drivers successfully but windows can't verify their their digital signature. Come on microsoft, those are OEM drivers! Here what I have tried so far- I verified MD5, SHA-1 and SHA-256 of the driver files with the hashes given on the download page. They all are intact. Tried installing the drivers by disabling the driver signature verification. No problem in that case - everything works just fine but only for the session. After you restart, driver signature verification fails and system switches to generic VGA driver instead of Radeon R4. Tried force install the driver but it shows signature verification error (the driver is installed BTW, it is just windows is not allowing to use it). I don't know what is there left to try.
  7. Hello fellas I've got an Acer one 10 s1002 2in1 convertible tab/laptop to format. I need to format it because the device is severely infected. So the device came with windows 10 home 32-bit pre-installed. It has a 32 GB eMMC (no HDD). Acer has driver support only for win 10 and win 8.1. So I have tried formatting with both but couldn't succeed. During boot I entered the BIOS and changed the boot order adding my bootable media in first place to boot from there. But after I exit the BIOS saving the changes that I have made, it boots from the internal eMMC, not from my bootable media. I also tried pressing F8 during restart to get to the boot menu and directly selected my bootable media but instead of booting from my media, it takes me to the BIOS. I also tried disabling the secure boot but no use. The unbelievable thing is I have disabled all other boot orders in BIOS including the internal eMMC and only allowed the one in order #1 which is my bootable device but yet after restart it boots from the internal eMMC completely ignoring the BIOS settings. So what do I do?
  8. Jime234

    Laptop Advice Needed

    Hey there , Currently I have a T410 Thinkpad (1st Gen i5 M560 @ 2.67GHz ,4GB RAM, Sam 750 Evo 120 GB SSD @240MBPS , 1440x900 Reso)( Refurbished ) But its So darn heavy ! It has that extra big battery butt too, makes it even more heavier.. So guys, please help me pick a comparatively new and light laptop model. Hopefully a Thinkpad. Thanks a lot!!
  9. A year-long study revealed on Friday that laptop manufacturers seriously overstate their claims on a device's battery life, sometimes by hours, not minutes. Which?, a website that provides reviews and expert advice on a various of topics, including hardware and technology, carried out the tests during the past year as part of their normal review process. Experts said they tested 8 Acer, 3 Apple, 8 Asus, 10 Dell, 12 HP, 20 Lenovo, and 6 Toshiba laptops. Each device went through two different tests three times. The first test included watching movies until the battery life died out, while the second test involved surfing the Internet via WiFi, also until the battery gave way. Results of these tests, portrayed in the infographic below, show that all but one laptop vendor overstated the average battery life for their devices. Battery life test results Besides Apple's MacBooks, who sometimes lasted longer than what Apple estimated, all laptops tested poorly. "The most optimistic laptop manufacturers are overstating their battery life by 50% or more, leaving you searching for the power cable twice as often as you’d expect," said Which?'s Jack Turner. For two decades, users have been whining about laptops not living up to vendor claims. This test shows how inaccurate those claims are to begin with. The vendors who replied to Which?'s request for comment said the Which? test result differed from their estimations because they used different tests to assess the initial presumed battery life. Source
  10. HP Recalls More Laptop Batteries After Finding They Could Catch Fire HP expands recall program originally started in June In an announcement today, the company says that batteries that are shipped with laptops such as HP, Compaq, HP ProBook, HP ENVY, Compaq Presario, and HP Pavilion Notebook Computers sold worldwide from March 2013 through October 2016 could be affected by an issue causing them to overheat, posing a fire and burn hazard. Additionally, batteries for these models that are sold separately could also be affected, HP says. The company recommends customers to recheck their batteries even if they were originally told they were safe. “Because these batteries pose a fire and burn hazard, it is essential to recheck your battery, even if you did so previously and were informed that it was not affected. However, if you have already received a replacement battery, you are not affected by this expansion,” HP says. If you’re trying to determine whether a specific battery is affected or not, the company also has a validation program that does the whole thing automatically, but you can also check it manually. Stop using defective batteries What’s important to note, however, is that HP does not recall laptops, but batteries, so the aforementioned models are not defective, but only come with a faulty battery that can pose a risk of fire when overheating. “HP is not recalling its notebook computers. HP has announced, in cooperation with various government regulatory agencies, a worldwide voluntary safety recall and replacement program for certain notebook computer batteries,” the company stated. Customers who have already replaced their batteries as part of the original recall program do not need to exchange them again, as this expansion does not affect new units. It goes without saying that should you have one of the laptops suspected to come with a defective battery, you are strongly recommended to stop using it as soon as possible and contact HP for a replacement. You can also use the laptop without a battery, but connected to an external power source until you get the new battery. Source
