Thursday, July 31, 2008

We are all bad NVIDIA card boys !


GeForce 8600 GTS GeForce 8600 GT
Stream Processors 32 32
Core Clock (MHz) 675 540
Shader Clock (MHz) 1450 1180
Memory Clock (MHz) 1000 700
Memory Amount 256MB GDDR3 256MB GDDR3
Memory Interface 128-bit 128-bit
Memory Bandwidth (GB/sec) 32 22.4
Texture Fill Rate (billion/sec) 10.8 8.6

Except model 8800 based on a different, unaffected core.

US Air Force to Launch Military Orbital Spaceplane

At first sight, it looks like the US military is starting to feel the heat of the May 2010 deadline for the space shuttle program—which will limit their capacity to service military satellites as well as their secret orbital base, with all those nuclear heads and chemical lasers capable of blowing up Teheran in a millisecond.

Airy disk - bad news for ever more megapixels camera

Airy disk - bad news for more megapixels camera

diaphragm diameter of the Airy disc
f/1.4 1.9 µm
f/2.8 3.8 µm
f/5.6 7.5 µm
f/8 10.7 µm
f/11 14.8 µm
f/16 21.5 µm
f/22 29.5 µm
f/32 42.9 µm
f/64 85.9 µm

Some camera formats

Computing in 80ies, BC of course !

Fragments of the Antikythera Mechanism, an ancient astronomical computer built by the Greeks around 80 B.C. It was found on a shipwreck by sponge divers in 1900, and its exact function still eludes scholars to this day.

After a closer examination of a surviving marvel of ancient Greek technology known as the Antikythera Mechanism, scientists have found that the device not only predicted solar eclipses but also organized the calendar in the four-year cycles of the Olympiad, forerunner of the modern Olympic Games.

But you would say, computers can't be mechanical devices. Right?

Tuesday, July 29, 2008

HP Admits NVIDIA Defects Were Known Since Last Year

Dell isn't the only laptop maker offering its customers help if they have laptops with certain Nvidia chips that are prone to overheating. HP has issued a list of laptops of its own that feature the chipset and states that it's been a known warranty issue since late last year.

World's Cheapest Laptop = $133

Processor Speed: 400 MHz MIPS Screen Size: 7" 128 MB RAM: 80 Key Keyboard & Touchpad
Hard Drive Capacity: 1 GB

1) 400 MHz MIPS CPU
2) 7" Analog Screen
3) 128 MB SDRAM
4) 1 GB Flash Memory
5) 80 Key English Keyboard & Touch Pad
6) Linux O.S.
7) Connectors: SD Card Slot, VGA Port, USB x 3, Mini USB, Microphone and Earphone Jack
8) AC Adaptor and Accessories
9) External USB LAN or 802.11g WiFi dongle (optional)


1) Excel File Viewer and Editor
2) Word File Viewer and Editor
3) Internet Browser
4) Media Player
5) Flash Viewer
6) O-Image Photo Viewer
7) Typing - Word Processor
8) Drawpad - Paint Application
9) Pointer Application

Monday, July 28, 2008

There are several US banks that are now in big trouble

It means the cost of bailing out housing exposures to the two mortgage insurers will be so great that it will leave no room to bail out anything else and there are several US banks that are now in big trouble.

US banks have written down $450 billion in bad housing loans.

The revelation from NAB means that they will now certainly need to take provisions to $1,000 billion. But write-downs of $1,300 billion and perhaps even more are on the cards.

Sunday, July 27, 2008

Fewer than one in 11 of the PCs being used in large or very large enterprises runs Windows Vista,

Of the 50,000 enterprise users surveyed by the Cambridge, Mass., analyst firm, 87.1% were still running Windows XP at the end of June, compared to 8.8% for Vista. According to author Thomas Mendel, that implies that the majority of PCs upgraded to Vista were those running older versions of Windows, such as Windows 2000 or 98.

Petavision project using petaflops supercomputer

Is artificial vision just around the corner?
Roadrunner has a unique hybrid design comprised of nodes containing two AMD OpteronTM dual-core processors plus four PowerXCell 8iTM processors used as computational accelerators. The accelerators are a special IBM-developed variant of the Cell processors used in the Sony PlayStation 3.

Are PS3 bundles better for that task than the NVIDIA GC performance monsters ?
Or perhaps FPGA?

