វិធីការពារបញ្ហាស្រវាំងភ្នែក ជាមួ យអេក្រង់កុំព្យូទ័រ

តើអ្នកធ្លាប់មានអារម្មណ៍ ថារោយភ្នែក នៅពេលសម្លឹងមើលអេក្រង់កុំព្យូទ័រយូរពេក ដែររឺទេ ?

វាជាការពិត ការខំសម្លឹង មើលកុំព្យូទ័រច្រើនម៉ោង បានធ្វើអោយស្រវាំងភ្នែក ឈឺក្បាល ភ្នែកស្ងួតនិងរលាក បាន ប៉ុន្តែមានវិធីការពារ ដែលជួយកុំអោយរោយភ្នែក នៅពេលខំប្រឹង មើលកុំព្យូទ័រខ្លាំងពេក៖
១) ដាក់ភ្លើងបំភ្លឺអោយបានសមរម្យ៖ មិនថាពេល អ្នកកំពុងអានសៀវភៅ នៅមុខអេក្រង់បំភ្លឺរឺក៏អំពូល ភ្លើងនោះទេ អ្នកគួរបន្ថយភ្លើងបំភ្លឺ ទាំងអស់នេះបានសមស្រប ពីព្រោះវាជួយសម្ពាធភ្នែកកុំអោយ ប្រឹងបើកខ្លាំង ពេកជាមួយពន្លឺពីកុំព្យូទ័រ។
២) ទីតាំង៖ គួររកទីតាំងល្អ ក្នុងការដាក់កុំព្យូទ័ររបស់អ្នក ដូចជានៅជិតពន្លឺបង្អួច។ វានឹងមិនធ្វើអោយ អេក្រង់កុំព្យូទ័រជះចូលភ្នែកអ្នក ដោយធ្ងន់ធ្ងរ។
៣) ព្រិចភ្នែក ៖ ការព្រិចភ្នែកបែបធម្មតា ក៏ជួយលាងសមា្អតភ្នែក កុំអោយមានការរលាក រឺស្ងួតបាន ។ អ្នកគួរព្យាយាមព្រិចភ្នែក ញឹកញាប់នៅពេលសម្លឹងមើលកុំព្យូទ័រ ។

៤)សំរាក ៖ អ្នកអាចសម្រាក ពីអេក្រង់ប្រហែល២០ ទៅ៣០នាទី ។ ពេលសំរាកនោះគួរតែសម្លឹង មើលអ្វីដែល ឆ្ងាយប្រហែលពាក់កណ្តាល រឺមួយនាទី។ ការធ្វើបែបនេះ ជួយអោយសាច់ដុំភ្នែក បានសម្រាកខ្លះពីអេក្រង់កុំព្យួទ័រ។

ជាការពិតណាស់ ជារៀងរាល់ថ្ងៃ គ្រប់គ្នាតែងតែសម្លឹងមើលកុំព្យូទ័រ ក្នុងកិច្ចការប្រចាំថ្ងៃដូច្នេះ អ្នកគួរតែមានវិធីការពារភ្នែកខ្លះ ដូចចំនុចខាងលើដែលបានបង្ហាញ ដើម្បីរក្សាភ្នែករបស់អ្នក អោយកាន់តែល្អថែមទៀត។

Video

“Tonight I Wanna Cry” – KEITH URBAN

Alone in this house again tonight
I got the TV on, the sound turned down and a bottle of wine
There’s pictures of you and I on the walls around me
The way that it was and could have been surrounds me
I’ll never get over you walkin’ away

[Chorus:]
I’ve never been the kind to ever let my feelings show
And I thought that bein’ strong meant never losin’ your self-control
But I’m just drunk enough to let go of my pain
To hell with my pride, let it fall like rain
From my eyes
Tonight I wanna cry

Would it help if I turned a sad song on
“All By Myself” would sure hit me hard now that you’re gone
Or maybe unfold some old yellow lost love letters
It’s gonna hurt bad before it gets better
But I’ll never get over you by hidin’ this way

[Repeat chorus twice]

Preparation Questions for mid-term exam @University of Puthisastra, Year 4-Sem I

Prepare questions for mid term

1. What if you wanted to filter a list of processes that started with s* and with e*? Would you use Where-Object or -Name?