  11. Meet The GPD Pocket, A 7-inch Ubuntu Laptop The GPD Pocket Do you have small hands? Are you a Borrower? Do you consider 10-inch netbooks to be monstrous? If so, the GPD Pocket may be right up your (very miniature) street. GPD Pocket, 7″ Laptop The GPD Pocket is a 7-inch laptop that’s small enough to slip in to a pocket — and it will apparently be available in two versions: with Windows 10, and Ubuntu 16.04 LTS. As reported on Liliputing, GPD (the company who makes the device) is currently only showing the device off a few fancy renders and photos with a prototype unit. But GPD has form for releasing other (similar) devices, like the GPD Win, and Android gaming portables, so although a novelty this latest device is unlikely to be outright vapourware. The GPD Pocket touts some impressive specifications for the size, including a quad-core Intel Atom x7-Z8700 processor (the same one used in the Microsoft Surface 3), 4GB RAM and a high-res IPS touch display: 7-inch IPS touch display Intel Atom x7-Z8700 (quad-core @ 1.6GHz) 4GB of RAM 128GB of storage 1x USB Type-C 1x USB 3.0 Mini HDMI Out MicroSD Card slot Courage jack (“headphone port”) 7000 mAh battery The overall dimensions of the device mean you won’t be able to hammer away on a full-sized keyboard, but the chiclet style QWERTY one included (plus a ThinkPad-like mouse nub as there’s no room for a touchpad) looks perfectly serviceable for tweets, forum posts and some basic web browsing. Since I doubt anyone would be using this device as their primary device issues to do with the keyboard size, or lack of palm rest, etc, are unlikely to be primary considerations. No, the GPD Pocket is, as the name suggests, intended as the sort of device you literally slide into your pocket as you head out the door. The “bad” news is that, like everything these days, GPD plan to crowdfund the GPD Pocket over on Indiegogo sometime in February. Currently there’s no indication of pricing or release date, but providing it’s not too weighted at the high-end it could make a nice midrange alternative to Linux hobbyists. Source
  12. Recycling Is A Good Thing Just when you think you’ve seen it all, someone does something that is simply too good not to share. This is about laptop computers and strange-but-true things people do with them. I’m all for recycling, so I thought some of these examples would definitely be interesting. and may just have to check them out. Who needs a Stress Ball when you have old technology at your disposal? Kung Fu Training So you want to progress through the ranks and get the next color belt to add to your collection. You have no blocks of wood or bricks to use. No problem at all– grab an old laptop and have a friend hold it. Give it a few good, swift kicks until you totally destroy it or break your foot or toes in the process. I am going to pass on this one. I envision myself in a cast and with crutches. Killing Pesky Varmints An old laptop is great to have on hand when you can’t find the fly swatter. If the screen still works, you can turn it on to lure the pesky bugs to the bright light. Once they are there, quickly close the lid and you now have trapped the little varmints, and made your keyboard pretty disgusting in the process. Nut Cracker It is the Holidays and you will be entertaining guests. It figures you can’t find the nutcracker or a hammer. Trusty old laptops were made tough, no worries. Grab that laptop, place it on a hard surface insert a walnut or a few (in the shell) with the pointed end up. Drop the lid on them until the nut cracks along its axis and BAM, you have shelled walnuts. Messy but it works in a pinch. Heating Leftovers Laptops are notorious for running hot if left on all the time and if they are older and the vents are blocked. Why not see if you can fry an egg or heat up leftovers. I speak from experience, before I knew the right-and-wrongs of owning a laptop, I enjoyed holding it on my lap in the winter and warming up my thighs. Why not heat up leftovers and put it to good use? Laptop Stool When I was younger in Girl Scouts we took old metal cans and decorated them and added a rope handle which was attached and called it a sit-upon. You could put things inside it and carry it around and you instantly had a chair to sit on. That old laptop (or the one you currently use) can also be used in the event you need to rest your legs a bit. Open it up and slowly lower yourself onto it. You will definitely capture people’s interest when they see you sitting on a laptop. Note: I cannot emphasize enough to slowly squat onto it as it may leave ridge marks on your backside. If you have opted to eat that extra doughnut understand the additional weight may find you sitting on the floor and not the laptop. More Ideas I was feeling creative so here are some other ideas. Feel free to add to this list: Scraping your windshield of ice when you can’t find the ice scraper. The thought of this makes me cringe, but it sure is funny. Make a bird house or small dog house by opening the laptop up and tenting it. I am pretty sure my Golden Retrievers and Collies would not fit under any of my laptops. Dustpan when you can’t find one and are in a hurry to get the dirt picked up The best thing you could do though, is to peruse old Dave’s Computer Tips (DCT) articles and empower yourself to fix it. You can make the laptop RUN again! Maybe you just want to use it as a spare. Maybe you want to see what the inside looks like. To get it to run well again, blow the dust off, do some software cleanup, clean the internal components, or format it. Article source
  13. Quick And Simple Way To Prevent Laptop Power Cords Fraying I come across a lot of laptops with frayed power cords that are expensive to replace. Prevention is better than cure. Here's how to prevent the problem happening in the first place. As a MacBook owner, I've grown accustom to the fact that it won't be long before the cable on the power cord starts to fray, and once that's happened, it's only a matter of time before I'm giving Apple another $80 for a charger. Well, prevention is better than cure, so I've been taking steps to prevent the problem from happening, rather than dealing with it once it's started. And don't worry, this isn't specific to the MacBook - this will work on all brands of laptop power cords. This also works for smartphone or laptop power cables. I know, because I've tested this on the weakest of the weak charger cables - the Apple Lightning cable. I've been experimenting with a number of techniques over the past few months, and the best one I've come up with needs only two things: a pack of Sugru and a couple of small cable ties. Not heard of Sugru? It's a mouldable adhesive made of polysiloxane (silicone caulk) and talc. It sets into a durable, waterproof silicone rubber in about 24 hours, and it's stable between -50°C (-58°F) to +180°C (356°F). Here's what I do: Step - 1: Here's the laptop charger, the Sugru, the cable ties, and a pair of snips for cutting the cable ties. Step - 2: Next, I put a plastic tie at both ends of the cable (because I'm giving the Sugru treatment to both the connector end and the power brick end). It doesn't have to be super-tight, but you do need to be able to snip the tail off the cable tie as close to the lock as possible. The purpose of the cable tie is to give the Sugru something to grip onto. It does work without this, but I've found that this gives a more durable fix. Step - 3: Here's the Sugru. I'm using black because that's what I had. It does make a bit of a mess, so if you want to be tidy I suggest using white. Step - 4: Now you just start molding it over the cable and the existing strain relief. If you're thinking of doing this on a new power cord, I actually suggest you wait a few months because you'll find that the cable usually takes on a particular bend or twist, and then you can mold the Sugru to follow these bends. This, believe it or not, makes the fix stronger. And yes, I know my molding is messy. I never was any good at crafts. Step - 5: See how the Surgu molding at the connector end has a bend in it? I'm following what seems to be the way the cable wants to bend. Source
