Saturday, June 30, 2012

Report: Apple Wins Injunction Against Galaxy Nexus

A California court has granted Apple an injunction against Samsung over sales of its Galaxy Nexus smartphones in the U.S. The injunction was handed down on Friday afternoon by the same California court that earlier this week issued an injunction against sales of Samsung's Galaxy Tab 10.1.
It will go into effect as soon as Apple posts a US$96 million bond that will be used toward any damages sustained by Samsung if the injunction is subsequently found to be erroneously enjoined, according to a report by Reuters.

Friday, June 29, 2012

The $10 000 College Degree. A Texas university offers a low-cost bachelor’s in IT. But what’s it worth?

In the summer of 2016, Texas A&M University–San Antonio will graduate its very first group of students with bachelor’s diplomas in information technology, at the bargain price of US $9700.
When the university’s president, Maria Hernandez Ferrier, announced the bachelor’s of applied arts and sciences IT degree [PDF] in March, listeners were astounded by its cut-rate price. Just last year, critics scoffed and education officials scratched their heads at Governor Rick Perry’s call to his state’s public higher-ed institutions to develop a four-year bachelor’s degree for no more than $10 000. That’s within range of just one year’s tuition and fees at sister school Texas A&M–College Station or the University of Texas–Austin.

Google I/O: Chrome Browser Improvements; Chrome and Google Drive for iOS; New Chromebooks


Google rolled out a series of improvements to some of its core web products on Day Two of its giant developer conference in San Francisco. 
Google Thursday announced improvements to its Chrome browser, improvements to Google Docs, and Chrome and Google Drive for iPhone and iPad, among other things on Day Two of the Google I/O developer conference in San Francisco.

Thursday, June 28, 2012

Web Attackers Borrow Domain Generation Tricks From Botnet-type Malware


 
Hackers have started to adopt domain-generation techniques normally used by botnet-type malware in order to prolong the life of Web-based attacks, according to security researchers from antivirus firm Symantec.
Such domain-generation techniques were recently observed in a series of drive-by download attacks that used the Black Hole exploit toolkit to infect Web users with malware when visiting compromised websites, Symantec security researcher Nick Johnston said in a blog post on Tuesday.

Wednesday, June 27, 2012

The Best Google Chrome Extensions 2012



Once again, Google Chrome is our Editors' Choice for Web browsers. Version 19 features an amazingly responsive browsing experience, security to prevent crashing, synchronization of bookmarks and preferences between Chrome browsers on other computers, great HTML5 support, and built-in Flash and PDF readers.
But even all of that isn't enough for true browser aficionados. We need extensions.
Google Chrome's support for extensions kicked off just three years ago and has exploded since. After last year's Chrome Web Store facelift, the collection now rivals Firefox's.
Rather than stumble through the almost endless number of entries in the store, however, browse through our efficient list of the 61 extensions just about everyone should consider. These are not the "apps" that are also very popular in the Web store, which are essentially links off to select Web app sites. Instead, we're concentrating on the actual software that extends and improves your browsing experience, sometimes in ways you didn't even think possible.
There are a lot of extensions specific to Google and its services, which isn't surprising considering Chrome is Google's browser. They work across operating systems. Best of all, every extension mentioned here is entirely free, so there's no harm in giving them a try. If you don't like one, just type chrome://extensions into the browser's address bar. From there, you can disable or remove any or all of them. You can also right-click an extension's icon in the toolbar to remove it.
Let us know if we included your favorite or if we missed the best in the comments section.

Ref:
Pcmag 
 

U.S. Bill Would Fight Chip Counterfeiting


Legislators in the United States took a small step toward combating the big problem of counterfeit electronics last week. As Celia Gorman detailed in our June issue, the counterfeiting problem is growing, and the U.S. government doesn't like it one bit. Three congressmen introduced a bill that streamlined the interaction between U.S. Customs and Border Protection and potential victims of counterfeiting.
According to a press release from the Semiconductor Industry Association (SIA), until 2008, the CBP would snap pictures of the trademarks and other info on suspected counterfeit chips and send the images to semiconductor firms for verification. That stopped with when the Department of Homeland Security implemented a new security policy.
The bill would reverse that policy, freeing CBP to share its photos.
In applauding the measure SIA president Brian Toohey said:
The legislation introduced yesterday by Reps. McKeon, McCaul and Keating would reverse the CBP policy and allow semiconductor companies to receive photographs that show identifying information on suspected counterfeit chips to determine their authenticity. This legislation would allow CBP and industry to resume working together in order to halt and seize suspected counterfeit semiconductors before they enter the U.S. supply chains.
Of course, a picture might not be enough. As Tam Harbert reported in April, the U.S. Defense Department is testing the use of plant DNA as a marker, which would make it much harder for importers to fake a trademark.
Ref:

Monday, June 25, 2012

Computer Issues Affecting Millions of NatWest Bank Customers in UK


I would assume that the computer rage meter pegged for a lot of people yesterday, and for some, it will likely remain so for the next few days if not longer.
According to news reports like this one at the London Telegraph, millions of customers of the UK bank NatWest and some 100 000 customers of Northern Ireland's Ulster Bank, both of which are owned by RBS Group (and in which the UK government owns an 84 percent stake), have not had their accounts updated since Wednesday evening due to "technical issues" with the banks computer systems. As a result, customers have been having trouble with their accounts, leaving many without any money or the ability to automatically pay their bills.