You would use Where-Object like this Get-Process|Where-Object{$_.Name –like “s*” –or $_.Name –like “e*”}. Using –Name doesn’t support regular expressions for a value.

2. When working with remote services, are there any advantages in using the –Name parameter versus using Where-Object?

Yes, the advantage of using –Name is that it has an effect similar to filtering. With something like Get-Service –Comp LON-DC1 –Name “a*”, only the services that start with “a” are retrieved. If this was done instead Get-Service –Comp LON-DC1|Where-Object{$_.Name –like “a*”}, in this case, all of the services from the remote machine are retrieved and are processed locally as they are passed to Where-Object.

3. How might sorting work with numbers versus strings?

It will depend on what type of object is being sorted. Even a number can be treated as a string. Consider this example: 1,"11",2,"33",3|sort. The output will be 1,11,2,3,33 because PowerShell has treated all the entries as string objects.

4. Can you think of other delimiters you may want to use with Export-Csv?

Other examples could be “|” and “;”.

5. Is there a difference between saving objects to a variable versus saving them to XML formatted file?

One thing XML formatted files are useful for, is being able to actually save the information of objects to disk, and even possibly transferring the information to another system.

6. Thinking about objects having properties and methods, if an object is saved to a file, is anything lost?

One of the disadvantages of files versus variables is that even when the file is imported, the methods of the original object are basically lost.

7. What might interfere with doing any kind of query of a remote computer?

Network firewalls, and even client side firewalls can interfere with remote queries like Get-Service and Get-Process.

8. Do all cmdlets accept pipeline input like New-ADUser?

No, not all cmdlet parameters have been programmed this way. To check whether a parameter accepts pipeline input can be determined by checking Get-Help with the –Full switch.

9. What is the advantage of a cmdlet parameter that accepts pipeline input?

A definite advantage is the shorter amount of typing required when the input can be read from any kind of input.

10. Before stopping a process, could a check be made to only stop the process if it was using more than a certain amount of physical or virtual memory?

Yes, simply using the filter cmdlet Where-Object in the pipeline could easily verify the current memory status. That would be useful in a script that is running regularly to check whether a process is having memory problems, and terminate it once it goes over a certain value.

11. Where can the $_ placeholder be used?

This placeholder is used to replace the current pipeline object, common in cmdlets like Where-Object and ForEach-Object.

12. What cmdlet do you use to remove selected objects from the pipeline?

Where-Object is used to filter entire objects out of the pipeline.

13. What kind of object is output by Select-Object when you specify property names?

The object that is output is the same object that was input into Select-Object, but with only those specified property names.

14. How do you list WMI classes in a specific namespace?

Call Get-WmiObject passing the namespace into the Namespace parameter and using the List switch parameter. E.g. Get-WmiObject –Namespace root\default -List

15. What is the WMI class to retrieve operating system information called?

Win32_OperatingSystem.

16. How do you use a server-side filter when using Get-WmiObject?

Pass a WMI expression to filter the data to the remote computer you are working with by using the Filter parameter.

17. Where is the best place to use filtering criteria with WMI?

A best practice is to “filter left,” that is, to specify filtering criteria as far to the left of the Windows PowerShell command line as possible. When you can filter by using a –filter parameter of a cmdlet, doing so is preferable to using the Where-Object cmdlet for the same filtering task.

18. When can alternate credentials be used with WMI connections?

When connecting to remote computers. It is not possible to use alternate credentials when connecting to a local WMI provider.

19. What protocol does WMI use, and how can you enable it to pass through a local firewall?

WMI rides atop the RPC protocol. A local computer’s Windows Firewall can be configured to pass its traffic by enabling the Remote Management dynamic exception.

20. Which common Active Directory cmdlet parameter is used to limit search results to matches based on attributes?

-filter.

