tag:blogger.com,1999:blog-48256511724818224422024-02-18T17:34:29.809-08:00Technology News, Analysis & Product Review for IT Professionals - Tech ForkedTech Forked breaking news, analysis, and research keeps business technology professionals in touch with the latest IT trends, issues and events.dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.comBlogger50125tag:blogger.com,1999:blog-4825651172481822442.post-82877170553483406432013-04-03T10:32:00.001-07:002013-04-03T10:32:49.698-07:00Firefox: Use new stealth window to satisfy your wife, suggests Mozilla<P>Porn-lovers and prezzie shoppers alike are celebrating today after Mozilla announced the release of the privacy-minded version 20 of Firefox.</P><br /><P>According to the Mozilla blog, the new iteration of the browser allows users to launch a private browsing window whilst keeping other sessions open.</P><br /><P>"You can shop for a birthday gift in a private window with your existing browsing session uninterrupted," Mozilla crowed. "You can also use a private browsing window to check multiple email accounts simultaneously."</P><br /><P>Mozilla made no mention of the opportunities their new browser offers to anyone wanting to view grumble flicks without being caught out.</P><br /><P>A similar service will be available on Android on a per-tab basis, so those keen to secretly splash some money can do what they feel the need to do without anyone else knowing.</P><br /><P>Other features include a new download manager in the toolbar, which will simplify the process of monitoring and finding downloaded files, and a new bookmarks system for Android.</P><br /><P>Mozilla also wants to help out the 50million people it claims use phones with weedy ARMv6 processors. Firefox will now run on phones with these weaker chips, including Samsung Galaxy Next, HTC Aria, HTC Legend, Samsung Dart, Samsung Galaxy Pop and the Samsung Galaxy Q.</P><br /><P>Mozilla is celebrating its 15th anniversary this week, prompting its arch-rival - Microsoft's Internet Explorer team - to take the time to send a birthday tweet which said:</P><br /><BLOCKQUOTE class=twitter-tweet readability="5" align="center"><br /><P>Congrats @mozilla on your 15 year anniversary & your continued advocacy for web standards! @firefox</P>— Internet Explorer (@IE) April 2, 2013</BLOCKQUOTE>dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-53851305496721127502012-12-21T03:04:00.000-08:002012-12-21T03:04:51.361-08:00Apple enables HTTPS for iTunes to Bypass China Great Firewall<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRmSe9peA0OXOD5vHvVWJCz62M8kDigzu3LtCu-61ngaUzI5IIsNAuecMSq24mPil0gi8egjwlhmraGeCosB1y6asiHf3mUZEAL3op_NQMyfg_B9trCwEXVuo191ZjXWavVaF0awdp3PM/s1600/12.10.30-iTunesLogo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRmSe9peA0OXOD5vHvVWJCz62M8kDigzu3LtCu-61ngaUzI5IIsNAuecMSq24mPil0gi8egjwlhmraGeCosB1y6asiHf3mUZEAL3op_NQMyfg_B9trCwEXVuo191ZjXWavVaF0awdp3PM/s320/12.10.30-iTunesLogo.jpg" width="300" /></a></div>
<div dir="ltr" style="text-align: left;" trbidi="on">
Apple has adopted HTTPS for searches and downloads on the version of iTunes used in China. The move comes at a time when China's government prepares to step up regulation of online app stores and continues its crackdown on VPNs.<br />
<br />
Greatfirewall.org, which tests blocked URLs and popular web platforms to provide info on censorship in China, blogged on <a href="https://en.greatfire.org/blog/2012/dec/apple-adopted-https-app-store-china-threatens-censor-apps" target="_blank">Thursday</a> that the switch to HTTPS has effectively enabled Apple to bypass the Great Firewall, for now.<br />
<br />
“Before this adoption, searching for certain keywords such as ‘vpn’ would lead to a connection reset on iTunes and visiting the page for certain apps, such as VPN Express would also cause a reset, which means there is no way for users in China to search for or download certain apps even if they are available in China App Store,” it said.<br />
<br />
“But because now HTTPS is implemented by Apple on almost all connection to iTunes server, Great Firewall of China has no way to selectively block connection to certain contents. A test to the same link mentioned above with HTTPS protocol yields no censorship.”<br />
<br />
Other e-commerce platforms such as Taobao actively self-censor results for things like net circumvention tools, Greatfirewall.org added.<br />
<br />
It’s still unclear exactly when Apple made the switch to HTTPS but last week the government signalled its intent for the first time to begin regulating the online application market.<br />
<br />
This will involve forcing operators of mobile app stores to acquire a license before they can sell online and could potentially extend to real name registration rules for developers and some form of regulation for the apps themselves, according to the state-run Global Times.<br />
<br />
It’s being done in the name of the “healthy development” of the mobile internet, and to be fair China does have a big problem with malware-ridden apps and dodgy third party stores, but raises the fear that it will also be used to extend the suppression of freedom of expression into yet another sphere.<br />
<br />
The news also comes as the authorities appear to be taking a harder stance on VPNs – the main means by which netizens inside the Great Firewall access banned content. As early as a week ago reports came in that various VPN providers such as Astrill and StrongVPN had been deliberately disrupted for users inside China.<br />
<br />
Apple couldn’t immediately be reached for comment.</div>
</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-35231363144114442922012-12-18T03:43:00.000-08:002012-12-21T03:45:02.027-08:00Instagram New Terms and Conditions Sells Your Photos<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKWcojO4UCxwxu_hgNydPS0cEEQcOMLPN21OETqjNAf5cV95x6wrpRj1pZCliZKbKBjgdkBUvEv83kfcTA7b25HhWKcrXKC4wMO69bp6L6zvKowvUEOnEayNc8Pms0aSmRV_npk5TWBlU/s1600/instagram.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="294" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKWcojO4UCxwxu_hgNydPS0cEEQcOMLPN21OETqjNAf5cV95x6wrpRj1pZCliZKbKBjgdkBUvEv83kfcTA7b25HhWKcrXKC4wMO69bp6L6zvKowvUEOnEayNc8Pms0aSmRV_npk5TWBlU/s320/instagram.png" width="320" /></a></div>
Social network Instagram has provoked uproar among its latte-photographing users: it has changed its terms and conditions to grant itself licensing rights to sell all photographs taken by the app.<br />
<br />
The amendment in the Ts&Cs will come into effect from 16 January. The firm will not technically "own" the images but will be able to license the snaps to third-parties.<br />
<br />
Instagram - now part of the Facebook cloud - will also be able to place users' photographs or profile pictures in adverts.<br />
<br />
