Social Icons

Showing posts with label intel. Show all posts
Showing posts with label intel. Show all posts

Monday, March 25, 2024

Aatmanirbharta in Action: Shouldn't India Learn from China's recent Chip Play?

       Prime Minister Modi's Aatmanirbharta mission, which emphasizes self-reliance, is a crucial step for India's technological future. Recent developments in China offer valuable insights into both the challenges and potential rewards of domestic chip manufacturing.

China's Bold Move: Stepping Away from US Tech Giants

        China recently implemented new guidelines phasing out Intel and AMD processors, along with Microsoft's Windows operating system, in favor of domestic alternatives for government computers. This move highlights China's commitment to reducing reliance on foreign technology, particularly from the US. {Source: https://www.reuters.com/world/china/china-blocks-use-intel-amd-chips-government-computers-ft-reports-2024-03-24/ }


        This strategic decision by China to prioritize domestic alternatives to Intel and AMD chips underscores the nation's broader objective of technological self-sufficiency and reducing dependency on foreign technology. Understanding the rationale behind this focus is crucial. China's move aligns with its long-term vision of building a robust indigenous semiconductor industry to bolster national security, economic resilience, and technological advancement. By reducing reliance on foreign-made components, China aims to mitigate risks associated with geopolitical tensions and ensure uninterrupted access to critical technologies. This decision also reflects China's ambition to assert itself as a global leader in innovation and technology. As such, it serves as a clarion call for countries like India to introspect and accelerate efforts towards enhancing domestic capabilities in semiconductor manufacturing to safeguard their technological sovereignty and secure a competitive edge in the digital age.

A Cause for Celebration, But Not Without Reservations

While China's initiative deserves recognition, it's important to maintain perspective.

  • Catching Up: While China boasts domestic alternatives, their performance might not yet fully match established players like Intel and AMD.
  • The Long Game: China's plan acknowledges this and prioritizes continuous improvement. Their commitment to domestic production suggests a long-term strategy for achieving technological parity.

Lessons for India's Aatmanirbharta Journey

India's Aatmanirbharta mission can learn from China's example:

  • Accelerated Efforts: Time is of the essence. Delays can hinder India's ability to compete in the global tech landscape.
  • Investment and Collaboration: Building domestic chip manufacturing requires significant investment in research, development, and infrastructure. Collaboration will only maintain dependence somewhere. Lesson to learn is let's be prepared if we fail...lets bear some R&D investments if they go down the drain...lets build our own technologies...lets wait before we announce the year 2047 as envisioning to be a developed nation...let there be some delay...but lets have a nation purely built on its own expertise and own technologies....alas we postpone 2047 later...We have the time...we have the brains...we have the economy....

India's Opportunity: Seize the Moment

By learning from China's approach and expediting its own efforts, India can leverage Aatmanirbharta to establish itself as a major player in the global chip market. This will not only ensure technological self-reliance but also empower the nation's future economic growth....remember our mission is 28nm in 2026....way far from targets of 2047

Saturday, June 01, 2013

Your passwords can be cracked easily if less then 16 Characters now!!!!

1.    When the IT security big bang of Do's and Don'ts started some years back it was widely advertised to the Cyber masses to keep their respective passwords any thing more then 8 characters with a mix and match of capitals and smalls with special characters...then this was increased to 10 and last heard it was 15...and was told that 15 character password which is not dictionary based will take years and is actually uncrackable...

2.  As recent as 4 days back,a team of 3(your read it rite it's three) hackers has been able to crack more than 14,800 supposedly random passwords from a list of 16,449 by simply brute forcing!!!!

Image courtesy : http://www.buzzquake.com/tag/brute-force-attacks/
3.   In December it was unveiled by Jeremi Gosney, the founder and CEO of Stricture Consulting Group, that a 25-computer cluster can cracks passwords by making 350 billion guesses per second. It can try every possible word in less than six hours to get plain text passwords from lists of hashed passwords...the word of significance is that you do not need high end machines and east-west architecture to build this kind of IT infra...it is simply a cluster of machines processing power...

4.   The general user in the cyber space like you and me have actually no control over which hashing process websites use and therefore remain at the mercy of an algorithm all would invariably be clueless about...so if you are concerned about security and your email id and password which is the key for so many transactions in your routine life.long passwords are the best defense....and not simply long it has to be a mix match of numerics,capitals,smalls and special characters!!!.

