Social Icons

twitter facebook google plus linkedin rss feed email

Featured Posts

10 Signs Your Computer Might Have a Malware Infection

Our computer is like a member of our family, when it doesn’t “feel good” or something is wrong with it, we can usually tell. We might not know exactly what is bothering it, but we have a feeling that something is wrong and we want to do everything we can to make them all better.

Who Is A Hacker? Mark Zuckerberg Explains In His Letter From The Past

The word hacker has been viewed with a bad filter that hackers always break into people’s computers. According to Facebook CEO Mark Zuckerberg, hacking is an approach to doing things quickly and testing their limits. Hacking is an active discipline, and one should focus on the quick implementation of ideas.

Sony Is Working On Mobile-to-Mobile Wireless Charging Technology

According to a recently published patent application, Sony is working on a new futuristic technique that enables wireless power exchange between various nearby consumer electronic devices, including smartphones, computers, microwave, washing machine, fridges, and TVs, without cords.

Pinterest is now blocked in China

China has blocked one of the few Western social media sites that had remained accessible to its population: Pinterest.

How To Remove User Account Password In Windows 10

Windows operating system allows you password protect your user account for obvious reasons. While we always recommend users to use a strong password for a user account, there are users who want to have a password-free user account.

Tuesday, June 6, 2017

15 Best Free Hacking Apps For Android Phones (2017 Edition)

As Android has emerged as the top mobile operating system, we have seen a great rise in the Android hacking apps for rooted as well as non-rooted devices. For our readers, we have prepared the list of the best hacking apps for Android for 2017, which can be used by a technology enthusiast, an IT security administrator, or an ethical hacker. Our list includes popular Wi-Fi and phone hacking apps like Hackode, zANTI, Shark for Root, etc.
Based upon the industry reviews and our own experience, here is a compilation of the top Android hacking applications that ethical hackers and security researchers can use. Along with the description of apps, we have provided the relevant website and download links (Play Store or APK links) to help you get started instantly.

Disclaimer: Please note that Fossbytes is publishing this list just for educational purposes. We don’t support the use of any tool to indulge in unethical purposes.

15 Best Hacking Apps For Android Phones

1. AndroRAT

AndroRAT stands for Android and RAT (Remote Administrative Tools). This top free hacking tool was released a long time ago as a client/server application. The app aims to give you the control of the Android system remotely and fetch the information from it. This Android app runs as a service right after the boot. So, a user doesn’t need to interact with the service. The app provides you the ability to trigger the server connection by a call or SMS.
The features in this useful Android hacking app include collecting information like contacts, call logs, messages, and location. The app also allows you to remotely monitor received message and state of phone, making a phone call and sending texts, taking picture from camera, opening URL in the default browser etc.
Find the APK/Download link of this hacking app here — AndroRAT

2. Hackode

The second entry on our list of top hacking Android apps for 2017 is Hackode. It is an app which is basically a collection of multiple tools for ethical hackers, IT specialists, and penetration testers. In the app, there are three modules –Reconnaissance, Scanning, Security Feed — available in the application.
With this app, you get the functionalities like Google hacking, SQL Injection, MySQL Server, Whois, Scanning, DNS lookup, IP, MX Records, DNS Dif, Security RSS Feed, Exploits etc. It’s a great Android hacking app to start with and it doesn’t ask for your private information to operate.
Find the APK/Download link of Hackode here — Hackode

3. zANTI

zANTI is a reputed Android hacking suite from Zimperium. This software suite comes with multiple tools that are widely used for penetration testing purposes. This mobile penetration testing toolkit allows the security researchers to scan a network easily. This toolkit allows the IT administrators to simulate an advanced hacking environment to detect multiple malicious techniques.
zANTI could be called an app that brings the power of Backtrack on your Android device. As soon as you login into zANTI, it maps the entire network and sniffs the websites being visited along with their cookies — thanks to ARP cache poisoning on devices.
The various modules in the app are network mapping, port discovery, sniffing, packet manipulation, DoS, MITM, and more.
Find the APK/Download link of this app here — zANTI

4. cSploit

cSploit calls itself the most advanced and complete IT security toolkit for Android operating system. It’s a tool that enumerates local hosts, finds vulnerabilities and their exploits, cracks Wi-Fi password, installs backdoors, etc.
APK/Download link of this security toolkit is here — cSploit