  14. You can partly credit the classic clamshell PC design to him. The PC industry has lost one of its quieter but more influential leaders: John Ellenby, the CEO of Grid Systems, died earlier this month at the age of 75 of yet to be determined causes. His company (particularly late designer William Moggridge) is widely credited with making the first commercially successful clamshell laptop, the Compass. The 1982-era machine was thick, had a tiny screen and was wildly expensive for the time at $8,150. However, it was a hit among companies and governments -- it was a relatively slick way of bringing computing (and even basic digital communication) with you at a time when the alternatives were barely-luggable desktops like the Kaypro or Osborne 1. Ellenby himself was influential beyond that one computer. Before Grid, he also worked at Xerox's groundbreaking Palo Alto Research Center. He took the Alto, the template for what would become Apple's Lisa and Mac desktops, and developed a sequel (the Alto II) that was much more commercially viable. He also founded an early tablet company, Agilis, and helped get the ball rolling on both augmented reality and navigation through another firm, GeoVector. You could argue that some of Ellenby's creations were premature. Laptops didn't really hit the mainstream until roughly a decade later through systems like Apple's PowerBook and IBM's ThinkPad, and it would be well over two decades before his other companies' fields really swung into high gear. With that said, there's no denying that he was forward thinking and had a knack for translating ambitious ideas to devices you could buy. He'll be missed. Source: New York Times Article source
  15. How to Play Pokémon Go On Your PC/Laptop Catch Pokemon with Pokemon Go on your PC/Laptop without ever leaving your desk, but it’s a little bit messy. If you are not living under a rock, you must have heard about Nintendo and Niantic’s gaming sensation, Pokémon GO, which is based on augmented reality. Pokémon GO requires gamers to walk around their neighborhood with the smartphones to capture Pokémon nearby. For now, Nintendo has not released this game for Windows devices. However, you can play this game on your Windows 10 PC using Android emulator such as Bluestacks. Since you can’t carry your Windows PC, you can use Fake GPS to fool the Pokemon Go on Windows PC/laptop that you are actually moving around. Even if you have Android smartphone or iOS device, if you want to collect all the Pokémons without leaving your desk, then the following may be your solution. Step by step guide to install Pokemon Go on your PC or Laptop Files to Download Download and Install BlueStacks App on your computer. The installation is simple and you simply need to follow the on-screen instructions to complete the setup. Once the program is installed, don’t launch it yet. We will have to download a few more files before we get started. Download KingRoot APK and LuckyPatcher APK. These apps will be used to gain Root access on BlueStacks player and then install our app as a system app. Download Mock Locations (fake GPS path) and Developer Options Tool APK. Finally, download the latest version of Pokémon GO. You can save all these files anywhere, however, Mock Locations should be saved in the Documents folder on your PC. Getting BlueStacks Player Ready for Pokémon GO. Open BlueStacks Player and wait for it to initialize. Once that’s done, navigate to the Android tab and from the left sidebar click on APK to install KingRoot APK. Once the app is installed, you will find it in the apps section. Run it once to gain root access on the BlueStacks Player. In the same way, install the Lucky Patcher app and run it. When prompted for Root Permissions, accept and close the app. Now to install the Location Spoofer app, open Lucky Patcher you just installed and then click Rebuild & Install at the bottom. Here, navigate to SD Card –> Windows –> Documents and click on the Mock Locations app to install it. Make sure you select Install as a System App when asked by Lucky Patcher. Install Developer Options Tool APK normally and turn the option off, if you see it turned on. Also, open up the Settings menu in BlueStacks and under location settings, make sure High Accuracy is selected. Finally, install the Pokémon GO app to start playing the game. Playing the Game Finally, when everything is set, open Lucky Patcher and launch the Mock Locations app. After the app is launched, click and hold on two locations on the map (the area which you want to explore in Pokémon GO), which then get selected. Next, click on the Play button. You will be asked to select a speed and here, give 4 kmph with 1 hour as a constraint modifier and start the path. Your Android device will now get your device location from the app which is the key ingredient to playing the Pokémon GO game. Now launch the Pokémon GO game, log in using your Google account and start playing the game. The avatar will follow the path you have given in the Mock Location app and you can collect Pokémons, take items from PokéStops and also do gym battles. Please make sure you turn off the AR (Augmented Reality) mode and play the game in a virtual environment. Conclusion So, that was all folks, you can now play Pokémon GO on your PC. Do ensure you don’t do big jumps on the map or you might get banned for location spoofing. Also, turn off the location of Windows PC if you are getting location errors while playing the game. But if you have a big park in your surrounding and it’s safe out there, I would insist you try the game there. It’s a lot more fun that way. Source