5.  All the best to all of us...keep surfing but avoid drowning!!!! :-)Thanks http://thehackernews.com

Tuesday, August 28, 2012

Cloud Threat : Malicious Insiders


1.   A lesser known fact but a serious threat comes in form of a malicious insider ie the people who work for the organisation delivering the cloud services.In a typical organisation,one malicious insider can put the company in serious trouble and embarassment unless all are monitored by placing strict access controls and policies.Thus the threat multifolds in capacity of doing damage in case of companies who offer cloud models as service since all services and customers under a single management domain, combined with a general lack of transparency into provider process and procedure. For example, a provider may not reveal how it grants employees access to physical and virtual assets, how it monitors these employees, or how it analyzes and reports on policy compliance.To complicate matters, there is often little or no visibility into the hiring standards and practices for cloud employees. This kind of situation clearly creates an attractive opportunity for an adversary — ranging from the hobbyist hacker, to organized crime, to corporate espionage, or even nation-state sponsored intrusion. The level of access granted could enable such an adversary to harvest confidential data or gain complete control over the cloud services with little or no risk of detection. 

2.   Recommendations by CSA are put up below :

-  Enforce strict supply chain management and conduct a comprehensive supplier assessment.

-  Specify human resource requirements as part of legal contracts.

-  Require transparency into overall information security and management practices, as well as compliance reporting.

-   Determine security breach notification processes.

3.   Thanks CSA

Cloud Threat : Unknown risk profile


1.    The best thing all of us like and promote about cloud is that we have very little and reduced investment in software and hardware and also that the cloud user is able to focus on his core business.Like for a bank he should not be worried about what server should he buy or what storage should he provision...the bank should be able to focus on how to improve the banking procedures and profits.So this way the distraction is less for the prime user.But at the same time these benefits must be weighed carefully against the contradictory security concerns which are complicated by the fact that cloud deployments are driven by anticipated benefits, by groups who may lose track of the security requirements and musts.Would ever the Bank,in an case example,bother to know the Versions of software, code updates, security practices, vulnerability profiles, intrusion attempts, and security design ?I am sure no bank would do that once they have outsourced their worries to the Cloud.Details and Information with whom the same infrastructure is being shared becomes critical.One loose hole and u get compromised.Although this is not so easy....but we should know that the cyber criminals and hackers work more then us to keep all of us on toes and if successful then on Knees:-)

2. An old, 2009, real case example exploiting this specific threat is available at http://www.pcworld.com/article/158038/heartland_has_no_heart_for_violated_customers.html

3.  Recommendations by CSA :

-  Disclosure of applicable logs and data.

-  Partial/full disclosure of infrastructure details (e.g., patch levels, firewalls, etc.).

-  Monitoring and alerting on necessary information.

Monday, August 27, 2012

Cloud Threat : Insecure Interfaces and APIs


1.    How does a typical cloud user interacts,manages and configures his cloud ? This interaction is achieved with Cloud Computing providers exposing the user to a set of software interfaces or APIs.Thus the overall demand,settings,managing and all configuration is achieved using this interface and APIs only.Thus comes the aspect of security of handling and designing these interfaces and APIs.The security and availability of ANY cloud service is dependent upon the security of these basic APIs. From authentication and access control to encryption and activity monitoring, these interfaces must be designed to protect against both accidental and malicious attempts to circumvent policy.Not only this,but all the third parties often build upon these interfaces to offer value-added services to their customers. This introduces the complexity of the new layered API.The recommended remediation's vide CSA are mentioned below :

- Analyze the security model of cloud provider interfaces.

- Ensure strong authentication and access controls are implemented in concert with encrypted transmission.

- Understand the dependency chain associated with the API

Cloud Threat : Shared Technology Issues


1.   When a computer processor is designed/manufactured...viz core 2 Duo or quad-core processor or for this purpose any processor,the processor doesn't know what will it be finally used for....I mean it may be used as a standalone machine or a server machine!!!Here's the issue..ie this processor was not meant to be used for cloud....but how does this matter?This matter because from the security point of view this processor was meant to support strong ISOLATION properties which is not the case in routine manufacturing.Only dependent on the hypervisors for the regular interface as discussed at an earlier post here.In cases of cloud we have to handle two platforms ..one is the OS running like windows or any other OS which comes along with inbuilt and already exploited vulnerabilities that keep getting patched(what about Zero day???) and the other is hypervisor vulnerabilities(just google on hypersvisor vulnerabilities and u see what's in store to get surprised).Both of these combined together would be deadly if not taken care of...because in the cloud world, reacting to a damage would be like taking some one to hospital after an accident or a bomb blast whereas it should be the other way round....remove all possibilities of the accident and ensure 100% secure Areas....latter being too tough to imagine in current environment.

