Blogs Lalibre.be
Lalibre.be | Créer un Blog | Avertir le modérateur

30/12/2017

Akku Acer Aspire 5755 www.akkus-laptop.com

Schwebendes Verfahren: Die Bedienoberfläche Acer Float UI erleichtert den Zugang zu elementaren Anwendungen wie dem Webbrowser, der als skalierbares Fenster zwischenzeitlich über der aktiven App, hier der Kamera, eingeblendet wird. Schwebendes Verfahren: Die Bedienoberfläche Acer Float UI erleichtert den Zugang zu elementaren Anwendungen wie dem Webbrowser, der als skalierbares Fenster zwischenzeitlich über der aktiven App, hier der Kamera, eingeblendet wird. Speicher für Apps und eigene Daten gibt's mit knapp 13 Gigabyte ausreichend; wer mehr braucht, steckt einfach eine Micro-SD-Karte ein. Acer-Angaben zufolge lässt sich das installierte Android 4.2.2 bereits ab August auf die Version 4.4 aktualisieren.

Einen direkten Zugang zu häufig benötigten Anwendungen bringt die Acer-eigene Bedienoberfläche Float UI: Bei Bedarf werden Apps wie der Taschenrechner oder der Notizblock einfach zwischenzeitlich als Fenster über den Bildschirminhalt gelegt. Die Acer Rapid-Taste auf der Geräterückseite dient beim Fotografieren als Auslöser und führt ansonsten vom Homescreen ohne Umwege zu der voreingestellten Anwendung. Die 13-Megapixel- Kamera bietet vielfältige Möglichkeiten und liefert stimmige Aufnahmen mit akzeptabler Detailschärfe. Bei Selfies in dunklerer Umgebung unterstützt die 2-MPFrontkamera ein zusätzliches LED-Licht vorne.Das solide, verwindungssteife Unibody-Gehäuse aus hartem Kunststoff liegt gut in der Hand. Der 2000-mAh-Akku ist fest eingebaut. Bei intensiver Nutzung erwärmt sich die Gehäuserückseite spürbar. Im Labortest gab's Abzüge für die Sende- und Empfangsqualität im UMTS-Netz und für die geringe Ausdauer. Unter praxistypischen Bedingungen lag das Durchhaltevermögen mit einer Akkuladung bei nur knapp 4,25 Stunden. Eine Ursache dafür ist der mit 15,4 mA hohe Standby-Strom.

Wer jedoch Augen und Ohren nicht permanent am Phone hat, findet in dem Acer Liquid E3 Plus, das für rund 220 Euro erhältlich ist, ein solides, bedienfreundliches und unterm Strich prima ausgestattetes Android-Smartphone, das dem Gros seiner Mitstreiter den zweiten SIM-Karten-Schacht voraus hat.Das Alcatel One Touch Fire E gibt's für 130 Euro zunächst exklusiv bei Congstar, im August kommt das neue Firefox-Smartphone dann bei O2, wo es bereits jetzt vorbestellt werden kann. Im Februar hatte Alcatel One Touch die zweite Generation der Firefox-Handys aus Fire C, Fire E und Fire S vorgestellt.Das Design des Fire E erinnert an den Vorgänger One Touch Fire (Test). War das Fire noch ein minimalistisch ausgestattetes Smartphone, spielt das Fire E eine Liga höher. Das IPS-Display ist 4,5-Zoll groß und bietet eine qHD-Auflösung aus 960 x 540 Pixel. Den Antrieb übernimmt ein 1,2 GHz Dual-Core Prozessor, dem 512 MByte Arbeitsspeicher zur Seite stehen. Der interne Speicher ist 4 GByte groß und kann per microSD-Karte um 32 GByte erweitert werden. Der Akku hat eine Kapazität von 1.700 mAh.

