Jump to content

Blexfraptor

Members
  • Posts

    2,189
  • Joined

  • Last visited

  • Days Won

    9
  • Country

    Venezuela, Bolivarian Republic Of

Everything posted by Blexfraptor

  1. V1 Text
  2. Good Morning Guys

  3. Currently the smallest lithography available is the 7 nm TSMC for the iPhone XS, XS Max and XR with the Apple A12 Bionic. In 2019 Samsung will be added, and AMD will launch the first processors and 7 nm graphics cards. However, IBM is starting to see the results of its investment beyond 7 nm, and has achieved an interesting innovation related to graphene. The "7 nm and beyond" initiative continues to bear fruit Four years ago, IBM announced that it would invest 3,000 million dollars over a period of 5 years to investigate the future of nanoelectronics under the "Beyond 7 nm" project. And, although some manufacturers know more or less where they are going to shoot to create lithographs of 5 and even 3 nm, there are many doubts about what will happen next. However, IBM researchers have published research in which they have managed to apply electricity to graphene to help deposit the nanomaterials on the substrate with 97% accuracy. Michael Engel, head of development at IBM Brazil, explained that this process can lead to the creation of a hybrid system that combines different techniques to develop electronics over lithography. In the demonstration, they cultivated graphene on silicon carbide, then peeled the graphene and put it on a silicon oxide wafer. This is the most logical material for semiconductors, and it is the one used now, but Engel says it could also be made with copper. Later, it was defined where the graphene was going to be placed and an electric field of alternating current is applied to the graphene layers while depositing the nanomaterials in the upper part. The nanomaterial creeps down and becomes trapped between the opposing graphene electrodes. With this, graphene defines the location and orientation of the electric field so that the nanomaterial is deposited. In the fourth step, the graphene deposition electrodes are discarded, and finally final steps are taken to integrate the final electronic devices. Main problem of this system: its large-scale implementation Until now, the best available technology used metal electrodes, which are difficult to remove and limit the performance and potential integration of the final device when leaving grooves. This is one of the great improvements introduced by graphene, which allows to dispose the nanomaterials without residues, and limit the exposure to chemicals in the final device. With this system also achieves a greater precision at the time of placing the nanomaterials, so that the door is opened to lower nanometers. This process, although hopeful, will not be an immediate solution to the impossibility of continuing with Moore's Law at present. The main problem they face at the moment is to use it on an industrial scale. First, it is necessary to standardize the solutions of nanomaterials to achieve consistent and repeatable results, in addition to adapting the use of the electric field method.
  4. Although perhaps many of you do not know, one of the most significant ways in the current times to filter private data of users when making use of the Internet, is through our web browser. In fact this filtering to which we refer, can not be even solved by the increasingly po[CENSORED]r VPN or virtual private networks, since all this is foreign to the service they usually provide. Well, to give you a more accurate idea of all this, then we are going to make a summary of the most important types of data that we are making known, unwittingly, to these programs increasingly used in all types of platforms and devices. Hardware and Software To begin we will say that as a general rule, the web browser that we use daily, collects a large amount of data about the hardware of our team, as well as part of the software we have installed. In this way the program knows the operating system that we use, our IP address, or the add-ons and extensions we use. At the same time and if we focus on the hardware, here is gathered information as important as the installed CPU, the GPU, or the battery of the equipment. One of the options to reduce leaks in this regard, is making use of a plugin focused on the privacy of users, such as the well-known NoScript. Geolocation This is a section that, as mobile devices have been advancing and gaining in features and versatility, at the same time has been extended. Specifically, we refer to the way in which the web browser itself knows exactly where we are at each moment, all thanks to the geolocation it uses. Thus, a website can accurately estimate our location, even if we have not given access to our GPS coordinates. Instead, you can use the Google API for these tasks, even if we are accessing the web from a browser on a mobile device. We will say that to avoid this type of actions related to geolocation and that the browser filters the data of our location, we can always use a web proxy to access the websites, among which we can also find several free alternatives. At the same time if we do not want Google to be able to use the aforementioned API, we will have to disable JavaScript in the software or, once again, use applications such as NoScript Browsing history One of the most known types of data that our browser collects about us while we are using it, is the browsing history. Of course we can always delete this navigation data, however it is worth knowing that even then, this history may not have disappeared completely. As an example, in the middle of this year, that is, just a few months ago, it was learned that Google keeps records about the way we use Chrome in relation to the deleted data, even if they were deleted, which includes this history of which we speak. With everything and with it it will never be more than every so often we make a cleaning of the data that is stored automatically in these browsers. Mouse movements One of the most curious types of data we can find and that these programs are able to filter to third parties, are the movements that we constantly make with the mouse, in addition to the clicks that we carry out on the websites that we visit. As a demonstration of this and for you to see this section in action, we recommend you take a look at this free web tool. Where we have our device In mobile terminals in recent years, it is more than usual that we find elements such as built-in gyroscopes, since these sensors are used in a multitude of applications, although they are also used to perform monitoring and status tasks, all