Introducing the changes in a <a href="http://blog.instagram.com/post/38143346554/privacy-and-terms-of-service-changes-on-instagram" rel="nofollow" target="_blank">blog post</a> Instagram apologised for the documents being "dry", but users are more upset by the sweeping changes to licensing rights.<br />
<br />
In the "Rights" section of the <a href="http://instagram.com/about/legal/terms/updated/" rel="nofollow" target="_blank">new terms and conditions</a>, these two clauses have caused a particular kerfuffle.<br />
<br />
Instagram does not claim ownership of any Content that you post on or through the Service. Instead, you hereby grant to Instagram a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use the Content that you post on or through the Service<br />
<br />
Exceptions are made for those who have set restrictions on how their photos are seen on the service, but crucially these only seem to apply to their use within Instagram, and there is no guarantee that these private photos will not be used elsewhere.<br />
<br />
The current terms agreement - which will run until 16 January - also gives Instagram a non-exclusive, fully paid and royalty-free worldwide licence to your content but it is not transferable nor sub-licensable.<br />
<br />
Perhaps more galling for the coffee-snappers is the fact that their image and photos could be used to sell, well, any old thing that Instagram gets adverts for.<br />
<br />
nstagram makes a plaintive case for why it needs the cash:<br />
<br />
Some or all of the Service may be supported by advertising revenue. To help us deliver interesting paid or sponsored content or promotions, you agree that a business or other entity may pay us to display your username, likeness, photos (along with any associated metadata), and/or actions you take, in connection with paid or sponsored content or promotions, without any compensation to you.<br />
<br />
It's the using-your-likeness-for-profit wheeze that got Facebook in trouble when it started to use people's faces to advertise brands to their friends. The takeover by Facebook has forced the photo-filtering service to be more energetic in its pursuit of a viable business model. The previous terms agreement said that Instagram had the right to place adverts within Instagram alongside people's photographs.<br />
<br />
Some users are threatening to quit the site, while others are expressing doubt that anyone would ever want to buy their colour-saturated breakfast photos. Others are offering to buy their friends' Instagram photos from Facebook to piss them off (technically they would only be able to purchase licences for use of the image, rather than outright ownership).<br />
<br />
But of course, as most web users have always been aware, Instagram is a free service and the users are the product. These guys need to pay for their server space, and they have to work out some way of turning cupcake pics into dollars.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-11702279633447207072012-12-11T09:34:00.000-08:002012-12-11T09:36:09.974-08:00RIM Releases BlackBerry 10 OS Software for Developers<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8h6TdDEKhNxQkHHjn4VAcgrQKA3s0Rak0Uz3L43VpY89n7Cl0u7g6Ehg9vS8VN_uCWJ3MIOJxvIesYAGn4rPhWMvy49-KeVzh2pX2Gj5mPlvdcWXOee6E0Geerh_CVGgpGm1OEp1Z9EU/s1600/BlackBerry10.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8h6TdDEKhNxQkHHjn4VAcgrQKA3s0Rak0Uz3L43VpY89n7Cl0u7g6Ehg9vS8VN_uCWJ3MIOJxvIesYAGn4rPhWMvy49-KeVzh2pX2Gj5mPlvdcWXOee6E0Geerh_CVGgpGm1OEp1Z9EU/s1600/BlackBerry10.jpg" /></a></div>
Today, faithful BlackBerry developers can stop tinkering around with pre-release tools and dig into the real thing: the BlackBerry 10 OS software developer kit has gone gold.<br />
<br />
RIM today released the final <a href="https://developer.blackberry.com/" target="_blank">tool set and APIs</a> for software-makers to start coding in earnest for the finished product.<br />
<br />
Gameloft is RIM's most high-profile public partner win so far, though many more titles from familiar consumer brands are sure to come.<br />
<br />
RIM will unveil its new vanguard of BlackBerry 10 smartphones on January 30, in a multi-city global launch.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-23861283251877889512012-12-11T09:12:00.000-08:002012-12-11T09:16:35.693-08:00New Yahoo Mail Aims for Speed & Simplicity<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLuYHKCn62LPtD91kVrtGjThslXGJG_5N96rdprM3mT8jxPA20khlTbPt-ZnW-NLFsFtCJY_kP8WoRSvmgRCnqRLrj9SOxGO_YUNxboIj389AotBEoCiQInqfP6tl9IojKgrTLOw34PQE/s1600/Yahoo_Mail_iPhone_Android.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLuYHKCn62LPtD91kVrtGjThslXGJG_5N96rdprM3mT8jxPA20khlTbPt-ZnW-NLFsFtCJY_kP8WoRSvmgRCnqRLrj9SOxGO_YUNxboIj389AotBEoCiQInqfP6tl9IojKgrTLOw34PQE/s1600/Yahoo_Mail_iPhone_Android.jpg" /></a></div>
<br />
The longstanding e-mail service underwent a revamp to focus on faster access to e-mail, fewer distractions, and an easier-to-use interface. Yahoo also worked to keep the look consistent throughout a variety of platforms, whether it's on the Internet, Windows 8, iPhone, or Android. The changes were announced today by CEO Marissa Mayer on Yahoo's blog. <br />
<br />
Regardless of Yahoo's broader struggles, its e-mail service remains a popular one and a default address for many individuals. As a result, it continues to be a crucial element to sustaining traffic.<br />
<br />
"You’ve told us loud and clear that you want fewer distractions when it comes to email. You want to quickly login, communicate, and get on with your day. And we’ve listened. Starting today, the new Yahoo! Mail is fast, easy and available anywhere you go. These improvements will be available on all major platforms: Web, Windows 8, iPhone/iPod touch and Android." Mayer said in the blog post.<br />
<br />
The apps are available now. The Web version will be rolled out in the next few days. </div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-34107948375005278102012-10-02T03:20:00.000-07:002012-10-02T03:21:32.974-07:00Hackers Penetrates Into White House Computer Network<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0H7S9oPJfMNp7GhwmvXwCufIm4q_3uAnex-UUn5UG77a7QQvsI31onDVzc-019UdkS3DFgR75YSCxXqpLPrYbIWXOMHqeW4kXrP0VDDGQhu29-eoiCgALu5BWlc0cExnMihYvkNCg5Ng/s1600/hackercomputer.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0H7S9oPJfMNp7GhwmvXwCufIm4q_3uAnex-UUn5UG77a7QQvsI31onDVzc-019UdkS3DFgR75YSCxXqpLPrYbIWXOMHqeW4kXrP0VDDGQhu29-eoiCgALu5BWlc0cExnMihYvkNCg5Ng/s1600/hackercomputer.jpg" /></a></div>
Hackers reportedly attempted a brazen attack on a White House military network in charge of the president’s nuclear football.<br />
<br />
