Online PC Support

OPS Technical Solutions : +1(833)-522-1003


Highlights of IDF 2010

In a recent IDF (Intel Developer’s Forum) 2010 conference Intel’s CEO Paul Otellini highlighted Intel‘s importance of creating smart devices and their plans of business expansion.

It is estimated that in the coming years “smart” devices like smartphones will increase to five billion by 2014.According to Otellini “People will choose the device that provides the best experience for any given intended use and that no one device will win.”

In order to meet the challenges, Intel is changing it business strategies to a “full computing solutions.”Otellini also explained the recent acquisition spree that Intel has made in the recent months in which companies like McAfee, Infineon and Wind River have been acquired.

He further explained that the recent acquisition has enabled Intel to diversify its business strategies according to new business risks that have been sighted amidst the recent developments in the IT industry.

With the acquisition of Wind River Intel has perfected its products like the Atom in order to gain great market share. According to Otellini, Intel by diversifying its product will have a wider knowledge base. Within this context Intel seeks to diversify with the acquisition of Texas Instruments, which will enable Intel to deliver Internet services to consumer electronics devices.

The hallmark of the conference was Intel’s announcement of its third generation chip that its next-generation chip design, which has been codenamed “Sandy Bridge”, will debut in PCs earlier next year.

Sandy Bridge will be based on “visibly smart” microarchitecture, which is manufactured through Intel’s cutting edge factories using 32 nanometer technology.

How to compare an anti-virus resource usage?

McAfee, Norton or AVG Anti virus are the best means to keep your computers protected against all odds. Thus, you can give a new definition to your computer’s security with these softwares in hand. These softwares are considered the best on certain criteria like their price, performance and compatibility with the operating system in use. Moreover, a criterion which also remains in lime light is the ability of it to consume less memory of your computer and try to give the best performance.

At times it happens that these antivirus software consume a robust amount of memory and remain connected to the Internet continuously. This actually slows down your computer’s performance and you will end up feeling greatly disappointed.

Can you minimize this effect and get your computer relaxed because of this? Yes, you can do so, by simply comparing the anti virus resource usage with the help of the Task Manager. All you have to do is to follow certain steps to give your computer relaxing time.

Step one

You be required to open the Anti virus program currently installed on your PC. This you can do by simply double-clicking on the icon present on the desktop of your computer and thereby, you prepare yourself to monitor the usage of you computer’s resource being used by Anti virus currently running. But, most of the time anti virus programs will automatically open at the time of your Windows booting and you can find the icon blinking in the task bar.

Step two

Once you are done with above step, right – click on the task bar and drop down menu will appear. On the drop down menu you will see an option “Start Task Manager”, which you will then have to choose. Click on the “Start Task Manager” to open it and then follow as mentioned.

Step three

Once you click on the above mentioned tab, a dialogue box will appear. On the window prompted you will see certain tabs, you will be required to choose the “Processes” tab, by clicking on it. Then a list of entries will be displayed and you will then be required to choose from the Task manager your anti-virus program entry. Once you find the entry of your anti-virus and then look for “Memory” tab. This tab will display the amount of memory being consumed by your program. It will rather display the information in KB (Kilo bytes) and thus tell you how much memory your program is currently consuming.

Step four

Once you find the detail regarding one anti-virus program, you will be then required to compare between two or more anti-virus in order to jump to a conclusion. Leave the option of previous anti-virus amongst the entries and but keep you task manager running. Open second anti-virus program and follow step three to find out how much memory is the latter consuming during its run.

Nevertheless, you can easily guard your computer with anti-virus program, but a slow running computer due to your anti-virus program. This can also be given a new definition with the help of above mentioned steps.

Intel to Acquire McAfee for $7.7 to set its Security footprint

In the latest developments of IT major, Intel Corporation is said to acquire McAfee for $7.7. The deal has not been completely finalized yet, as the shareholders of McAfee and government regulators are yet to give a final nod.

Intel and McAfee have concluded the deal at $48 per share, which is to be paid in cash.  Earlier market estimates suggested that Intel could have acquired for McAfee for a cheaper rate as the share prices of McAfee than the current estimates.

