http://www.engadget.com/2013/12/31/nsa-drououtjeep-iphone-hack-details/?ncid=rss_truncated
This was Intended to be a BSD only blog, but now it's about all Unix Like Free Operating Systems, Linux, FreeBSD etc.
Tuesday, December 31, 2013
Monday, December 30, 2013
Thursday, December 26, 2013
Monday, December 23, 2013
Sunday, December 22, 2013
Friday, December 20, 2013
QNX survives cuts at Blackberry/RIM, called "crown jewel"
Read the last segment for details,
BlackBerry CEO details survival strategy | Mobile - CNET News
http://news.cnet.com/8301-1035_3-57616170-94/blackberry-ceo-details-survival-strategy/
Thursday, December 19, 2013
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Summary
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer and, in particular, leak sensitive information about security-related computations. In a preliminary presentation, we have shown that different RSA keys induce different sound patterns, but it was not clear how to extract individual key bits. The main problem was the very low bandwidth of the acoustic side channel (under 20 kHz using common microphones, and a few hundred kHz using ultrasound microphones), many orders of magnitude below the GHz-scale clock rates of the attacked computers.
Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away.
Beyond acoustics, we demonstrate that a similar low-bandwidth attack can be performed by measuring the electric potential of a computer chassis. A suitably-equipped attacker need merely touch the target computer with his bare hand, or get the required leakage information from the ground wires at the remote end of VGA, USB or Ethernet cables.
Wednesday, December 18, 2013
Re: Benchmarking the ODroid XU: A Fast-Clocked Quad A15 ARM Machine
make money. ;-)
Jesse
Monday, December 16, 2013
Sunday, December 15, 2013
Thursday, December 12, 2013
Google Brings AmigaOS to Chrome Via Native Client Emulation
Google Brings AmigaOS to Chrome Via Native Client Emulation
Wednesday, December 11, 2013
Tuesday, December 10, 2013
Monday, December 09, 2013
Friday, December 06, 2013
Wednesday, December 04, 2013
New USB connector inbound, set to be smaller and reversible - TechSpot
NOTE: New connectors are not expected until late 2014.
http://www.techspot.com/news/54899-new-usb-connector-inbound-set-to-be-smaller-and-reversible.html
Tuesday, December 03, 2013
Monday, December 02, 2013
Thursday, November 28, 2013
Wednesday, November 27, 2013
ControlByWeb Ethernet I/O
There are a few other alternate products you can check out too:
http://www.controlanything.com/Relay/Relay/ETHERNET_KEY_FOB
There used to be 6bit.com but it looks like they've gone out of business.
Monday, November 25, 2013
Sunday, November 17, 2013
Friday, November 15, 2013
Tuesday, November 12, 2013
Wednesday, November 06, 2013
Monday, November 04, 2013
Saturday, November 02, 2013
Monday, October 28, 2013
Thursday, October 24, 2013
Friday, October 18, 2013
Wednesday, October 16, 2013
Tuesday, October 15, 2013
How To Develop Unmaintainable Software
How To Develop Unmaintainable Software
Monday, October 14, 2013
Thursday, October 10, 2013
Fwd: That grumpy BSD guy: The Hail Mary Cloud And The Lessons Learned
http://bsdly.blogspot.ca/2013/10/the-hail-mary-cloud-and-lessons-learned.html?m=1
Friday, October 04, 2013
Sunday, September 29, 2013
Friday, September 27, 2013
Wednesday, September 25, 2013
Nokia ’fesses up about its former-CEO’s compensation | Ars Technica
NOTE: This article is about a former Microsoft employee, that was CEO of Nokia, just before the sale of Nokia Business Phone Divison to Microsoft. Appearance of Conflict of Interest.
Monday, September 23, 2013
Platform Connectors
5. Platform Connectors
Wednesday, September 18, 2013
New Operating System Seeks To Replace Linux In the Cloud
New Operating System Seeks To Replace Linux In the Cloud
from the chasing-the-penguins-out-of-the-sky dept.
Tuesday, September 17, 2013
Friday, September 13, 2013
Thursday, September 12, 2013
Wednesday, September 11, 2013
Tuesday, September 10, 2013
Saturday, September 07, 2013
The US government has betrayed the internet. We need to take it back
The US government has betrayed the internet. We need to take it back
The NSA has undermined a fundamental social contract. We engineers built the internet – and now we have to fix it
• Explaining the latest NSA revelations – Q&A
Government and industry have betrayed the internet, and us.