  16. How To Install Linux On An Android Device Unleash the full potential of your Android device by installing Linux OS on it Installing Linux on Your device involve four steps which are -installing BusyBox, installing Terminal Emulator, placing required files in SD card and finally running the Linux OS. Step 1: Installing the BusyBox libraries Before you start you’ll need: Android Device 4 GB SD card(or more) Root Access Full Backup of your data(for recovery if something goes wrong) You can get BusyBox from Play Store by clicking here. All you have to do is to download and install it. Step 2: Installing a Terminal You’ll need a terminal emulator for using your Linux OS. Installing this is recommended. Step 3:Putting required files in place Connect your device to your PC (remember to enable the USB mount), and then download this file and this file. Create a new folder in your SD card and name it Ubuntu(or whatever you like) and then extract these files in the folder. Step 4: You’re almost ready Go back to the Terminal app and write “su’ again. Then write “cd /mnt/sdcard”. To confirm everything is working try to write “ls” and see if you can recognize your folders (you might find the ubuntu folder as well). To start our ubuntu write “cd /ubuntu” and then “sh ubuntu.sh”. This will execute many procedures which are trying to set your system. It will request to enter a resolution. Use number x number format to express it. For example: 600×400 is the proper format. For the best appearance and performance I suggest 800×480. Now everything is done. The ubuntu system is running , however we can’t see it. To see it , we must use a VNC app. We can download it from Play Store. Thats it! However if you feel any difficulty in any of the steps or require further information, you may drop your query in the comments. Source
  17. Currently confirmed: Lenovo and HP laptops UEFI zero-day affects Lenovo, HP laptops Dmytro Oleksiuk, an independent security researcher, has released details about an unpatched UEFI firmware zero-day that's currently confirmed to affect some versions of Lenovo and HP laptops. Oleksiuk initially discovered the issue affecting Lenovo ThinkPad laptops but said that, in theory, many other OEMs may be affected as well. One of Oleksiuk's followers later learned that some HP laptops were also affected by the same problem. UEFI zero-day can alter firmware code, disable Windows security measures The issue resides in the source code of System Management Mode (SMM) module that's part of various UEFI firmware packages. The researcher said he created an exploit that leverages this vulnerable code to disable UEFI write protections and alter the device's firmware. Additionally, he could also disable the Secure Boot option and even Windows 10 built-in security settings such as Device Guard or credential Guard. The exploit code, named ThinkPwn, works on the level of the UEFI shell, that can be accessed at boot time. Oleksiuk says that, in theory, the code could be modified to run at the OS level, something that malware authors could incorporate inside their malicious code. Vulnerability resides in firmware IBV code In a statement on its website, Lenovo said that the issue doesn't reside in the UEFI code added by its engineers but on top of the IBV code provided by Intel. IBV stands for Independent BIOS Vendor and is a package of ready-made code that's integrated inside BIOS and UEFI (an evolution on BIOS firmware code) to ensure inter-compatibility with other device components. The issue appears to be an old one, which Intel engineers have apparently fixed in 2014, but has made its way in the UEFI distributions of various OEMs. "Importantly, because Lenovo did not develop the vulnerable SMM code and is still in the process of determining the identity of the original author, it does not know its originally intended purpose," Lenovo explains. "But, as part of the ongoing investigation, Lenovo is engaging all of its IBVs as well as Intel to identify or rule out any additional instances of the vulnerability's presence in the BIOS provided to Lenovo by other IBVs, as well as the original purpose of the vulnerable code." Oleksiuk revealed the exploit on his blog, after informing Lenovo of the issue, and has also published proof-of-concept code on GitHub. There's currently no fix available for this issue, neither from Lenovo or HP. Article source
  18. 5 Reasons to Install Linux on Your Laptop You can choose something other than MacOS or Windows 10 when it comes to an operating system for your computer. If you’re prepared to be a little more adventurous, Linux has plenty of great features that will save you time and make working a little less dull. The best part is that Live Installations allow you to try out the software before you wipe your entire hard drive. Linux comes in various flavors called distros (distributions) and it’s up to you to determine which one you opt for. Ubuntu is by far the most popular desktop distro and is a good place to start for beginners, so we’ve focused on that one here, but once you’ve grasped the basics feel free to explore the pros and cons of some others out there. 1) You don’t have to ditch Windows (or OS X) You don’t need to wave goodbye to Windows (or macOS) to give Linux a try—Ubuntu can run very happily on a dual-boot system or even straight from a USB drive. Follow the instructions provided on the Ubuntu website to get up and running: you need a blank DVD or a USB stick at least 2GB in size, and the setup process is very straightforward. Of course the benefit of using a USB drive or DVD is that your existing OS remains untouched. On the other hand, performance and responsiveness won’t be quite as good, and you’re limited in terms of some system operations (to install apps and save files permanently, you need to create a USB stick with the persistence option enabled). 2) It’s simple to set up In the past, installing software and popular codecs on Linux was a pain for the less tech-savvy, but that’s no longer the case. Ubuntu, for example, prompts you to download codecs for commonly used audio and video formats with a single check box, and on most modern systems can instantly identify available wifi networks and connect up to them. While it’s true that seasoned Windows and Mac OS X users may find themselves occasionally perplexed by how to do something, that’s to be expected when switching between OSes of any flavor, and there’s always plenty of support available on the web. Most users are going to be up and running and happily enjoying Linux in a few minutes. 3) Everything you need is included Ubuntu comes complete with Firefox for your web browsing, Thunderbird for your emailing, and LibreOffice for making documents, spreadsheets, and presentations. Other free and open source applications like GIMP (image editing), Evolution (the Linux version of Outlook), and Kodi (home theater and media management) are only a few clicks away. Other well-known apps with Linux versions include Google Chrome, Plex, VLC Player, Slack, Dropbox, Skype, and Spotify. And don’t forget all those programs that run in a browser now, from the online versions of Microsoft Office to Google Play Music. If there’s a Windows program you really need to bring along with you, then give Wine a try. 4) It’s very secure There’s a relatively small number of people using Linux as a desktop OS, which means a relatively small number of hackers looking to exploit it, but besides the raw numbers, Linux is an incredibly secure OS to run. It’s designed from the ground up to be secure, from the default privileges given to users to the way that Linux code is developed and maintained. Linux can crash and be exposed like any other operating system out there, but the fact that few pieces of malware will run on the platform and any damage they do will be more limited means it’s a solid choice for the security-conscious. It’s also less likely to be weighed down by bloat and creeping system sluggishness than its more well-known rivals. 