The Ars Technica Guide to Virtualisation

This is part three of Ars' guide about virtualisation. "Part 1 described three ways in which a component might be virtualized; emulation, "classic" virtualization, and paravirtualization, and part 2 described in more detail how each of these methods was used in CPU virtualization. But the CPU is not the only part of a computer that can use these techniques; although hardware devices are quite different from a CPU, similar approaches are equally useful."

Office for Mac 2011 To Feature Co-Authoring, Ribbon Interface

"Microsoft on Thursday detailed some of the new features in its forthcoming Office for Mac 2011 suite, including co-authoring tools, Web apps, and a redesigned ribbon interface more consistent with its Windows counterpart. Microsoft is a part of Macworld 2010 expo in San Francisco this week, and has used the event to divulge details on its forthcoming update to Office for Mac, expected to arrive later this year."

App Store Model Provides Security, Stability: Evidence, Please?

The fact that the iPhone is a locked-down device, and that you don't really own it so much as rent it from Apple is well-known by now. The supposed reason for this lock-down is to ensure the device's stability and security - in fact, this has already become conventional wisdom. However, where is the proof that supports this statement? Is there any real-world evidence that suggests this model is better?

Opera Announces Opera Mini for iPhone

As should be common knowledge by now, Apple is very restrictive and sometimes quite arbitrary in managing its App Store. One thing is clear, though: fat chance there's going to be an alternative browser in the App Store (i.e., one that doesn't use WebKit). Mozilla didn't even bother to submit Fennec, but Opera is going head-to-head with Apple: the Norwegian browser maker has announced Opera Mini for the iPhone, but has not yet submitted it for approval.

Researcher Cracks Trusted Platform Module Security Chip

"At the Black Hat DC Conference 2010 security researcher Christopher Tarnovsky of FlyLogic Engineering has demonstrated a way to defeat the Trusted Platform Module chips widely used to secure data in computers, identity cards, gaming systems like the Xbox 360, cable set-top boxes, and other electronics. TPM modules are widely used in enterprise, health care, government, and military applications to protect data through encryption, particularly on portable devices that might be easily lost or stolen. Although Tarnovsky's process is labor intensive and requires both specialized equipment and a significant period of physic access to the device to be cracked, his step-by-step instructions do outline how to get data out of a TPM-protected system, including encryption keys and manufacturing information that could be used to create pre-cracked counterfeit chips."

Two Billion-Transistor Beasts: POWER7 and Niagara 3

"In years past, an ISSCC presentation on a new processor would consist of detailed discussion of the chip's microarchitecture (pipeline, instruction fetch and decode, execution units, etc.), along with at least one shot of a floorplan that marked out the location of major functional blocks (the decoder, the floating-point unit, the load-store unit, etc.). This year's ISSCC is well into the many-core era, though, and with single-chip core counts ranging from six to 16, the only elements you're likely to see in a floorplan like the two below are cores, interfaces, and switches. Most of the discussion focuses on power-related arcana, but most folks are interested in the chips themselves. In this short article, I'll walk you through the floorplan of two chips with similar transistor counts - the Sun's Niagara 3 and IBM's POWER7."

Aperture 3 Adds Faces, Places, Improved Local Adjustment

"After a long wait, Apple has released the next major update to its pro-class photo workflow application, Aperture 3. The new version boasts over 200 new features, including the addition of the successful facial recognition and geotagging features, Faces and Places, that were introduced with iPhoto '09. Version 3 also adds edge-detecting adjustment brushes for non-destructive localized editing and touch-ups. Along with numerous UI and performance improvements, Aperture 3 adds full 64-bit support on supported systems running Snow Leopard."

Quantum Trick for Pressure-Sensitive Mobile Devices

Hand-held devices could soon have pressure-sensitive touch-screens and keys, thanks to a UK firm's material that exploits a quantum physics trick. The technology allows, for example, scrolling down a long list or webpage faster as more pressure is applied. A division of Samsung that distributes mobile phone components to several handset manufacturers has now licensed the "Quantum Tunnelling Composite". The approach could find use in devices from phones to games to GPS handsets.

Does the iPhone OS Need Multitasking?

"Whereas the iPhone is aimed at short, focused tasks, the iPad is more likely to lend itself to longer, more general tasks that involve using multiple apps, just as we're used to on the Mac. It's easy to imagine wanting to use an iPad to read text in Mobile Safari, copy some text to a Pages document, and send that document to a colleague via Mail. That specific example may turn out to be possible with the current iPhone OS, but it points toward needing more ways for iPad apps to work together in the future."

KDE SC 4.4 Released

And there we are, the KDE team has released KDE Software Compilation 4.4, formerly known as, well, KDE. Major new features include social networking and online collaboration integration, the new netbook interface, the KAuth authentication framework, and a lot more.