21. Which common Active Directory cmdlet parameter is used to specify the attributes that you want in your query results? Properties

22. How do you add the Active Directory functionality to your PowerShell session?

ipmo ActiveDirectory

23. How can you see a list of all attributes that are available for an Active Directory object?

Get-ADUser -Filter * -Properties * -ResultSetSize 1 | fl *

24. Which parameter can be used to limit the total number of objects returned in an Active Directory query? ResultSetSize

25. On which operating systems are the Active Directory cmdlets available?

Windows 7 and Windows Server 2008 R2

26. Which module contains the Active Directory cmdlets? The ActiveDirectory module

27. What is the purpose of an Active Directory PSDrive?

It is primarily used as an object that contains credentials for running Active Directory-related cmdlets.

28. Which drive must be active in order to use New-PSDriveto map a new drive to Active Directory? The AD: drive must be active.

29. If you send a script to another user with Windows 7 or Windows Server 2008 R2, will they be able to run the script? Is PowerShell included with these versions? Is it included with older Windows operating system versions?

Yes, both Windows 7 and Windows Server 2008 R2 come with PowerShell v2 by default. By default their execution policy is set to Restricted though, so a user won’t be able to immediately run any scripts without changing the execution policy.

30. If you send a script to another user, how can they incorporate that so that it automatically runs every time PowerShell is opened?

By adding if to the profile, they can make PowerShell load the script every time it is opened.

31. Is there a way to specify a default value for parameters in the param statement?

Yes, for example, using the syntax param([string]$my=”value”). In that case, unless a different value is provided when invoking the script, $my will be assigned the string “value”.

32. What execution policy requires that remote scripts have a digital signature? RemoteSigned

33. What are the advantages of a parameterized script?

Reuse. Replacing variable information with parameters allows the script to be run with varying information, in a more structured fashion.

34. You have started a PowerShell console and have started a couple of background jobs. What happens to the background jobs if they are still running and the main console is closed?

The background jobs will basically stop running completed and all the information they may contain will be lost.

35. If you have two or more PowerShell consoles open, and start a background job in one console, can you access the job from the other console?

No, jobs are tied directly to the console that started them and cannot be accessed by any other consoles.

37. Is there any limit to the number of remote sessions can be run?

Basically the only limit is availability of resources on all the systems involved in PowerShell remoting. There is however a –ThrottleLimit property available for Invoke-Command which limits the number of simultaneous child jobs that can run at any one time.

38. If I use Invoke-Command from one console and start it as a background job, can other consoles on the same server also see the background jobs and access their information directly?

No, all the background jobs are basically attached to the console that they were initiated from. You can, however, share information between consoles, but it requires using some intermediary, like saving the output from a job to a text or XML file, and importing that file into the other console.

39. What is the primary difference between Start-Job and Invoke-Command (used with its –AsJob parameter)?

Start-Job is for local jobs. Invoke-Command is for remote computer jobs.

40. Will implicit remoting work if the remote computer does not have WinRMenabled?

No

41. What command would disable Remoting on the local computer?

Disable-PSRemoting

43. What kind of object is output by Measure-Object?

A measurement object

PowerShell Basics – Extending the Shell with Modules and Snapins

In PowerShell there are 2 main ways to extend the shell this are:

· Modules – A package that contains Windows PowerShell commands int he form of functions, cmdlerts and worksflows, in addition it may contain variables, aliases and providers. Modules can be written in PowerShell and/or compiled as DLLs.

· Snap-Ins – Are compiled cmdlets in to a DLL written in a .Net language are bening deprecated and no longer recomended as the way to create and package new cmdlets.

There is a big miss conception with people starting with PowerShell when they install some server products like Exchange or SharePoint and the programs place a shotcut to what they call a "Management Shell" it is nothing more than PowerShell with a loaded Module or PSSnapin. As you will see extending the shell is quite simple and flexible.

Working with Modules

Modules have primarily 2 locations on your system:

· %windir%\system32\WindowsPowerShell\v1.0\Modules this is the location for system wide modules available to any user in the system.