5. FaceNiff

FaceNiff is a top Android hacking app that allows you to intercept and sniff your WiFi network traffic. This tool is widely used to snoop into people’s Facebook, Twitter and other social media websites using your Android device. This hacker-favorite tool steals cookies from WiFi network and gives an attacker an unauthorized access to victim’s account.
FaceNiff is developed by Bartosz Ponurkiewicz — the same developer who wrote Firesheep for Firefox hacking on the desktop.
Find the APK/Download link of FaceNiff here — FaceNiff

6. Shark for Root

Shark for Root is an advanced tool for security experts and hackers. This tool works as a traffic snipper and works on Wi-Fi, 3G, and FroYo tethered mode. One can also use the tcpdump command for this free hacking app for rooted Android devices.
Find the APK/Download link of this advanced security app here — Shark For Root

7. Droidsheep

Droidsheep is an effective hacking app developed for security analysts interested in playing with Wi-Fi networks. The app has the ability to hijack the web session profiles over a network and it works with almost all services and websites.
As you fire up the Droidsheep app, it acts a router that monitors and intercepts all the Wi-Fi network traffic and fetches the profiles of active sessions. With this app, one can sniff Facebook, LinkedIn, Twitter and other social media accounts.
DroidSheep Guard, another version of app, helps you to detect ARP-Snoofing on the networks i.e. the attacks by FaceNiff, Droidsheep, and other software.
Find the APK/Download link of Droidsheep app here — Droidsheep

8. DroidBox

DroidBox is an app that offers dynamic analysis of Android applications. Using the app, one can get a wide range of results about the hashes for the APK package, network traffic, SMS and phone calls, information leaks via different channels etc.
This top Android hacking application also gives you the ability to visualize the behavior of an Android app package.
Find the APK/Download link of this free phone hacking app here — DroidBox

9. APKInspector

APKInspector is an app that allows you to perform reverse engineering tricks. With this app, you can get the graphic features and analysis functions for the users to get a deep insight. This powerful Android hacking tool helps you get the source code of any Android app and visualize the DEX code to erase the credits and license.
Find the APK/Download link of this reverse engineering app here — APKInspector

10. Nmap

One of the most popular network scanning apps for desktop can also be used on Android operating system. Nmap works on both non-rooted and rooted phones. If you are a beginner Android hacker, this hacking app app is a must have.
Find the Nmap APK/Download link of this hacking app — Nmap

11. SSHDroid

SSHDroid is a SSH server implementation developed for Android that allows you to connect your Android device to a PC and run commands like ‘terminal’ and ‘adb shell’ and edit files. It provides an extra security later when you are connecting to a remote machine.
The app provides features like shared-key authentication, WiFi autostart whitelist, extended notification control etc,
Find the APK/Download link of this hacking app here — SSHDroid

12. Wi-Fi Kill

Wi-Fi Kill is a great hacking tool for rooted Android devices. Using this tool, one can disable a device’s internet connection if it’s connected to your network. In reality, it blocks the packet data going to a device. Thanks to its simple interface, any novice user can use this Android hacking app. Find the apk of this tool using the link given below:
Find the APK/Download link of Wi-Fi kill app here — WiFi Kill

13. Kali Linux NetHunter

Kali Linux NetHunter is the first open source penetration testing platform for Android-powered Nexus devices and OnePlus One. It supports Wireless 802.11 frame injection, HID keyboard, 1-click MANA Evil Access Point setups, BadUSB MITM attacks. etc.
Download link of Kali Linux NetHunter is here — Kali Linux NetHunter

14. Fing Network Scanner

This popular network scanner app for Android is used by hackers and security professionals to discover which devices are connected to the internet, map devices, locate security risks, find intruders, solve network problems, etc. It comes with more than a dozen free network tools for making your job easier.
APK/Download link Fing is here  — Fing

15. USB Cleaver

USB Cleaver is a free Android hacking app that’s capable of stealing information from connected Windows PCs. It can access browser passwords, Wi-Fi password, network information, etc.
Find the APK/Download link of this hacking app here — USB Cleaver
Did you find these best hacking tools of 2017 helpful? Use them and share your reviews in the comments below.

Hey My Readers and Visitirs If You Like Us or Our Web Site Please Share and Link back To My Site ... Take Care .,.,.

