apt

Customers are learning to adapt to the new norm: Deb Deep Sengupta, MD, SAP Indian Subcontinent

In order to ensure business continuity during these challenging times, the German enterprise software maker SAP is actively engaged with its workforce and customers to help navigate this challenging business environment.




apt

Tech boost for frontline workers: How IBM is helping ICMR to manage process of capturing COVID-19 data

The Watson virtual agent is AI-enabled and will be able to understand and respond to queries in English and Hindi.




apt

Google Duo users will soon be able to make ‘group’ video calls from their PC and laptops

Google Duo group video calling for web will arrive in the coming weeks starting as a preview on Chrome.




apt

AMBA Adaptive Traffic Profiles: Addressing The Challenge

Modern systems-on-a-chip (SoCs) continue to increase in complexity, adding more components and calculation power to accommodate new performance-hungry applications such as machine learning and autonomous driving.  With increased number of SoC components, such as CPUs, GPUs, accelerators and I/O devices, comes increased demand to correctly model interoperability of various components. Traditional simulation of complex systems requires accurate models of all components comprising the system and normally results in very long simulation times. A better way is to create a set of typical traffic profiles which describe behavior of system’s masters and slaves. Such profiles should be abstract to be applied to various protocols and interfaces and be portable to be applied throughout different SoC design and verification cycles.

To address the challenges outlined above, Arm has recently announced availability of the AMBA® Adaptive Traffic Profiles (AMBA ATP) specification which lays foundation of a new synthetic traffic framework. The AMBA ATP specification includes detailed information of various transaction types and timing characteristics of those transactions. The traffic profiles defined in the specification are abstract in nature and thus could be used to generate stimuli for various standard AMBA protocols and in various environments such as RTL-based simulation, FPGA prototyping and final SoC verification. The traffic profiles outlined in the specification include a set of parameters to define timing relationships between transactions as well as timing relationships within individual transactions. Even though the traffic profile represents the behavior of a single agent it could be applied either in a concurrent manner (e.g. write and read traffic profiles running in parallel) or in a sequential manner (e.g. when one traffic completes before the next one start). Moreover, when simulating a reasonably complex system, it is possible to coordinate traffic profiles generated by multiple components. While providing abstract definition of traffic profiles, the AMBA ATP specification focuses on the use of traffic profiles with an AMBA AXI interface, outlining signaling, timing relationships between different transaction phases and between different transactions. The same application principles could be used to map the abstract traffic profiles to other AMBA protocols such as AMBA5 CHI protocol.  

To facilitate adoption of the AMBA Adaptive Traffic Profiles, Cadence has recently announced availability of SystemVerilog UVM ATP Sequence Layer which automatically implements mapping of an abstract ATP traffic to AMBA protocol specific traffic, generated by Cadence AMBA Verification IP. The ATP layer is implemented as a SystemVerilog UVM virtual sequence with the sequence item including all ATP transaction parameters as defined in the specification.

Using the provided sequence infrastructure, users can write tests to define and coordinate traffic profiles for various components in the system. The ATP Layer automatically converts the abstract traffic profile into AMBA protocol-specific traffic, e.g., AMBA5 CHI protocol traffic.

 A sample code below, shows an example of a read profile translated by Cadence ACE Verification IP in ACE protocol traffic.

   `uvm_do_with(ace_atp_vseq,                                            

                       {ace_atp_vseq.agentId == agent_id;                                // ATP agent id

                        ace_atp_vseq.atpDirection == ATP_READ;                    // direction of bursts issued by virtual sequence

                        ace_atp_vseq.startAddress == start_address;                // start of address range being accessed

                        ace_atp_vseq.endAddress == end_address;                  // end of address range being accessed

                        ace_atp_vseq.atpDomain == atp_domain;                      // domain to use for transactions

                        ace_atp_vseq.addressPattern == ATP_SEQUENTIAL;  // address pattern

                        ace_atp_vseq.transactionSize == 64;                             // number of bytes in each burst

                        ace_atp_vseq.dataSize == 4;                                          // number of bytes in each transfer

                        ace_atp_vseq.rate == 150.0/(50.0);                                // requestedBandwidth / clkFrequency

                        ace_atp_vseq.start == ATP_EMPTY;                              // start condition of the ATP FIFO

                        ace_atp_vseq.full == 128;                                               // full level of the ATP FIFO

                        ace_atp_vseq.numOfTransactions == 500;                    // number of bursts issued by this sequence