· %USERPROFILE%\Documents\WindowsPowerShell\Modules

Each module is stored in a folder where there is a psm1 file that is known as a Module Manifest, this manifest has the settings for the module and sets the restrictions for it in terms of .Net Framework version, version of PowerShell, files to load, version, copyright, author and many other settings. This file can load what is called a main module and sub-modules each can either be a psm1 or dll file, in addition they can also be scripts that gets procresses. As it can be seen using modules provide great flexibility in terms of formats and structure.

We can also have modules in other locations that can be accessed by the PowerShell session we run in, the locations are defined in the environemt variable $env:PSModulePath

C:\> $env:PSModulePath

C:\Users\Carlos\Documents\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules\

If we want to add another path for PowerShell to look at we just add that path to the current environment variable:

$env:psmodulepath = $env:psmodulepath + ";"

To list the modules that are available we use the Get-Module cmdlet withe the -listavailable parameter:

Get-Module -ListAvailable

This will list all modules that the session can see in the paths that are specified in the environmet variable. On PowerShell v2 we would have to load each module we wanted by hand and only then would be be able to use the commands available, in the case of PowerShell v3 Microsoft now allows us access to the modules in those paths and the modules are loaded dynamically when a cmdlet, workflow, alias or function that form part of the module is invoked.

If you only want to see the modules that are currently loaded in to the session the -All parameter is used with Get-Module:

C:\> Get-Module -All

ModuleType Name ExportedCommands

All about RAID

Different types of RAID protection

These descriptions are based on the original RAID definitions from the Berkeley paper by Patterson, Gibson and Katz. RAID originally stood for Redundant Array of Inexpensive Disks, but the disk vendors did not like that, as it had cost implications. They changed it to mean Redundant Array of Independent Disks.

Now this page has turned out to be a lot more popular that I ever thought it would, and needs a bit more explanation, as a lot of people are coming in from the home PC angle. I’m from a big systems background, IBM mainframes, big Unix servers, Windows and Netware clusters, that sort of stuff and that biases my opinions on RAID. If you want to put RAID onto your home PC, then in my opinion, RAID1 is the best way to go. It’s simple. it works and it only needs two disks. It will even perform if it is a software implementation.
If you run big storage systems with gigabytes of cache and hundreds of physical disks, then I would definitely go for RAID5. Why? It is cheaper because it uses fewer disks for a given capacity and it performs just as good as RAID1. If you have eighty 500GB disks, you can only store 20 Terabytes of data on them with RAID1, but you will get 35 TB on them in a 7+1 RAID5 implementation. That’s why I claim that RAID5 is cheaper than RAID1. It is for big systems, but not for small systems, say less than a couple of terabytes.
I had an animated discussion (which is one way of describing it) with a DBA last year who insisted that Oracle databases had to have RAID1 or they would not perform. We bought a DMX and ran some tests with the same database on RAID1 and RAID5, and the RAID5 setup actually performed better, I suspect, because it was pulling the data off more spindles.
However, I would never touch a software implementation of RAID5 as the write penalty will kill performance.
So there you go, PCs and small systems; RAID1, big systems RAID5 but at the end of the day it is your money.

RAID can be implemented by software in the host, but this is not usually successful. It is best implemented by microcode in the storage subsystem controller. The various types of RAID are explained below. In the diagrams, the square box represents the controller and the cache.

Parity is a means of adding extra data, so that if one of the bits of data is deleted, it can be recreated from the parity. For example, suppose a binary halfword consists of the bits 1011. The total number of ‘1’s in the halfword is odd, so we make the parity bit a 1. The halfword then becomes 10111. Suppose the third bit is lost, the halfword is then 10?11. We know from the last bit that there should be an odd number of ‘1’s, the number of recognisable ‘1’s is even, so the missing but must be a ‘1’. This is a very simplistic explanation, in practice, disk parity is calculated on blocks of data using XOR hardware functions. The advantage of parity is that it is possible to recover data from errors. The disadvantage is that more storage space is required.