5) You’re supporting open source and free software Linux is more than an operating system, it’s a philosophy. Not only is the software free (like Google Chrome, for example) but the source code is open and free (unlike Google Chrome, for example). You use the OS and the bundled software completely free of charge, but also view the code and make changes to it, should you be so inclined. When you use Linux you’re supporting a global community of millions committed to making software free to install and use. That philosophy has helped drive innovation on the web and in Windows and OS X, as well as Linux itself, and if you want to dive further into software development, Linux is a great place to get started. Source
  19. Software makers like Microsoft put a lot of effort into ensuring that the operating system and application updates they deliver to your system are secure, so that hackers can’t hijack updates to get into your computer. But it turns out that PC hardware makers are not so careful. An investigation conducted by Duo Security into the software updaters of five of the most popular PC manufacturers—HP, Dell, Acer, Lenovo, and Asus—found that all had serious security problems that would allow attackers to hijack the update process and install malicious code on victim machines. Researchers at Duo Security’s Duo Labs found that all five vendors, known as OEMs or Original Equipment Manufacturers, shipped computers with pre-installed updaters that had at least one high-risk vulnerability that would give an attacker remote-code execution abilities—the ability to remotely run whatever malicious code they want on a system—and gain complete control of the system. The skill required to exploit the vulnerabilities was minimal, the researchers said in a report they’re releasing (.pdf) about their findings. All of the sexy exploit mitigations, desktop firewalls, and safe browsing enhancements can't protect you when they're crippled with pre-installed software. The OEM vendors all shared similar security flaws in varying degrees, such as failure to deliver updates over a secured HTTPS channel or failure to sign update files or validate them. These problems make it possible for attackers to conduct a man-in-the-middle attack to intercept update files as they’re transmitted to computers and replace them with malicious ones. The malicious files can get installed regardless of other protections a machine might have because updaters operate with the highest level of trust and privilege on machines. “It doesn’t take much for one piece of software to negate the effectiveness of many, if not all defenses,” they write in their report. “All of the sexy exploit mitigations, desktop firewalls, and safe browsing enhancements can’t protect you when an OEM vendor cripples them with pre-installed software.” Many of the vendors also failed to digitally sign their manifests—lists of files the updater should pull down from a server and install. Attackers can intercept unsigned manifests if they’re transmitted unsecurely; then they can either delete important update files from the manifest, preventing computer users from getting updates they need, or add malicious files to the list. The latter would be effective in cases where vendors didn’t sign their update files, allowing attackers to slip in their own unsigned files. Some manifests include inline commands that are required to execute update files, but an attacker could simply add inline commands to install and launch his malicious files. In the case of HP, the researchers found they could in fact execute any administrative-level command on a system through the inline commands in its manifest, not just commands to install update files. An attacker could add a new user account to the system, for example, that gives him ongoing access to the system. “There are myriad ways to abuse command-injection bugs,” says Darren Kemp, a researcher with Duo Security. “Pretty much anything an administrator can do, you could do [through the inline commands in the manifest].” The five vendors they examined are just a sampling, but the researchers noted in their report that based on what they found, it’s unlikely that other vendors are any more secure. However, they suspect that Apple’s updater might be more locked down because the company is known for taking security seriously and for not installing third-party bloatware on its machines. “This is one of the cases where that Apple walled garden works,” says Kemp. “You get [only] Apple software … so their ability to control that tightly is in this case a befit to them.” PC makers install update tools on computers to deliver firmware updates—firmware is the software on a computer that boots up the machine and loads the operating system—as well as driver updates and updates to so-called bloatware that comes pre-installed on machines when consumers buy them. Bloatware can be anything from 30-day trial versions of third-party software, to special utilities the OEM offers to add functionality to your machine, to adware that sends ads to your browser as you surf the web. In some cases, the updaters direct computers to the OEM’s site to download updates, but in other cases they send computers to the third-party software maker’s site to get an update. The researchers found 12 vulnerabilities across the five vendors, and every vendor had at least one high-risk vulnerability in their updater that would allow remote-code execution. In some cases, vendors installed more than one updater on machines, for different purposes, and the security of each updater was inconsistent. Of the five OEMs, Dell’s updaters were the most secure—although the company doesn’t sign its manifests, it sends manifests as well as the update files themselves via secured HTTPS channels to thwart simple man-in-the-middle attacks. The Dell Update also validates that the files are signed and that the certificate used to sign them is valid. Although the researchers found problems with the latest version of another updater Dell uses for Dell Foundation Services, the company apparently discovered these vulnerabilities independently and patched them before they could report them. Hewlett-Packard also scored