Overclockers Australia!
Make us your homepage. Add us to your bookmarks  
Major Sponsors:
News Archive

Articles & Reviews
Image Hosting

OCAU Sponsors
Online Vendors
Motorcycle Club

Hosted by Micron21!

Wednesday Morning (2 Comments) (link)
 Wednesday, 24-April-2013  09:49:35 (GMT +10) - by booj

Apple's Siri voice assistant software reportedly logs all the questions users ask. Exactly what the voice assistant does with the data isn't clear, but Apple confirmed that it keeps users' questions for up to two years. Siri, which needs to be connected to the Internet to function, sends all of its users' queries to Apple. Thanks IntelInside.

Gunna sent in this article that looks at the rise and fall of AMD. In part one of this two-part series, we look at the evolution of AMD from a second-source supplier for companies using Intel processors towards CEO Hector Ruiz's ideal of a "premium" chipmaker that could sell to the likes of Dell and Intel.

The SSD Review have a detailed article that looks at how you can optimize your SSD in a Windows 8 environment.

Check out this fluid simulation video. It is supposedly running on a single GTX580. Hopefully we'll see water like this in games soon.

What was she thinking? It's so easy to get away with charging thousands to the company credit card!! A PR executive working for the makers of Xbox game Call Of Duty siphoned off 18,963 to pay for her engagement party, hen party and designer shopping sprees. Kathryn Kirton, 35, was head of PR at Activision when she got carried away with the 'glamorous and luxurious' world of public relations, Blackfriars Crown Court heard.

The king of mobile, ARM just keeps on keeping on. ARM Holdings is the embedded device, smartphone, and tablet industries' undisputed king. Whether it's an Apple i-device, an Android gadget, or a Windows Phone, the processors that power each of these devices are typically chips based on architecture and/or instruction set licensed from ARM.

Verizon's 2013 Data Breach Investigation Report is out and claims intrusions originating from China are behind 96% of all cyber-espionage data breaches. China was involved in 96% of all espionage data-breach incidents, most often targeting manufacturing, professional and transportation industries. The assets China targeted within those industries included laptop/desktop, file server, mail server and directory server, in order to steal credentials, internal organization data, trade secrets and system info.

It's amazing that a simple tweet can cause so much damage.. like wiping $136 Billion off of the S&P 500. This follows a hack of the Associated Press twitter account. Stocks took a steep plunge following a false AP tweet that indicated that the White House had been the victim of an explosion and that President Obama had been injured. The AP confirmed its Twitter account was hacked and the spokesman said the tweet was "bogus." The Twitter account was suspended shortly after the fake tweet.

Return to OCAU's News Page


All original content copyright James Rolfe. All rights reserved. No reproduction allowed without written permission.