  • RAID0 is simply data striped over several disks. This gives a performance advantage, as it is possible to read parts of a file in parallel. However not only is there no data protection, it is actually less reliable than a single disk, as all the data is lost if a single disk in the array stripe fails.RAID0 principles
  • RAID1 is data mirroring. Two copies of the data are held on two physical disks, and the data is always identical. RAID1 has a performance advantage, as reads can come from either disk, and is simple to implement. However, it is expensive, as twice as many disks are needed to store the data.RAID1 principles
  • RAID2 is a theoretical entity. It stripes data at bit level across an array of disks, then writes check bytes to other disks in the array. The check bytes are calculated using a Hamming code. Theoretical performance is very high, but it would be so expensive to implement that no-one uses it.
  • RAID3 A block of data is striped over an array of disks, then parity data is written to a dedicated parity disk. Successful implementations usually require that all the disks have synchronised rotation. RAID3 is very effective for large sequential data, such as satellite imagery and video.RAID3 principles

    In the gif above, the right hand disk is dedicated parity, the other three disks are data disks.

  • RAID4 data is written in blocks onto the data disks (i.e. not striped), then parity is generated and written to a dedicated parity disk.RAID4 principles

    In the gif above, the right hand disk is dedicated parity, the other three disks are data disks.

  • RAID5 data is written in blocks onto data disks, and parity is generated and rotated around the data disks. Good general performance, and reasonably cheap to implement. Used extensively for general data.RAID5 principles

    The gif below illustrates the RAID5 write overhead. If a block of data on a RAID5 disk is updated, then all the unchanged data blocks from the RAID stripe have to be read back from the disks, then new parity calculated before the new data block and new parity block can be written out. This means that a RAID5 write operation requires 4 IOs. The performance impact is usually masked by a large subsystem cache.
    As Nat Makarevitch pointed out, more efficient RAID-5 implementations hang on to the original data and use that to generate the parity according to the formula new-parity = old-data XOR new-data XOR old-parity. If the old data block is retained in cache, and it often is, then this just requires one extra IO to fetch the old parity. Worst case it will require to read two extra data blocks, not four.

    RAID5 write overhead

    RAID 5 often gets a bad press, due to potential data loss on hardware errors and poor performance on random writes. Some database manufactures will positively tell you to avoid RAID5. The truth is, it depends on the implementation. Avoid software implemented RAID5, it will not perform. RAID5 on smaller subsystems will not perform unless the subsystem has a large amount of cache. However, RAID5 is fine on enterprise class subsystems like the EMC DMX, the HDS USP or the IBM DDS devices. They all have large, gigabyte size caches and force all write IOs to be written to cache, thus guaranteeing performance and data integrity.

    Most manufactures will let you have some control over the RAID5 configuration now. You can select your block stripe size and the number of volumes in an array group.
    A smaller stripe size is more efficient for a heavy random write workload, while a larger blocksize works better for sequential writes. A smaller number of disks in an array will perform better, but has a bigger parity bit overhead. Typical configurations are 3+1 (25% parity) and 7+1 (12.5% parity).

  • RAID6 is growing in popularity as it is seen as the best way to guarantee data integrity as it uses double parity. It was originally used in SUN V2X devices, where there are a lot of disks in a RAID array, and so a higher chance of multiple failures. RAID6 as implemented by SUN does not have a write overhead, as the data is always written out to a different block.The problem with RAID6 is that there is no standard method of implementation; every manufacturer has their own method. In fact there are two distinct architectures, RAID6 P+Q and RAID6 DP.

    DP, or Double Parity raid uses a mathematical method to generate two independent parity bits for each block of data, and several mathematical methods are used. P+Q generates a horizontal P parity block, then combines those disks into a second vertical RAID stripe and generates a Q parity, hence P+Q. One way to visualise this is to picture three standard four disk RAID5 arrays then take a fourth array and stripe again to construct a second set of raid arrays that consist of one disk from each of the first three arrays, plus a fourth disk from the fourth array. The consequence is that those sixteen disks will only contain nine disks worth of data.