Monday, June 5, 2017

How To Share Your Location Using Google Maps

For me, it happens at least once a week. I’m trying to find a friend at a local park, a crowded music festival, or at a bar they wandered into but now for some reason can’t remember the name of (or there’s a few in town and they aren’t sure which one they’ve made it to)… and we spend a bunch of time exchanging texts, photos, and other awkward descriptions of each other’s location until we’re finally able to meet up. It’s annoying, and a huge time-suck, but it’s for the most part how it is. But it doesn’t have to be that way.
With Google Maps, you can share your location with friends, so they can pinpoint where you are, and use Google’s stellar navigational skills to get them to you fast. Locations can be shared for just right now when you need to meet up with someone at a local park, or can be shared for longer periods of time. For instance, if you happen to be vacationing with a few friends in Vegas, you might all share your location with each other for the weekend, so you can at a quick glance see that two friends at gambling at the MGM, another at Planet Hollywood, and one is still in bed at the hotel.
While you probably don’t want your friends to be able to keep tabs on you constantly, there are definitely a few occasions where having an idea of where everyone is can be super useful. If you want to give it a try, here’s a step-by-step guide to making it happen. I’d recommend settings things up before a big trip with everyone, so when you need the feature you can use it without any missteps.
I’m going to kick things off with instructions on how to share your location with people who have Google accounts. At this point, it’s highly likely that this is all of your friends. Even if they’re not huge Gmail users they probably have a Google account (or totally should, tell them to get on that). If you have a die-hard pal that doesn’t have an account (there’s always that one guy) the feature won’t be quite as robust, but there’s an option for that down at the bottom of the page.
So, for your Google Account friends, here’s how to make the magic happen:

of 05
Add Everyone’s Email To Your Address Book

Make sure you have everyone’s Gmail address saved in your Google Contacts. If you’ve ever emailed these people, then chances are good you’ll have their info saved. On your Android phone, that means going into their contact card, and making sure the email field is filled out with an account they use. On your computer, you can access Google Contacts by logging into Gmail, and click on the “Gmail” in the top-left corner. From there, select “Contacts” from the drop-down menu. On the Contacts page, you can add new people by clicking the big pink + sign in the bottom right of the page and add to individual’s entries by clicking on their name.

of 05
Launch Google Maps

Launch Google Maps on your Android or iOS device. Tap the menu button (it looks like three lines and is on the left side of the search bar). About halfway down the menu options, you’d see “Share Location.” tap on that to bring up the share location window.

of 05
Choose How Long You’d Like To Share

Decide how long you’d like to share your location. There’s an option for “Until I turn this off,” if you’d like it to be indefinite for now. Alternatively, you can select the first option to specify a time. It defaults to one hour (for those quick “Where are you?!?” messages. You can press the + or - button beside it to change how long you’re sharing. The time the share will expire will appear, so you know exactly when you’re going to run out of time. 

of 05
Select People To Share With

Once you’ve determined how long you’d like to share your location, you can designate who you’d like to share it with. Tap the “Select People” button at the bottom of your page to select whom you’d like to share with. Once you select a person and send, they’ll get a notification letting them know you’ve shared your location with them and they'll be able to access your location via Google Maps on their device. 

of 05
For People Without Google Accounts

For people without Google Accounts, you can still share your location, but that person can not share theirs. To do so, go through the steps I outlined above, and then go into the “More” menu and select “Copy to Clipboard” option. That will give you a link you can pass along to friends via text, email, Facebook Messenger and the like, so they can find you. This one can be super useful when you’re trying to meet up with a ton of people you don’t know very well. For instance, if you’re the leader of a tour group, you can share your location so people can meet you for the tour and/or catch up to the group if they’re running behind.
Sources: Lifewire

Hey My Readers and Visitirs If You Like Us or Our Web Site Please Share and Link back To My Site ... Take Care .,.,.

Tuesday, May 30, 2017

Microsoft HoloLens to Serve as AR tool for Doctors During Spinal Surgery

While augmented reality is often touted as the future of entertainment and mobile communication, the technology has the potential to be useful in a number of practical and professional situations as well. Case in point: Scopis, a company that specializes in technology for surgical purposes, has announced a new AR platform that uses Microsoft’s HoloLens to aid surgeons operating on the spine.

Dubbed the Holographic Navigation Platform, Scopis’ technology uses the HoloLens to give surgeons a hands-free display that projects information over the area being operated on. This mixed-reality overlay can include markings of where to place instruments, and important measurements or stats within field-of-view.