Das Fire E ist mit einer 5-Megapixel-Kamera inklusive Autofokus und LED-Blitz ausgestattet. Die VGA-Webcam auf der Front ermöglicht Videochats. Das Fire E kommt zurnächst Firefox OS 1.3 als Betriebssystem. Wenn Firefox OS 2.0 herauskommt, soll es ein Update auf die neue Version erhalten.Sony hat seine schlanke Neuheit Xperia T3 mit guten Mittelklasse-Features sowie einem 5,3-Zoll-Großbildschirm ausgestattet, der mit seiner Auflösung von 720 x 1280 Pixel eine ordentliche Detailschärfe bietet.Angetrieben wird das 148 Gramm schwere Sony-Phone von einen Snapdragon 400-Prozessor. Die Quad-Core-CPU beschleunigt seine Kerne auf maximal 1,4 GHz. Ihr stehen mit 1 GB RAM und 8 GB interner Speicher (erweiterbar per MicroSD-Karte) die üblichen Mittelklasse-Speicher-Features zur Verfügung. Als Betriebssystem liefert Sony das aktuelle Android 4.4 (Kitkat) aus.Das nur 7 mm dünne Sony-Smartphone verfügt über eine 8-Megapixel-Hauptkamera sowie eine 1,1-Megapixel-Frontkamera für Selfies. Sein 2.500 mAh-Akku soll bis zu 12 Stunden lange Telefonate erlauben.

Sony bringt das Xperia T3 in den Farben, Schwarz, Violett und Weiß in den Handel. Ende Juli soll das Phone in Deutschland zu haben sein. Bislang gibt es noch keine Aussagen zum Preis.Die Notebooks und Tablets der Thinkpad-Reihe genügen technisch hohen Ansprüchen. Aber mal ehrlich: Die kantige Business-Thinkpads wirken nicht besonders elegant. Anders das Windows-8.1-Tablet Thinkpad 8Hier gehts zum Kauf bei Amazon: Auf der bräunlich schimmernden Metallrückseite sorgt der leuchtende i-Tupfer im Logo für Verzückung: Das Detail kennt man von den Großen, hat es auf dem kleinen Tablet aber so nicht erwartet.Punkten kann das Thinkpad 8 natürlich mit Nützlicherem, etwa knapp 100 Gigabyte verfügbarem Speicher. Traditionell spricht Lenovo mit den Thinkpads vornehmlich Business-Kunden an und langt mit 449 Euro auch kräftig zu. Aber wenn die Hardware stimmt - und eine 128-Gigabyte-eMMC bieten die sogenannten Consumer-Tablets selten - rechtfertigt sich der Preis. Für den Einsatz in Unternehmen packen die Chinesen einige funktionale Apps auf ihr Tablet, wie die Standort- bzw. WLAN-abhängige Festlegung des Standarddruckers.

Dem optionalen Cover fehlt leider eine Standfunktion. Dafür reagiert die Kamera, sobald sie bei umgeschlagenem Cover freigelegt wird. Interessante Features gibt es auch für das optional erhältliche Cover: Schlägt man den schicken roten Deckel zurück, hat er genau über der 8-Megapixel- Kamera ein Eselsohr. Klappt man das um, legt es nicht nur Kamera und LED frei und bleibt magnetisch haften, sondern startet auch gleich die Kamera-App. Leider schließt sich die App nicht auch wieder mit dem Zuklappen der Ecke; aber das ist letztlich nur eine Frage der Software und ließe sich mit einem Update ändern.Der Sensor dagegen, der bei zurückgeklapptem Cover den Lichteinfall überwacht, ist Teil der Hardware und verbraucht Energie. Wer die Funktion nicht nutzt oder das Cover nicht braucht, sollte deshalb darauf achten, dass dieses Kamera-Feature in den Lenovo-eigenen Einstellungen deaktiviert ist. Denn selbst bei deaktivierter Hintergrundüberwachung fehlen dem Thinkpad bereits ganze drei Stunden Durchhaltevermögen beispielsweise zum Acer Iconia W4. Mit nicht mal fünf Stunden zieht es auch gegenüber dem Vivo Tab Note 8 den Kürzeren - und das obwohl Lenovo beim Akku großzügiger war als Asus.