By subverting the internet at every level to make it a vast, multi-layered and robust surveillance platform, the NSA has undermined a fundamental social contract. The companies that build and manage our internet infrastructure, the companies that create and sell us our hardware and software, or the companies that host our data: we can no longer trust them to be ethical internet stewards.
This is not the internet the world needs, or the internet its creators envisioned. We need to take it back.
And by we, I mean the engineering community.
Yes, this is primarily a political problem, a policy matter that requires political intervention.
But this is also an engineering problem, and there are several things engineers can – and should – do.
One, we should expose. If you do not have a security clearance, and if you have not received a National Security Letter, you are not bound by a federal confidentially requirements or a gag order. If you have been contacted by the NSA to subvert a product or protocol, you need to come forward with your story. Your employer obligations don't cover illegal or unethical activity. If you work with classified data and are truly brave, expose what you know. We need whistleblowers.
We need to know how exactly how the NSA and other agencies are subverting routers, switches, the internet backbone, encryption technologies and cloud systems. I already have five stories from people like you, and I've just started collecting. I want 50. There's safety in numbers, and this form of civil disobedience is the moral thing to do.
Two, we can design. We need to figure out how to re-engineer the internet to prevent this kind of wholesale spying. We need new techniques to prevent communications intermediaries from leaking private information.
We can make surveillance expensive again. In particular, we need open protocols, open implementations, open systems – these will be harder for the NSA to subvert.
The Internet Engineering Task Force, the group that defines the standards that make the internet run, has a meeting planned for early November in Vancouver. This group needs to dedicate its next meeting to this task. This is an emergency, and demands an emergency response.
Three, we can influence governance. I have resisted saying this up to now, and I am saddened to say it, but the US has proved to be an unethical steward of the internet. The UK is no better. The NSA's actions are legitimizing the internet abuses by China, Russia, Iran and others. We need to figure out new means of internet governance, ones that makes it harder for powerful tech countries to monitor everything. For example, we need to demand transparency, oversight, and accountability from our governments and corporations.
Unfortunately, this is going play directly into the hands of totalitarian governments that want to control their country's internet for even more extreme forms of surveillance. We need to figure out how to prevent that, too. We need to avoid the mistakes of the International Telecommunications Union, which has become a forum to legitimize bad government behavior, and create truly international governance that can't be dominated or abused by any one country.
Generations from now, when people look back on these early decades of the internet, I hope they will not be disappointed in us. We can ensure that they don't only if each of us makes this a priority, and engages in the debate. We have a moral duty to do this, and we have no time to lose.
Dismantling the surveillance state won't be easy. Has any country that engaged in mass surveillance of its own citizens voluntarily given up that capability? Has any mass surveillance country avoided becoming totalitarian? Whatever happens, we're going to be breaking new ground.
Again, the politics of this is a bigger task than the engineering, but the engineering is critical. We need to demand that real technologists be involved in any key government decision making on these issues. We've had enough of lawyers and politicians not fully understanding technology; we need technologists at the table when we build tech policy.
To the engineers, I say this: we built the internet, and some of us have helped to subvert it. Now, those of us who love liberty have to fix it.
• Bruce Schneier writes about security, technology, and people. His latest book is Liars and Outliers: Enabling the Trust That Society Needs to Thrive. He is working for the Guardian on other NSA stories
Friday, September 06, 2013
Elon Musk Unveils 'Iron Man'-like Design Tech for SpaceX Rockets (Video)
This is the demo leap motion needs to be showing
Tuesday, September 03, 2013
Saturday, August 31, 2013
Monday, August 26, 2013
Friday, August 23, 2013
Thursday, August 22, 2013
Tuesday, August 20, 2013
Sunday, August 18, 2013
Saturday, August 17, 2013
Thursday, August 15, 2013
Collective IQ
Sunday, August 11, 2013
Writing Hello World Bootloader Tutorial
Apparently part of a:
TAJ OS may be an answer. It is a first operating system developed in India which is totally based on object oriented concept. C++ is the first thing that comes to mind when we hear the word object oriented. And yes, TAJ OS is totally developed in C++, which removes all drawbacks of C language. (sic)
Features of TAJ Operating System
- 32-bit Protected mode Operating System
- Paging enable
- Secure Exception handling
- Interrupt management system
- Work with different kinds of CPU (80386 onwards).