Scopis notes that the Holographic Navigation Platform is designed to improve both the speed and precision of spinal operations. For example, during multiple vertebrae fixation surgeries, surgeons can use the HoloLens to project an overlay of exactly where pedicle screws are to be positioned.
While the technology allows surgeons to improve the accuracy and alignment of their instruments, there are also benefits for patients as well. There’s shorter and less invasive surgeries, in addition to reduced exposure to the radiation used in fluoroscopy devices, which are currently used in identifying the ideal position for screw placements.
SOURCE : slashgear

Hey My Readers and Visitirs If You Like Us or Our Web Site Please Share and Link back To My Site ... Take Care .,.,.

Monday, May 29, 2017

Google Allo brings backup/restore options and group incognito mode

Google Allo has recently surpassed the 50 million download threshold, and the folks at the big “G” have released a new update for the application. The update adds a few new features that may be important to you, provided that you’re still using Allo.

New features in  rolling out today! Chat backup/restore, incognito mode for groups and link preview

The biggest addition to Allo is the ability to backup and restore your various conversations within the app. This will make life much easier if you’re getting a new device and want to keep your conversation history.

Another addition to Allo is the inclusion of group incognito mode, which will bring you and your friends the ability to have a quick chat that disappears after a pre-set period time. This could come in handy if you’re trying to make plans for the night and don’t want to clog up your conversation list.

Finally, Google has added the ability to preview rich URL links in chat giving you the ability to view links before clicking through. Allo was just updated today, but these changes aren’t on the official changelog. Instead, Allo’s head Amit Fulay has stated these changes are on the server side, so you’ll just have to wait until you see the options on your device.

Sources: phandroid

Hey My Readers and Visitirs If You Like Us or Our Web Site Please Share and Link back To My Site ... Take Care .,.,.

How Do SSDs Work?

Here at ExtremeTech, we’ve often discussed the difference between different types of NAND structures — vertical NAND versus planar, or multi-level cell (MLC) versus triple-level cells (TLC). Now, let’s talk about the more basic relevant question: How do SSDs work in the first place, and how do they compare with new technologies, like Intel Optane?
To understand how and why SSDs are different from spinning discs, we need to talk a little bit about hard drives. A hard drive stores data on a series of spinning magnetic disks, called platters. There’s an actuator arm with read/write heads attached to it. This arm positions the read-write heads over the correct area of the drive to read or write information.
Because the drive heads must align over an area of the disk in order to read or write data (and the disk is constantly spinning), there’s a non-zero wait time before data can be accessed. The drive may need to read from multiple locations in order to launch a program or load a file, which means it may have to wait for the platters to spin into the proper position multiple times before it can complete the command. If a drive is asleep or in a low-power state, it can take several seconds more for the disk to spin up to full power and begin operating.
From the very beginning, it was clear that hard drives couldn’t possibly match the speeds at which CPUs could operate. Latency in HDDs is measured in milliseconds, compared with nanoseconds for your typical CPU. One millisecond is 1,000,000 nanoseconds, and it typically takes a hard drive 10-15 milliseconds to find data on the drive and begin reading it. The hard drive industry introduced smaller platters, on-disk memory caches, and faster spindle speeds to counteract this trend, but there’s only so fast that drives can spin. Western Digital’s 10,000 RPM VelociRaptor family is the fastest set of drives ever built for the consumer market, while some enterprise drives spun up to 15,000 RPM. The problem is, even the fastest spinning drive with the largest caches and smallest platters are still achingly slow as far as your CPU is concerned.

How SSDs are different

“If I had asked people what they wanted, they would have said faster horses.” — Henry Ford
Solid-state drives are called that specifically because they don’t rely on moving parts or spinning disks. Instead, data is saved to a pool of NAND flash. NAND itself is made up of what are called floating gate transistors. Unlike the transistor designs used in DRAM, which must be refreshed multiple times per second, NAND flash is designed to retain its charge state even when not powered up. This makes NAND a type of non-volatile memory.
Flash cell structure
The diagram above shows a simple flash cell design. Electrons are stored in the floating gate, which then reads as charged “0” or not-charged “1.” Yes, in NAND flash, a 0 means that data is stored in a cell — it’s the opposite of how we typically think of a zero or one. NAND flash is organized in a grid. The entire grid layout is referred to as a block, while the individual rows that make up the grid are called a page. Common page sizes are 2K, 4K, 8K, or 16K, with 128 to 256 pages per block. Block size therefore typically varies between 256KB and 4MB.
One advantage of this system should be immediately obvious. Because SSDs have no moving parts, they can operate at speeds far above those of a typical HDD. The following chart shows the access latency for typical storage mediums given in microseconds.
Image by CodeCapsule
NAND is nowhere near as fast as main memory, but it’s multiple orders of magnitude faster than a hard drive. While write latencies are significantly slower for NAND flash than read latencies, they still outstrip traditional spinning media.
There are two things to notice in the above chart. First, note how adding more bits per cell of NAND has a significant impact on the memory’s performance. It’s worse for writes as opposed to reads — typical triple-level-cell (TLC) latency is 4x worse compared with single-level cell (SLC) NAND for reads, but 6x worse for writes. Erase latencies are also significantly impacted. The impact isn’t proportional, either — TLC NAND is nearly twice as slow as MLC NAND, despite holding just 50% more data (three bits per cell, instead of two).
TLC NAND voltages
The reason TLC NAND is slower than MLC or SLC has to do with how data moves in and out of the NAND cell. With SLC NAND, the controller only needs to know if the bit is a 0 or a 1. With MLC NAND, the cell may have four values — 00, 01, 10, or 11. With TLC NAND, the cell can have eight values. Reading the proper value out of the cell requires that the memory controller use a very precise voltage to ascertain whether any particular cell is charged or not.