EBay Will Rely on Fuel Cells to Power Major Data Center


EBay announced this week that its expanded data center in Utah will rely on a 6 MW fuel cell array supplied by Bloom Energy, based in Sunnyvale, Cal., which makes an innovative solid oxide system. It will be the largest stationary fuel cell bank ever installed in a non-utility setting, and the first time a data center has been designed to rely on fuel cells as its primary energy source, with the grid serving as backup. The normal procedure is for data centers to get electricity from the grid, with some kind of backup system to kick in when the grid goes down—an expensive procedure.

Sunday, June 24, 2012

Adobe Lightroom and Corel AfterShot Pro


Two programs can help you get your photo house in order
It used to be an effort to take pictures and get them developed and easy to keep and show them. Today, it’s the other way around—pictures are easy to take, and as a result, we’re swimming in them. Drowning, even. Every time we shoot another thousand or so at a simple birthday party, we’re left with a major task—sorting out the best ones, then editing and sharing them.

Monday, June 18, 2012

Quantum Dots Are Behind New Displays


They make LCDs brighter and could challenge OLEDs for future TV dominance
Bright Dots: Red, green, and blue pixels made from quantum dot LEDs developed by QD Vision.
13 June 2012—Liquid crystal displays dominate today’s big, bright world of color TVs. They are inefficient, though, and don’t produce the vibrant, richly hued images of organic light-emitting diode (OLED) screens, which are expensive to make in large sizes.
But a handful of start-up companies have been plugging away at another display technology that could enhance LCDs and unseat OLEDs: quantum dots. These light-emitting semiconductor nanocrystals shine pure colors when excited by electric current or light and promise rich, beautiful displays that would be inexpensive and easy to manufacture.

Sunday, June 17, 2012

Reduce Audio Latency On Your Nexus S And GSM Galaxy Nexus With This Mod

Although Android is the most commonly used mobile ecosystem on the market, it’s not without its fair share of caveats. Aside from the scores of malware outbreaks plaguing Google’s mobile OS, there’s also the long-standing issue of audio latency.
"Big deal!" I hear you exclaim, and while audio latency may not be too much of an issue for the overwhelming majority, those using the likes of Skype, or the increasingly-popular mobile instrument and music production apps available, will notice just how significant it can turn out to be. Tapping the virtual drum, for example, and waiting for a split-second for the sound to be played from your device’s speaker, adversely affects the experience, and given said apps can often be priced into the tens of dollars, it’s simply not on.
The issue has snowballed, and since the problem has been prevalent through many versions of Android yet still not resolved, it’s now become the proverbial elephant in the room. It was discussed at last year’s I/O, and Google Android chiefs had hoped something could be done to amend the issue in Ice Cream Sandwich (4.0), but the complexity of the issue has meant it still remains unresolved.
Still, whenever there’s a problem, there are usually plenty of modders and devs on hand, attempting to fix the problem in an unofficial yet extremely convenient manner. Okay, so this isn’t exactly what we would regard as an outright fix, but for those rocking a Nexus S or a GSM Galaxy Nexus, it’s the next best thing.
One little mod, created by a couple of intuitive folk over at XDA Developers, improves the audio latency existent on aforementioned device. It’s a re-jig of each device’s respective audio libraries, although the Nexus S mod has had more hours put into it, thus performs much better, than that of the Galaxy Nexus. Still, it’s encouraging work, and if you own either device, then check out the thread links below and see if you can improve that annoying audio lag by modifying those files within your device’s audio libraries.
Ref:
Redmondpie

Saturday, June 16, 2012

How To Get The Best iOS 6 Features On iOS 5 Right Now


After including major missing features in iOS 3, 4 and 5, iOS 6 has turned out to be more of an incremental update than anything else. Other than Maps, there are no downright mind-blowing features. Everything iOS 6-related announced by Forstall at WWDC 2012, we’ve seen in one form or another whether as a Cydia tweak or a minor feature on other platforms.
Yes, I am tad disappointed at how things turned out at the event. I went through the iOS 6 keynote, wrote down every new feature mentioned in it and found that most of these features are available in iOS 5. They are definitely more scattered and less polished, but the functionality is there and that’s what we will be discussing in this post: how to get iOS 6’s best features on iOS 5 right now.

Friday, June 15, 2012

There's a Map for That—Several, Actually

Map time: Hover, a 3-D-focused map company that’s still in stealth mode, can gather pictures from different sources and combine them to produce models of buildings that can be updated later on if more images are added.