Im connect-Labor kommt die Erklärung: Das Thinkpad 8 verbraucht sehr viel Energie; und zwar nicht nur im laufenden Betrieb, sondern auch im Standby. Im Einsatz war das Thinkpad selbst bei Nichtgebrauch schneller leer als die beiden anderen Kandidaten.Das hochauflösende Display des Thinkpad erfreut ebenfalls mit einer hohen Blickwinkelstabilität und geringer Spiegelung. Der mittlere Kontrast ist mit 1:341 sehr gut. Die Helligkeit liegt im unteren Bereich des Durchschnitts und dürfte gerne höher sein. Neue Energie bekommt das Thinkpad 8 über einen modernen USB-3.0-Micro-B-Port, über den auch die optional erhältliche Dockingstation angeschlossen werden kann. Das beiliegende passende Kabel ist nicht abwärts kompatibel, der Port selbst schon. Zum Laden kann man unterwegs auch das verbreitete Micro-B-USB-Kabel nehmen. Die Verwendung eines USB-2.0-Sticks über ein herkömmliches Adapterkabel war im Test trotz einer Fehlermeldung erfolgreich.Deutliche Abzüge gibt es für die geringe Ausdauer, Vorteile unter anderem für die hohe Auflösung bei Kamera und Full-HD-Display oder die LED zur Unterstützung der Kamera. Insgesamt errreicht das Thinkpad 8 ein gutes Testergebnis.

Toshiba pa3591u-1bas Battery www.all-laptopbattery.com

Much has also been made of software weaknesses in SCADA (supervisory control and data acquisition) systems. These manage various pieces of critical infrastructure and can be easily identified via device search engine Shodan. As SCADA systems are used to control nuclear plants, transport systems like railway tracks and water utilities, it’s pretty apparent something needs to be done to secure them, yet many remain replete with vulnerabilities.One shouldn’t, of course, get too mired in the FUD (fear, uncertainty and doubt). One can count the number of genuinely malicious IoT attacks on a single hand. Researchers have shown themselves to be a tad hasty in talking up the IoT threat too. After Proofpoint said connected fridges had been involved in sending out reams of spam messages earlier this year, Symantec waded in to note that the fridges weren’t actually to blame. Instead, the fridges sat behind home routers using Network Address Translation. The fridges were simply sharing the same IP address as infected PCs, which were the devices responsible for the spam.

Indeed, the current IoT threat is not severe. With cyber terrorism still something of a myth, it will only become a huge problem if the “things” start processing financial data. That’s when the interest of real criminal hackers will be piqued.But to get bogged down in FUD is to miss a pertinent point: the potential for harm is very real. “IoT devices are insecure, in the security community we know this. While these devices are not controlling or containing anything of real importance their threat is relatively low. However, as they get more and more pervasive and have more and more importance the greater the threats become,” says Michael Jordon, research director at Context Information Security.To prove that point, Context recently purchased five devices, all of which can be found in the home but can’t be named for responsible disclosure reasons, and hacked them “with relative ease”, says Jordon.“This shows that security is not currently on the requirements list for IoT devices. The devices and manufacturers cannot be named as these devices currently have no fix for the issues that we found, but they are being worked on,” he adds.

“Interestingly, the smaller the company the more seriously they take the security issues - they know that one bad story about the fact that their only product is insecure would sink their company.”It’s not just security that’s a concern either. Privacy is likely to come further under threat if everyday devices within the home and across towns and cities can be compromised for surveillance operations, whoever is carrying them out. Given the now-tarnished reputation of UK and US intelligence agencies, it would be no surprise if they were already investigating ways to use embedded devices for scooping up data on the general populace.But any hacker crew could become an arm of Big Brother, if the current landscape is anything to go by. James Lyne, global head of security research at Sophos, has been poking around with IoT devices too, purchasing a large selection of devices including CCTV, webcams and baby monitors. He found a lot of issues which could be exploited to snoop on people.

Of the 11 different camera products he tested, four didn't support encryption at all, meaning any username and password could be intercepted and the camera compromised. Three were vulnerable to Heartbleed, five had default credentials even when an account was created during setup and seven were open to multiple categories of web application attacks, Lyne says. Most of them automatically negotiated network access to the web using UPNP, itself a protocol that has been shown to be flawed in the past, he adds.Lyne also tested a number of faults in home automation systems, using existing research. He says he managed to cause desk lamps to explode by exploiting weak control channels in power devices.“I'm sure there are more devious use cases I have yet to discover,” says Lyne, who believes the future of IoT is not looking bright from a security perspective. “Internet of Things devices tend to have poor updating infrastructure and aren't prepared to react and rectify the serious faults that may be discovered during their years of service.