Reads, writes, and erasure

One of the functional limitations of SSDs is that while they can read and write data very quickly to an empty drive, overwriting data is much slower. This is because while SSDs read data at the page level (meaning from individual rows within the NAND memory grid) and can write at the page level, assuming that surrounding cells are empty, they can only erase data at the block level. This is because the act of erasing NAND flash requires a high amount of voltage. While you can theoretically erase NAND at the page level, the amount of voltage required stresses the individual cells around the cells that are being re-written. Erasing data at the block level helps mitigate this problem.
The only way for an SSD to update an existing page is to copy the contents of the entire block into memory, erase the block, and then write the contents of the old block + the updated page. If the drive is full and there are no empty pages available, the SSD must first scan for blocks that are marked for deletion but that haven’t been deleted yet, erase them, and then write the data to the now-erased page. This is why SSDs can become slower as they age — a mostly-empty drive is full of blocks that can be written immediately, a mostly-full drive is more likely to be forced through the entire program/erase sequence.
If you’ve used SSDs, you’ve likely heard of something called “garbage collection.” Garbage collection is a background process that allows a drive to mitigate the performance impact of the program/erase cycle by performing certain tasks in the background. The following image steps through the garbage collection process.
Garbage collection
Image courtesy of Wikipedia
Note that in this example, the drive has taken advantage of the fact that it can write very quickly to empty pages by writing new values for the first four blocks (A’-D’). It’s also written two new blocks, E and H. Blocks A-D are now marked as stale, meaning they contain information that the drive has marked as out-of-date. During an idle period, the SSD will move the fresh pages over to a new block, erase the old block, and mark it as free space. This means that the next time the SSD needs to perform a write, it can write directly to the now-empty Block X, rather than performing the program/erase cycle.
The next concept I want to discuss is TRIM. When you delete a file from Windows on a typical hard drive, the file isn’t deleted immediately. Instead, the operating system tells the hard drive that it can overwrite the physical area of the disk where that data was stored the next time it needs to perform a write. This is why it’s possible to undelete files (and why deleting files in Windows doesn’t typically clear much physical disk space until you empty the recycling bin). With a traditional HDD, the OS doesn’t need to pay attention to where data is being written or what the relative state of the blocks or pages is. With an SSD, this matters.
The TRIM command allows the operating system to tell the SSD that it can skip rewriting certain data the next time it performs a block erase. This lowers the total amount of data that the drive writes and increases SSD longevity. Both reads and writes damage NAND flash, but writes do far more damage than reads. Fortunately, block-level longevity has not proven to be an issue in modern NAND flash. More data on SSD longevity, courtesy of the Tech Report, can be found here.
The last two concepts we want to talk about are wear leveling and write amplification. Because SSDs write data to pages but erase data in blocks, the amount of data being written to the drive is always larger than the actual update. If you make a change to a 4KB file, for example, the entire block that 4K file sits within must be updated and rewritten. Depending on the number of pages per block and the size of the pages, you might end up writing 4MB worth of data to update a 4KB file. Garbage collection reduces the impact of write amplification, as does the TRIM command. Keeping a significant chunk of the drive free and/or manufacturer overprovisioning can also reduce the impact of write amplification.
Wear leveling refers to the practice of ensuring that certain NAND blocks aren’t written and erased more often than others. While wear leveling increases a drive’s life expectancy and endurance by writing to the NAND equally, it can actually increase write amplification. In other to distribute writes evenly across the disk, it’s sometimes necessary to program and erase blocks even though their contents haven’t actually changed. A good wear leveling algorithm seeks to balance these impacts.