based on the movements that we make. Well, these data are collected, among other sections, through our browser, because the software knows if the device has a gyroscope, a compass, or other similar sensors to know where we are at that time, in addition to other details technicians What's more, the program can even know where the terminal is physically: on a table, in a backpack, or in a pocket. Social network information As expected, these programs that we are talking about collect personal information about the social networks to which we are connected, all while we move through them and interact with other users. At the same time we will say that the browser is prepared to relate this information collected with other types of data, all this so that advertisers, for example, know where and how to contact us and thus achieve maximum impact and success. Fonts, language and photographs On the other hand, we will tell you that these programs also know exactly the sources that we have installed on our computer, in addition to the language in which we are using the operating system. In addition, it is interesting to know that each time we upload a new image using our favorite web browser, it is scanning the metadata of the file to know more about us. And of course, these metadata can include information such as the location, the resolution of the image, the technical specifications of the file, or even the camera model we use to take the photograph. Technical information To conclude, we will tell you that in addition to everything discussed so far, these Internet browsers so widespread today, also collect large amounts of technical data on how we are accessing the web. These data to which we mention, include the user agent of the browser itself, if we have touch screen support, if the heading "Do not track" or DNT is enabled, the size of the screen, and many other things.
  5. V2:Text.Blur
  6. Hurricane Michael, now a tropical storm, left at least 11 dead after touching land on Wednesday in Florida, officials said Friday, reporting the deaths of five people in Virginia. In the Twitter account of the emergency services of the state it was written: "5 confirmed deaths linked to Michael". The climatic phenomenon passed through Virginia on Thursday and now it moves away from the US territory, degraded to a post-tropical storm. The Emergency Department reported that 520,000 homes are without electricity in Virginia. "Floods, fallen trees, closed roads and debris are going to affect the roads this morning," said emergency services. According to the balance of the authorities, in Florida four people died, in Georgia an 11-year-old girl died, and another person died in North Carolina, a state already affected by Hurricane Florence last month. Search efforts continue The search and rescue teams worked Friday in the destroyed communities of the United States looking for victims of Hurricane Michael. According to the authorities, it has been the most powerful storm to hit the state of Virginia in years. The US military explained that more than 2,000 soldiers of the Florida National Guard were working in recovery operations. Michael's eye touched land near Mexico Beach, a town about 30 km southeast of Panama City, on Wednesday as a Category 4 hurricane of a maximum of 5 on the Saffir-Simpson scale, the National Hurricane Center reported. (NHC). My biggest worry is, of course, the loss of lives. I know that several people were injured Tearing roofs Photos and videos of Mexico Beach, of about 1,000 inhabitants, showed scenes of absolute devastation. The houses seemed to float in the middle of flooded streets, some completely destroyed after having lost the roof. There, the boats were thrown into the yards and the streets were plagued with trees and power lines. "My house in Mexico Beach is underwater," said Loren Beltrán, a 38-year-old accountant, after seeing images of her neighborhood. She and her 3-year-old son took refuge in another house in Panama City, where the outlook was not much more encouraging. Panama City looked like a war scenario after being hit by more than three hours with strong winds and heavy rain that fell horizontally. The streets were impassable and there were containers, antennas, roofs, trees and traffic lights scattered everywhere. "The winds could be heard ugly, like a big television monster," Beltran told AFP. The house where he took refuge from the storm was partially destroyed by the trees that surrounded it and that fell with the wind. "It's an unthinkable devastation," said Rick Scott, the Republican governor of Florida. "My biggest concern is, of course, the loss of life, I know several people were injured." Scott had warned that the hurricane would be "the most destructive storm that hits the panhandle of Florida in a century." The "panhandle" (pan handle) is how this tongue of land is commonly known on the coast of the Gulf of Mexico. In reporting to President Donald Trump at the White House, the head of the federal emergency agency FEMA, Brock Long, said Michael is the most intense hurricane to hit the area since 1851. Speaking to Fox News on Thursday, the president promised that "the reconstruction will be quick." On Wednesday, Trump had said he would travel to Florida "very soon." More than 400,000 homes and businesses were without power in Florida, according to a newsletter from Florida's emergency agency, SERT, and Governor Scott said about 20,000 workers were trying to restore service. A historic hurricane "Unfortunately, this is a historical situation, incredibly dangerous and life-threatening," Ken Graham, director of the NHC, had warned. General Terrence O'Shaughnessy, commander of the North American Aerospace Defense Command, said the rapidity with which the storm formed and grew took residents off guard. "When we least expected it, it was a Category 4 hurricane," O'Shaughnessy said. It is estimated that some 375,000 people from more than 20 counties received evacuation orders, mandatory or voluntary. FEMA has more than 3,000 people on the ground, while Governor Scott said he had activated 3,500 National Guard troops. In Dothan, Alabama, billboards, utility poles and various sheet metal roofs were blown up by the wind, the AFP said. Some trees that fell on the road were cut at dawn to allow traffic. Last year, a series of catastrophic hurricanes hit the western Atlantic. The most devastating were Harvey in Texas, Irma in the Caribbean and Florida, and Maria, who hit the Caribbean and left almost 3,000 dead in the US territory of Puerto Rico. The Atlantic hurricane season ends on November 30.
  7. Congratulations for the pink color