fairly well. The company transmitted updates over HTTPS and also validated updates. But it failed to sign its manifests. And in the case of one downloader component, although HP included a process for verifying signatures of files, it failed to ensure that the verification was always required. An attacker could, for example, download an unsigned malicious file to a computer and prompt the user to run the file. And since HP had a redirect problem that would allow an attacker to redirect a user’s machine to a malicious URL masquerading as a legitimate HP download URL, this would have made it easy for an attacker to download malicious code and trick the user into launching it. Lenovo was a mixed bag when it came to security. It had two updaters the researchers examined—Lenovo Solutions Center and UpdateAgent. The first was one of the best updaters the researchers examined. But the second was one of the worst. Both manifests and update files got transmitted in the clear and the updater didn’t validate the signature of files. Acer tried to do the right thing by signing update files, but failed to specify that the updater should verify signatures, essentially making the signing useless. It also failed to sign its manifests, allowing an attacker to add malicious unsigned files to the manifests. As bad as Acer was, however, Asus was worse. Its updater was so bad the researchers called it “remote code execution as a service”—essentially a built-in service for hackers to do remote-code execution. Asus transmits unsigned manifests over HTTP instead of HTTPS. And although the manifest file was encrypted, it was encrypted with an algorithm known to be broken, and the key to unlock the file was an MD5 hash of the words “Asus Live Update.” As a result, attackers could easily intercept and unlock the list to make changes. Asus update files weren’t signed, either, and they were also transmitted via HTTP. Across the board, the researchers found that if the vendors had simply used HTTPS and certificate signing in a consistent and competent manner, they would have “significantly raised the bar to exploitation.” As varied as their security stances were, the vendors also varied in how easy they made it to report security problems. While Lenovo, HP and Dell, all had direct channels for reporting security problems with their software, Acer and Asus did not, leaving Duo researchers to attempt contact to their customer support lines channels multiple times via email and phone calls before they got a response. How the vendors responded to the researchers also varied. HP has already patched the most egregious vulnerabilities the researchers found. Lenovo addressed its problems by simply removing the vulnerable software from affected systems. Duo reported the problems to the vendors more than four months ago, but Acer and Asus still haven’t indicated when they will fix the problems or if they will. “Asus told us they were going to patch in a month, then they backed off on that after we pointed out that their planned patch was also flawed,” says Steve Manzuik, director of security research at Duo Labs. “And that’s when our communication broke down with them.” Article source
  20. Have you ever thought about taking your powerful computer with yourself to wherever you go? maybe Laptops be the first choice for this job, but we all know that no matter how powerful their hardware be, due to limitations in size, power consumption and above all, cooling, they can't provide the performance of a Desktop PC. so what's the best choice? A science and technology based company located in Iran named "Mazesta" (DFM) has tried to make this idea happen and from professional hardware suppliers for powerful systems in the country, they created a portable system named RenderWay RW. from hardcore gaming to heavy rendering with a portable case. RW covers the new series of powerful systems, products of Mazesta company, built for gaming and heavy and complicated processing. but that's not all! huge processing power is not the only property RW series products, in addition to utilizing the most powerful and newest hardware, they are actually fully portable. it can be firmly said that RW series have no domestic nor foreign equivalent. it's not finished yet, RenderWay RW aren't pre-assembled and don't lack personalization. from Z170 motherboard all the way to X99 platform, the choice is up to you! When it comes to portable systems most of us think about very small form factor motherboards and unprofessional graphic cards, yet none of the things just has been said are true about RenderWay RW case. on the systems based on RenderWay RW, you can use all Nvidia Geforce GTX graphic cards, from GTX 950 to Titan X and also AMD Radeon graphic cards of all models from R7 to R9 and even Fury X, as well as workstation and computational cards like Quadro, Nvidia Tesla and AMD FirePro. two of each models can be used in RenderWay RW case. one of the key features of this system is its personalization capability, choosing the processor and graphic card, case color, case modding including color, logo, other appearance customization, lighting...etc. these give users the ability to have a very powerful and upgradable gaming system without the limitations of normal gaming consoles. In RenderWay RW based systems you can use two graphic cards using SLI with Nvidia cards or CFX with AMD Radeon cards in order to have the best gaming experience and the highest possible level of details. with the aid of different video output ports, you can connect up to 4 monitors with up to 4K resolution. Renderway RW systems also provide WIFI connectivity in addition to cable network adapters, so once you place your system on anyplace you can use wireless connection to connect to the world, from online gaming to web browsing and watching high definition videos. Mazesta company has proved that being portable doesn't mean being limited. despite the fact that RenderWay RW systems can be a great replacement for gaming consoles and gaming Laptops, but it doesn't mean that its users are limited only to gamers. you can use powerful Intel X99 platform with processors from Core i X and K series, as well as Intel's super processors like Xenon E5 V3 and V4 alongside with 2 powerful graphic cards, to create a powerful 3D computational and processing system. so if you are a professional user, from now on you can carry your personal workshop with yourself and use it wherever you desire. such a powerful system can prevent professional users from providing two parallel work place (one at work and one at home). users can only have one of these systems and carry it to work and in the end of the day bring it back home to continue their work. connecting only a few cables definitely takes less than 1 minute. this case is designed in a way that the hardware in it are resistant against problems caused by movements and there is no worries about any possibility of hardware failures due to constant movements of such expensive hardware. Probably you didn't expect such a tiny little system to be more powerful than huge computer cases, it might be interesting to know that the design of RenderWay RW is such a way that in addition to the possibility of installing max 4 Hard Disks or SSDs, you can use water cooling systems with 120 to 240 mm pipes, as well as using the most powerful and updated power supplies in the world. More images: Soft98.ir dfmrendering