                        ace_atp_vseq.ARTV == 2;                                              // sub-transaction delay

                        ace_atp_vseq.RBR == 3;                                                // sub-transaction delay

                       });

In addition to the ATP Layer for Cadence Simulation-Based AMBA Verification IP, Cadence supports the ATP functionality in Acceleration-Based AMBA Verification IP. For detailed information about ATP support in Cadence Simulation-Based and Acceleration-Based Verification IP, visit ip.cadence.com.




apt

Verification of the Lane Adapter FSM of a USB4 Router Design Is Not Simple

Verifying lane adapter state machine in a router design is quite an involved task and needs verification from several aspects including that for its link training functionality.

The diagram below shows two lane adapters connected to each other and each going through the link training process. Each training sub-state transition is contingent on conditions for both transmission and reception of relevant ordered sets needed for a transition. Until conditions for both are satisfied an adapter cannot transition to the next training sub-state.

As deduced from the lane adapter state machine section of USB4 specification, the reception condition for the next training sub-state transition is less strict than that of the transmission condition. For ex., for LOCK1 to LOCK2 transition, the reception condition requires only two SLOS symbols in a row being detected, while the transmission condition requires at least four complete SLOS1 ordered sets to be sent.

From the above conditions in the specification, it is a possibility that a lane adapter A may detect the two SLOS or TS ordered sets, being sent by the lane adapter B on the other end, in the very beginning as soon as it starts transmitting its own SLOS or TS ordered sets. On the other hand, it is also a possibility that these SLOS or TS ordered sets are not yet detected by lane adapter A even when it has met the condition of sending minimum number of SLOS or TS ordered sets.

In such a case, lane adapter A, even though it has satisfied the transmission condition cannot transition to the next sub-state because the reception condition is not yet met. Hence lane adapter A must first wait for the required number of ordered sets to be detected by it before it can go to the next sub-state. But this wait cannot be endless as there are timeouts defined in the specification, after which the training process may be re-attempted.

This interlocked way of operation also ensures that state machine of a lane adapter does not go out of sync with that of the other lane adapter. Such type of scenarios can occur whenever lane adapter state machine transitions to the training state from other states.

Cadence has a mature Verification IP solution for the verification of various aspects of the logical layer of a USB4 router design, with verification capabilities provided to do a comprehensive verification of it.




apt

Capture - Net name from port name

Is there a setting for automatically naming nets from port names in a hierarchical design? That is, when creating a netlist for Allegro in Capture.




apt

Capture Constraint Man anger

Is anyone else using Constraint Manager within Capture? This is my first time using it. I'm finding that it is occasionally changing some of my constraint values in Allegro. It seems random. 




apt

Capture BOM wrong

Hi

i have generated a BOM of my design and one of the parts is showing wrong information than what I specified in the database. I can see that in CIS database that part has been specified a correct information  but when I exported it to bom it shows wrong values.




apt

US Navy Captures Suspected Pirates After Gunbattle




apt

US Marines Capture Ship Hijacked By Pirates Off Somalia








apt

02062007-raptor_winudf.tgz

This is a MySQL backdoor kit for Windows based on the UDFs (User Defined Functions) mechanism. It can be used to spawn a reverse shell (netcat UDF on port 80/tcp) or to execute single OS commands (exec UDF). Tested on MySQL 4.0.18-win32 (running on Windows XP SP2), MySQL 4.1.22-win32 (running on Windows XP SP2), MySQL 5.0.27-win32 (running on Windows XP SP2).




apt

Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration

The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation.





apt

Raptor WAF 0.01

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.




apt

Raptor WAF 0.2

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.




apt

Raptor WAF 0.3

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.




apt

Raptor WAF 0.4

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.




apt

Raptor WAF 0.5

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.




apt

Raptor WAF 0.6

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.





apt

Google Invisible RECAPTCHA 3 Spoof Bypass

Google Invisible RECAPTCHA version 3 suffers from a spoofing bypass vulnerability.










apt

Buildings Are Becoming Energy Hubs: How Utilities Can Adapt

As utility customers invest more in advanced energy technologies, buildings are becoming dynamic energy hubs. Anywhere, anytime, a building could be a consumer, storage point, or generator of energy. And a building’s energy profile could change instantaneously as it responds to signals from internal controls, the grid operator, or third parties to deploy assets like controllable water heaters, smart equipment, solar, and storage.




apt

Level up: The best laptops to boost your gaming experience

BEST DEALS ON GAMING LAPTOPS:


It's time to level up.