“We are adopting the Internet of Things, but the ecosystem isn't ready to do it right. Given we aren't likely to slow our charge to adopt new fancy devices they had better learn quickly or they will give cyber criminals huge power in the physical world, not just digital.”One of the biggest concerns is that old problems are being carried into the new hyperconnected world. “It is scary to think how many devices around us that we have just accepted and ignore as a 'black box device' when really they are a computer running old software - ancient versions of Linux not being uncommon - with basic security failures like default passwords, unpatched and simply exploitable software and web vulnerabilities that make it feel like 2005,” adds Lyne.“The scary thing is that these flaws are tragically similar to the flaws I've seen in industrial infrastructure and control systems. From the innocuous device to the powerful, life and limb impacting infrastructure, there is a lot of work to do in security beyond the PC.”

Australian broadcaster SBS, which during the 2014 FIFA World Cup ran a movie promo called “Sex Before Soccer”*, has quietly launched an HbbTV beta to the tiny handful of viewers that have suitable TVs.HbbTV – Hybrid Broadcast Broadband TV – lets people with suitably-equipped Internet-connected TVs or set-top-boxes navigate catch-up programming at the same time as watching broadcast programs, meaning you don't have to fire up your computer, laptop, tablet or phone to watch the catch-up channel. With SBS's schedule currently dominated by the football World Cup, and often peppered with risque European movies, the trial means it could be possible to take in streamed cinematic delights while watching football.The broadcast marketing collective, Freeview, has been prepping its own launch under the perhaps-catchier Freeview Plus, to get behind the coming generation of smart TVs. Freeview Plus would provide a “single pane of glass” program guide to the last seven days' worth of programming from Australia's five free-to-air broadcasters (the Australian Broadcasting, the Seven, Nine and Ten networks, and SBS).

The SBS's own trial runs ahead of the planned July Freeview Plus launch.According to this TechRadar report, only a handful of brand-new Panasonic TVs currently support the SBS beta, with other makers due to launch HbbTV-capable models later in the year.Addressing the problems now should help ease the threat of IoT hacks. The first thing is to push manufacturers to ensure security and privacy by design, says David Emm, senior security researcher at Kaspersky Lab. It's important that manufacturers of such devices, and the organisations implementing them, ensure that security is built in. The first step is to be aware of the potential risk; this can be more difficult if the device manufacturer and the implementation are not being carried out by the same organisation, he adds.“For example, a car manufacturer may not be responsible for the technology that brings Internet connectivity into the car – or that's used to drive it – in the future. Similarly, it's unlikely that the connectivity built into smart meters will be developed by power companies themselves.“Not only does this mean that security may not be automatically be 'top of mind' from the start, but deployment of any firmware updates may be beyond the means of the implementer.”

Fortunately, there are a number of groups who are working to create such good practices amongst IoT vendors. The Build It Securely initiative, established by a number of researchers including Zach Lanier of Duo Security, is providing information for companies to help embed security in their processes. It also includes advice on setting up bug bounty programs to reward vulnerability researchers, thereby encouraging firms to make their products more secure.“This isn't a service, this is kind of like OWASP, we're just providing resources,” Lanier says. “Here's some education on how security researchers work, here is some research to make your stuff more secure.”Then there’s I Am The Cavalry, a project set up by Josh Corman, which describes itself as “a global grassroots organisation that is focused on issues where computer security intersects public safety and human life”. It will act as a hub for research on the Internet of Things and will hope to coordinate efforts to secure the connected machines that surround us.