People actually like Microsoft Vista, though they still don't know that :)

Finally, a truth on bad OS.

Saturday, July 26, 2008

Moon GPS ??

For whom?

Friday, July 25, 2008

USA Nuclear launching codes without control !!!

Finally, a truth on bad security.

Tuesday, July 22, 2008

David Kaminski DNS attack in detail

  1. Reliable DNS Forgery in 2008: Kaminsky’s Discovery
  2. from Matasano Chargen by ecopeland
  3. 0.

  4. The cat is out of the bag. Yes, Halvar Flake figured out the flaw Dan Kaminsky will announce at Black Hat.
  5. 1.

  6. Pretend for the moment that you know only the basic function of DNS — that it translates WWW.VICTIM.COM into The code that does this is called a resolver. Each time the resolver contacts the DNS to translate names to addresses, it creates a packet called a query. The exchange of packets is called a transaction. Since the number of packets flying about on the internet requires scientific notation to express, you can imagine there has to be some way of not mixing them up.

  7. Bob goes to to a deli, to get a sandwich. Bob walks up to the counter, takes a pointy ticket from a round red dispenser. The ticket has a number on it. This will be Bob’s unique identifier for his sandwich acquisition transaction. Note that the number will probably be used twice — once when he is called to the counter to place his order and again when he’s called back to get his sandwich. If you’re wondering, Bob likes ham on rye with no onions.

  8. If you’ve got this, you have the concept of transaction IDs, which are numbers assigned to keep different transactions in order. Conveniently, the first sixteen bits of a DNS packet is just such a unique identifier. It’s called a query id (QID). And with the efficiency of the deli, the QID is used for multiple transactions.
  9. 2.

  10. Until very recently, there were two basic classes of DNS vulnerabilities. One of them involves mucking about with the QID in DNS packets and the other requires you to know the Deep Magic.

  11. First, QIDs.

  12. Bob’s a resolver and Alice is a content DNS server. Bob asks Alice for the address of WWW.VICTIM.COM. The answer is Mallory would like the answer to be

  13. It is a (now not) secret shame of mine that for a great deal of my career, creating and sending packets was, to me, Deep Magic. Then it became part of my job, and I learned that it is surprisingly trivial. So put aside the idea that forging IP packets is the hard part of poisoning DNS. If I’m Mallory and I’m attacking Bob, how can he distinguish my packets from Alice’s? Because I can’t see the QID in his request, and the QID in my response won’t match. The QID is the only thing protecting the DNS from Mallory (me).

  14. QID attacks began in the olden days, when BIND simply incremented the QID with every query response. If you can remember 1995, here’s a workable DNS attack. Think fast: 9372 + 1. Did you get 9372, or even miss and get 9373? You win, Alice loses. Mallory sends a constant stream of DNS responses for WWW.VICTIM.COM. All are quietly discarded —- until Mallory gets Bob to query for WWW.VICTIM.COM. If Mallory’s response gets to your computer before the legitimate response arrives from your ISP’s name server, you will be redirected where Mallory tells you you’re going.

  15. Obvious fix: you want the QID be randomly generated. Now Alice and Mallory are in a race. Alice sees Bob’s request and knows the QID. Mallory has to guess it. The first one to land a packet with the correct QID wins. Randomized QIDs give Alice a big advantage in this race.

  16. But there’s a bunch more problems here:

  17. *

  18. If you convince Bob to ask Alice the same question 1000 times all at once, and Bob uses a different QID for each packet, you made the race 1000 times easier for Mallory to win.
  19. *

  20. If Bob uses a crappy random number generator, Mallory can get Bob to ask for names she controls, like WWW.EVIL.COM, and watch how the QIDs bounce around; eventually, she’ll break the RNG and be able to predict its outputs.
  21. *

  22. 16 bits just isn’t big enough to provide real security at the traffic rates we deal with in 2008.

  23. Your computer’s resolver is probably a stub. Which means it won’t really save the response. You don’t want it to. The stub asks a real DNS server, probably run by your ISP. That server doesn’t know everything. It can’t, and shouldn’t, because the whole idea of DNS is to compensate for the organic and shifting nature of internet naming and addressing. Frequently, that server has to go ask another, and so on. The cool kids call this “recursion”.