US officials familiar with the incident said unidentified hackers launched an attack early last month on the network used by the White House Military Office (<a href="http://www.whitehouse.gov/administration/eop/whmo" target="_blank">WHMO</a>), an military office in charge of sensitive communications, including systems to send and authenticate nuclear strike commands. The office is also responsible for arranging presidential communications and travel. However it seems only less significant systems were targeted by an assault that was, in any case, ultimately unsuccessful.<br />
<br />
An unnamed Obama national security official said: "This was a spear phishing attack against an unclassified network."<br />
<br />
"In this instance the attack was identified, the system was isolated, and there is no indication whatsoever that any exfiltration of data took place," the official said, the Washington Free Beacon (a Conservative blog that broke the story) <a href="http://freebeacon.com/white-house-hack-attack" target="_blank">reports</a>.<br />
<br />
Follow-up reports suggest that a dodgy email with a malicious attachment made it past perimeter defences and onto someone's desktop, where it might have been opened, and a machine infected. But this machine was quickly identified and isolated before any damage was done.<br />
<br />
Rob Rachwald, director of security strategy at Imperva, said the attempted attack should nonetheless act as a wake up call.<br />
<br />
"Yet again traditional security software has failed to keep the bad guys out. Enterprise needed to assume that they have been compromised which means we need to detect abnormal access to data and Intellectual Property. This is yet another example of why we need to rethink the current security model and implement a new one that puts cameras on sensitive information."<br />
<br />
The attack was launched from Chinese networks, which by itself doesn't mean much. However some officials seem to reckon the Chinese military cyber warfare specialists, working as part of a unit called the 4th Department of General Staff of the People’s Liberation Army, or 4PLA, are the most likely suspects behind the attack.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-57634007271059652562012-09-17T06:50:00.001-07:002012-09-17T06:50:08.377-07:00iPhone 5 Review, Bigger Screen & Improved Wi-fi<div dir="ltr" style="text-align: left;" trbidi="on">
Apple is generous with information when it releases a new product, but some of those product’s details may be difficult to ferret out of Apple pronouncements and presentations. Confounded by the what, how, why, and where of the new iPhone 5? <br />
<br />
<span style="font-size: large;">W<b>hen can I get the new iPhone 5?</b></span><br />
<br />
You can start pre-ordering the phone online as of 12:01 PT a.m. on September 14. The phone will be available beginning September 21 in the U.S. Doors at Apple Stores will open at 8 a.m. local time on that day. In addition to this country, the new iPhone also goes on sale in Canada, UK, France, Germany, Australia, Japan, Hong Kong, and Singapore on September 21.<br />
<br />
Apple says that the iPhone 5 will be available in 20 more countries starting September 28, and in 100 countries by year’s end. <br />
<span style="font-size: large;"><b><br />
</b></span> <span style="font-size: large;"><b>Which carriers are offering the iPhone 5?</b></span><br />
<br />
We’re going to assume you’re asking that question from within the borders of the U.S. (And if not and you’re wondering which telecoms offer LTE outside the U.S. see this Apple document.) If that’s the case, then AT&T, Sprint, and Verizon are your wireless service providers for nationwide coverage, just like they were when the iPhone 4S debuted. Note that the Big Three are going to want you to sign a two-year service agreement. Assuming you’re not obligated to stick with your existing carrier, you should check the coverage maps for AT&T, Verizon, and Sprint—particularly for LTE coverage—to get a sense of which carrier best serves your needs before you commit to them for the next two years. <br />
<br />
<span style="font-size: large;"><b>Any no-contract carriers or regional carriers?</b></span><br />
<br />
Yes: Cricket, which jumped into the iPhone fray earlier this year with no-contract, prepaid service for the iPhone 4 and 4S, will be doing the same with the latest iPhone. The catch is, you’ll have to wait, though not terribly long. Cricket will begin offering its no-contract plan for the iPhone 5 on September 28. That’s a week after AT&T, et al start selling the phone. Note that since Cricket can’t count on two years of service fees from you, it makes you pay up for an unsubsidized iPhone. The company hasn’t announced pricing yet, but in the case of the iPhone 4S, that was $500 for a 16GB model.<br />
<br />
<span style="font-size: large;"><b>Can I use FaceTime over cellular with the iPhone 5?</b></span><br />
<br />
It’s up to your carrier. Sprint and Verizon place no limits on the feature, which lets you video chat even when you don’t have a Wi-Fi connection. AT&T requires that you purchase a Mobile Share plan to use the feature.<br />
<br />
<span style="font-size: large;"><b>Can I talk and use data at the same time on Verizon?</b></span><br />
<br />
“iPhone 5 was designed to allow simultaneous voice calling on the Verizon Wireless network while browsing the Internet over Wi-Fi,” Verizon spokesperson Brenda Raney told Macworld. “This is no different from the current iPhone 4S.” So it seems that even if you’re using Verizon’s cellular network (including its LTE service) you can't use voice and data at the same time. <br />
<span style="font-size: large;"><b><br />
</b></span> <span style="font-size: large;"><b>How much does the iPhone 5 cost? How many models are there?</b></span><br />
<br />
Like the iPhone 4S, the iPhone 5 comes in three different capacities, available in two color options. The colors are just a smidgen different this time around: There’s black with a slate back, and white with an aluminum silver back.<br />
<br />
Pricing and storage options match the iPhone 4S: $199 for 16GB, $299 for 32GB, and $399 for 64GB. Of course, all those prices require two-year carrier contracts. At this writing, Apple hasn’t yet offered details on pricing for an unlocked iPhone 5. The unlocked iPhone 4S cost $649 for the 16GB version, $749 for 32GB, and $849 for 64GB. <br />
<br />
<span style="font-size: large;"><b>How much will it cost me to upgrade from my existing iPhone?</b></span><br />
<br />
Great question. You can check your <a href="http://store.apple.com/xc/iphone_eligibility">upgrade eligibility at Apple’s website</a>. AT&T customers can also dial *639# from their iPhones to receive a text message with upgrade details. Note that if you bought an iPhone 4S at the time of its year-ago release, those $199-$399 pricing options aren’t likely to be available to you; you’ll have to pay full price for the new phone. <br />
<br />