    P+Q architectures tend to perform better than DP architectures and are more flexible in the number of disks that can be in each RAID array. DP architectures usually insist that the number of disks is prime, something like 4+1, 6+1 or 10+1. This can be a problem as the physical disks usually come in units of eight, and so do not easily fit a prime number scheme.

  • RAID7 is a registered trademark of Storage Computer Corporation, and is basically RAID3 with an embedded operating system in the controller to manage the data and cache to speed up the access.
  • RAID1+0 is a combination of RAID1 mirroring and data striping. This means it has very good performance, and high reliability, so its ideal for mission critical database applications. All that redundancy means that it is expensive.
  • RAID50 is implemented as a RAID5 array that is then striped in RAID0 fashion for fast access
  • RAID53 applies this ‘RAID then stripe’ principle to RAID3. It should really be called RAID3+0. Both these RAID versions are expensive to implement in hardware terms
  • RAID0+1 is implemented as a mirrored array whose segments are RAID 0 arrays, which is not the same as RAID10. RAID 0+1 has the same fault tolerance as RAID level 5. The data will survive the loss of a single disk, but at this point, all you have is a striped RAID0 disk set. It does provide high performance, with lower resilience than RAID10.
  • RAID-S or parity RAID is a specific implementation of RAID5, used by EMC. It uses hardware facilities within the disks to produce the parity information, and so does not have the RAID5 write overhead. It used to be called RAID-S, and is sometimes called 3+1 or 7+1 RAID.
  • RAIDZ is part of the SUN ZFS file system. It is a software based variant of RAID5 which does not used a fixed size RAID stripe but writes out the current block of data as a varying size RAID stripe. With standard RAID, data is written and read in blocks and several blocks are usually combined together to make up a RAID stripe. If you need to update one data block, you have to read back all the other data blocks in that stripe to calculate the new RAID parity. RAIDZ eliminates the RAID 5 write penalty as any read and write of existing data will just include the current block. In a failure, data is re-created by reading checksum bytes from the file system itself, not the hardware, so recovery is independent of hardware failures. The problem, of course is that RAIDZ closely couples the operating system and the hardware. In other words, you have to buy them both from SUN.

Source: http://www.lascon.co.uk/hwd-raid.php

By vichhaiy Posted in SNA Tagged

Samsung plans Galaxy S5 by April

Samsung Electronics Co will release its Galaxy S5 smartphone by April and is studying the use of eye scanner technology for the first time, as it readies the high-end handset to compete with Apple Inc’s iPhones.

The S5 will be paired with a new wearable device that will be an evolution of the Galaxy Gear smartwatch, Lee Young Hee, executive vice-president of the company’s mobile business, had said on Monday. Samsung, which posted profit this week that missed analyst estimates, will debut the new products together as it also boosts marketing of tablet computers.

"We’ve been announcing our first flagship model in the first half of each year, around March and April, and we are still targeting for release around that time," Lee said. "When we release our S5 device, you can also expect a Gear successor with more advanced functions, and the bulky design will also be improved."

Samsung, which sells one of every three smartphones globally, is adding new features and models to fend off Apple in the high-end market and Chinese makers luring budget customers with handsets for $100. Asia’s biggest technology company will announce at least one other wearable device this year, Lee said without elaborating.

Samsung registered a design in South Korea in October for eyeglasses that can show information from a smartphone and enable users to take calls.

Fingerprint reader
Sales of the S4, the company’s current marquee handset, slowed after Apple released the iPhone 5s and 5c in September. The 5s includes a fingerprint-identity sensor, and Samsung is considering using an eye scanner in its top-end smartphones.

"Many people are fanatical about iris recognition technology," Lee said at the International Consumer Electronics Show in Las Vegas. "We are studying the possibility but can’t really say whether we will have it or not on the S5."

