RAM drives and RAM caching have long been a secret of the gaming and overclocking elite to attain the fastest load times and smoothest gameplay possible. The advent of the SSD has reduced usage of RAM caching due to the SSDs similar performance, and overall simplicity. RAM drives and RAM caching have several hindrances, they require a lot of DRAM because they cache the entire OS, along with everything else, into the DRAM. RAM is also susceptible to power loss. For those with overclocked gaming rigs an errant BSOD can cause massive data loss and require complete reinstallation of the OS. This is not a tradeoff many are willing to make.
Enter Dimmdrive. This new program, which will be available for $34 on Steam today, takes a different approach that removes many of the disadvantages of typical RAM caching. Dimmdrive allows users to specify exactly which data is cached into the DRAM, so users can load just a single game into the RAM. This reduces the amount of RAM required, and also helps minimize exposure to data loss from any type of BSOD or power loss. It is much simpler to reinstall a game than an entire operating system. Once the game is loaded into RAM users can expect speeds up to 13 GB/s for any cached data.
We've covered this Australian giant online retailer in the recent past, showing off their $329 windows 8.1-Based Laptop and explaining how Kogan's self-branded technology components are quite often listed well-below or placed around the lowest priced offerings on the market at any given time.
With an apparent 668 views today alone, Kogan's new 256GB SSD is no different. Boasting a maximum sequential read rate of 460 Mb/s and a maximum sequential write rate of 320 Mb/s, this new offering is said to utilize Intel's NAND flash technology.
Comparing the retail listing with other similar devices in the local Australian market, you can see that the Kogan SSD is very well priced. When looking at other 256GB SSD's, it's noted that you can pick yourself up a Crucial MX100 256GB SSD for $139 AU - which offers sequential read speeds of up to 550MB/s and sequential write speeds of up to 300MB/s. If you're looking for higher specifications and higher pricing, you can expect to fork out $219 AU for one of Samsung's 850 Pro Series 256GB SSDs - offering sequential read speeds of up to 550MB/s and sequential write speeds up to 520MB/s.
The wearables market should only accelerate in 2015, and is presenting unique opportunities for niche products that help consumers. The idea of so-called "hearables" will be heavily marketed as companies develop new products that otherwise would have been overlooked.
The hearable market is expected to be valued at $5 billion by 2018 - close to the same figure of the 2014 wearables market overall - according to Wifore Consulting.
"There's some interesting information you can capture through the ear," said Craig Stires, associate vice president for bit data, analytics and software for IDC Asia Pacific, in a statement to CNBC. "We've been looking at things like wrist wearables, but the ear can capture things like oxygen levels, electrocardiograms, and body temperature."
Often described as still the best game in the series, the modding community of SA:MP has reached out to TweakTown - explaining that their San Andreas community is extremely alive and well, showing us screenshots of thousands of players pitting their might against each other in modded servers.
Ranging from role-playing modifications to extremely fun RPG-only battle zones, the team at SA:MP have already started work on their GTA V mod list. As according to James Beatie, V:Multiplayer's Lead Developer and Community Leader, "this modification can be created before the game is released, as a large portion of the programming needed can be done at any time. We feel the head start will open many doors to add as many features as possible."
South Korean Internet users interested in downloading copies of "The Interview" should be worried, as people are having their devices infected while trying to download the movie. Specifically, a Google Android mobile app, available for smartphones and tablets, has been circulating promising access to a pirated copy of the movie - but is instead stealing banking details, according to researchers from McAfee Labs, Center for Advanced Security Research Darmstadt, and Technische Universitate Darmstadt.
"It contains an Android Trojan detected by McAfee products as Android/Badaccents," according to cybersecurity expert Graham Cluley. "Android/Badaccents claims to download a copy of 'The Interview' but instead installs a two-stage banking Trojan onto victims' devices."
The malware targets Korean banks and Citi Bank, with stolen credentials then sent to a Chinese server. The app was reportedly hosted using the Amazon Web Service (AWS), but Amazon has denied the claim. Researchers say the malicious app has been downloaded more than 20,000 times.