  24. Responses carry another value, too, called a time to live (TTL). This number tells your name server how long to cache the answer. Why? Because they deal with zillions of queries. Whoever wins the race between Alice and Mallory, their answer gets cached. All subsequent responses will be dropped. All future requests for that same data, within the TTL, come from that answer. This is good for whoever wins the race. If Alice wins, it means Mallory can’t poison the cache for that name. If Mallory wins, the next 10,000 or so people that ask that cache where WWW.VICTIM.COM is go to
  25. 3.

  26. Then there’s that other set of DNS vulnerabilities. These require you to pay attention in class. They haven’t really been talked about since 1997. And they’re hard to find, because you have to understand how DNS works. In other words, you have to be completely crazy. Lazlo Hollyfeld crazy. I’m speaking of course of RRset poisoning.

  27. DNS has a complicated architecture. Not only that, but not all name servers run the same code. So not all of them implement DNS in exactly the same way. And not only that, but not all name servers are configured properly.

  28. I just described a QID attack that poisons the name server’s cache. This attack requires speed, agility and luck, because if the “real” answer happens to arrive before your spoofed one, you’re locked out. Fortunately for those of you that have a time machine, some versions of DNS provide you with another way to poison the name server’s cache anyway. To explain it, I will have to explain more about the format of a DNS packet.

  29. DNS packets are variable in length and consist of a header, some flags and resource records (RRs). RRs are where the goods ride around. There are up to three sets of RRs in a DNS packet, along with the original query. These are:

  30. *

  31. Answer RR’s, which contain the answer to whatever question you asked (such as the A record that says WWW.VICTIM.COM is
  32. *

  33. Authority RR’s, which tell resolvers which name servers to refer to to get the complete answer for a question
  34. *

  35. Additional RR’s, sometimes called “glue”, which contain any additional information needed to make the response effective.

  36. A word about the Additional RR’s. Think about an NS record, like the one that COM’s name server uses to tell us that, to find out where WWW.VICTIM.COM is, you have to ask NS1.VICTIM.COM. That’s good to know, but it’s not going to help you unless you know where to find NS1.VICTIM.COM. Names are not addresses. This is a chicken and egg problem. The answer is, you provide both the NS record pointing VICTIM.COM to NS1.VICTIM.COM, and the A record pointing NS1.VICTIM.COM to

  37. Now, let’s party like it’s 1995.

  38. Download the source code for a DNS implementation and hack it up such that every time it sends out a response, it also sends out a little bit of evil — an extra Additional RR with bad information. Then let’s set up an evil server with it, and register it as EVIL.COM. Now get a bunch of web pages up with IMG tags pointing to names hosted at that server.

  39. Bob innocently loads up a page with the malicious tags which coerces his browser resolve that name. Bob asks Alice to resolve that name. Here comes recursion: eventually the query arrives at our evil server. Which sends back a response with an unexpected (evil) Additional RR.

  40. If Alice’s cache honors the unexpected record, it’s 1995 —- buy CSCO! —- and you just poisoned their cache. Worse, it will replace the “real” data already in the cache with the fake data. You asked where WWW.EVIL.COM was (or rather, the image tags did). But Alice also “found out” where WWW.VICTIM.COM was: Every resolver that points to that name server will now gladly forward you to the website of the beast.
  41. 4.

  42. It’s not 1995. It’s 2008. There are fixes for the attacks I have described.
  43. Fix 1:

  44. The QID race is fixed with random IDs, and by using a strong random number generator and being careful with the state you keep for queries. 16 bit query IDs are still too short, which fills us with dread. There are hacks to get around this. For instance, DJBDNS randomizes the source port on requests as well, and thus won’t honor responses unless they come from someone who guesses the ~16 bit source port. This brings us close to 32 bits, which is much harder to guess.
  45. Fix 2:

  46. The RR set poisoning attack is fixed by bailiwick checking, which is a quirky way of saying that resolvers simply remember that if they’re asking where WWW.VICTIM.COM is, they’re not interested in caching a new address for WWW.GOOGLE.COM in the same transaction.

  47. Remember how these fixes work. They’re very important.

  48. And so we arrive at the present day.
  49. 5.

  50. Let’s try again to convince Bob that WWW.VICTIM.COM is

  51. This time though, instead of getting Bob to look up WWW.VICTIM.COM and then beating Alice in the race, or getting Bob to look up WWW.EVIL.COM and slipping strychnine into his ham sandwich, we’re going to be clever (sneaky).