<b><span style="font-size: large;">How big is the screen?</span></b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrGvXAo_T2Pk2BOxARtpbmB4TV_9LgUAIkBpOg5jzXPUvGG0cSJZIgOLIRbCd6Va_mTUoHVIZyA-KmwEfXHK1XnSFlyJldcV1UC7_8D_Pa04XvWR3iRF2OVnkOD99u0iXLqbMs5lVKSMw/s1600/iphone5.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrGvXAo_T2Pk2BOxARtpbmB4TV_9LgUAIkBpOg5jzXPUvGG0cSJZIgOLIRbCd6Va_mTUoHVIZyA-KmwEfXHK1XnSFlyJldcV1UC7_8D_Pa04XvWR3iRF2OVnkOD99u0iXLqbMs5lVKSMw/s1600/iphone5.jpg" /></a></div>
<br />
The iPhone 5 sports a 4-inch screen. That’s a change from every prior iPhone, which used a smaller 3.5-inch screen. Screen measurements look at the diagonal length, and the iPhone 5’s screen isn’t any wider than its predecessors—just taller. As a result, Apple packed a fifth row of icons onto the iPhone 5’s home screen.<br />
<br />
The screen also packs in a lot of pixels—326 pixels per inch, as a matter of fact, on a 1136x640 display. And that means more room for your apps: Apple is redesigning all of the built-in apps that ship with the iPhone to fit more data on the new model’s larger screen.<br />
<br />
<b><span style="font-size: large;">Does that mean my current apps are going to need to be rewritten to work on the new iPhone?</span></b><br />
<br />
Only if they want to also get more information on the screen. Wednesday’s press event, for example, featured demos of an updated OpenTable app for the iPhone that brought in a lot of elements from the iPad version’s interface. As for existing apps, they’ll work just fine on the new iPhone, even without an update. But they will feature black bars around the edges—on the side for apps running in landscape mode, on the top and bottom in portrait orientation—to fill in the extra screen space. On the bright side, old apps won’t need to be stretched or scaled when they run on the iPhone 5. <br />
<br />
<span style="font-size: large;"><b>With the bigger screen, the iPhone 5 must be awfully heavy, right?</b></span><br />
<br />
Not so! It’s actually slimmer and lighter than the iPhone 4S, Apple says. The iPhone 5 is just 7.6mm thick, and weighs 112 grams. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNoSBDKOS4KNaYp2cJg8qGjKTnqAdnCtg0uFfjE1TGdQTEisqTFIJZq-qMjqufepDcraWR4EjCyh-_BYOaWRhQnW_wF-lHWgU-UiNgXHbc3bdyepc0LA3AudBe-SIcBPGJPYnMCu7op-I/s1600/iphone5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNoSBDKOS4KNaYp2cJg8qGjKTnqAdnCtg0uFfjE1TGdQTEisqTFIJZq-qMjqufepDcraWR4EjCyh-_BYOaWRhQnW_wF-lHWgU-UiNgXHbc3bdyepc0LA3AudBe-SIcBPGJPYnMCu7op-I/s1600/iphone5.jpg" /></a></div>
<br />
<b><span style="font-size: large;">Is that it? Just taller? No other under-the-hood changes?</span></b><br />
<br />
No no, dear reader. Plenty of under the hood changes. The iPhone includes Apple’s new A6 chip, which the company says is twice as fast as the A5 chip inside the iPhone 4S. (That twice-as-fast claim applies not only to the processor itself but also how the A6 handles graphics compared to its predecessor.)<br />
<br />
Both cameras—the front- and rear-facing ones—are updated on the iPhone 5. The networking—both wireless and cellular—is improved, with new LTE support and Bluetooth 4.0. The audio’s better, and there’s a new dock connector port called Lightning, too. <br />
<br />
<b><span style="font-size: large;">Break it down for me. Start with the cameras: What’s new there? </span></b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxZZppeeLC9AP_4MF6yWff5rdt_00Xnw2pyoSaET1K9FcgyMHUwezY-LNIN7LDV9AvzWy_D1pRkDavM_C4X-lLfzHZ8zJf-Mi-HfKk0hNtb5sdYMYX1WKDsb7vQwtq5XZVrP3HDFFYLmE/s1600/iphone-5.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxZZppeeLC9AP_4MF6yWff5rdt_00Xnw2pyoSaET1K9FcgyMHUwezY-LNIN7LDV9AvzWy_D1pRkDavM_C4X-lLfzHZ8zJf-Mi-HfKk0hNtb5sdYMYX1WKDsb7vQwtq5XZVrP3HDFFYLmE/s1600/iphone-5.png" /></a></div>
<br />
The rear-facing camera gets an update with a new dynamic low-light mode and sapphire lens cover, and leverages image processing technology new to the A6 chip. The front-facing camera gets an upgrade, too; it’s now a FaceTime HD 720p HD camera.<br />
<br />
The iPhone 5’s camera allows you to take photos while you’re shooting video, which is a first for an iPhone. That sapphire lens cover should not only protect the lens, but also make images look cleaner and sharper, Apple claims. And, along with the iPhone 4S in iOS 6, the iPhone 5 offers a built-in option called Panorama, for taking stitched-together panoramic shots.<br />
<br />
<b><span style="font-size: large;">You mentioned improved networking and LTE support?</span></b><br />
<br />
Indeed, we did. New to the iPhone 5 is support for LTE. That’s on top of the GPRS, EDGE, EV-DO, HSPA, HSPA+, and DC-HSDPA options the iPhone 4S already offered.<br />
<br />
With LTE support, the iPhone 5 can connect to the fastest cellular networks in the U.S. Apple offers a <a href="http://www.apple.com/iphone/LTE/">webpage detailing the precise breakdown of which U.S. carriers support which LTE networks</a>. The AT&T iPhone 5 supports only two LTE bands; the Sprint and Verizon model supports five. If you plan to travel internationally and want your iPhone to work on European or Asian cellular networks, note that AT&T’s model won’t do for you.<br />
<br />
LTE partners for the iPhone 5 include Sprint, AT&T, and Verizon in the U.S, and Rogers, Fido, Bell, Telus, and more in Canada. Schiller said there are “plenty” of LTE partners in Asia, Australia, the UK, and Germany, with lots of DC-HSDPA support in Europe as well. <br />
<br />
<b><span style="font-size: large;">Any Wi-Fi improvements?</span></b><br />
<br />
That’s a very prescient question. The answer is yes. The iPhone 5 supports 802.11 a/b/g/n standards, and works on both the 2.4GHz and, for the first time, 5GHz spectrums. Apple claims that gives the iPhone 5 a maximum theoretical download speed of 150Mbps.<br />
<br />
<span style="font-size: large;"><b>That LTE technology and larger screen must be a massive battery drain. What’s battery life like?</b></span><br />
<br />
We haven’t yet gotten our hands on an iPhone 5 to put the battery through its paces. But Apple claims that the iPhone 5’s battery actually lasts longer than the iPhone 4S’s. The company says that you can expect eight hours of 3G talk time, browsing, and LTE browsing; ten hours of Wi-Fi browsing; ten hours of video; 40 hours of music; and 225 hours of standby time.<br />
<br />
<span style="font-size: large;"><b>What’s this Lightning thing? </b></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6UmxFgMa2VHADacZjmIfuPhOC9rXrwjAuftpQnSbeNsW4054GdfZtf3gz2yfNXC4-PuhBa7x9SxyfHCfN-rN9wT-ffzg_R2leyANkFWgOG9JrOsmzh2R_9QL27eUFz_5M_Dir77Dqxj0/s1600/lightningconnectorplug.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6UmxFgMa2VHADacZjmIfuPhOC9rXrwjAuftpQnSbeNsW4054GdfZtf3gz2yfNXC4-PuhBa7x9SxyfHCfN-rN9wT-ffzg_R2leyANkFWgOG9JrOsmzh2R_9QL27eUFz_5M_Dir77Dqxj0/s1600/lightningconnectorplug.png" /></a></div>