If you didn't already know, PC gamers take great pride in the way they play. These are the folks who delight in the fact that PC gaming is just so much better than playing on a console, and if this Reddit thread is any indication — this way of thinking isn't going away any time soon.

While it can take a year or two for gaming consoles to adapt to updated technology, PCs see that improvement hit almost instantly. New rigs and laptops hit the market faster, as opposed to consoles that make you wait for months until their release.  Read more...

More about Laptops, Pc Gaming, Gaming Laptops, Mashable Shopping, and Tech
IMAGE: Walmart

BEST CHOICE OVERALL

MSI GP63 Leopard

A dependable graphics card, excellent speeds, and a lightweight build make this the complete package.

  • Processor: Intel Core i7-8750
  • RAM: 16GB
  • Graphics Card: NVIDIA GeForce GTX 1060 6GB
  • Storage: 1TB HDD + 256GB SSD
  • Weight: 4.8 lbs
$1 from Walmart

IMAGE: Walmart

BEST FOR VR AND VIDEO QUALITY

MSI GT75 Titan 4K-071

While it carries a hefty price tag, the MSI GT75 Titan is everything you could want out of a gaming laptop, down to VR and 4K.

  • Processor: Intel Core i9-8950HK
  • RAM: 32GB
  • Graphics Card: NVIDIA GeForce GTX 1080 8GB
  • Storage: 1TB HDD + 1TB SDD
  • Weight: 10.05 lbs
$120.93 from Walmart

IMAGE: Amazon

BEST FOR GAMERS ON A BUDGET

Dell Gaming Laptop G5587

While you may not have $2000 to drop on some higher performance gaming laptop, you can still get reliable gaming performance with the Dell Gaming Laptop G5587.

  • Processor: Intel Core i5-8300
  • RAM: 8GB
  • Graphics Card: NVIDIA GeForce GTX 1060
  • Storage: 128GB SSD + 1TB HDD
  • Weight: 6.28 lbs
$1 from Amazon

IMAGE: Amazon

BEST FOR POWER IN A SLIM DESIGN

ASUS ROG Zephyrus M

ASUS offers the best of both worlds with a slim and light gaming laptop that doesn't skimp on the power under the hood.

  • Processor: Intel Core i7-8750H
  • RAM: 16GB
  • Graphics Card: NVIDIA GeForce GTX 1070 8GB
  • Storage: 256GB SSD + 1TB HDD
  • Weight: 5.4 lbs
$1 from Amazon

IMAGE: Amazon

BEST FOR NEW GAMERS

Acer Nitro 5

If you're new to PC gaming, the Acer Nitro 5 delivers a reliable laptop at a reasonable price.

  • Processor: Intel Core i5-7300HQ
  • RAM: 8GB
  • Graphics Card: NVIDIA GeForce GTX 1050 Ti
  • Storage: 256GB SSD
  • Weight: 2.65 lbs
$749.99 from Amazon

IMAGE: Amazon

BEST FOR TRADITIONAL/HARDCORE GAMERS

Acer Predator Triton 700

Hardcore gamers expect power out of their platform of choice, and Acer delivers on that power with the Predator Triton 700 laptop.

  • Processor: Intel Core i7-7700HQ
  • RAM: 32GB
  • Graphics Card: GeForce GTX 1080
  • Storage: 512GB SSD
  • Weight: 5.4 lbs
$1 from Amazon

IMAGE: Amazon

BEST FOR BUDGET VR

Alienware 15

Alienware is one of the most recognized names in PC gaming, and the Alienware 15 lives up to that namesake, even delivering a reliable VR laptop.

  • Processor: Intel Core i7-7700HQ
  • RAM: 16GB
  • Graphics Card: NVIDIA GeForce GTX 1070
  • Storage: 256GB SSD + 1TB HDD
  • Weight: 8 lbs
$1 from Amazon

IMAGE: Amazon

BEST FOR PERFORMANCE

MSI GS65 Stealth THIN-051

This is one of the thinnest laptops built for intense gaming on-the-go.

  • Processor: Intel Core i7-8750H 6 Core
  • RAM: 16GB
  • Graphics Card: NVIDIA GeForce GTX 1060
  • Storage: 256GB
  • Weight: 4.14 lbs
$1,282 from Amazon

IMAGE: Amazon

BEST FOR SLEEK DESIGN

Razer Blade 15

Think of this as the Apple MacBook Pro of gaming laptops.