  21. Rising security threats + vulnerable laptops = potential data risk disaster. Here’s why you need hardware as well as software security. Laptops are typically among the weakest links in any security chain. Mobile or remote users often access sensitive data on the go at public hot spots that are, to say the least, beyond a company’s secure network perimeter. Internet security risks to which laptop users can be especially vulnerable are growing in frequency, complexity, and sophistication. For example, data theft or loss from stolen or hacked laptops has long been a concern. But data sabotage, in which criminals hack into your system and change data to compromise its integrity, is IT’s “next nightmare,” according to an early 2016 Wired report. Clearly, protecting endpoints, especially laptops, is vital. All too often, however, laptops are protected mostly by software security, such as firewall and anti-virus software. But software security has its limitations. Here’s why software security isn’t enough, and what you can do about it. Security Should be a Top Priority—But it’s Not Security is a constantly moving target, but few IT departments have the resources to do security thoroughly. PC security is something of a thankless job, to boot. Do it right, no one says a word. Do it wrong, you’re on the firing line. Surprisingly, security isn’t always a top factor when IT looks to replace aging PCs, according to IDC. Of the top five considerations cited when making PC brand decisions, security ranked fourth below overall performance (priority no. 1), overall costs (no. 2), and overall specs (no. 3). IT typically adds security to laptops via software such as anti-virus, anti-malware, firewalls, and intrusion detection. They’re all certainly important and should be a part of your overall security strategy. Users Don’t Always Follow the Rules But even the most effective aftermarket security software won’t protect laptops when users don’t follow basic security protocols. Employees who connect to insecure public hot spots, click on unauthorized or questionable email attachments, visit questionable websites, or try to “outsmart” IT by using their own devices or cloud services can make your company more vulnerable to security risks. No surprise, then, that IDC research also shows that the top security risk identified by IT is that employees “underestimate the importance of following security policy.” Why Hardware Security is Important Because of these and other factors, IT should be looking at laptop security more holistically, with an eye toward securing data and devices at the hardware level as well as the software level. This trend is already well underway: IDC estimates that by next year, about 90 percent of enterprise endpoints will include some degree of hardware-based security. Beyond the basic security software installations, IT should seriously consider encrypting the data that employees store and access on laptops. Encryption is essential to protecting that data if the laptop is lost, stolen or hacked. Every mobile device should be protected by strong passwords that are regularly changed. And the data in cloud services should be protected with two-factor verification wherever possible. In addition, the next time you look to replace a laptop, consider enterprise-grade products offering security features built into the hardware or firmware, such as preboot authentication, self-encrypting drives, remote wiping capabilities and a self-healing BIOS. For more on hardware-based security, see “Security Features to Look for in New Laptops.” Ultimately, a patchwork of security measures, coupled with careless mobile users and rising security threats, can be a recipe for disaster. You don’t want to become the next Target (on the hook for $10 million after a data breach), Anthem (cost of data breach: well over $100 million), or Ashley Madison (hit with about $850 million in losses). Article source
  22. If there's one thing Mark "Chris" Sevier loves, it's jerking off. If there's another, it's filing lawsuits. The man who sued Apple because it sold him a computer that allowed him to get addicted to porn is now getting involved in Florida's gay marriage debate by demanding he be allowed to marry that same porn-infested computer. Florida is considering the very serious question of whether it will recognize same-sex marriages performed in other states, and Sevier has filed a motion claiming to represent other minority sexual orientation groups. If gay people "have the right to marry their object of sexual desire, even if they lack corresponding sexual parts," he argues, "then I should have the right to marry my preferred sexual object." Because the gay marriage debate is all about objects and parts, not relationships, families, and the legal benefits that accrue to married couples. Obviously. Unfortunately, Sevier's 24-page filing continues with a description of his personal relationship with his sweetheart—I mean, preferred sexual object: Over time, I began preferring sex with my computer over sex with real women. Naturally, I 'fell in love' with my computer and preferred having sex with it over all other persons or things, as a result of classic conditioning upon orgasm. Sevier, an attorney and music producer, has a history of strange legal entanglements, includingstalking country singer John Rich and suing A&E for firing one of Duck Dynasty's beardos over homophobic remarks in an interview. He was suspended from practicing law in Tennessee in 2011 due to "mental infirmity or illness." Sevier's attempt to marry his MacBook have been squashed for now in Florida. "Chris Sevier has moved to intervene, apparently asserting he wishes to marry his computer," Judge Robert Hinkle wrote on April 24. "Perhaps the motion is satirical. Or perhaps it is only removed from reality. Either way, the motion has no place in this lawsuit." But Sevier isn't done yet. If Florida won't let him get hitched to a computer, maybe another state will. He's currently attempting to intervene in Utah's battle over a state constitutional amendment banning gay marriage. "Those of us whose sexual orientation has been classically conditioned upon orgasm through the straight forward science of dopamine to prefer sex with inanimate objects and animals do not have public support, like the gays, so we are especially vulnerable here," he wrote in a 50 page brief. Source