- Fully functional built in keyboard driver
- Total DMA control
- Floppy driver
- Mouse driver
- Fat file system driver
- Multitasking
- Multithreading
- Multiuser
Friday, August 09, 2013
Tuesday, August 06, 2013
Monday, August 05, 2013
Project HiJack
Hijacking power and bandwidth from the mobile phone's audio interface.
Creating a cubic-inch peripheral sensor ecosystem for the mobile phone.
Hendy’s Law (pixels per dollar)
Sunday, August 04, 2013
Friday, August 02, 2013
Sajak's law of technology marketing
Tuesday, July 30, 2013
Fwd: Embedded RTOS E-News
From: "Embedded News" <embedded_news@mentor.com>
Date: Jul 30, 2013 5:55 PM
Subject: Embedded RTOS E-News
To: "John Sokol" <john.sokol@gmail.com>
|
Saturday, July 27, 2013
Ballmer admits Microsoft built too many Surface RTs, disappointed with Windows sales | The Verge
The article is about average. The 486 comments (as of Jul-27-2023) have some real meat.
Friday, July 26, 2013
Sunday, July 21, 2013
Fwd: ai takes over internet
---------- Forwarded message ----------
From: "Bill Crawford"
Date: Jul 20, 2013 11:39 PM
Subject: ai takes over internet
"MIT is claiming they can make the Internet faster if we let computers redesign TCP/IP instead of coding it by hand. They used machine learning to design a version of TCP that's twice the speed and causes half the delay, even with modern bufferbloated networks. They also claim it's more 'fair.' The researchers have put up a lengthy FAQ and source code where they admit they don't know why the system works, only that it goes faster than normal TCP."
Saturday, July 20, 2013
Oracle switches Berkeley DB license
Oracle had the right to change the BerkeleyDB license to AGPL, but many will view Oracle's switch as a betrayal of trust
http://www.infoworld.com/d/open-source-software/oracle-switches-berkeley-db-license-222097
From the articleFuture versions of Berkeley DB will instead use the GNU Affero General Public License (AGPL). This is also a strong copyleft license, but with an important difference. The AGPL says "your modified version must prominently offer all users interacting with it remotely through a computer network ... an opportunity to receive the Corresponding Source of your version."
Friday, July 19, 2013
Saturday, July 13, 2013
Thursday, July 11, 2013
NOTES on Implementing an Email Parser with Python
import email
# read a file which has just one message
f = open("mbox",'r')
emailMessage = email.message_from_file(f)
f.close()
Or you can read the entire file first by doing:
import email
# Process the message
emailMessage = email.message_from_string(str)
Either way, the email message has been processed for ease of use. The header has been stored in a python dictionary, and the body of the message is in a blob.
The list of available rfc822 headers can be gotten by:
print emailMessage.keys()
Next, you might want to get the value from a field. The lookup is not case sensative.
print emailMessage.get('subject')
And of course you'd like to get the body of the message.
print emailMessage.payload()
Monday, July 08, 2013
Wednesday, July 03, 2013
Tuesday, July 02, 2013
funny photo of random number algorithm
From: Ted
Debian was producing weak crypto keys for a few years, and nobody noticed.
http://www.gergely.risko.hu/debian-dsa1571/random4.jpg
Monday, July 01, 2013
Teen Faces Years in Prison for ‘Sarcastic Comment’ He Made on Facebook
"A Texas teen has been jailed since late March for what his father says was just a dumb joke he posted on Facebook.
(...)
http://gawker.com/teen-faces-years-in-prison-for-sarcastic-comment-he-m-598970268
Sunday, June 30, 2013
Friday, June 28, 2013
Sunday, June 23, 2013
Saturday, June 22, 2013
Friday, June 21, 2013
Skynet, a Tor-powered botnet straight from Reddit
Thursday, June 20, 2013
Wednesday, June 19, 2013
Tuesday, June 18, 2013
Monday, June 17, 2013
Saturday, June 15, 2013
Go to statement considered harmful
http://dl.acm.org/citation.cfm?id=1241518&coll=ACM&dl=ACM
In form and content, Dijkstra's letter is similar to his 1965 paper, which appears first in this collection. Description of the inverse relationship between a programmer's ability and the density of goto statements in his program is repeated, as is the emphasis on the limited ability of the human brain. Much of the discussion is somewhat theoretical in nature, and the typical COBOL programmer will hunger for some coding examples so that he can see why goto statements make program logic harder to understand.