<br />
Lightning is Apple’s name for the new 8-pin, all-digital connector in use by the iPhone 5 (along with several new iPods). It replaces the 30-pin dock connector of old.<br />
<br />
Apple says that the Lightning technology is more durable than the dock connector it replaces. The plug is reversible, like a MagSafe adapter, meaning you don’t have to worry about which way is up.<br />
<br />
<span style="font-size: large;"><b>So I guess my old accessories are worthless now?</b></span><br />
<br />
Depends on what you’re willing to spend. Apple’s offering a pair of Lightning adapters: A $29 dongle that plugs into a Lightning port on one end, and offers a dock connector port on the other, and a $39 cable that does the same thing.<br />
<br />
Without at least one of those, yes, your old docks, chargers, and cables are about as useful as a SCSI terminator. Obviously, AirPlay speakers will continue to work with the iPhone 5 just fine.<br />
<br />
If you have any old iPhone 4/4S cases lying around, unsurprisingly, those won’t fit the taller iPhone 5.<br />
<br />
<b><span style="font-size: large;">What if I want to output iPhone 5 video to a TV? What are my options?</span></b><br />
<br />
As with the 30-pin connector, the Lightning connector supports video output; Apple told Macworld that Lightning-to-HDMI and Lightning-to-VGA cables will be available “in the coming months.” In the meantime, you’re restricted to AirPlay. Until those cables appear, if you want to show pictures or video from your iPhone on the big screen, you’d better have an Apple TV hooked up.<br />
<br />
<b><span style="font-size: large;">You mentioned something about audio improvements? </span></b><br />
<br />
The iPhone 5 is the first iPhone with three microphones: One on the front, one on the back, and one on the bottom. Apple says that they work in tandem to improve noise cancellation and voice recognition. The earpiece includes better noise-cancellation now, too, Apple says.<br />
<br />
The iPhone 5 still, like its predecessors, sports a mono speaker, but Apple says that speaker is improved, with better frequency response and better sound.<br />
<br />
With certain carriers—though none in the U.S. so far—the iPhone 5 will support wideband audio, which should make your voice sound more normal to folks on the other end of the conversation, unlike the typically compressed sound associated with most cellphone calls.<br />
<br />
<b><span style="font-size: large;">And I think I heard something about new headphones, too? </span></b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_YdX8Wed4eBfxKVGDFDBpc8HQEdSM6hbh6XFq5soXJjWqRfTUgHuslYjmjdc7qJrHPiLyXZ-7jWID2QdUVbUB9oo1WCldzw0_lttghzP4aPTHgh8B6rXj23Hmk6xR658oUWcISUBOWeU/s1600/earpods.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_YdX8Wed4eBfxKVGDFDBpc8HQEdSM6hbh6XFq5soXJjWqRfTUgHuslYjmjdc7qJrHPiLyXZ-7jWID2QdUVbUB9oo1WCldzw0_lttghzP4aPTHgh8B6rXj23Hmk6xR658oUWcISUBOWeU/s1600/earpods.jpg" /></a></div>
<br />
Apple announced that it finally has a replacement for those fiddly white earphones it’s included with iPods and iPhones since the beginning, and they’re called EarPods. Apple says that EarPods sound better and fit better too. You’ll get a set in the box with your iPhone 5. (Note that Apple has moved the headphone connector to the bottom of the device.) </div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-67392595968611003952012-09-13T04:01:00.000-07:002012-09-13T04:01:06.316-07:00Apple Unveils Apple 5, Skinny, Better Display, Camera, Software<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQudeshot0zLFZu73cxnRM0GwFvlEqCeuCjdFqCcnUvfDltrrAw-rLWuOSYx3Q7LnrzOQ-g7-5GIDXMWOTVv4QMEh1yE1U5u_AQNVbYGE3Vcg4ty5XzZNJSjptnKty3y2sUVaDc9yZ3vQ/s1600/iphone%252C.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQudeshot0zLFZu73cxnRM0GwFvlEqCeuCjdFqCcnUvfDltrrAw-rLWuOSYx3Q7LnrzOQ-g7-5GIDXMWOTVv4QMEh1yE1U5u_AQNVbYGE3Vcg4ty5XzZNJSjptnKty3y2sUVaDc9yZ3vQ/s1600/iphone%252C.jpg" alt"Iphone 5" /></a></div><br />
The object of much anticipation and speculation over the last several months, the iPhone 5 delivers most of what industry observers had expected. The smartphone is made of glass and aluminum and all of the buttons are in the same places.<br />
<br />
According to Apple, the device is 18 percent thinner than the iPhone 4S, measuring just 7.6mm. It's also 20 percent lighter than its predecessor at 112 grams. The company is calling the aluminum backplate -- which has been shown in several leaked images over the last several weeks -- the "slate."<br />
<br />
One of the biggest additions is the new 4 inch display, besting its predecessor's 3.5-inch screen. The device once again comes with the Retina display and has the same 326 pixels per inch found in the iPhone 4S. In terms of resolution, users can expect 1,136 x 640, Apple senior vice president for worldwide marketing, Phil Schiller said today during the unveiling. The screen has a 16:9 aspect ratio.<br />
<br />
With the bigger displays comes more space for your goodies. In fact, Apple says that the device will be able to accommodate a fifth row of icons. Previously, Apple's iPhones only supported four rows of icons.<br />
<br />
Apple says that it has updated its software, including iLife, iWork, and the native apps, among others, to accommodate the larger display. In addition, the company will allow developers to update their apps to work with the larger screen.<br />
<br />
Moving onto the Web, Apple announced that, as expected, the iPhone 5 will come with support for 4G LTE service, delivering what it calls "Ultrafast Wireless." The device's LTE service will be available in the U.S. on the Sprint, Verizon Wireless, and AT&T networks.<br />
<br />
In addition, Apple says that the platform will offer up HSPA+ and DC-HSPDA. On the Wi-Fi side, the device will boast support for 802.11n 2.4GHz and 5GHz signals.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm0MQQ9tgLW6ttCpCHphAIh84kEUcUY354nAAsIaj030zCXdcDR3CL_4xzwzniT6Zm1jNE4Dt5HmBe6hq-exiDAebIxb_dqSszWGCn30xnY-Lr2tBzlXHNnCHXdhP4Q-v1qWrQYVbXS74/s1600/iphone.....jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm0MQQ9tgLW6ttCpCHphAIh84kEUcUY354nAAsIaj030zCXdcDR3CL_4xzwzniT6Zm1jNE4Dt5HmBe6hq-exiDAebIxb_dqSszWGCn30xnY-Lr2tBzlXHNnCHXdhP4Q-v1qWrQYVbXS74/s1600/iphone.....jpg" alt"Iphone 5" /></a></div><br />
Performance-wise, Apple is making some big promises, thanks to its inclusion of the A6 processor. According to Schiller, the chip is 22 percent smaller than the previous A5, featured in the iPhone 4S, but is twice as fast and doubles the graphics performance of its predecessor. Saving an image from an iPhoto app, for example, is 1.7-times faster on an iPhone 5 than on the iPhone 4S.<br />
<br />