  52. Get Bob to look up AAAAA.VICTIM.COM. Race Alice. Alice’s answer is NXDOMAIN, because there’s no such name as AAAAA.VICTIM.COM. Mallory has an answer. We’ll come back to it. Alice has an advantage in the race, and so she likely beats Mallory. NXDOMAIN for AAAAA.VICTIM.COM.

  53. Alice’s advantage is not insurmountable. Mallory repeats with AAAAB.VICTIM.COM. Then AAAAC.VICTIM.COM. And so on. Sometime, perhaps around CXOPQ.VICTIM.COM, Mallory wins! Bob believes CXOPQ.VICTIM.COM is!

  54. Poisoning CXOPQ.VICTIM.COM is not super valuable to Mallory. But Mallory has another trick up her sleeve. Because her response didn’t just say CXOPQ.VICTIM.COM was It also contained Additional RRs pointing WWW.VICTIM.COM to Those records are in-bailiwick: Bob is in fact interested in VICTIM.COM for this query. Mallory has combined attack #1 with attack #2, defeating fix #1 and fix #2. Mallory can conduct this attack in less than 10 seconds on a fast Internet link.

Monday, July 21, 2008

World's First Two-Watt PC

Finally, a truth on decent hardware

The CherryPal desktop consumes just two watts of power, compared to the 114 watts of power used by the average desktop machine, delivering a 98 percent decrease in energy consumption. In addition, it also uses 80 percent fewer components, dramatically reducing the amount of resources it takes to manufacture a PC. And because there are no moving parts, the CherryPal desktop can last a decade or longer, eliminating the need to replace a computer every two to three years.

Nice plank device for surfing in a big shark infested hardware waters.

Freescale’s MPC5121e mobileGT processor, 800 MIPS (400 MHz) of processing
256 MB of DDR2 DRAM
4GB NAND Flash-based solid state drive
WiFi 802.11b/g Wi-Fi
Two USB 2.0 ports
One 10/100 Ethernet with RJ-45 jack
One VGA DB-15 display out jack
Headphone level stereo audio out 3.5mm jack
9vDC 2.5mm 10 watt AC-DC adapter power supply
Weighs 10 ounces
1.3” high, 5.8” x 4.2” wide

Eagle to Houston 39 years ago exactly : We have guiding computer performance problem !


US B-52 nuclear bomber crashes off

In February, a B-2 stealth bomber, which costs around $1.2 billion, too crashed at Andersen Air Force Base on Guam.
Finally, a truth on bad hardware.

How they manage to bomb Iraq at all, when B 52 are mysteriously falling with 8 power engines below the wings? Do we remember Russian's after failed Perestrojka sinking nuclear subs?

Saturday, July 19, 2008

AMD's Bobcat to smash Atom

With lesser overall power budget.

Liquid metal cooling

Ideal for AMD 4 core cooling.

Humans as endangered species

Our most powerful 21st-century technologies - robotics, genetic engineering, and nanotech - are threatening to make humans an endangered species.

Survival of the Machines through shared reality

Finally, a truth on bad hardware.
In the real world, a few researchers are working toward a moment that feels inspired by such science fiction: a tipping point when smart computers themselves become capable of creating smarter computers, at a speed and in a direction we cannot predict.

Professor Jeremy Cooperstock, who teaches a course in Artificial Intelligence at McGill University, sits in a "shared reality" environment in a university lab. Shared reality is a twist on virtual reality, involving interactive virtual environments that can be shared by users in different locations, and can also interact with the real world.

The end of more than Moore era !

"There are three forces that are converging as growth enablers for chips—the Internet, connectivity and Moore's Law,"

"After 22nm the result of further scaling is more power consumption, more costly [devices] and slower operation"

Gulp. Seems only 2 scaling generation more are left to invincible manufacturerIntel. Than in hardware we will face too the same problem like with Microsoft Vista. Expensive resource hogging.

Singer reminded the audience that "it takes 10 years for innovative technologies to be entrenched in volume production from the time they were researched and developed.

Actually, one unblocked road is left. It is called 3D device integration, but the industry is not ready at all. Nor it will be in time.

Economy Down, PC Sales Up

Economy Down, PC Sales Up

Is that strange combination actually good or bad?

Thursday, July 17, 2008

NASA Moon sequel schedule in danger !