2.   I read about this few years back when I was not very much clear on Cloud Computing concepts(though still naive but better then past!!! :-),there was an incident involving a hypervisor breach that was not widely publicized.Now if u know about XBox 360(is a video game console developed by Microsoft that competes with Sony's PlayStation 3 and Nintendo's Wii),it has an embedded hypervisor (surprisingly not Hyper-V),so it was some time in 2007, that there was a documented buffer overflow vulnerability in this hypervisor which could be exploited to gain access to the hypervisor mode and thus, to the entire system. Microsoft immediately released a patch for this.Now unlike regular Windows OS Option, patches are not optional for Xbox users. Thus,the patch was applied the next time a user connected to Xbox Live or installed a new game. Proof of concepts quickly appeared that exploited the hypervisor vulnerability as well as online documentation on how people have used the Xbox “hypervisor exploit” to crack their systems.(...got this info from http://blogs.gartner.com/neil_macdonald/2009/02/20/hypervisor-attacks-in-the-real-world/)

3.   Thus arises a need for strong secured compartments to ensure that the individual cloud users are not compromised in a manner that would ensure unmanageable losses in monitory terms as well as brand devaluation.The CSA gives the following point wise remidiation format for designing the policy boundaries to counter Shared Technology Issues : 

-  Promote strong authentication and access control for administrative access and operations.

-  Monitor environment for unauthorized changes/activity.

-  Enforce service level agreements for patching and vulnerability remediation.

-  Implement security best practices for installation/configuration.

-  Conduct vulnerability scanning and configuration audits.

Sunday, August 21, 2011

IBM developing PCs that may run 30 times faster


1.   A one-atom-thick layer of carbon has currently become the focus of interest of IBM and the U.S. military to build computers that function at near the speed of light.


2.  The focus is actually based on GRAPHENE, the thinnest and toughest material ever produced, that conducts electricity, a breakthrough that opens the door to its use in digital electronics

3.   Some key finding on GRAPHINE :

- Graphene is the basic structural element of some carbon allotropes including graphite, charcoal, carbon nanotubes and fullerenes.

- Graphene conducts electricity 30 times faster than silicon -- approaching the speed of light

- Until recently, use of graphene was limited to development of more-efficient batteries and foldable touch screens.

- Nokia, the world’s largest maker of mobile phones by volume, is investigating the material’s potential use in cell phones, touch screens, and printed electronics. 

- Graphene’s flexibility and strength is astonishingly 300 times tougher than steel - may lead to the Nokia Morph, the first foldable phone.

- “With a graphene battery the same amount of weight and volume as a current one, you could drive 300 miles instead of 100,” said Yuegang Zhang, a principal investigator at the lab. 

- Graphene has the ideal properties to be an excellent component of integrated circuits. Graphene has a high carrier mobility, as well as low noise, allowing it to be used as the channel in a FET.

4.     Thanks Wiki and electroiq

Monday, November 01, 2010

Intel opens first chip plant in China??

1.    The article at this post here informs in detail about the location,capacity of the first Intel chip set plant in China.The new plant fulfills Intel's total investment commitment in China to $4.7 billion. Intel has also established an assembly and test site in Chengdu as well as R&D centers and labs in Beijing, Shanghai and elsewhere in China, it said.

2.    What made me took a second read on this article was that since about last 6 years,whatever Motherboards and Chipsets from intel I have bought and seen in various machines....all chip sets have a common imprint of MADE IN CHINA since then....so if this is the first plant being set up in china....where were the earlier ones being made or printed???????

Friday, October 08, 2010

Security Enabled Hardware :INTEL - McAfee Merger

1.      “Security is more effective when enabled in hardware” provisions for something in the pipe known as Security Enabled Hardware.Howzzz that???? There has been a lot of speculation about the rationale behind Intel's recent acquisition of McAfee....well if u r not aware of this Intel’s proposed $7.7billion purchase of McAfee that comes as the most magnanimous takeover deal in the chip giant’s 40-odd-year history....u better be now....although there is no product roadmap to speak of yet.




2.       McAfee technology deeply desegregated into Intel products would mean adding security functionality into Intel’s chip. But would this pushing security into silicon be able to negate the increasingly sophisticated and dynamic threats from cyber crime? Though components of security could be significantly enhanced if chips were designed integrating this way. What about updates,patches etc


3.       Security in the 21st century is about being dynamic, responding to the ever-changing threat landscape in real-time, which you can do with a cloud-based system powered by a network of threat intelligence sensors and reputation-based technologies that stop threats before they even hit the device. Pushing security down to the hardware level makes it very difficult to be reactive, agile or fundamentally secure.

Wednesday, July 07, 2010

Intel meets Car : Makes it SMART CAR

1. In an earlier post here about Intel's Bike,I discussed about how Intel had plans to get IT into Bike.Now they have gone a step further.....I mean from Bike to Car...yess..they have graduated to Car.