Even with a growing number of cybersecurity experts thinking an insider attack is more likely in the demise of Sony Pictures earlier this year, the FBI continues to blame North Korea. US government officials said there are no alternate leads in who was behind attacking Sony, despite arriving at the conclusion North Korea was behind the attack.
The FBI issued the following statement: "The FBI has concluded the government of North Korea is responsible for the theft and destruction of data on the network of Sony Pictures Entertainment. Attribution to North Korea is based on intelligence from the FBI, the US intelligence community, DHS, foreign partners and the private sector. There is no credible information to indicate that any other individual is responsible for this cyber incident."
However, cybersecurity experts were amazed how quickly the FBI was able to point fingers towards North Korea, as noted by a Norse cybersecurity official: "When the FBI made the announcement so soon after the initial hack was unveiled, everyone in the [cyber] intelligence community kind of raised their eyebrows at it, because it's really hard to pin this on anyone within days of the attack."1
Companies must learn from the mistakes made by Sony Pictures leading up to a data breach carried out by the Guardians of Peace - and that should translate to increased network security and better training for employees. In addition to the stolen movies and leaked employee personal information, embarrassing emails sent and received among executives at the company caused an additional layer of an expanding public relations nightmare.
"Now you have to operate under the mindset that my email is not confidential," said Frank Mong, GM of enterprise security solutions with Hewlett-Packard, in a recent interview published by the San Jose Mercury News. "We should all live with a little more paranoia when we do these things - ask, 'Is this really legitimate?' Should I really be clicking that?"
While the SPE breach is an ideal learning opportunity, many companies will refuse to make adjustments and could be next in line to suffer an incident. Companies need to create guidelines that force employees to use more complicated passwords, and hire third-party cybersecurity firms to educate employees on identifying phishing and spear-phishing attacks.
A group called H4LT reportedly released the Microsoft Xbox One software development kit onto the Internet, to help "end 2014 with a bang." The leaked SDK could potentially open the door for developers to create their own apps and games for the Xbox One - but they will still be required to register with Microsoft beforehand.
H4LT noticed there is no "definite exploit" for the Xbox One, but hopes this will help coders to begin working on their own homebrew solutions.
"We leaked it to the community because if something is shared then... progress is achieved faster than alone.... The SDK will basically allow the community to reverse and open doors towards homebrew applications being present on the Xbox One."
The Guardians of Peace, the cybercriminal group behind crippling Sony Pictures, reportedly sent threats to a U.S.-based news organization. The FBI bulletin refers to the company as "USPER2," so it remains unknown which company was targeted.
The posted threat was published on Pastebin, taunting the FBI and the unnamed media organization "for the 'quality' of their investigations," according to the GOP statement. Unfortunately, many ad servers don't support newer encryption technologies, so media outlets are vulnerable to potential hijacking - and it's something that clever cybercriminals are clearly aware of.
"As part of our ongoing public-private partnerships, the FBI and DHS routinely share information with the private sector and law enforcement community," according to an unnamed military source, speaking to journalists. "The FBI and DHS are not aware of any specific credible information indicating a threat to entertainment or news organizations, however, out of an abundance of caution, we will continue to disseminate relevant information observed during the course of our investigations."
Third-party WordPress plugins, extremely popular among millions of WordPress users, leave the door open for cybercriminals to exploit threats. Unfortunately, many people install new plugins and simply leave them be - without installing updates or ensuring security protocols are met - and that makes it even easier to compromise websites, databases, and users.
"WordPress is extremely powerful, and while the popularity creates a lot of opportunities for development, it also attracts hackers,"said Tony Baker, Internet Assure director, in a press statement. "There are thousands of extremely popular plugins that create vulnerabilities within these sites, and quite frankly, most WordPress self-hosted websites are set up without any thought to security."
As security becomes significantly more important for WordPress websites, vulnerabilities and code exploits will remain major security concerns. It's recommended for inexperienced website owners to rely on GoDaddy, BlueHost, Site5, and established hosting services to help host the site, as they have internal security protocols in place to keep track of security threats.