It’s also lobbying US government to act on the issues. Corman tells me he has been spending time on Capitol Hill this year, speaking with a number of politicians about what can be done to make the digital controls running everyday machinery less vulnerable to hackers.But even these admirable initiatives will find it hard to cover off the majority of vulnerabilities. Perhaps encouraging corporations and government entities to slow the rise of the Internet of Things would also be wise, so hackable machines don’t form a significant part of our quotidian existence.Emm and others believe there’s little chance of that happening. There are simply too many economic opportunities. “If this were a government project, or one sponsored by a single company, it might be. But what's driving this is economics – the drive for efficiency and productivity. The benefits that flow from an Internet of Things are much more evident than the potential dangers.”That’s why Gartner is predicting the number of IoT devices, excluding PCs, tablets and smartphones, will hit 26 billion units installed by 2020. That represents an almost 30-fold increase from 0.9 billion in 2009. This will open up vast revenue streams for businesses, as IoT product and service suppliers are expected to generate revenue exceeding $300bn, mostly in services, by that same year. In a world still reeling from the downturn that started in 2008, which government wouldn’t want to spur on IoT development?

28/12/2017

Acer Aspire 4715z Battery www.all-laptopbattery.com

That sounds impressive. The Pandora’s display was a Sinclair flat tube fitted into the lid. It was, of course, far too small to make a usable text display on its own, so Sinclair engineers contrived an arrangement of mirrors and lenses which folded out as the computer’s lid was lifted. The notion, says Stephen Berry, who worked on the computer’s software, was that, the tube’s image was reflected and magnified into a “floating” image placed where a modern laptop’s screen would be.Stephen says one problem was that in order to see the virtual image, the user needed to focus his or her eyes at infinity, even though the screen appeared close up. It was like trying to see those 1980s ‘magic’ pictures, which embedded pictures inside repeating patterns. Only by trying to focus your eyes ‘behind’ the picture could you see the hidden object. It wasn’t easy to do; distracted, your eyes didn’t automatically focus on the image but rather on the poster itself. The Pandora screen was much the same.

Rupert Goodwins said of it: “I did the screen driving software and designed some fonts – the screen was so weird that if you didn’t have fonts explicitly matched to it, the chances of reading stuff was minimal – all tested on an old Zenith green monitor I’d jimmied to match the aspect ratio of the final screen.”Pandora’s industrial design when through a number of iterations, first as sketches made by Sinclair’s designer, Rick Dickinson, which led to a final design that was modelled as a physical reproduction. This was subsequently revised, at least once if not twice.“Only a couple of prototypes got made,” recalled Goodwins. “The circuit never got further than a collection of breadboards, and the models were there to test the optics and screen details. People were understandably nervous about things like the extra-hight tension supply to the overdriven tube, and even more nervous about whether the whole thing would either work or be manufacturable.

“I can’t remember too much about the video modes, although I think there was one that had 64 x 24 characters. That was going to be the main one, because Pandora was seen as a productivity tool rather than a games box. It also had a 6 or 8MHz Z80 - I think it was the Hitachi variant with some extra instructions - and everything else bar the memory in one ULA.“I also seem to remember that it wasn’t going to have Microdrives: the flat screen was seen as quite enough nonsense to be getting on with, thank you very much, Clive.“Journalist Guy Kewney asked Alan Sugar whether he’d bought the rights to Pandora. ‘Have you seen it?’ asked Sugar. ‘Yes,’ said Guy. ‘Well then.’ said Sugar.”Amstrad would, just a few years, release the Notepad NC100, a rather less sophisticated Z88-alike.Clive Sinclair never lost his vision for a workable portable computer, and almost immediately assembled a team to work on a machine without Spectrum compatibility. Goodwins was asked to participate, but chose to work for Amstrad instead; he was one of very few Sinclair people to be hired by Sugar’s firm. No Spectrum support, then for the Z88, and no flat tube, either. Sir Clive was persuaded that perhaps LCD - a technology he detested, says Stephen Berry, because of the of carcinogenic chemicals used in its production - had to be adopted after all.