Despite the LTE and better chip, Apple is promising strong battery life in the iPhone 5. The company claims it'll deliver 8 hours of 3G talk time and 8 hours of LTE browsing. On standby, the device will last 225 hours on a single charge, the company says.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCYBXZuiOfSD2uXTDgxKVcysODZu50A0941Hr1hWYAZx840uX2j_nKWM7kxQKVboORRL0cxKL7CTP0_o0ZBOWqcp7qzIJ9w8yXsb-Fuw1veDQHvSuM8yf-HycMYRrVzf4y60Bh5-T9_nA/s1600/iphone....jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCYBXZuiOfSD2uXTDgxKVcysODZu50A0941Hr1hWYAZx840uX2j_nKWM7kxQKVboORRL0cxKL7CTP0_o0ZBOWqcp7qzIJ9w8yXsb-Fuw1veDQHvSuM8yf-HycMYRrVzf4y60Bh5-T9_nA/s1600/iphone....jpg" alt"Iphone 5" /></a></div><br />
Given the popularity of the iPhone's iSight camera, it's not surprising that it has been updated, as well. According to Apple, the camera now comes with an 8-megapixel sensor and 3,264 x 2,448 resolution. Backside illumination, a five-element lens, and better low-light performance are just a few of the upgrades that have made their way to the iSight. Users will also be able to take panoramic shots, thanks to built-in software.<br />
<br />
As one might expect, the camera also supports video capture. Apple says that the lens will deliver 1080p video and facial detection for up to 10 people. As Apple announced at the Worldwide Developers Conference earlier this year, FaceTime, the company's video chatting feature, is available on both Wi-Fi and cellular networks.<br />
<br />
Apple says that it has bundled an additional speaker in the iPhone 5, bringing the grand total to three. The device will also come with a noise-canceling earpiece to improve call quality.<br />
<br />
Not willing to leave anything untouched, Apple also took to its Dock connector and replaced it with a new one. According to the company, the 30-pin connector is now being replaced by an all-digital connector, called Lightning. The connector is 80 percent smaller than the 30-pin connector and according to Apple, will deliver "improved durability" and be "easier to use."<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs2_XbzVAsCwbqAU5XtZLdUCfTDCk8U_VmfRcI3VT0vbevfjkdxI08vPSrIpQCRaHLF5hGR7-NdyP1v2B9j2Jzj09Vv19HJoIgCjgOtJ2AoI60ndAwGzcshp_GJUMxLyPq_sbppbtyKSg/s1600/iphone...jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs2_XbzVAsCwbqAU5XtZLdUCfTDCk8U_VmfRcI3VT0vbevfjkdxI08vPSrIpQCRaHLF5hGR7-NdyP1v2B9j2Jzj09Vv19HJoIgCjgOtJ2AoI60ndAwGzcshp_GJUMxLyPq_sbppbtyKSg/s1600/iphone...jpg" alt"Iphone 5" /></a></div><br />
The trouble with the smaller connector, however, is that it's not compatible with accessories featuring the old design. To make good on that, Apple's Schiller also unveiled a new adapter that will allow the iPhone 5 to connect to standard, 30-pin ports. For the low, low price of $29.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj3noxGzt1WIYt4-rPaf8wH6efZ7-EE7QPObhEdwseX_wLxrXbIqT6VHCDjeK_EQV7xcs1AlKq_jcwUChx2MRJvIXGLIsRiGWSdySntxdEAKOGTL5_2gCtk_a85FsUptmRmApHZ-BkT18/s1600/iphone..jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj3noxGzt1WIYt4-rPaf8wH6efZ7-EE7QPObhEdwseX_wLxrXbIqT6VHCDjeK_EQV7xcs1AlKq_jcwUChx2MRJvIXGLIsRiGWSdySntxdEAKOGTL5_2gCtk_a85FsUptmRmApHZ-BkT18/s1600/iphone..jpg" alt"Iphone 5" /></a></div><br />
Apple's handset will ship in the customer's choice of white or black, and run on iOS 6. The device will offer the same storage options as its predecessor -- 16GB, 32GB, and 64GB -- and come with identical pricing of $199 to $399, depending on storage needs, with a two-year contract.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9iJj0bNsRaKiAjG7jd76iIkzpGl3UbfWeE9418fO-GUHtgcy6hknkytZ2zOF40Jta9rUldOaP9XfBul8VaEvhJlwyFHi3cloqmupZR-jfQRdMSWPVLUE_OZ_NbsNWLo6E8qEa6WLeUFs/s1600/iphone.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9iJj0bNsRaKiAjG7jd76iIkzpGl3UbfWeE9418fO-GUHtgcy6hknkytZ2zOF40Jta9rUldOaP9XfBul8VaEvhJlwyFHi3cloqmupZR-jfQRdMSWPVLUE_OZ_NbsNWLo6E8qEa6WLeUFs/s1600/iphone.jpg" alt"Iphone 5" /></a></div><br />
Meanwhile, Apple has decided to kill off the iPhone 3GS and cut the price of its iPhone 4 8GB device to free. The iPhone 4S will be available in its 16GB flavor for $99.<br />
<br />
Apple plans to open pre-orders for the iPhone 5 on September 14. The device will hit store shelves on September 21.</div>dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-83155180629493382982012-09-11T04:03:00.000-07:002012-09-11T04:19:32.980-07:00Anonymous Takes Credit for Go Daddy Massive Service Disruption<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-uwIheEcuTAdW_q69MNZEJk-ZxMd7bkZVv4AmSEmKzAF3RvNrt4sooLM4FdK8oaMyer6H3ts83-OyLx1S_w5iV8nqDbmh69_WWHMheu2Z3aVQEwopx0BaAIWa0tWjosLrU_Rz8AyEVAU/s1600/go-daddy-anonymous.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-uwIheEcuTAdW_q69MNZEJk-ZxMd7bkZVv4AmSEmKzAF3RvNrt4sooLM4FdK8oaMyer6H3ts83-OyLx1S_w5iV8nqDbmh69_WWHMheu2Z3aVQEwopx0BaAIWa0tWjosLrU_Rz8AyEVAU/s1600/go-daddy-anonymous.png" /></a></div>
GoDaddy, the largest registrar of Internet domains and host to some 5 million websites, starter to recover Monday afternoon from a service disruption that may have disabled countless websites across the Internet.<br />
<br />
GoDaddy customers who found their websites suddenly going black heard this greeting when they sought answers from the company:<br />
<br />
"We're aware of an issue affecting several services, including email, our website, and some customer websites," the GoDaddy recording said. "We understand your frustration and we want you to know that our team is investigating the source of the issue and is working to resolve it as quickly as possible."<br />
<br />
GoDaddy kept its customers posted on the progress it made on full restoration of service through its <a href="https://twitter.com/GoDaddy">Twitter account</a>.<br />
<br />
Elizabeth L. Driscoll, vice president of public relations for GoDaddy, said via email that the outage started around 10:25 AM PDT, and services for the bulk of affected customers were restored at 2:43 PM PDT.<br />
<br />
<blockquote class="tr_bq">
"At no time was any sensitive customer information, such as credit card data, passwords or names and addresses, compromised," she wrote. "We will provide an additional update within the next 24 hours."</blockquote>
<br />
The attack apparently affected GoDaddy's DNS (Domain Name System) servers, which direct browsers to the correct IP address after a domain name is requested. GoDaddy temporarily redirected its DNS traffic for GoDaddy.com to VeriSign, which also registers domain names and runs the ".com" and ".net" top-level domains, Driscoll said.<br />
<br />
<blockquote class="tr_bq">
"Our services are now back to normal, we are no longer redirecting DNS traffic," she said. "It was helpful because it allowed our customers to manage their accounts while we restored services. We thank Verisign for their assistance today."</blockquote>