Beyond Apple and Google, a number of companies are hoping to find success with new mapping technology.
Apple's announcement that its own mapping app will be added to the next version of its mobile software sounded like a punch in the gut for Google Maps, which has been a constant presence on the iPhone since the gadget first launched in 2007.
Apple's senior vice president of iOS software, Scott Forstall, gave a glimpse of the Maps app on Monday at the company's annual Worldwide Developers Conference in San Francisco. Forstall showed off maps of countries around the globe, as well as Flyover, a feature that uses images captured by planes and helicopters to build crisp, 3-D views of buildings like the Transamerica Pyramid in San Francisco and the Sydney Opera House in Australia.

Thursday, June 14, 2012

How to Stuff Five Universities Into One Computer Center


A multi-institutional Massachusetts computer center tests out terascale computing—and the social engineering needed to use it
24 May 2012—When the Massachusetts Green High-Performance Computing Center launches at the end of this year, its energy efficiency and low carbon emissions (as IEEE Spectrum has detailed) may garner some headlines. But MGHPCC is a trailblazer in one other, perhaps more significant, way.
It puts to a high-stakes test what might be called the “Thanksgiving dinner” approach to academic computing: Put multiple outspoken and diversely opinionated entities under one roof, cross your fingers, and work to ensure that they all get along.
Each of MGHPCC’s five member institutions at the Thanksgiving table—Boston University, Harvard University, MIT, Northeastern University, and the University of Massachusetts system—will by year’s end begin transitioning research computing over to the center. MGHPCC, based in Holyoke, a once-thriving Massachusetts mill town two hours west of Boston, does not provide its own computers but rather the power, networking, and cooling infrastructure needed to remotely and inexpensively host members’ computers.

Wednesday, June 13, 2012

Few Privacy Regulations Inhibit Facebook

Laws haven't kept up with the company's ability to mine its users' data.
Now that it's a public company, Facebook needs to significantly boost its revenues to bring them in line with shareholders' expectations. That means finding new uses for the endless amounts of personal data the company collects from its users—but this prospect concerns privacy advocates, who say Facebook has outgrown existing privacy laws. Although regulators around the globe are increasing their scrutiny of Facebook, it might be years before they catch up.
The U.S. Federal Trade Commission, for example, will subject Facebook to 20 years of regular privacy audits after settling charges last year that the company engaged in "unfair and deceptive practices" such as misleading people about whether information they disclosed on the site would stay private. The FTC has a mandate to protect consumers from false advertising, but its ability to restrain Facebook is limited because current U.S. privacy laws are decades old. They're written to shield medical and financial information, even motor vehicle and movie rental records, but they don't address many practices common online today, such as compiling profiles of online behavior to target ads. 

LinkedIn and eHarmony Hacked: 8 Million Passwords Taken

After initially pleading ignorance, the professional social network LinkedIn confirmed yesterday that it had been hacked and that the encrypted passwords of at least 6.5 million of its 161 million users had been taken.
According to a story at Cnet, a list of 6.5 million passwords allegedly from LinkedIn was uploaded to a Russian hacker server, after which someone claimed on a Russian forum that he was the one who had hacked into LinkedIn and uploaded the information. LinkedIn was contacted about the claim, and soon said that it was unable to confirm that it had been hacked.
However, as word spread about the alleged hack, experts at the security firms Sophos and Rapid7 announced that that they had confirmed the uploaded list contained the LinkedIn passwords of some of their colleagues.
 User names are also suspected of being stolen along with the passwords.
Not long afterwards, LinkedIn confirmed that it had indeed been hacked.  According to the story at Cnet:
“LinkedIn encrypted the passwords using the SHA-1 algorithm, but did not use proper obscuring techniques that would have made the password cracking more difficult, said Paul Kocher, president and chief scientist of Cryptography Research. The passwords were obscured using a cryptographic hash function, but the hashes were not unique to each password, a procedure called ‘salting,’  he said. So if a hacker finds a match for a guessed password, the hash used there will be the same for other accounts that use that same password.”

Tuesday, June 12, 2012

Google Brings New Meaning to the Web


The search-engine giant now “understands” what you’re looking for
7 June 2012—Depending on where you are, you may have recently noticed a dramatic change in your Google search results. For example, if you type in the key words “Margaret Thatcher,” you’ll get the usual set of links to highly ranked sites about this former British prime minister. But to the right of that list, you’ll also see a new pane with information about Thatcher—her photograph, date of birth, children, education, books she’s written—along with links to similar sets of information about her husband, other British prime ministers, and even Meryl Streep, who played Thatcher in the movie Iron Lady.
This new feature is the first visible outgrowth of something Google calls the Knowledge Graph, a vast collection of information about a half-billion entities and the relationships between them. It represents Google’s new push to make sense of the Web in terms of “things, not strings,” to use the company’s catchphrase. Instead of just indexing Web documents by the words they contain, “we really need to understand about things in the real world,” says Shashi Thakur, technical lead on the Knowledge Graph project, which some see as a stepping stone to a long-sought system called the Semantic Web.
The Knowledge Graph is very different from the basic search strategy Google was founded on, which was to crawl the Web and build up a giant index of the words contained on each of the documents found. With such an index, Google could easily return links to pages that included your search terms. The company’s secret sauce was the algorithm it used to rank results. This approach, while somewhat daunting to carry out at the scale required, is fundamentally straightforward. The computers doing the crawling, indexing, and ranking don’t need to have any sort of understanding of what the strings of letters you are searching on signify.

