August 17, 2018 brianradio2016

I know that Apple claims that it’s not the megapixel count that matters, but I’m of the belief that if the light isn’t captured in the first place, nothing can be done later on to compensate of that.

With some handsets packing 40-megapixel cameras – like the Huawei P20 Pro, which, along with a 40-megapixel rear camera has a 24-megapixel front-facing camera – the iPhone’s 12-megapixe rear camera feels outgunned nowadays.

August 17, 2018 brianradio2016

Video: New Arm processors for mobile devices tailored to AI and VR.

Featured stories

Arm has revealed its roadmap through to 2020 for chips it reckons will be powerful enough to loosen Intel’s decades-long grip on the PC market.

Arm-designed chips dominate the smartphone market thanks to processors largely made by Qualcomm that as of this year have also started appearing in Windows 10 on Arm laptops made by HP, Lenovo, Asus, and soon Samsung.

These laptops do have longer battery life and 4G, but starting at $600 they’re not cheap and don’t come close to Intel’s Core chips on performance.

But Arm recently began boasting that its newest chip design, the Cortex-A76, will be on par with Intel’s top Core i7 chips and will deliver a performance gain of 35 percent on its older designs.

It comes as Microsoft continues its work with Qualcomm to optimize Windows for devices powered by Qualcomm’s Snapdragon chips, including the forthcoming Snapdragon 850, which Samsung used for its first Arm-based Windows 10 laptop. So it appears there is some momentum behind the concept.

Arm has now revealed its follow-up chips to the Cortex-A76 aimed at the PC market. They should arrive on new laptops in 2019 and 2020.

These include Deimos, which Arm says will deliver over a 15 percent performance boost, and Hercules, which will deliver further but unspecified performance gains.

Deimos chips will be built with a seven-nanometer (nm) process, while Hercules will be build with 7nm and 5nm processes.

“Our roadmap of client CPUs has been designed to take advantage of the disruptive innovation 5G will bring to all client devices,” said Nandan Nayampally, vice president and general manager of Arm’s client business.

“This combined with innovations from our silicon and foundry partners will enable Arm SoCs to break through the dominance of x86 and gain substantial market share in Windows laptops and Chromebooks over the next five years.”


Arm’s follow-up chips to the Cortex-A76 aimed at the PC market should arrive on new laptops in 2019 and 2020.

Image: Arm

Previous and related coverage

Windows 10 on Arm: Tests say Snapdragon 845 could bring big speed boost

This year’s Windows on Arm PCs could be a more compelling purchase thanks to the Snapdragon 845.

Microsoft reveals more details of Windows Core OS

A LinkedIn job posting has revealed some new details about how it’s preparing Windows for new form factors and new devices.

Windows 10 on Arm, Android phones: Our new CPU will match Intel Core i7, says Arm

Arm thinks its new Cortex-A76 CPU will close the performance gap on Intel’s high-end CPUs, which could be a game-changer for Windows 10 on Arm devices.

Lenovo Miix 630 ARM-based 2-in-1 Windows tablet goes on sale for $900

The 12.3-inch convertible is one of the first Windows 10 devices powered by Qualcomm’s Snapdragon 835 processor, which promises up to 20 hours of battery life.

Review: HP Envy x2 running Windows 10 on ARM

The first crop of Snapdragon 835-based Windows 10 PCs are starting to roll out more widely. Here’s my ‘non-reviewer’s review’ of the ARM-based HP Envy x2.

Windows 10 on Arm: What we learned at Build 2018 TechRepublic

How can Windows apps be persuaded to run well on Arm processors? Microsoft provided some pointers at its recent developer conference.

Samsung signs on for Windows-on-Snapdragon 850 laptop CNET

At its Computex press conference, Qualcomm revealed Samsung is its latest partner for Windows-on-Arm systems.

August 17, 2018 brianradio2016

I’m angry about it, really. The treatment around Steve Jobs, in books, in movies and on TV seems to depict him as part-genius, part-ogre, and seldom looks at him as Steve Jobs: Human.

Who benefits from that?

I can’t help but wonder who gains from such diluted biography. People can’t solve big problems if the culture they work in means they’ll be fried to a crisp for making a mistake.

That’s why people put money into Jobs or Musk.

Companies that work together well grow while those with inadequate management inevitably shrink.

August 17, 2018 brianradio2016

A 16-year-old kid in Australia managed to hack into Apple’s computer systems multiple times over the course of a year and steal secure data, and the best part of the story is the name of the folder in which he saved instructions and stolen files on his laptop: “hacky hack…

August 17, 2018 brianradio2016

This pilot fish is writing mainframe software for a large defense contractor, and he’s discovered a way to become a lot more efficient: arrive at work at 6 a.m.

“The traffic is light at that hour, and I get a couple of hours of work in without much interruption,” says fish. “It also means I get to find what changes the computer center — which is at a different location — has made overnight.

“One morning I sat down, fired up the PC that’s my terminal and started to work. But the editor was acting very strangely, so I called a system guy I know to find out what was going on.

Fish: Fred, what did you do the editor last night?

August 17, 2018 brianradio2016

An Australian teenager may have found it amusing enough when he managed to break into Apple’s mainframe to name a folder full of stolen Apple files “hacky hack hack,” but law enforcement has not found it funny.

More security news

A teenager from Melbourne, unnamed for legal reasons, is now facing criminal charges after he allegedly accessed Apple’s network without permission, leading to the theft of documents and the apparent compromise of customer accounts.

As reported by The Age, the teenager managed to compromise “Apple’s mainframe” a number of times from his bedroom over the course of a year.

At the Australian Children’s Court on Thursday, prosecutors reportedly heard that the teenager downloaded roughly 90GB of content from the network which was stored in a folder called “hacky hack hack.”

Apple uncovered the intrusion and contained the FBI, which communicated the incident to the Australian Federal Police (AFP).

The AFP obtained a search warrant and raided the family home, leading to the discovery of the folder.

CNET: iPhone SE 2: Rumored specs, leaks, price, release date

Two Apple laptops, a mobile phone, and a hard drive were confiscated. According to the publication, the serial numbers of the laptops matched those tracked as the devices used to compromise the network, made possible by obtaining authorization keys.

The teenager allegedly also accessed customer accounts, although the size and scope of the accounts has not been made public.

See also: Instagram hack is locking hundreds of users out of their accounts

The teenager’s lawyer said the reason he hacked into the network was that he was a fan of the iPad and iPhone maker, considered it a “dream” to one day work for the company, and that the defendant was “well-known” in the international hacking community.

TechRepublic: Photos: Apple iPhone models through the years

The defendant has pleaded guilty and will return to court next month for sentencing.

The alleged network breach comes after iOS source code was leaked on GitHub. Apple acknowledged the leak but said that the three-year-old source code did not impact the security of modern devices.

An Apple spokesperson told ZDNet:

“At Apple, we vigilantly protect our networks and have dedicated teams of information security professionals that work to detect and respond to threats.

“In this case, our teams discovered the unauthorised access, contained it, and reported the incident to law enforcement.

We regard the data security of our users as one of our greatest responsibilities and want to assure our customers that at no point during this incident was their personal data compromised.”

Previous and related coverage