Intel has set three pillars of its business philosophy which sets to gain a greater share of the IT market. The pillar of Intel’s effective business strategy includes:

  1. Connectivity
  2. Energy efficiency
  3. Security

Security in the latest pillar to be added as Intel seeks to streamline its technological achievements with great customer and client support through the Internet for emerging technologies.

According to analysts, Intel product base will be expanding in the near future as it will seek to make its chips and other hardware devices, that would be directed towards portable devices and emerging gadgets.  It does not only seek to expand its business priorities in the PC market, where it is already making revenues by selling latest computers chips including i5.  Secondly Intel sees large business propositions of streaming ahead of other IT giants like Qualcomm, who would be making similar deals in future to acquire companies and increase its market share.

According to Paul Otellini, Chief Executive officer of Intel, the deal completes Intel’s business philosophy of its three pillars.  He also stressed that in the emerging technologies of the IT world it becomes imperative to have a strong subsidiary such as McAfee to bolster its security sufficiency.

McAfee and Symantec Sued by Finjan

Finjan is a recent addition to M86 Security. They are the leasing provider in Secure Web Gateways and are the largest independent provider for Web and email content security in the whole world. Finjan develops the highly acclaimed and unified Web security solutions for the enterprise market which has protected more than 1.5 million users in more than a thousand corporations and organizations worldwide.

Finjan and its web security solutions enable the control, security and compliance for various organizations’ web productivity, liability and their security needs no matter where they are in the world. Finjan has a hybrid Secure Web Gateway and a cloud security solution which provides web security to main offices, remote branches and roaming users. These are differentiated by industry-proven real time code analysis technologies as Finjan provides the unique solutions for medium to large sized organizations in the world.

Finjan and the Big 5

Now, according to the grapevine in the techie world, it has been reported to have sued five of its rival companies which include Symantec and McAfee. Finjan claims that it holds crucial patents which are used by these popular antivirus products and their security services. The said lawsuit was filed on Monday in the US District Court for the District of Delaware. Finjan has also named the rest of its rivals who they are suing which include WebRoot Software, WebSense and Sophos.

According to Finjan, flagship products from these specific companies have violated two of the patents that Finjan has been holding on to for about a decade now. Finjan was once a technology vendor but they sold most of their assets last November to a different security company, M86. Even if this was the case, they still held on to its patent portfolio which they are now deciding to use as a moneymaker. Finjan is in possession of almost a dozen patents which are all related to computer security.

Two years ago in 2008, Finjan won a case due to the jury verdict against Secure Computing which is now owned by McAfee. The damages were awarded for patent infringement by Secure Computing’s Webwasher and Cyberguard TSP software. The jurors awarded Finjan with US$9.2 million in damages but a federal judge later decided to increase that award to US$13.8 million.

About the Lawsuits

The lawsuit on Monday might involve one of the patents covered in the Secure Computing case that relates to a network-based virus protection program. They have also named its second patent which is a system and method for protecting a client during the runtime of a computer from hostile downloadables. These cover most of Finjan’s desktop antivirus claims.
The company has even asked the court to award them with unspecified financial damages and an injunction which will prevent the companies from selling their products. This includes McAfee’s web Gateway and VirusScan software, Symantec’s Brightmail Gateway and Norton Antivirus.

Symantec and McAfee has declined to comment on the suit while Webroot, Websense and Sophos, which was acquired by Apex Partners in May, could not be reached for comment as of now.

Pro’s and Con’s of Windows 7 Security Features

The new security features of Microsoft Windows 7 allows for better security features which can help the users to segregate each of them and figure out which one is good and bad. The new Windows operating system has been engineered with different features and applications that make it user-friendly and any user’s guide to better computing. Apart from the virtues, it also comes with limitations.

Neil MacDonald gave an insight into the various features of the operating system at the Gartner Summit; Risk Management Summit 2010 last week.