Sunday, June 10, 2012

Diamond Quantum Memory Beats Record

It holds a quantum bit long enough for real computation

7 June 2012—A new type of memory could give the emerging field of quantum computing a much-needed boost. Scientists at Harvard University say they’ve developed a solid-state, room-temperature quantum memory that can hold information longer than one second. The memory records a quantum property called spin on the nucleus of an atom inside a diamond. Earlier solid-state nuclear-spin-based memories would lose their data after only milliseconds unless cryogenically cooled. The research is being reported in this week’s issue of the journal Science.
For practical quantum computers—experimental machines that aim to solve problems beyond the reach of ordinary computers by exploiting some of the stranger rules of quantum mechanics—it is essential to have quantum memories that last long enough to process information and churn out answers. Physicists think that the needed time frame is about one second.
“Diamond turns out to be a particularly good material for [the] purpose,” says Peter Maurer, a graduate student in physics at Harvard who came up with the new memory along with his advisor, Mikhail Lukin, and other colleagues. “It is possible to fabricate diamond with very few impurities.”
The Harvard scientists exploited such an impurity, a defect in the diamond lattice known as a nitrogen vacancy, to create a quantum bit, or qubit. The qubit could interact with a nearby carbon-13 atom in the diamond lattice, which acted as the quantum memory.

Friday, June 8, 2012

5 Common Reasons Why Blogs Fail

Many people find blogging to be a difficult task. Whether your blog is part of your business website, a place to generate some extra income or a standalone blog for personal reasons you may have found that your audience is missing. Blogs may sound easy but you need a combination of skills and commitment if you wish yours to become a success. This is not an easy way of making money; however it can be highly enjoyable and worthwhile with commitment and dedication.

Learn from the Blogging Mistakes of Others

I have seen many blogs die a quick death and become fully abandoned, and to help you ensure that this doesn’t happen to yours it can help to be aware of the problems that lead to this path. Use these 5 reasons why blogs fail effectively to ensure it doesn’t happen to you and soon you could become the owner of a popular blog.

Trying too hard to make money

A Dollar For Your Data


Information about you is free for the taking on the Web. A new crop of entrepreneurs wants you to collect. 
Unless your name is Oprah Winfrey or Warren Buffett, you'd be hard pressed to find anyone to pay $1,000 to hear about your purchasing habits. Anyone who wants this information can glean much of it from your behavior on the Internet anyway. Companies tracking and aggregating our clicks, taps, and swipes are the ones making fortunes. Individuals are not.
But a startup called Personal thinks it can change this. Its starting point is an idea that may seem strange to the Facebook generation: an online network where users control what information advertisers can access.
Personal, based in Washington, D.C., is among a number of startups that want to help people "collect, curate, and derive value" from their own online data, according to the Personal Data Ecosystem Consortium, a group formed in 2010 to encourage such efforts; it lists 30 businesses as members.
Personal cofounder Shane Green believes that many Internet surfers are primed to share more detailed and revealing information than they commonly do today—so long as they stay in control, and possibly earn money from it.
sers of the network, launched last November, are encouraged to upload information of all sorts, trivial (pizza orders) or sensitive (student loan records, medical prescriptions). They place the data in a "vault" and can grant other people or Web programs access to relevant portions. You could enter your home alarm code and share it only with houseguests, or grant a financial advisor access to details about your retirement accounts.

What’s Apple Going to Announce Next Week?


Apple's World Wide Developers Conference kicks off on Monday, June 11. There will be lots of major announcements for sure, so get ready for an exciting summer. Here's what we know, what we think, and what we wish is coming...

iOS 6

Like last year, there is a very high probability that Apple will feature iOS prominently at WWDC. iOS 6 will be the cornerstone of the keynote and the follow-up sessions. Don't expect it to be available for users quite yet, though. Like iOS 5 last year—detailed at WWDC, released in October—iOS 6 will probably be available at a later date. Also like last year, it will have quite significant new features, perhaps new maps and Facebook integration.
This will be a technology preview or a beta aimed at 1) getting developers ready for its new features and changes, 2) getting consumers excited, and 3) putting the screws to Google.
Gut feeling: Definite

Thursday, June 7, 2012

The Curious Case of Internet Privacy

Free services in exchange for personal information. That's the "privacy bargain" we all strike on the Web. It could be the worst deal ever.
Here's a story you've heard about the Internet: we trade our privacy for services. The idea is that your private information is less valuable to you than it is to the firms that siphon it out of your browser as you navigate the Web. They know what to do with it to turn it into value—for them and for you. This story has taken on mythic proportions, and no wonder, since it has billions of dollars riding on it.
But if it's a bargain, it's a curious, one-sided arrangement. To understand the kind of deal you make with your privacy a hundred times a day, please read and agree with the following:
By reading this agreement, you give Technology Review and its partners the unlimited right to intercept and examine your reading choices from this day forward, to sell the insights gleaned thereby, and to retain that information in perpetuity and supply it without limitation to any third party.