  8. Happy Birthday friend passes it well in your day
  9. New avatar and signature ? ? 

    New-avatar-AZAKA-CSBD.png 

    New-Signature-A-Z-A-K-A-CSBD.png

  10. Blexfraptor

    ts3 problem

    you already have an open topic Here Closed/Topic
  11. TSMC is currently the most advanced chip manufacturer in the world, as it is the only one that is creating 7 nm processors present in devices that we can buy, such as the Apple A12 Bionic included in the iPhone XS, XS Max and XR. However, TSMC is already thinking about the next generation of 7 nm, in addition to the 5 nm that will replace them. The next generation of 7 nm + will arrive next year This announcement of the new generation of the 7 nm is particularly interesting because this will be the first lithography to make use of EUV (Extreme UltraViolet) technology. The company has affirmed that it already has a first client that will use it, and that the 5 nm will enter the phase of "risk production" next April. TSMC started to mass-produce 7 nm chips last April. To do this, they use Deep Ultraviolet lithography (DUV), but for this new one they will use EUV. The objective of this is to gain precision and increase production. The density will be around 20% higher, with a consumption 8% lower maintaining the frequency and complexity, although in principle without increasing performance. The new client who has already signed on to use this new lithograph has not been published, but looking at the company's history one would expect them to be either AMD or Apple. 5 nm: same power in half the space After this process of 7 nm +, the 5 nm will arrive. This first generation will use EUV in up to 14 of its layers, compared to the 4 that will use the 7 nm +. The performance and density improvement will be much more substantial. Specifically, the estimate is that consumption is 20% lower than 7 nm + (30% more than the current 7 nm), that performance improves 15%, and that the reduction of the area is 45%. This will make the processors smaller, or that in the same size that increase in density allows more transistors to be introduced. Normally, one year passes from the risk production process to the mass production process. Therefore, when starting the first step in April 2019, by April 2020, the first 5 nm chips of the mass manufacturing process should be ready. By 2019, it is expected that AMD will use the current 7 nm node, while perhaps by the end of the year they could use the 7 nm + node for their future graphics cards. The 2019 iPhones should also make use of these 7 nm +. The 5 nm will be a quite expensive technology. Normally the cost of developing a new process is estimated at around 150 million dollars, taking into account work and intellectual property licenses. With 5 nm, the cost is expected to rise to 200 or 250 million dollars, which will limit the number of companies that make use of it.
  12. Gmail is undoubtedly one of the most used email services in the world. In addition to that Google offers it for free, it has both its web version and its app so we can always have the mail at hand. It also has interesting functions, storage space and security options. One of them is to try to detect any mail that may be dangerous and can infect us with a virus or malware. However, it is a function that can sometimes cause us some problem. Next, we will show how to download an attachment in Gmail even though the service deactivates or blocks this option. I'm sure that on some occasion you tried to send an attachment in Gmail but the service itself has not allowed it. And is that Gmail, prevents that you can send files of certain types to prevent it can easily spread viruses or malware. However, this does not mean that at some point we receive an email that carries an attachment that is suspicious for Gmail and we want to download it anyway. In the case where we receive an attachment in Gmail that has been blocked from downloading, the service will show us a message indicating that the file is potentially dangerous and the download of the file is disabled. This is going to make it impossible for us to