Echoing his 1965 paper, the last few paragraphs underscore once again why the subject of structured programming stayed out of the mainstream of the data processing industry for so long. As Dijkstra points out, goto statements were a subject of discussion among academicians as far back as 1959. But even today, people whom Dijkstra acknowledges --- names like Wirth, Hoare, Strachey, and Landin --- are not well known to business-oriented or scientificoriented programmers, so it should be no surprise that their ideas have languished for so many years.
Friday, June 14, 2013
Thursday, June 13, 2013
Wednesday, June 12, 2013
Sunday, June 09, 2013
Friday, June 07, 2013
Thursday, June 06, 2013
Sunday, June 02, 2013
CPU speed vs efficiency
I have been tasked with finding a lower power consuming solution while preserving performance.
The chart below is sorted by Total CPU performance but there are also other factors such as can your application use 4 CPU's or will it just be limited to one or two while the rest go unused.
We are currently using an i5-650 that is 73 watts for 2 core at 3.2 GHz. I quick look shows the i3-3225 at 55 watts for what is a slight performance gain of 2 cores at 3.3 Ghz.
I found it interesting that there was such a strong relationship between lower CPU speeds and more efficient operation. I can't help but feel this is more then physics at work but more organizational mandates and a side effect of the way their requirements are put together.
This is across all Intel CPU's after 2006 or so up to the current ones shipped.
Speed is (GHz * Cores) / 21 , the fasted being the i7-3970X 6 cores at 3.5 GHz.
CPU Model | Clock GHz | # of Cores | TPD Watts | Speed (Clock*Cores) | Efficiency (Ghz / Watt) | |
i7-3970X | 3.5 | 6 | 150 | 21 | 0.14 | |
i7-990X | 3.47 | 6 | 130 | 20.82 | 0.16 | |
i7-980 | 3.33 | 6 | 130 | 19.98 | 0.154 | |
i7-980X | 3.33 | 6 | 130 | 19.98 | 0.154 | |
i7-3960X | 3.3 | 6 | 130 | 19.8 | 0.152 | |
i7-970 | 3.2 | 6 | 130 | 19.2 | 0.148 | |
i7-3930K | 3.2 | 6 | 130 | 19.2 | 0.148 | |
i7-3820 | 3.6 | 4 | 130 | 14.4 | 0.111 | |
i7-2700K | 3.5 | 4 | 95 | 14 | 0.147 | |
i7-3770K | 3.5 | 4 | 77 | 14 | 0.182 | |
i5-2550K | 3.4 | 4 | 95 | 13.6 | 0.143 | |
i7-2600 | 3.4 | 4 | 95 | 13.6 | 0.143 | |
i7-2600K | 3.4 | 4 | 95 | 13.6 | 0.143 | |
i5-3570 | 3.4 | 4 | 77 | 13.6 | 0.177 | |
i5-3570K | 3.4 | 4 | 77 | 13.6 | 0.177 | |
i7-3770 | 3.4 | 4 | 77 | 13.6 | 0.177 | |
i7-975 | 3.33 | 4 | 130 | 13.32 | 0.102 | |