Tuesday, June 5, 2012

Can Your Facebook Profile Predict Job Performance?

In a recent study from Northern Illinois University, researchers found that Facebook profiles can help predict job performance and academic success. A small group of HR professionals and students were asked to review students’ Facebook profiles, grade them according to the Big Five personality traits (conscientiousness, agreeableness, extroversion, emotional stability and openness) and then rate their hirability. Six months later, researchers matched these ratings against employee evaluations from the students’ supervisors and found a strong correlation between the two.
“In five or 10 minutes, our raters could look at the tone of a subject’s wall post, note the number of friends they have, peruse their photos to see how social they were and assess their tastes in books and music. It’s a very rich source of information,” says Don Kluemper, lead researcher of the study.
Other major takeaways of the study include:
  • Facebook scores were a better predictor of future academic success (based upon grade point averages) than personality and IQ scores combined.
  • Facebook profiles are more authentic than personality profiles questionnaires.
  • Emotional extremes displayed on Facebook can translate to “emotionally unstable.”
What can I do to make sure my profile is the best reflection of my personality?
Reppler helps you monitor your Facebook profile, and generates an “Image Score” to evaluate the tone of the language on your wall (positive, neutral or negative). Our “Common Word” widget keeps record of the words used most often by you and your connections. Like to “vent” on Facebook? Chances are your score will indicate a higher level of emotional instability (not exactly something a potential employer wants to see). When it doubt, choose something positive to post.
Interestingly enough, however, social pictures on your profile are not always a bad thing. They indicate extroversion and friendliness. Does this mean anything goes? Certainly not. Some pictures, and you know which ones, should remain for your eyes only.
Whether we like it or not, Facebook is being used as a reliable job-screening tool. It is important to ensure that your profile is consistent with how you would like to be perceived by others, personally and professionally.

Ref:
Repller

Facebook Pages 4 New Features.. Don't Miss!

Facebook is releasing new features and it is very clear that it wants to give more to Facebook Pages, mostly owned by Brands, Shops and Business. The 4 major features that we will mention below are ready to offer to Facebook page owners' better productivity on how they manage their Facebook page.
So let's check them out:








This is big since many of us rely on services like Hootsuite to do this. Now you can easily create a new post and instead of posting, you just schedule it to be automatically posted on a day and time you prefer. This is very helpful for page owners that do not have a flexible time to spend with their page and let you for example, write a post in the morning and have it schedule to be posted at night 20:00.
Be careful, wrong use of this feature might cause you to lose a lot of engagement with the fans, if you use it with the wrong way.











You will notice a tiny button on the right bottom side of your post. There you can spend a few cash in order to boost your post's virallity and get it promoted on the first page activity stream of your fans. I'm not a huge fan of this feature since it requires payment to be used but if you have something really important to share, Facebook just give you the opportunity to do it with some extra cash.
Doing some quick math. Let's say that your average selling product is 20 Euro and that your average conversion rate from Facebook is 0.1%. That means by spending 5 Euro promoting a post to reach 1000 fans, you will get a customer with 5 euro. If that is Ok with you in order to pay 5 euro and get a customer from Social Media then you should try out this feature.
















Another good feature, which let you have a quick look of your Reach Metrics at the bottom of each post. I know a lot us don't have time or don't bother checking all the time the Insights page, so that's a good one for those who just want to have a fast look on how their post is doing.
Check the picture above. What you see is
1. Organic reach which is how many fans have seen your post
2. Viral reach which is how many friends of your fans seen your post. (Very useful)
3. Paid reach which is how many fans saw your posts from the promoted feature we mention above

















Another final huge feature that at last let you create several roles for your Facebook page. This is very useful especially for big pages and brands, who have several staff to manage several tasks on each page. For example, if you are owner of a retail store page you might want to give access to a marketing analyst of your page and you don't want to bother him with many admin features that he will not need. In that case you can assign him with the role of Insights Analyst and that's it.

These are just few of the "more to come' from Facebook. It is clear that Facebook wants to invest on Brands and Business owners who aim to reach customers and create brand awareness from Facebook. That's not bad at all, but let's hope that Facebook do this slowly with caution because giving Page owners too much freedom and promotion features might break the relationship between fans and create "walls". We don't want this to happen and we all shall invest time on providing great content to our fans.

Ref:

Monday, June 4, 2012

Could You Spare Some Internet Access?