Space program contractor Hamilton Sundstrand is seeking urine from workers at the Johnson Space Center in Houston as part of its work on the new Orion space capsule that would eventually take astronauts to the moon, according to an internal memo posted on the Web site

Here is a suggestion of a quick fix to NASA. Take a Budweiser for mission sponsor. That will make
enough urine stockpile even for Mars mission!.

After rumored big reliability problems NVIDIA switches to SOI substrate !

The SOI Industry Consortium announced today that NVIDIA (Nasdaq: NVDA), the world leader in visual computing technologies, has joined the organization.

BADHARDWARE's comment: QUite contrary AMD first switched to SOI and than run into troubles !.

AMD payed for ATi more than double of its real value !??

Now it writes $2.6B off.

Tuesday, July 15, 2008

Mars Space Odyssey 2011: 10 Petaflops computer at the University of Illinois

We've got documents showing IBM going after a 10 petaflop system (peak) comprised of 38,900 eight-core Power7 chips with each chip running at 4.0GHz. This monster will have an astonishing 620TB of memory and 5PB/s of memory bandwidth. To be used at the University of Illinois by the year 2011.

SF writer Sir Arthur Clarke had a vision of HAL9000 Psycho badhardware supercomputer (No. 13th in Hollywood 100 years list of villains, by the way Count Dracula is only no. 33 at the same list) in his legendary novel Space Odyssey 2010.
Unnecessary to say, HAL9000 has been too designed and operated at the University of Illinios.

"I am a HAL 9000 computer. I became operational at the H.A.L. plant in Urbana, Illinois on the 12th of January 1992. My instructor was Mr. Langley, and he taught me to sing a song. If you'd like to hear it I can sing it for you. "
HAL, open the doors, please. !

Everything on Earthly bad hardware you can find free of charge at BADHARDWARE. However, human analogs for Clarke's higher mental supercomputer's malfunctions like in the legendary Odyssey 2001, you can find of course at the open the doors institution of closed type.
Let me remind you in th end that in those hippie years the very idea of possible terrorism threats still wasn't clearly exposed to broad, mainly cinema public)

Stealth bomber B2 upgraded to Pentium ?!

Finally, a truth on bad hardware.

The company is upgrading the B-2's 256Kb-class processor chip with a Pentium-class Lockheed Martin integrated processing unit, with the improved FMS to feature 1Gb/s computational speed.

Now anyone can afford stealth bomber. Right? By the way, the next upgrade consequently might be to Vista ?

Monday, July 14, 2008

Terminator is unable to terminate wildfires

Bush doesn't believe in wildfires- global warming link. Actually Bush doesn't believe in global warming at all. Why? Because it should be a flaw in his intelligent design of our world theory.

Competition = lower share prices for all that are involved

As Nvidia Struggles, So Do AMD and Intel

Tech stocks slump as broad market retreats

Yet some remain skeptical. Merrill Lynch analyst Srini Pajjuri said demand for Intel’s chips may recede in the second half of this year as consumer shopping slows worldwide.

Sunday, July 13, 2008

Canada on Mars too !

AMD 45nm-Deneb @ 3.44 GHz !

Seems that production clock values should be as high as 2.8Ghz. That is pretty competitive compared to Intel. Actually, seems that Phenom is concieved as 45nm design that was premateruly born in 65nm.
Please note 6MB of L3. Now Intel should start running for their money. No easy earnings any more.

Friday, July 11, 2008

AMD to file a big loss in Q2 2008

AMD will again announce a big loss in Q2 2008 but this is not really a surprise. We heard that this time around the loss will get to over 300 million.

Thursday, July 10, 2008

It is time for 24M pixels DSLR camera

Kodak full frame sensor reached 50M pixels. Nice, that allows smaller sensor formats cameras 24M pixels without drop of S/N . And pocket camera of 12MP, and mobile phone of 8MP.
Next year of course, but possible even this summer.
In fact, Nikon would be a more likely customer for this sucker when it ships this summer, the better to compete with Canon's $8,000 EOS-1Ds Mark III DSLR, which has its own 21.1-megapixel full-frame CMOS.

Tuesday, July 08, 2008

The secret of Intel's Core duo bus efficiency finally discovered in detail !