The architecture remained as it had in Pandora: Z80 CPU plus ROM plus RAM plus one ULA. Ditto the use of disposable rather than rechargeable batteries, Sinclair long having averred that you could always buy fresh batteries but rarely find a power outlet to feed a charger.The ROM contained a new OS, OZ, plus PipeDream, an integrated word processing, spreadsheet and database program. It also contained a version of... BBC Basic. At long last, Sir Clive had laid a very specific ghost to rest.During the latter part of 1985, Sinclair Research seems to have been awash with ideas about how the QL line could be extended - or, given the QL’s blemished reputation, caused by announcing the original far too early - another brand but one also aimed at a more sophisticated audience than the Spectrum.Enigma emerged in the Autumn of 1985: a system with one or two 3.5-inch floppy disks in a system unit which would come with a bundled colour monitor, printer and a separate keyboard. It would, claimed Your Computer, feature 1MB of RAM and bundle versions of the Psion-produced QL productivity applications in a “full Window, Icon, Mouse environment”, perhaps Digital Research’s Gem, which had been released in the UK the previous April.

In many ways, Enigma can be seen as Sinclair’s response to the PCW 8256, Amstrad’s Z80-based word processor launched in September 1985 and quickly becoming hugely popular. The QL’s hardware designer, David Karlin, had wanted the QL to be a machine along the lines of the QL. Perhaps Enigma was his suggestion for a way for Sinclair to release not only a PCW rival but a machine closer to the one he’d wanted to make in the first place.Enigma was rumoured to be set to ship toward the end of the first half of 1986. Was it ever a runner? It was rumoured that the creator of the Archimedes casing had designed the box for Sinclair but sold the design to Acorn when Sinclair changed its mind. If not Enigma, then the case might have found a home as an IBM PC clone, which company executives were also pondering as the money began to run out during the latter part of 1985 and the situation at Sinclair Research began to look increasingly untenable. Stephen Berry says the PC clone was Dylan.

Tyche is another QL successor and perhaps has more weight than Enigma because it eventually made it outside Sinclair, at least in the form of an updated ROM image developed by Jonathan Oakley and made public many years later. Thanks to the Amstrad takeover, the Tyche code became Sinclair’s final version of QDOS, though it was never released at the time.It is said to have been prepared not for the QL but for a successor that has been described by QDOS creator Tony Tebby - though he had been long gone from Sinclair by then - in terms that sound a lot like the Enigma description.“There was a program internally to do a QL-type machine, that’s to say based on the same chips, but with disc drives,” said Sir Clive in 1986. “It wasn’t really a QL, though, and it was a much more expensive machine.” That sounds a lot like Enigma/Tyche.

Janus remains something of a mystery. The god Janus had two faces, to look two ways at once, and it’s tempting to see that reflected in a concept machine able to succeed in both the business and the games markets - perhaps the way it had once been thought that the QL might go. Equally, and perhaps more likely, it reflects looking both forward and backward: the latter in its support for QL technology, but forward to a new world of computing based on Sinclair’s wafer-scale integration ideas.Certainly designer Rick Dickinson sketched and produced mock-ups of a number of wafer-scale machines, some in upright towers, others in squat, domed units. Many are marked “QL+”. Was Janus and the QL+ one and the same thing, and if so were they ever more than a concept for a future? We shall probably never know. Finally, in 1999, HP dropped the old LX name and switched from Hitachi SH3 processors to the now well-established ARM for the last generation of HP handhelds. The HP Jornada 720 was a Psion on steroids, boasting a 206MHz StrongARM, an onboard 56K modem, a third card slot for Smartmedia – and despite all this, dropped the baby weight for a muscly 34mm and 515g.

But steroid abuse can lead to bloating, and despite being half a kilo, the lardy Jornada only delivered nine hours of battery life – under half the Psion's. The simple laptop-style clamshell design also meant that the HP tended to topple over backwards if you tapped the touchscreen firmly, whereas Psion's conjoined screen and keyboard slid down as you opened the device into a relaxed, stable slouch – at the price of a fixed screen angle.HP bowed out of the handheld market in 2002 with the Jornada 728, which doubled the RAM to 64MB and changed the colour scheme... but this wasn't quite the end of the palmtop PC.The last gasps of the handheld PC were two Japanese devices in 2003. NEC's MobilePro 900c slightly pushed the handheld size limits, being 246mm (9.7) wide with an 8.1 screen and weighed a hefty 830g – around the size of the Sony Vaio-P netbook – although it still had the basic 640x240 screen resolution. As such, the crown for the highest-spec handheld probably belongs to the Sigmarion III from Japanese mobile telco NTT DoCoMo.