An app called Open Garden lets users share wireless bandwidth, and could reduce network congestion—if carriers don't revolt.
Though the idea of having Internet available everywhere is no longer a fantasy, it's not quite reality, either. Many of us carry smart phones everywhere we go, but we don't always have a high-speed data or Wi-Fi connection. And in many places, Internet access can still be hard to find.
Open Garden wants to change this. The San Francisco–based startup recently rolled out a smart-phone app that lets you connect to the Internet by piggybacking on the Web access of other Open Garden app users, using peer-to-peer connections that form a mesh network. The company's hope is that, in addition to making Internet access ubiquitous, Open Garden will become a platform on top of which developers can build new kinds of mobile services.
Though the app may excite some consumers, it's likely to face pushback from wireless carriers, which currently charge both for tethering services that allow you to share your smart phone's wireless data connection with a laptop and for wireless hotspots that allow several gadgets to access the Web at once. Open Garden is hoping carriers will come around once they realize that its app may help relieve congestion on their clogged data networks.
Cofounder and CEO Micha Benoliel, an entrepreneur whose past experiences include helping Skype roll out the features that let users make calls to or from landlines and cell phones, thought of the concept behind Open Garden a while back. But it wasn't until 2010 that he felt smart phones had grown popular enough that it could work.
The Open Garden app was released last month in an open beta test for mobile devices running Google's Android software, and there is an Open Garden app for Macs and PCs as well. Benoliel would also like to release a version of the app for Apple's iOS platform, but he says he'll need approval from Apple before that is possible.
Once you've installed Open Garden and opened it up, it runs in the background, quietly managing connections between devices with the help of Bluetooth.
Looking at the app on your smart-phone screen, you can see all the devices around you that are running Open Garden, and see how each is connected to the Internet—sometimes directly, sometimes through another person's connection, sometimes through the connection of a person who is latched on to yet another person's connection—as well as your connection speed.
While demonstrating Open Garden at a San Francisco café, Benoliel said that the company has developed a patented method by which nearby gadgets can recognize each other without the need for users to intervene. He said that Open Garden sniffs around for available Web-connected devices, choosing the best way to get online automatically, and that the person with the original connection is prioritized over others.
A future version of the app will be able to consolidate data streams coming from two different networks to improve Web-surfing speed, Benoliel said, and it will let users decide how much data they want to share (helpful for those with limited data plans). And though Open Garden users are currently forced to share their networks with all comers, Benoliel said it will eventually allow users to decide whom they want to share with. The company is also considering a credit system under which users who share Web access with strangers will get credits they can then use to hop onto strangers' networks.
Kevin Restivo, a senior analyst with IDC, thinks Open Garden is most likely to resonate with consumers in emerging mobile markets like Africa, where relatively few people have cell phones, incomes are low, and people are more likely to share phone service.
I was able to use Open Garden to surf the Internet on a smart phone using the Firefox Mobile browser (currently, you must use Firefox to browse with Open Garden if you're on an Android device, along with a browser add-on). Video, which was streaming via another phone's 4G connection, looked a bit stilted, but overall the quality wasn't bad.
Benoliel concedes that wireless carriers may look askance at the app, given existing data-sharing rules. But he's confident that they will eventually embrace it, as they have done with other technologies like VoIP. One unnamed mobile operator has already agreed to test the service, he said.
The technology could make carriers' networks more efficient, Benoliel argues. At a time when wireless companies are struggling to provide enough bandwidth to satisfy an ever-increasing number of mobile users, Open Garden has the potential to reduce data network traffic by routing users through Wi-Fi networks, he says, ultimately saving the service providers money. "What we do improves the network at the edge," he said.