i5-2500 | 3.3 | 4 | 95 | 13.2 | 0.139 | |
i5-2500K | 3.3 | 4 | 95 | 13.2 | 0.139 | |
i5-3550 | 3.3 | 4 | 77 | 13.2 | 0.171 | |
i7-960 | 3.2 | 4 | 130 | 12.8 | 0.098 | |
i7-965 | 3.2 | 4 | 130 | 12.8 | 0.098 | |
i5-2450P | 3.2 | 4 | 95 | 12.8 | 0.135 | |
i5-3470 | 3.2 | 4 | 77 | 12.8 | 0.166 | |
i5-2380P | 3.1 | 4 | 95 | 12.4 | 0.131 | |
i5-2400 | 3.1 | 4 | 95 | 12.4 | 0.131 | |
i5-3450 | 3.1 | 4 | 77 | 12.4 | 0.161 | |
i5-3350P | 3.1 | 4 | 69 | 12.4 | 0.18 | |
i5-3570S | 3.1 | 4 | 65 | 12.4 | 0.191 | |
i7-3770S | 3.1 | 4 | 65 | 12.4 | 0.191 | |
i7-950 | 3.07 | 4 | 130 | 12.28 | 0.094 | |
i7-880 | 3.07 | 4 | 95 | 12.28 | 0.129 | |
i5-2320 | 3 | 4 | 95 | 12 | 0.126 | |
i5-3330 | 3 | 4 | 77 | 12 | 0.156 | |
i5-3550S | 3 | 4 | 65 | 12 | 0.185 | |
i7-3940XM | 3 | 4 | 55 | 12 | 0.218 | |
i7-940 | 2.93 | 4 | 130 | 11.72 | 0.09 | |
i7-870 | 2.93 | 4 | 95 | 11.72 | 0.123 | |
i7-875K | 2.93 | 4 | 95 | 11.72 | 0.123 | |
i5-2310 | 2.9 | 4 | 95 | 11.6 | 0.122 | |
i5-3470S | 2.9 | 4 | 65 | 11.6 | 0.178 | |
i5-3475S | 2.9 | 4 | 65 | 11.6 | 0.178 | |
i7-3920XM | 2.9 | 4 | 55 | 11.6 | 0.211 | |
i7-930 | 2.8 | 4 | 130 | 11.2 | 0.086 | |
i5-760 | 2.8 | 4 | 95 | 11.2 | 0.118 | |
i5-2300 | 2.8 | 4 | 95 | 11.2 | 0.118 | |
i7-860 | 2.8 | 4 | 95 | 11.2 | 0.118 | |
i5-3450S | 2.8 | 4 | 65 | 11.2 | 0.172 | |
i7-2600S | 2.8 | 4 | 65 | 11.2 | 0.172 | |
i7-3840QM | 2.8 | 4 | 45 | 11.2 | 0.249 | |
i5-2500S | 2.7 | 4 | 65 | 10.8 | 0.166 | |
i5-3330S | 2.7 | 4 | 65 | 10.8 | 0.166 | |
i5-3335S | 2.7 | 4 | 65 | 10.8 | 0.166 | |
i7-2960XM | 2.7 | 4 | 55 | 10.8 | 0.196 | |
i7-3740QM | 2.7 | 4 | 45 | 10.8 | 0.24 | |
i7-3820QM | 2.7 | 4 | 45 | 10.8 | 0.24 | |
i7-920 | 2.67 | 4 | 130 | 10.68 | 0.082 | |
i5-750 | 2.67 | 4 | 95 | 10.68 | 0.112 | |
i7-870S | 2.67 | 4 | 82 | 10.68 | 0.13 | |
i7-3720QM | 2.6 | 4 | 45 | 10.4 | 0.231 | |
i7-860S | 2.53 | 4 | 82 | 10.12 | 0.123 | |
i5-2400S | 2.5 | 4 | 65 | 10 | 0.154 | |
i5-2405S | 2.5 | 4 | 65 | 10 | 0.154 | |
i7-2920XM | 2.5 | 4 | 55 | 10 | 0.182 | |
i7-3770T | 2.5 | 4 | 45 | 10 | 0.222 | |
i7-2860QM | 2.5 | 4 | 45 | 10 | 0.222 | |
i5-750s | 2.4 | 4 | 82 | 9.6 | 0.117 | |
i7-2760QM | 2.4 | 4 | 45 | 9.6 | 0.213 | |
i7-3630QM | 2.4 | 4 | 45 | 9.6 | 0.213 | |
i7-3635QM | 2.4 | 4 | 45 | 9.6 | 0.213 | |
i5-2500T | 2.3 | 4 | 45 | 9.2 | 0.204 | |
i5-3570T | 2.3 | 4 | 45 | 9.2 | 0.204 | |
i7-2820QM | 2.3 | 4 | 45 | 9.2 | 0.204 | |
i7-3610QM | 2.3 | 4 | 45 | 9.2 | 0.204 | |
i7-3615QM | 2.3 | 4 | 45 | 9.2 | 0.204 | |
i7-3610QE | 2.3 | 4 | 45 | 9.2 | 0.204 | |