The SSD controller

It should be obvious by now that SSDs require much more sophisticated control mechanisms than hard drives do. That’s not to diss magnetic media — I actually think HDDs deserve more respect than they are given. The mechanical challenges involved in balancing multiple read-write heads nanometers above platters that spin at 5,400 to 10,000 RPM are nothing to sneeze at. The fact that HDDs perform this challenge while pioneering new methods of recording to magnetic media and eventually wind up selling drives at 3-5 cents per gigabyte is simply incredible.
SSD controller
A typical SSD controller
SSD controllers, however, are in a class by themselves. They often have a DDR3 memory pool to help with managing the NAND itself. Many drives also incorporate single-level cell caches that act as buffers, increasing drive performance by dedicating fast NAND to read/write cycles. Because the NAND flash in an SSD is typically connected to the controller through a series of parallel memory channels, you can think of the drive controller as performing some of the same load balancing work as a high-end storage array — SSDs don’t deploy RAID internally, but wear leveling, garbage collection, and SLC cache management all have parallels in the big iron world.
Some drives also use data compression algorithms to reduce total number of writes and improve the drive’s lifespan. The SSD controller handles error correction, and the algorithms that control for single-bit errors have become increasingly complex as time has passed.
Unfortunately, we can’t go into too much detail on SSD controllers because companies lock down their various secret sauces. Much of NAND flash’s performance is determined by the underlying controller, and companies aren’t willing to lift the lid too far on how they do what they do, lest they hand a competitor an advantage.

The road ahead

NAND flash offers an enormous improvement over hard drives, but it isn’t without its own drawbacks and challenges. Drive capacities and price-per-gigabyte are expected to continue to rise and fall respectively, but there’s little chance that SSDs will catch hard drives in price-per-gigabyte. Shrinking process nodes are a significant challenge for NAND flash — while most hardware improves as the node shrinks, NAND becomes more fragile. Data retention times and write performance are intrinsically lower for 20nm NAND than 40nm NAND, even if data density and total capacity are vastly improved.
Thus far, SSD manufacturers have delivered better performance by offering faster data standards, more bandwidth, and more channels per controller — plus the use of SLC caches we mentioned earlier. Nonetheless, in the long run, it’s assumed that NAND will be replaced by something else.
What that something else will look like is still open for debate. Both magnetic RAM and phase change memory have presented themselves as candidates, though both technologies are still in early stages and must overcome significant challenges to actually compete as a replacement to NAND. Whether consumers would notice the difference is an open question. If you’ve upgraded from NAND to an SSD and then upgraded to a faster SSD, you’re likely aware that the gap between HDDs and SSDs is much larger than the SSD – SSD gap, even when upgrading from a relatively modest drive. Improving access times from milliseconds to microseconds matters a great deal, but improving them from microseconds to nanoseconds might fall below what humans can realistically perceive in most cases.
Intel’s 3D XPoint (marketed as Intel Optane) has emerged as one potential challenger to NAND flash, and the only current alternative technology in mainstream production (other alternatives, like phase-change memory or magnetoresistive RAM. Intel has played its cards close to the vest with Optane and hasn’t revealed many of its underlying technologies, but we’ve recently seen some updated information on the company’s upcoming Optane SSDs.
Intel Optane performance targets
Optane SSDs are expected to offer similar sequential performance to current NAND flash drives, but with vastly better performance at low drive queues. Drive latency is also roughly half of NAND flash (10 microseconds, versus 20) and vastly higher endurance (30 full drive-writes per day, compared with 10 full drive writes per day for a high-end Intel SSD). For now, Optane is still too new and expensive to match NAND flash, which benefits from substantial economies of scale, but this could change in the future. The first Optane SSDs will debut this year as add-ons for Kaby Lake and its X270 chipset. NAND will stay king of the hill for at least the next 4-5 years. But past that point we could see Optane starting to replace it in volume, depending on how Intel and Micron scale the technology and how well 3D NAND flash continues to expand its cell layers (64-layer NAND will ship in 2017 from multiple players), with roadmaps for 96 and even 128 layers on the horizon.
Sources: extremetech

Hey My Readers and Visitirs If You Like Us or Our Web Site Please Share and Link back To My Site ... Take Care .,.,.

Related Posts Plugin for WordPress, Blogger...

Google Analystic

add block