Ref
TechReview

Saturday, June 2, 2012

U.S., Long Engaged in Cyberwar Against Iran, Has Now Declared It


Just a week ago, the Flame virus, suspected to be a weapon in a heretofore undeclared cyberwar, was discovered by computer security experts. Now, unnamed U.S. government officials have told a New York Times reporter that the Stuxnet worm, another sophisticated piece of malware that was discovered in 2010, was the brainchild of secretive U.S. and Israeli intelligence agencies. Stuxnet, designed to deliver information about Iran’s uranium enrichment program and subsequently hamper it, was clearly a cyberwarfare tool. But previous discussions of its authorship were, at best, a series of educated guesses and unverified allegations.
The NYT reporter, David Sanger, says his U.S. government sources told him that the program responsible for Stuxnet, code named “Olympic Games,” was initiated in 2006 at the behest of former president George W. Bush, but has since been championed by Barack Obama. These sources told Sanger that Obama “decided to step up cyber-attacks on Iran’s Natanz enrichment facility, even after the existence of the worm became public in 2010 after it leaked out onto the Internet.”
The highly-detailed Times article, excerpted from Sanger’s soon-to-be-released book, “Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,” benefits from 18 months of interviews with current and former American, European and Israeli officials involved in the program, and several outside experts. In it, Sanger reveals what Stuxnet was intended to do, how it managed to conceal itself, why it remained effective even after a coding error allowed it to escape the Natanz enrichment plant’s computer system and eventually spread to the Internet, and even the decision making process that led Obama to order that the cyberespionage program be continued.
According to the Guardian, the U.S. National Security Agency and Israel’s Unit 8200 ended up as collaborators on the project because of U.S. fears that Israel would take it upon itself to end the threat of Iranian nuclear weapons capability by leveling the plant. The U.S. let Israel in on its plot in order to reassure its ally that Iran’s nuclear efforts would be snuffed out without a single bomb being dropped. The article quotes Sanger, who notes that to talk them down from the ledge, “The Israelis would have to be convinced that the new line of attack was working…The only way to convince them, several officials said in interviews, was to have them deeply involved in every aspect of the program.” But Sanger’s New York Times article notes that Israel’s technical expertise and unrivaled intelligence about the Natanz facility’s operations helped to make it an attractive partner.
For a while, the plan went off without a hitch, the U.S. officials told Sanger. “The Iranians didn’t suspect foul play because no two attacks were exactly alike," they said; and even in the midst of a full-bore attack, the Stuxnet worm sent signals to the Natanz control room that made readouts being monitored by engineers there appear to be perfectly normal. "This may have been the most brilliant part of the code,” a U.S. official told the New York Times reporter.
How effective was it? Even after the malware’s existence became the subject of worldwide buzz, an updated version of the worm destroyed about a thousand of the 5000 centrifuges then in operation.
Now that the United States has acknowledged responsibility for Stuxnet, it naturally becomes the leading suspect in the case of the the Flame virus. According to an article in The Guardian, Kaspersky Labs, a Russian computer security firm that has studied both Stuxnet and Flame, confirms that the timing of the first Stuxnet attack on Iran in June 2009 and the worm being outed almost a year later gibe with the timeline proposed by the New York Times' sources.
Asked if there were any conclusions about Flame’s origin that could be drawn from the U.S. admission that it targeted Iran with Stuxnet, Kaspersky said, “there are sufficient similarities between the two worms to suggest they have the same source.”
The U.S. government, which denies that the Flame virus was part of the Olympic Games program, maintains that it did not create that bit of malware. But then again, that was its official stance regarding Stuxnet until admitting it became politically expedient.
The Guardian article calls it a tactical political strike meant to bolster President Obama’s hawkish bona fides. The Guardian paints a picture of an Obama taking advantage of every opportunity to counter assertions from the right that he is weak on military issues:
“The decision to reveal Obama's role in the cyberwar against Iran follows hard on the heels of the highly political disclosure in an election year that the president had taken a personal role in approving terrorist targets for US drone strikes. And the depiction of his key involvement in two major clandestine military operations follows photographs last year showing him, as commander-in-chief, awaiting news of the death of Osama bin Laden.”
According to Sanger’s sources, who say they participated in many briefings on the progress of Olympic Games, Obama “was acutely aware that with every attack he was pushing the United States into new territory…He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons—even under the most careful and limited circumstances—could enable other countries, terrorists or hackers to justify their own attacks.” These aides revealed Obama’s concern that because the United States’ infrastructure is so dependent on computer systems, no country is more vulnerable to a similar type of attack.
It stands to reason that engaging in cyberwarfare would have a sobering effect: It was almost exactly a year ago that the United States drew a line in the sand, declaring that certain types of cyberattacks can constitute an act of war. As one military official in a Wall Street Journal article stated it: "If you shut down our power grid, maybe we will put a missile down one of your smokestacks."
Will Iran retaliate? Experts say they’ve seen no evidence of a return volley on the malware front. But there’s no guarantee that the country and its allies aren’t plotting something that, while less sophisticated, may be just as destructive.

Ref:
Spectrum

Microsoft launches the Windows 8 Release Preview – Say hello to what’s next


Today Microsoft made available the Windows 8 Release Preview. Of course, the company broke its own embargoes last night be releasing a blog post concerning the software release. So, while this post is not a surprise, consider it a functional offering.
A Microsoft ‘Release Preview’ is the same as a release candidate, in software terms. For the laymen, this build is the essential Microsoft vision for Windows 8 in terms of features, minus the very last polish that the code will receive before its final release. However, this is the real dope, and not a partial build that is designed for a single demographic.
To get started, download and install Windows 8 Release Preview with Apps now on MSDN Technet (requires login) or directly here.
Here are the essentials that you need to know: Windows 8 is a complete re-haul of how Microsoft views computing. Its user interface is fresh, while including a full blend of what one might call normal Windows. It’s radical, because it is complete. The UI choices that Microsoft has made permeate more than just Windows 8, but also involve everything from Xbox to Office. This is big news.
However, you’ve read our early reviews of Windows 8, and our obsessive coverage. Now is the time to get hands on, and dirty. Read our massive post, from the perspective of a Mac users, digging into the code, and install it yourself. Really, get into this.
Microsoft thinks that it has figured out the future of computing. Whether or not they have won’t be decided by us in the media, but by you, the end-user. So get testing. Now.