i7-3615QE | 2.3 | 4 | 45 | 9.2 | 0.204 | |
i7-2670QM | 2.2 | 4 | 45 | 8.8 | 0.196 | |
i7-2675QM | 2.2 | 4 | 45 | 8.8 | 0.196 | |
i7-2720QM | 2.2 | 4 | 45 | 8.8 | 0.196 | |
i7-3632QM | 2.2 | 4 | 35 | 8.8 | 0.251 | |
i7-940XM | 2.13 | 4 | 55 | 8.52 | 0.155 | |
i7-2710QE | 2.1 | 4 | 45 | 8.4 | 0.187 | |
i7-2715QE | 2.1 | 4 | 45 | 8.4 | 0.187 | |
i7-3612QM | 2.1 | 4 | 35 | 8.4 | 0.24 | |
i7-3612QE | 2.1 | 4 | 35 | 8.4 | 0.24 | |
i7-920XM | 2 | 4 | 55 | 8 | 0.145 | |
i7-2630QM | 2 | 4 | 45 | 8 | 0.178 | |
i7-2635QM | 2 | 4 | 45 | 8 | 0.178 | |
i7-840QM | 1.87 | 4 | 45 | 7.48 | 0.166 | |
i5-680 | 3.6 | 2 | 73 | 7.2 | 0.099 | |
i5-670 | 3.47 | 2 | 73 | 6.94 | 0.095 | |
i7-740QM | 1.73 | 4 | 45 | 6.92 | 0.154 | |
i7-820QM | 1.73 | 4 | 45 | 6.92 | 0.154 | |
i3-2130 | 3.4 | 2 | 65 | 6.8 | 0.105 | |
i3-3240 | 3.4 | 2 | 55 | 6.8 | 0.124 | |
i5-661 | 3.33 | 2 | 87 | 6.66 | 0.077 | |
i5-660 | 3.33 | 2 | 73 | 6.66 | 0.091 | |
i3-560 | 3.33 | 2 | 73 | 6.66 | 0.091 | |
i3-2120 | 3.3 | 2 | 65 | 6.6 | 0.102 | |
i3-2125 | 3.3 | 2 | 65 | 6.6 | 0.102 | |
i3-3220 | 3.3 | 2 | 55 | 6.6 | 0.12 | |
i3-3225 | 3.3 | 2 | 55 | 6.6 | 0.12 | |
i5-650 | 3.2 | 2 | 73 | 6.4 | 0.088 | |
i5-655 | 3.2 | 2 | 73 | 6.4 | 0.088 | |
i3-550 | 3.2 | 2 | 73 | 6.4 | 0.088 | |
i3-3210 | 3.2 | 2 | 55 | 6.4 | 0.116 | |
i7-720QM | 1.6 | 4 | 45 | 6.4 | 0.142 | |
i3-2100 | 3.1 | 2 | 65 | 6.2 | 0.095 | |
i3-2102 | 3.1 | 2 | 65 | 6.2 | 0.095 | |
i3-2105 | 3.1 | 2 | 65 | 6.2 | 0.095 | |
i3-540 | 3.07 | 2 | 73 | 6.14 | 0.084 | |
i7-3540M | 3 | 2 | 35 | 6 | 0.171 | |
i3-530 | 2.93 | 2 | 73 | 5.86 | 0.08 | |
i5-3470T | 2.9 | 2 | 35 | 5.8 | 0.166 | |
i5-3380M | 2.9 | 2 | 35 | 5.8 | 0.166 | |
i3-3240T | 2.9 | 2 | 35 | 5.8 | 0.166 | |
i7-3520M | 2.9 | 2 | 35 | 5.8 | 0.166 | |
i5-3360M | 2.8 | 2 | 35 | 5.6 | 0.16 | |
i3-3220T | 2.8 | 2 | 35 | 5.6 | 0.16 | |
i7-640M | 2.8 | 2 | 35 | 5.6 | 0.16 | |
i7-2640M | 2.8 | 2 | 35 | 5.6 | 0.16 | |
i5-2390T | 2.7 | 2 | 35 | 5.4 | 0.154 | |
i5-3340M | 2.7 | 2 | 35 | 5.4 | 0.154 | |
i5-3610ME | 2.7 | 2 | 35 | 5.4 | 0.154 | |
i7-2620M | 2.7 | 2 | 35 | 5.4 | 0.154 | |
i5-480M | 2.67 | 2 | 35 | 5.34 | 0.153 | |
i5-560M | 2.67 | 2 | 35 | 5.34 | 0.153 | |
i5-580M | 2.67 | 2 | 35 | 5.34 | 0.153 | |
i3-390M | 2.67 | 2 | 35 | 5.34 | 0.153 | |
i7-620M | 2.67 | 2 | 35 | 5.34 | 0.153 | |
i5-2540M | 2.6 | 2 | 35 | 5.2 | 0.149 | |
i5-3230M | 2.6 | 2 | 35 | 5.2 | 0.149 | |
i5-3320M | 2.6 | 2 | 35 | 5.2 | 0.149 | |
i3-2120T | 2.6 | 2 | 35 | 5.2 | 0.149 | |