download the attachment in Gmail, however, it may be dangerous, come from one of our trusted contacts and we want to download it in any case. So you can download an attachment in Gmail even if it has been blocked Well, for that we are going to have to follow the steps that we show below. First of all, we will have a mail client installed on our computer. If you have Windows 10 then you will have by default the application of Mail, Mail in the case of using macOS or Thunderbird is also installed by default in most Linux distributions. In any case, the mail client must be configured with a mail account in order to follow the steps shown below. The first thing we are going to do is open the mail message that has the attached file in Gmail and click on the menu button next to the reply button to select the option Show original. This will open a new window or tab where we have to click on the original Download button and then change the default extension TXT to EML. With the EML file saved on our PC, the next thing we have to do is open it with our mail client installed on the computer and then right click on the attached file to select the Open or Save option. Now we should be able to download the attachment in Gmail that we could not save from the Google service.
  13. On Wednesday, Keiko Fujimori, daughter of former Peruvian President Alberto Fujimori (1990-2000), was detained for 10 days by order of Judge Richard Concepción Carhuancho in Peru. The former Po[CENSORED]r Force presidential candidate is accused of receiving illegal contributions from Odebrecht. After their declaration before the Prosecutor's Office, experts explain what process the law should follow. What is preliminary detention? As its name indicates, preliminary detention is a precautionary measure that a prosecutor asks a judge when there are well-founded elements of judgment to assume that people are going to run away, are going to evade the pursuit of justice or go to destroy evidence. If the judge considers that the request is appropriate, it issues this precautionary measure and gives the prosecutor a deadline to present his case and request preventive detention. Preliminary detention is a kind of emergency mandate. A prosecutor, with a case of urgency, asks a judge to detain those under investigation to prevent them from evading justice. The maximum term for a preliminary detention in cases of criminal organization is 10 days. * Enrique Ghersi - Criminal Lawyer You have to formalize an investigation because otherwise it would be an arbitrary detention. What happens once the 10 days of preliminary detention expire? It would have to formalize the investigation because, if not, it would be an arbitrary detention. If a prosecutor asks for a preliminary detention and does not formalize the charges within the period that the judge has given him, it is because he is acting arbitrarily, and would have not only functional but also criminal responsibility, for having abusively requested the arrest of a person. * Enrique Ghersi - Criminal Lawyer What actions can Keiko Fujimori's defense take? They can appeal, but, unfortunately, as they have requested 10 days for the preparatory investigation, the deadline is very short for the court to resolve. In 10 days formalize the investigation and there it is already possible that Keiko Fujimori appeals to this situation of deprivation of their freedom. * Mario Amoretti - Criminal Lawyer If the judge ruled in favor of the preliminary detention, does it mean that he will do the same before a possible request for preventive detention? Of course. Concepcion has been amended in the case of Humala, in the case of Moreno, in the case of the 'construction club' businessmen, but he says: "No, I am the one who is right, the TC those in the penal room do not either. " After dictating this measure, nobody is going to change his mind. I think that it is most likely that, at the end of these 10 days, a preventive detention measure will be issued. * Mario Amoretti - Criminal Lawyer
  14. espero que te guste 

     

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.