<br />
<b><span style="font-size: large;">Hard to Determine How Many Affected</span></b><br />
<br />
What makes the damage from the disruption difficult to assess is that, in addition to hosting websites, GoDaddy also registers domain names. Those domains, which exceed 50 million, could have also been affected by the outage.<br />
<br />
Meanwhile, someone with the Twitter handle @AnonymousOwn3r claimed to be behind the disruption that may have affected millions of websites. The putative hacker declared on Twitter that he is a sole actor in the outage. "Tell the people to not understand wrong," <a href="https://twitter.com/AnonymousOwn3r">he wrote</a>. "The attack is coming only from me."<br />
<br />
According to the hacker, he launched his attack on GoDaddy "to test how the cyber security is safe" and for reasons he wouldn't talk about.<br />
<br />
Asked by his Twitter followers how long he intended to prolong the assault on GoDaddy, the hacker responded, "It can last one hour or one month."<br />
<br />
<b><span style="font-size: large;">The Affected Speak</span></b><br />
<br />
Some of GoDaddy’s small-business clients expressed displeasure at the hacker's action on his Twitter stream.<br />
<br />
"You got your press, now put it back so we can get back to work," complained Charter Marketing.<br />
<br />
"Pissed and impressed at the same time," added MinuteWomen HomeCare. "BTW, two of my sites are down."<br />
<br />
Fashion blog Au Courant Daily told its Twitter followers that it was unable to publish an online issue on Monday, in the midst of New York Fashion Week coverage, because of the outage.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-18627782699717495962012-09-04T07:33:00.000-07:002012-09-04T07:33:19.079-07:00Windows 7 Market Share Increases, surpases XP, Mac OS X passes Vista<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz0DIqpoQvnZF6xCiVS1GveX7c0qYMiwokd1GpJ0_o28VGud0hACiWh5rUM0BFJNZHYdIMyGyco3sx1p5JKgppsL0PQTVSJHr2jUCcHJPxWqdNOUdz8lAXly7Fryn73JBEDcEQ1wruPcY/s1600/Windows-7.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="318" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz0DIqpoQvnZF6xCiVS1GveX7c0qYMiwokd1GpJ0_o28VGud0hACiWh5rUM0BFJNZHYdIMyGyco3sx1p5JKgppsL0PQTVSJHr2jUCcHJPxWqdNOUdz8lAXly7Fryn73JBEDcEQ1wruPcY/s320/Windows-7.png" width="320" /></a></div>Two aging Windows operating systems slipped a ranking each in the market share race this August, with Windows 7 overtaking Windows XP as the world's most popular desktop operating system, and Apple's OS X overtaking the late, lamented Windows Vista.<br />
<br />
This news comes to us from Net Applications' monthly Net Market Share survey, which released its Desktop Operating System Market Share rankings on Monday. Caveat emptor: these statistics are based not by counting actual installation numbers – a prohibitively difficult task – but by extrapolating from internet usage as reported by 40,000 websites worldwide. Not a perfect methodology, to be sure, but one that provides a more than merely acceptable estimation.<br />
<br />
Apple's OS X – known as Mac OS X before the release of version 10.8, Mountain Lion, this July – may have edged past Windows Vista, but it took a veritable herd of cats to pass Microsoft's unloved operating system. Net Applications' reported OS X market share of 7.13 per cent is the sum of versions 10.4 Tiger (April 2005), 10.5 Leopard (October 2007), 10.6 Snow Leopard (August 2009), 10.7 Lion (July 2011), 10.8 Mountain Lion (July 2012), plus a 0.02 per cent contribution from "no version reported".<br />
<br />
Seeing as how it took Apple seven years worth of operating systems to edge past Microsoft's embarrassing flameout (released in January 2007), it doesn't appear that Redmond's desktop hegemony is due to come a-tumblin' down anytime soon.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2oPZ-Se83jGgY2D8ZkM9fw5Y4FiZ8YjlVcGju7NPQb9grNc7iyF7eCz3NsoYR9Ko7B_pv1vc202a9H94RUzF-3J6_UAZcRKRrCWLFjW8EdBDNPw3s0w69NiU9ae8yxShTIvE3LJJJjIo/s1600/total_os_market_share_august_2012.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2oPZ-Se83jGgY2D8ZkM9fw5Y4FiZ8YjlVcGju7NPQb9grNc7iyF7eCz3NsoYR9Ko7B_pv1vc202a9H94RUzF-3J6_UAZcRKRrCWLFjW8EdBDNPw3s0w69NiU9ae8yxShTIvE3LJJJjIo/s320/total_os_market_share_august_2012.jpg" width="219" /></a></div>Which leads us to the next nugget in Monday's report – namely that Windows XP has been passed by Windows 7. The new leader, which was released in October 2009, barely snuck by Windows XP by posting a 42.76 per cent market share versus XP's 42.52 per cent.<br />
<br />
Seeing as how Windows XP arrived on the scene over a decade ago, we have to tip our hat to that venerable operating system in honor of its long and useful – and, of course, continuing – lifespan.<br />
<br />
For you Mac users who'd like a little bit of context, Windows XP's October 2001 release occurred mere months after the heinously buggy Mac OS X 10.0 Cheetah's debut in March of that year, an OS which Linus Torvalds famously described as "a piece of crap."<br />
<br />
Mac OS X 10.0 was as big – or bigger – a jump from Apple's OS 9 as Windows 8 will be from Windows 7. It remains to be seen whether Microsoft's next operating system will have as long and productive life as the one Redmond gave birth to in 2001.</div>dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-78461120427253425942012-09-03T08:16:00.001-07:002012-09-03T08:16:19.426-07:00Pirate Bay Founder Has Been Arrested in Cambodia<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7mG7CLsAtIB69e_6mVpvRLixYHIxIawjbqBPydnbrXkapnKwywgGz6q2AvQqvcbYdOcqP_WnZXnDxX3IPIkItGerZXt_pi3CnBhQTBxVgNc5fboiIOrWSAsbWRMngKI3jnzj3JKYooU4/s1600/piratebay.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="229" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7mG7CLsAtIB69e_6mVpvRLixYHIxIawjbqBPydnbrXkapnKwywgGz6q2AvQqvcbYdOcqP_WnZXnDxX3IPIkItGerZXt_pi3CnBhQTBxVgNc5fboiIOrWSAsbWRMngKI3jnzj3JKYooU4/s320/piratebay.gif" width="320" /></a></div>
Pirate Bay co-founder Gottfrid Svartholm Warg, has been tracked down and arrested in Cambodia.<br />
<br />
Warg is believed to have been living in Cambodia since charges were laid against the founders of the Pirate Bay over copyright infringement in 2009.<br />
<br />
Sweden has no extradition treaty with Cambodia.<br />
<br />
Warg’s former lawyer Ola Salomonsson confirmed to Swedish press that his former client had been arrested in Cambodia.<br />
<br />
The Foreign Ministry's press service also confirmed that a Swedish citizen who was on an international watch list had been arrested in Phnom Penh, but did not reveal his identity.<br />
<br />
<blockquote class="tr_bq">
“Our ambassador has visited him and he is doing under the circumstances,” a spokesperson for the Foreign Ministry's press service said.</blockquote>
<br />