AMD's engineers couldn't ever imagine this bus breakthrough solution from Intel's Israel Core duo research labs. Using of course as you can see, brain breaking reverse engineering technology. Intel inclined hardware sites have helped a lot in establishing in industry this broken mainstream bus solution in 65nm.

MSI officially announces first 12.1-inch Puma kitties

The second one packs a bit more power as it is based on ATI's RX781+SB700 chipset. This one will come with ATI Radeon HD 3450 with 256MB of GDDR3 memory. The rest of the specs are the same as on the PR211 model. Both of these models are coming with a 12.1-inch TFT screen capable of showing 1280x800 resolution.
They are both delivering speedy scratches NOW, immediately. Atom power seems pale compared with this. :)

Obama wins landslide 4: 1 !, well for now among the Internet people .

Expected democratic presidential nominee Barack Obama apparently reaches a far greater Internet audience than the Republican nominee, John McCain. According to a survey released by Nielsen Netratings, Obama’s website counted 2.3 million unique visitors in June while John McCain’s site was the destination of only 563,000 unique visitors, market research firm Nielsen Netratings said today (see the picture above).

AMD Phenom Black Edition TDP 125W at 2.5Ghz

Phenom X4 9850 Black Edition

Clock 2.5GHz
L1 64KB×4
L2 512KB×4
L3 2MB
HT 2.0GHz
Voltage 1.05 /1.30V
T 61℃
Power 125W

AMD should halve power consumption in 45nm , or 200W will follow at 3 Ghz clock.
Intel's Nehalem is just around the corner.
Believe me.
Or look at this test below.

Saturday, July 05, 2008

Police officer: "Yes, it's the moon. Over."

Control: "South Wales Police, what's your emergency?"

Caller: "It's not really. I just need to inform you that across the mountain there's a bright stationary object."

Control: "Right."

Caller: "If you've got a couple of minutes perhaps you could find out what it is? It's been there at least half an hour and it's still there."

Control: "It's been there for half an hour. Right. Is it actually on the mountain or in the sky?"

Caller: "It's in the air."
Control: "I will send someone up there now to check it out."

Caller: "OK."
After the police patrol car arrives, the script reveals the exchange between the control room and the police officer sent to the scene.

Control: "Alpha Zulu 20, this object in the sky, did anyone have a look at it?"

Officer: "Yes, it's the moon. Over."

Friday, July 04, 2008

Fat vs thin client computing

UK MOD to roll out 6000 terminals each month

The first stage was meant to deliver 62,800 terminals by July 2007 but only 29,000 have been installed so far. A project to deliver a unified computer system for Britain's armed forces is running 18 months late and in danger of being seriously over budget unless the Ministry of Defence takes "concerted action", says the public spending watchdog.

The new system is being built by the Atlas consortium led by U.S. computer firm EDS and will eventually deliver 150,000 computer terminals at more than 2,000 locations, including Royal Navy warships.

BADHARDWARE verdict: Terminals? Mainframe empire strikes back.
By the way, EDS is not in delivery problems relating to MoD for the first time.

New unified computer system seems have been planned online for attack on Iran, that now might happen in the next 18 months, taking in account all EDS delays.

Thursday, July 03, 2008

Israel had conducted air operations over the Mediterranean that could simulate a strike on Iran.

Don't bomb Iran, Bush warns Israel

President Bush's tour to see the results of his disastrous presidency

Finally, a truth on bad Presidency.

Reifeiser file system developer has developmental disability

Finally, a truth on ill development.

"This is complete and total nonsense," says Reiser's prosecutor, Paul Hora. "All of a sudden he's incompetent a week before he gets sentenced."

Wednesday, July 02, 2008

1 Exaflops by the year 2019

Stevens predicts that by 2019, we could have supercomputers capable of 1.2 exaflops, and containing 400,000 nodes with 128 processor cores each -- and consuming a staggering 80MW.

By that stage, though, competition between Europe, Japan and the U.S. for the supercomputing crown may no longer be an option. "We may have to cooperate at a global level to push past one petaflop," said Stevens.

AMD has stolen 2% of Intel's market in Q1 !!

Finally, a truth on bad hardware

AMD Intel war heats up.

"It will be an interesting second half," said Brookwood. "AMD has been trying hard to convince everyone that the dark clouds hanging over them for most of 2007 have blown away."

Microsoft ended its search for semantic search machine

Acquiring Powerset.

This page is powered by Blogger. Isn't yours?