2. Intel is currently working on a smart car that will register desired information about the speed, steering, braking while also recording video footage from the outside.This would work well enough as a black box since all the information can be used in case of crashes and if possible, even thefts. Safety features like an on-board camera system, sensors to monitor the road condition, distance sensors to warn the driver of closing in distances and mobile control to lock or unlock the car.

Friday, June 18, 2010

INTEL : UPCOMING PROCESSOR'S

1. At an earlier post here, I had discussed about the upcoming OSs incl Barrelfish,Midori,Helios etc likely to be introduced by Microsoft in near future.....now some thing from leaked (which valve actually faltered …no one knows?) source on the net about processors from INTEL,three quad-core Clarksfield processors, the i7-720QM, i7-820QM and i7-920XM, clocked at 1.6GHz, 1.73GHz and 2GHz can be expected by the end of this year

2. Low voltage chips including 25W 2.26GHz Core i7-660LM,1.46GHz Core i7-680UM and 1.33GHz Core i5-560UM with an overall aim to enhance the battery life while end Dec 2010 will see high-end Core i7-680UM that starts at 1.46GHz and speeds up to 2.53GHz and a 1.33GHz / 2.13GHz Core i5-560UM, plus a 25W 2.26GHz Core i7-660LM low-voltage chip will also see the year 2010. All these will have on-die Intel HD Graphics .

3. Another 32nm "Huron River" is likely to make it to the user shores by early 2011 which will single handedly handle WiMAX, WiDi and Intel Bluetooth alongside new concept dubbed Zero Power ODD which promises a power-saving sleep mode for optical disks drives.

Thursday, September 24, 2009

LIGHT PEAK TECHNOLOGY : INTEL


1. Your internet connection at home and office would be happy biting at 10 or 100 Mbps, how about being able to get upgraded to 100Gbps over the decade! yes...INTEL has thrown some light on this vide the new Light Peak technology that uses light instead of electric signals to transmit data, meaning faster speeds, smaller cables, and less signal loss. The subject technology is already in use in data-centers, but has not been able to gate crash into mainstream computing yet. 

2. In the coming year Intel plans to release this technology for use in consumer devices and mainstream computing, for the first time giving people the taste of transfer speeds up to 10Gbps. Light Peak is the code-name for a new high-speed optical cable technology designed to connect electronic devices to each other while allowing high bandwidth starting at 10Gb/s with the potential ability to scale to 100Gb/s over the next decade.
3. Light Peak consists of a controller chip and an optical module that would be included in platforms supporting this technology. The optical module performs the conversion from electricity to light and vice versa, using miniature lasers and photo detectors. 

4. Since this as optical technology, multiplexing multiple connections over a single cable will be much simpler, and thus a single cable cold be used to connect your computer to multiple "peripherals, workstations, displays, disk drives, docking stations, and more."

5. Light Peak is designed to be cheap, and in fact claims to be smaller and cheaper than current telecom modules. The Light Peak optical modules are up to 120 times smaller and up to 30 times cheaper than current telecom modules! The optical fibres used in it are in fact nearly as thin as human hair, and use LASER chips called VCSEL (Vertical Cavity, Surface Emmiting LASER) which are a mere 250 microns by 250 microns.

6. Comeeeeeeeeee ON....what r we heading for in next 50 years....our generation is the lucky one to see all this quick transition from files,postman to emails and Light peak transfer rate.No other generation other then the present one would see this difference....kids today are born without seeing a postman in their galiiiii....born with computers and laptops in hands of ma and pa..

7. Thanks DIGIT & www.engadget.com

Friday, September 11, 2009

INTEL vs THE SEVEN SAMURAIs

1. The old story of  “MUTTHI MEIN TAQAT" has come up with a new version in the 21st century in the form of SEVEN SAMURAI

2. Dysphoric with Intel’s dominance in the sector, the conglutination of processor designers and manufacturers has teamed up to develop a revolutionary new microprocessor. The coalition is led by the recent merger of NEC, Renesas , Hitachi, Toshiba, Fujitsu, Panasonic and Canon. Nickname for the group: THE SEVEN SAMURAI

3. The new microprocessor will be based on innovative energy-saving software. The final, commercial CPU will run on solar cells; it will be smart enough to use only as much power as is needed for the data being processed at the time; and it will remain switched on even during power cuts. A prototype is reported to be running at 30 percent of the power of current CPUs and remains ON even when mains power is cut. This new standard, along with the CPU is likely to be introduced in 2012.

4. Come on ….come on brains of the world…fight more with each other  for consumers like us who wish to get the best!!!!!!!!!!!

5. Thanks www.thinkdigit.com and http://www.osnews.com

Powered By Blogger