Suwon, South Korea-based Samsung this week posted its first profit decline in nine quarters as high-end handset growth slowed and the company paid employee bonuses. Operating profit was 8.3 trillion won ($7.8 billion) in the three months ended December, falling from 9 trillion won a year earlier, the company said.

Shares of Samsung have dropped 11 per cent from its closing price on December 23 as analysts scaled back projections for high- end handsets, erasing about $22 billion of the company’s market value. Samsung shipped 13 million units of the S4 in the fourth quarter, down from 17 million in the previous three months, Daewoo Securities Co said in a December 23 report.

New design
"The release of the S5 will be very important to Samsung," Lee Seung Woo, an analyst at IBK Securities Co, said by phone on Thursday. "Competition is going to intensify, and it’s not going to be an easy year for the company."

The Galaxy S4 may have fallen short of consumer expectations because its design was too similar to its S3 predecessor, Lee Young Hee said. The next handset likely will be different, she said without providing specifications, including screen size.

"When we moved to S4 from S3, it’s partly true that consumers couldn’t really feel much difference between the two products from the physical perspective, so the market reaction wasn’t as big," she said. "For the S5, we will go back to the basics. Mostly, it’s about the display and the feel of the cover."

Wraparound display
The timing of the release is after February’s Mobile World Congress in Barcelona.

Samsung shipped 91 million smartphones in the fourth quarter, up 4 percent from the previous quarter, according to an estimate by KB Investment & Securities Co. The company, the largest maker of televisions and memory chips, is diversifying its product range and using its manufacturing scale to tap new markets.

Samsung’s next Galaxy Note handset may use a three-sided display so messages can be read from an angle. The latest model will be released in the second half of this year and be aimed at the high-end segment.

"We are targeting consumers who want more professional use and tend to be willing to pay more for handsets," Samsung’s Lee said.

Wearable devices
The market for wearable devices may more than triple to about $30 billion by 2018, according to IHS Global Insights. Samsung will attempt to boost sales of its smartwatches by adding functions to check calorie consumption, monitor heart rate and measure stress levels, Lee Young Hee said.

"Healthcare related functions will be the most inherently tied functions to future wearables," she said. "We see a very big potential from there."

The company also sees more growth potential in tablets as it takes on Apple’s iPad line and Amazon.com Inc’s Kindle devices. The tablet computer market will grow more than 15 per cent annually, with more than 240 million units shipped last year, Shin Jong Kyun, head of Samsung’s mobile business, said November 6.

Samsung’s share of global tablet shipments doubled to about 20 per cent last year, Lee Young Hee said. The company, which shipped more than 40 million units in 2013, aims to drive sales growth of its mobile business, which accounts for more than 60 per cent of the company’s operating profit, to fend off margin pressure from the slowing high-end smartphone segment.

Samsung announced its largest tablets at CES, unveiling 12.2-inch versions of the Galaxy NotePRO, which uses a stylus, and the TabPRO, which doesn’t. The largest screens allows users to split the display into four windows running different applications.

"We had put relatively fewer resources and focus, including marketing, on tablets, but from this year we will consider it as one of our key major focuses," Lee Young Hee said.

"We still have room to improve."

Microsoft prepares urgent patch for Windows XP next week

Microsoft is readying an urgent patch for Windows XP on this month’s patch Tuesday, restricting attackers from completely taking over the affected computers.

According to a Symantec blog post, successful exploits will result in complete compromise of affected computers and patching of XP will make it less vulnerable.

Attackers are known to execute arbitrary code with kernel privileges and according to Microsoft; the same problem affects Windows Server 2003.

The urgency for patching of XP is due to Microsoft ending its support to XP in April, PC World reported.

Russ Ernst, director of product management at Lumension said that if one is still using XP, this will be an important patch to deploy.

Another alert, Bulletin 1 promises that it has patches for all supported versions of Microsoft Word and SharePoint Server, whereas the fourth bulletin addresses a denial-of-service weakness in Microsoft Dynamics AX.

Read more on: Microsoft Prepares Urgent Patch For Windows Xp Next Week