  • Processor: Intel Core i7-8750H 6 Core
  • RAM: 16GB
  • Graphics Card: NVIDIA GeForce GTX 1060 Max-Q
  • Storage: 512GB SSD
  • Weight: 4.56 lbs
$1 from Amazon




apt

6 of the best gaming laptops that cost less than $1,000

BEST DEALS ON GAMING LAPTOPS:


My first gaming laptop cost $1,500 more than 10 years ago, and that was considered affordable. It wasn't a top-of-the-line model, but it wasn't a slouch either, sporting one of the better mid-tier graphics cards and a reliable processor/RAM combination.  

But my, how things have changed.

Today, you can go on Amazon and find plenty of laptops for less than $1,000 that would have been at least $1,500 a few years ago, thus opening doors to people who want to try out PC gaming for themselves. (And if it's Prime Day or Black Friday or Cyber Monday, you can expect deal prices to dip even lower.) But sorting through all of the options and deciding which is best presents its own unique challenge. Read more...

More about Gaming, Laptop, Mashable Shopping, Tech, and Gaming
IMAGE: Amazon

OUR TOP PICK

Lenovo Legion Y520

Lenovo balances price and power to deliver a well-rounded gaming laptop that can handle most of what the average gamer can throw at it.

  • Processor: Intel Core i5-7300HQ
  • RAM: 8GB
  • Graphics card: NVIDIA GeForce GTX 1050 Ti 4GB
  • Storage: 256GB SSD
  • Screen: 15.6" Full HD (1920x1080) LED-lit
$999.99 from Amazon

IMAGE: Amazon

BEST FOR A BUDGET

Asus TUF Gaming FX504

The Asus TUF Gaming FX504 offers reliable performance without breaking the bank for gamers on a budget.

  • Processor: Intel Core i5-8300H
  • RAM: 8GB
  • Graphics card: NVIDIA GTX 1050 2GB
  • Storage: 1TB FireCuda SSHD
  • Screen: 15.6” Full HD
$999.99 from Amazon

IMAGE: Amazon

BEST POWER FOR THE PRICE

Dell G5 Gaming Laptop

With plenty of graphical power for an affordable price, the Dell G5 gaming laptop is proof that price doesn't have to lock out performance.

  • Processor: Intel Core i5-8300H
  • RAM: 8GB(up to 32GB)
  • Graphics card: NVIDIA GeForce GTX 1060
  • Storage: 128GB SSD and 1TB HDD
  • Screen: 15.6-inch FHD (1920 x 1080) IPS Anti-Glare LED-Backlit Display
$937 from Amazon

IMAGE: Amazon

BEST FOR NEW GAMERS

Dell Inspiron 15 5000 Gaming Edition 5577

If you're new to the gaming scene and looking for a good place to start, the Dell Inspiron 15 5000 is a great pick.

  • Processor: Intel Core i5-7300HQ
  • RAM: 8GB
  • Graphics card: NVIDIA GeForce GTX 1050 4GB GDDR5 VRAM
  • Storage: 128GB SSD and 1TB HDD
  • Screen: 15.6" Full HD (1920x1080) anti-glare LED-backlit
$749 from Amazon

IMAGE: Amazon

BEST MULTI-PURPOSE LAPTOP

Acer Aspire 7

With the Acer Aspire 7, you'll be ready for anything life or gaming has to throw at you.

  • Processor: Intel Core i7-8750H
  • RAM: 8GB
  • Graphics card: NVIDIA GeForce GTX 1050 Ti with 4 GB of dedicated GDDR5 VRAM
  • Storage: 128GB SSD and 1TB HDD
  • Screen: 15.6" Full HD (1920 x 1080) Widescreen LED-backlit IPS Display
$839.99 from Amazon

IMAGE: Amazon

BEST NAME BRAND LAPTOP

OMEN by HP 15.6" Gaming Laptop

HP integrates its trusted brand design with plenty of power in the Omen 15.6" gaming laptop.

  • Processor: Intel Core i5-8300H
  • RAM: 12GB
  • Graphics card: NVIDIA GeForce GTX 1050 Ti with dedicated 4 GB GDDR5
  • Storage: 128GB SSD and 1TB HDD
  • Screen: 15.6" diagonal FHD IPS BrightView micro-edge WLED-backlit
$929 from Amazon




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




apt

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.