The AppLocker feature that Windows 7 holds proffers the users with an application-control capability, which is inbuilt with the power to prepare a list of applications that and IT manager wants to run. This technique is called “whitelisting” and this type of security control proffers a potential lock-down technique. The source of difficulty is that the applications that are used within organizations by the employees have a tendency to grow. Therefore, there is a necessity to manage the white list over a period of time so that the new list is always updated. MacDonald suggested that third-party security products are a better fit.

MacDonald strained on the fact that the whitelist needs to be cared and fed over time. he noted that there are a number of vendors building their mark in the application-control market. Few names of these vendors include Bit9, McAfee and Bit9.

BitLocker is another potential feature of the operating system that helps to protect system files as well as data. This feature is one of many security features that various businesses are willing to evaluate in Microsoft Windows 7. This feature holds a few minus points: no self-service key recovery, no smart card support for boot drive and no Windows single sign-on.

The license restriction imposes a confinement on operating system virtualization. The operating system does not support non-Windows machines or even Windows mobile.

MacDonald pointed out that Windows 7 BitLocker has not been legally certified under the Federal Governments FIPS 140 program and is on its way to certification.

Other security features as the user-account control imposes restrictions on the ability of applications or the users to make unofficial changes to the system. This feature has been improved to make the prompts insignificant. Unfortunately, it does not superimpose restrictions on a user who is running the system as a standard user from setting up or installing a software.

Direct Access is another Windows 7 security feature, which is an “always-on” VPN client that makes use of IPv6 below to address a workstation that is located in any part of the world, uniquely. Supporting this IPSec tunnel, MacDonald pointed out, can pose problematic for different reasons as there is a lot of complexity especially when organizations do not have an IPv6 network inbuilt.

As far as the most likely software is concerned, Windows Ultimate version is cheaper than Windows 7 Enterprise version. It also is officially the consumer version but carries only 5 years of fixes contradicting the 10 years fixes that Windows Enterprise carries.

Panda Launched Free Antivirus

Panda is trying to increase its brand knowledge in U.S. as well as other markets by launching a free and cloud-based program of antivirus. Executives feel that the new free antivirus product, named Panda Cloud Antivirus, has improved accuracy and performance. It will create enough buzz in the market to encourage customers to upgrade Panda’s business products like Panda Cloud Internet Protection, launched in April.

“Panda has amongst best products available in the market, according to my opinion,” said Rick Carlson who is the president of operations in Panda U.S. He further added, “The problem with Panda is that it’s a very small player in the U.S.”

The strategy of “free first” has proved to be very successful for other vendors. Especially, Microsoft launched the free antivirus named Microsoft Security Essentials, last year.

“Panda has about 10 million users around the world and most of them are free users”, Carlson said. “In the past, adaptations happen gradually, however they do happen”, he added. Generally, around 2-4 % of Panda users will ultimately upgrade their existing product with paid or business product after considering free offerings from the company.

“The crucial benefit to Panda is that we now have more than 2 times number of users who have tried and installed Panda. They’re now well aware about what Panda is and what Panda signifies in marketplace,” Carlson said.

Another aim is to provide opponents like McAfee and Symantec, a cut- throat competition in the antivirus market with cloud-based, high-quality antivirus software, executives said.

Executives agreed that majority of users will never upgrade to the paid service and will continue to use free product. But at this point of time, it’s more important to create a recognizable name first in the U.S., Carlson said.

“I think there is a significant enhancement in brand awareness. Panda is focusing mainly on distribution and making sure that people use this product,” he said.

Carlson, who was an ex- administrative at AVG, said that the “free antivirus” strategy of AVG has pushed company’s market awareness in the U.S. as amongst most renowned brands of the industry.

“AVG is probably, the 3rd or 4th most renowned antivirus brand in U.S. If we can build this sort of brand alertness, it will make reseller’s job very easy,” he said. “Now the discussion doesn’t begin with “who’s Panda? That’s truly what it’s in regards.”

Hugo Uyttenhove, a channel partner of Panda and CEO of Raleigh, said that he had tangled his foot in end user customers’ door by suggesting the free version. The free upgraded antivirus might give Panda, an opportunity in aiming end users, he said.

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003