  23. A leaked video demo reveals the HP Slatebook 14 – an Android-powered laptop with a 14″ 1080p touchscreen. It’s not a hybrid (detachable tablet + keyboard dock) like the Slatebook X2, nor is it a dual-boot device, it’s pure Android. The specs are a bit unclear, but the video is promising a slim and lightweight design. Without the need for a second battery behind the screen like on the Slatebook X2, this new device should be thinner than 20mm. It’s positioned as an affordable device, though so we shouldn’t expect anything too cheap. The body seems to be made of polycarbonate and will likely be available in bright colors. The HP Slatebook 14 features a 1080p screen, but a cheaper version with a lower screen resolution might be available too. It will be powered by Tegra 4 with rumored 2GB RAM and 16GB storage, expandable via a microSD card slot. The Android version is unclear, but it’s rumored to be 4.2 Jelly Bean. There are also three full size USB 2.0 ports, a full-size HDMI port, Wi-Fi and Bluetooth. The connectivity features include a SIM card slot, presumably for HP DataPass. The Slatebook 14 also packs Beats audio speakers. Note that the HP Slatebook 14 isn’t official yet, but with Computex 2014 just around the corner (it starts June 3) it should be announced fairly soon. Until then, check out the video in question: http://<object id="flashObj" width="480" height="270" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,47,0"><param name="movie" value="http://c.brightcove.com/services/viewer/federated_f9?isVid=1&isUI=1" /><param name="bgcolor" value="#FFFFFF" /><param name="flashVars" value="videoId=3507630053001&linkBaseURL=http%3A%2F%2Fh20621.www2.hp.com%2Fvideo-gallery%2Fus%2Fen%2Fproducts%2Flaptops-and-notebooks%2Flaptop%2F3507630053001%2Fhp-slatebook-14-video-demo%2Fvideo%2F&playerID=1111577658001&playerKey=AQ~~,AAABAeI3VIE~,N0OfmZCPaxgxui0PhG4ilXrKUlL_O1tR&domain=embed&dynamicStreaming=true" /><param name="base" value="http://admin.brightcove.com" /><param name="seamlesstabbing" value="false" /><param name="allowFullScreen" value="true" /><param name="swLiveConnect" value="true" /><param name="allowScriptAccess" value="always" /><embed src="http://c.brightcove.com/services/viewer/federated_f9?isVid=1&isUI=1" bgcolor="#FFFFFF" flashVars="videoId=3507630053001&linkBaseURL=http%3A%2F%2Fh20621.www2.hp.com%2Fvideo-gallery%2Fus%2Fen%2Fproducts%2Flaptops-and-notebooks%2Flaptop%2F3507630053001%2Fhp-slatebook-14-video-demo%2Fvideo%2F&playerID=1111577658001&playerKey=AQ~~,AAABAeI3VIE~,N0OfmZCPaxgxui0PhG4ilXrKUlL_O1tR&domain=embed&dynamicStreaming=true" base="http://admin.brightcove.com" name="flashObj" width="480" height="270" seamlesstabbing="false" type="application/x-shockwave-flash" allowFullScreen="true" allowScriptAccess="always" swLiveConnect="true" pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash"></embed></object> Source
  24. Seed Phone offers a unique way to converge multiple devices using a single smartphone A computer engineering student from the University of Cape Town has come up with a unique way to transform a smartphone into anything from a laptop to a games console. In an effort to eliminate the disjointed experience of using multiple devices across different platforms, Nick Rout developed Seed - a range of laptop, tablet, TV and console hub prototypes capable of converging around a single smartphone. "While our devices are individually really capable, using them together is quite disjointed," Rout tells IBTimes UK. "These devices all have different operating systems. An app might work on one and not another, your files are often scattered across them in an unorganised fashion and settings/preferences differ from device to device." A multi-faceted approach Having previously relied upon an ad hoc solution of cloud services and portable storage, Rout decided to transform his current smartphone - a Google Nexus 4 - into a range of devices that he designed. A 3D render of the Seed concept. A 3D Prited prototype of the Seed Phone. The Seed Phone magnetically docked into the Tablet. The Seed Phone docked into the laptop prototype. The Seed Phone docked in the TV/ games console hub. Inserting the cylindrical magnets into the Nexus 4 case. In developing prototypes that locally synchronised all of a user's data into one multipurpose device, Rout also sought to overcome a number of other tech-related problems that modern devices encounter. The ones he identified with the most included poor battery performance, the high cost of owning a whole set of devices and the ever-growing concern of data security. For it to work, Rout needs an operating system that can handle convergent user-interface switching. Fortunately, the Ubuntu OS will be offering this exact functionality in the very near future. "This multi-faceted approach aims to unify the disparate user experience one encounters when hopping from mobile to desktop to tablet and back again," writes Joey-Elijah Sneddon, editor of OMGUbuntu. The success of Seed will therefore likely depend heavily on the success of this new operating system, unless a significant contender - like Apple or Microsoft - moves into the space. Growing the idea The cost of development has so far come straight out of the student's own pocket but Rout is currently in talks with a number of potential investors. A crowd-funding campaign is also expected in the near future. "My hope is that it would reach consumers within six months to a year of development," Rout says. While products like the Motorola Atrix and the Asus Padfone have previously experimented with portions of what Seed would offer, none has yet achieved widespread commercial success. Could Seed be any different? Rout seems to think so. "The devices only offered convergence between two form factors and the docks they created were too expensive. Seed aims to change all of this." Source
  25. Hey guys. I am going to get my daughter a new laptop for her birthday. Here is the deal: 1) I have about $450 to spend 2) She will be happy if the laptop plays Netflix smoothly and if she can Skype smoothly (our internet is fast so that is not a concern, I am speaking of the video motion of Netflix and video conferencing like Skype being smooth with the Intel Integrated GMA HD Graphics Card...i think its an Intel HD Graphics 2500) 3) Here is what I am thinking about getting her: http://www.newegg.com/Product/Product.aspx?Item=N82E16834314249 4) What do you think? 5) Thanx
×
×
  • Create New...