Ref:
Thenextweb

Three Questions for PayPal's New Boss

David Marcus aims to push the service into physical stores.
PayPal has built up its mobile offerings in the past several years, so it was no surprise when it named David Marcus, formerly its vice president of mobile, as president in March.
Marcus joined PayPal in August 2011, when eBay paid $240 million for his startup, Zong, which lets someone using the service use his phone number to shop on his phone and get billed through his wireless carrier.
Last week, PayPal announced that 15 new retailers—including Office Depot, Barnes & Noble, and JCPenney—will soon accept PayPal in their brick-and-mortar locations. The Home Depot already accepts PayPal in most of its 2,000 U.S. stores.
1. Soon I'll be able to use PayPal at a variety of retailers, just by providing my cell-phone number and PIN. Are we on the verge of getting rid of cash and credit cards?
Ultimately the consumers will decide how they want to pay. But the payment experience, to me, is going to move out of the way. My favorite [example] is location-based payments, where the merchant knows you're in the store, and the transaction happens with no friction, flawlessly, without you doing anything.
2. What's the advantage of that?
That becomes a tool for the merchant to treat you well and to welcome you. If you go to Peet's Coffee in San Francisco but now you want to go to Peet's Coffee in Palo Alto, you're greeted by your name despite the fact that it's your first time in that store. They know what your favorite drink is, and they'll prepare it for you. We remove the friction from the payment experience—nobody likes to pay, everybody likes to shop—but we also, by doing that, enable you to have the best possible shopping experience.
3. There are a lot of companies that have come up with innovative ideas in mobile payments, including Zong, the company you ran before it was bought by eBay, PayPal's parent company. What's PayPal's advantage?
Innovation at scale in payments is really hard. It's really easy to get some initial buzz when you launch a product. To this day, no one has succeeded signing up consumers at a meaningful scale for a digital wallet service—no one except us. We need to continue innovating, [but] as long as we continue doing that, because we have the scale advantage, we'll be fine.

Ref:
TechReview

 

Friday, June 1, 2012

Samsung and Dropbox offer Galaxy S III users up to 50GB of extra storage


Samsung has partnered with Dropbox to offer extra storage for Galaxy S III owners. Once you've registered the newly minted handset, your current pre-loaded allocation will be topped up to a maximum of 50GB ...
not matching but doubling HTC's allowance. And just like Sense 4's offering, the free storage will remain valid for two years but there's no indication if there will be discounts for those who've become hooked on all that online real estate -- we hear it's very moreish.

Ref
engadget.com
Hightech-it 

Jailbreak iOS 5.1.1 Untethered On iPhone 4S, iPad 3, iPod touch And More Using Absinthe 2.0


We are once again sitting right in the middle of that beautiful time period when updated jailbreaking tools are available, which allow us to free our iOS devices from their technical shackles. For those who have been sitting with an iPhone, iPod touch or iPad running Apple’s iOS 5.1.1 firmware, you will no doubt be aware that after weeks of hard work and research, Pod2g and his team have released an untethered jailbreak for all existing iOS devices, excluding the third-generation Apple TV.
Full list of compatible devices for 5.1.1 untethered jailbreak are as follows:
  • iPhone 4S
  • iPhone 4
  • iPhone 3GS
  • iPad (3rd gen)
  • iPad 2
  • iPad 1
  • iPod touch 3G
  • iPod touch 4G
  • Apple TV 2G
As a part of that hard work, the Chronic Dev Team have provided the necessary updates to their Absinthe tool, which was originally released back in January, and was the tool behind jailbreaking the iPhone 4S and the iPad 2 (on iOS 5.x) for the first time. Absinthe is an extremely simple GUI tool which allows users to inject the necessary files into their device so that they can benefit from the untethered jailbreak. If you happen to be sitting with an iOS 5.1.1 device in your hand, then read on for full details on how to use the Absinthe app to achieve an untether.
Important Note:
  • Make a complete backup of your device using iTunes or iCloud before jailbreaking your device.
  • If your iPhone relies on an unlock, do not update to stock iOS 5.1.1 firmware and for the time being stay away from Absinthe.
  • If you have a passcode set on your device, make sure you disable it before following the instructions below.
How To Use Absinthe iOS 5.1.1 Untethered Jailbreak
Step 1: Download Absinthe 2.0 from here.
Step 2: Once the tool has been downloaded, find the compressed file and extract all of the contents like you would with any standard zip file. Place the files on your desktop for easy and quick access.
Step 3: Using a standard 30-pin connector cable, connect the device to be jailbroken with your computer.
Step 4: Launch the Absinthe tool through the executable file which you downloaded in step 1. When launched, the program will show an initial interface that will have some text-based information on it, and a “Jailbreak” button.

Step 5: If the device is connected properly as per step 3 then the Jailbreak button should be available. Press the button to begin the jailbreak process.
The initial Absinthe tool for iOS 5.0.1 accompanied with it a new method for jailbreaking iOS devices, so with that in mind, don’t be alarmed if the device looks like if it is going through a restore process. The progress bar on the Absinthe GUI will provide user feedback, please don’t touch the device at this time.
Step 6: When the payload process is complete and you’re confronted with your device’s lock screen, the ever familiar Cydia icon will be present on the home screen. The device is now successfully jailbroken untethered and you can now install any extensions or packages via Cydia, provided that your device is supported by them.
One of the great things about Absinthe and something which users – and us – love is the simplicity of the tool. Although the production and implementation of a jailbreak is extremely difficult and requires a very unique skill set, the dev teams have managed to produce a tool that is extremely user-friendly and simple to use.
You can follow us on Twitter, add us to your circle on Google+ or like our Facebook page to keep yourself updated on all the latest from Microsoft, Google, Apple and the Web.

Video
 http://www.youtube.com/watch?v=JX6zZUtHyGw&feature=relmfu
Ref:
Remondpie