i3-3130M | 2.6 | 2 | 35 | 5.2 | 0.149 | |
i5-460M | 2.53 | 2 | 35 | 5.06 | 0.145 | |
i5-540M | 2.53 | 2 | 35 | 5.06 | 0.145 | |
i3-380M | 2.53 | 2 | 35 | 5.06 | 0.145 | |
i7-610E | 2.53 | 2 | 35 | 5.06 | 0.145 | |
i5-2450M | 2.5 | 2 | 35 | 5 | 0.143 | |
i5-2520M | 2.5 | 2 | 35 | 5 | 0.143 | |
i5-2510E | 2.5 | 2 | 35 | 5 | 0.143 | |
i5-2515E | 2.5 | 2 | 35 | 5 | 0.143 | |
i5-3210M | 2.5 | 2 | 35 | 5 | 0.143 | |
i3-2100T | 2.5 | 2 | 35 | 5 | 0.143 | |
i3-3120M | 2.5 | 2 | 35 | 5 | 0.143 | |
i7-3555LE | 2.5 | 2 | 25 | 5 | 0.2 | |
i5-450M | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i5-520M | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i5-520E | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i5-2430M | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i5-2435M | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i3-370M | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i3-2370M | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i3-3110M | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i3-2120ME | 2.4 | 2 | 35 | 4.8 | 0.137 | |
i5-2410M | 2.3 | 2 | 35 | 4.6 | 0.131 | |
i5-2415M | 2.3 | 2 | 35 | 4.6 | 0.131 | |
i3-2348M | 2.3 | 2 | 35 | 4.6 | 0.131 | |
i3-2350M | 2.3 | 2 | 35 | 4.6 | 0.131 | |
i7-2649M | 2.3 | 2 | 25 | 4.6 | 0.184 | |
i5-430M | 2.27 | 2 | 35 | 4.54 | 0.13 | |
i3-350M | 2.27 | 2 | 35 | 4.54 | 0.13 | |
i7-660LM | 2.27 | 2 | 25 | 4.54 | 0.182 | |
A D2750 | 2.26 | 2 | 10 | 4.52 | 0.452 | |
i3-2328M | 2.2 | 2 | 35 | 4.4 | 0.126 | |
i3-2330M | 2.2 | 2 | 35 | 4.4 | 0.126 | |
i3-2332M | 2.2 | 2 | 35 | 4.4 | 0.126 | |
i3-2330E | 2.2 | 2 | 35 | 4.4 | 0.126 | |
i7-2644LE | 2.2 | 2 | 25 | 4.4 | 0.176 | |
i3-330M | 2.13 | 2 | 35 | 4.26 | 0.122 | |
i3-330E | 2.13 | 2 | 35 | 4.26 | 0.122 | |
i7-640LM | 2.13 | 2 | 25 | 4.26 | 0.17 | |
A D2700 | 2.13 | 2 | 10 | 4.26 | 0.426 | |
i3-2308M | 2.1 | 2 | 35 | 4.2 | 0.12 | |
i3-2310M | 2.1 | 2 | 35 | 4.2 | 0.12 | |
i3-2312M | 2.1 | 2 | 35 | 4.2 | 0.12 | |
i3-2310E | 2.1 | 2 | 35 | 4.2 | 0.12 | |
i7-2629M | 2.1 | 2 | 25 | 4.2 | 0.168 | |
i7-3687U | 2.1 | 2 | 17 | 4.2 | 0.247 | |
i7-620LM | 2 | 2 | 25 | 4 | 0.16 | |
i7-620LE | 2 | 2 | 25 | 4 | 0.16 | |
i7-3537U | 2 | 2 | 17 | 4 | 0.235 | |
i7-3667U | 2 | 2 | 17 | 4 | 0.235 | |
A D2560 | 2 | 2 | 10 | 4 | 0.4 | |
A S1260 | 2 | 2 | 8.5 | 4 | 0.471 | |
A N2850 | 2 | 2 | 6.6 | 4 | 0.606 | |
P4 HT670 | 3.8 | 1 | 115 | 3.8 | 0.033 | |
i5-3437U | 1.9 | 2 | 17 | 3.8 | 0.224 | |
i3-3227U | 1.9 | 2 | 17 | 3.8 | 0.224 | |
i7-3517U | 1.9 | 2 |