In 2009, all four infamous Pirate Bay founders were sentenced to one year in prison and ordered to pay US$4.4 million (30 million Swedish kronor) in damages.<br />
<br />
All four appealed their sentences in November 2010, with the exception of Warg who failed to turn up at the hearing due to illness.<br />
<br />
Warg then failed to request his appeal be heard and subsequently his guilty verdict came into force on October 2011. Warg, who was at the time believed to be in Cambodia, also failed to turn up for prison time on April 18th 2012 which set the wheels in motion for an international warrant to be put out for his arrest.<br />
<br />
The court of appeal reduced the sentences of the other three founders but increased the demanded compensation to $6.57 million.<br />
<br />
In February, the Swedish Supreme Court announced it would not grant the defendants the right to appeal in the case.<br />
<br />
In May, fellow Pirate Bay founder and current Laos or Thailand dweller, Fredrik Neij took his case to the European Court of Human Rights, claiming the conviction violated his freedom of speech.<br />
<br />
It is understood that Peter Sunde currently lives in Germany. He also confirmed his comrade's detention on Twiiter; “ Gottfrid (ex @tpbdotorg) is in custody in Cambodia. He's apparently Ok. No more info available.”</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-39680094387704451292012-08-29T06:15:00.002-07:002012-08-29T06:15:35.276-07:00Apple Genius Training Manual Leaked Online<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq3s_hsxJljKg3e-v7euW8LHkNPtzMSjDH1VU_Wce7L-jox_jmIBpv6xY0CTmJcFMjnxeu6vRxJk66n20kcDVCcPZXu3Zs72WZ0HL2P75u5VeU728UcY5Sul4JG4-HEXu1dgjEKAKnqGU/s1600/apple-genius-book.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="apple-genius-book.PNG" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq3s_hsxJljKg3e-v7euW8LHkNPtzMSjDH1VU_Wce7L-jox_jmIBpv6xY0CTmJcFMjnxeu6vRxJk66n20kcDVCcPZXu3Zs72WZ0HL2P75u5VeU728UcY5Sul4JG4-HEXu1dgjEKAKnqGU/s1600/apple-genius-book.PNG" /></a></div>
A copy of the training manual used to prepare Apple employees for work at its in-store Genius Bars shows the smooth patter and sales mindset Cupertino seeks to indoctrinate into staff.<br />
<br />
Before donning the sacred blue t-shirt and becoming a Genius Bar operative, staff must first pass through a 14 day training course teaching not only technical tips and tricks but also how to empathize with customers, monitor their nonverbal tics, and guide them to making a purchase. As the manual says: "Everyone in the Apple Store is in the business of selling."<br />
<br />
The Genius Training Student Workbook, <a href="http://gizmodo.com/5938323/how-to-be-a-genius-this-is-apples-secret-employee-training-manual">leaked</a> to Gizmodo, introduces Apple's own sales technique in some depth. Sales training has traditionally focused on acronyms like AIDA (Attention, Interest, Desire, Action) or DIPADA (Drop Its Price And Drop Again), but Apple has its own variant – unsurprisingly named APPLE (Approach, Probe, Present, Listen, End.)<br />
<br />
Apple doesn't want high-pressure sellers behind the bar – quite the opposite, in fact. The manual reinforces a constant message that staff must be empathetic to a potential customer's needs and should employ what it calls the Three Fs: the words "feel," "felt," and "found." In roleplaying examples given, the employee is taught to use these words to establish a bond with the customer and win their trust. For example:<br />
<br />
Customer: This Mac is just too expensive.<br />
<br />
Genius: I can see how you'd feel this way. I felt the price was a little high, but I found it's a real value because of all the built-in software and capabilities.<br />
<br />
Staff are also trained to look to nonverbal clues in people's behavior. Examples given include rubbing the nose, indicating the person is suspicious, or tilting their head to one side if they are feeling cooperative. Some of these are a tad obvious, however – you don't need 14 days of training to work out that a blank stare from someone indicates boredom.<br />
<br />
There is also a list of key phrases not to be used by Genius Bar staff. Apple hardware does not "bomb," "crash," "bang," or even "freeze." Instead it "unexpectedly quits," "does not respond," or "stops responding." Similarly there's no such thing as a "bug" or "problem," just a "condition" or "situation."<br />
<br />
Such vocabulary rules are not uncommon in the industry (this hack was once told never to write something is "cheaper" in product documentation, only that it is "less expensive") but parts of the manual do read rather like a manual on seduction. Be that as it may, if Apple's retail sales are anything to go by, the techniques certainly work.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-31286952527634464582012-08-29T05:24:00.000-07:002012-08-29T05:24:49.047-07:00FBI Arrests Another Lulzsec Hacker Over Sony Picture Breach<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihfjHhjDj4Ibr1Uya87_NfEtgloILY-xhi-x6LbekItTARc_sPsc69m5pejhjJFNrNJfh6Q57Uqb1EfZe1xw8PSoyDMXEe8XBgUNG17HI1PMlByJUqlHTVgXswsZ4W0fZiXpRlrHXs04o/s1600/Lulzsec.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihfjHhjDj4Ibr1Uya87_NfEtgloILY-xhi-x6LbekItTARc_sPsc69m5pejhjJFNrNJfh6Q57Uqb1EfZe1xw8PSoyDMXEe8XBgUNG17HI1PMlByJUqlHTVgXswsZ4W0fZiXpRlrHXs04o/s320/Lulzsec.jpg" width="320" /></a></div>
The FBI just reported that a suspected member of the infamous hacking group Lulzsec have been arrested in the US.<br />
<br />
The suspect, Raynaldo Rivera, 20, is charged of being involved in Sony Pictures hack in May and June last year, which resulted to the leaked personal details of Sony customers that was published online.<br />
<br />
According to the FBI, he worked with Cody Kretsinger, 24 years old who pleaded guilty to hacking charges in April and if convicted, he could face up to 15 years in prison<br />
<br />
Lulzsec, an off-shoot of the Anonymous hacking collective, gained notoriety last year with a string of high-profile attacks on websites and businesses.<br />
<br />
In the Sony hack, which the company said had cost it $600,000 (£380,000), people who had entered competitions had their personal details exposed on the internet.<br />
<br />
Alleged members of the group have to date been arrested in the US, UK and Ireland.<br />
<br />
'Simple attacks'<br />
<br />
An indictment containing details of Mr Rivera's arrest was made public on Tuesday. It accused Mr Rivera and others of stealing data from Sony using a hacking technique known as an SQL injection.<br />
<br />
The indictment said Mr Rivera had helped to post the confidential information onto the internet, and had been involved in publicising the attack on Twitter.<br />
<br />
At the time of the attack, Lulzsec members wrote: "From a single injection we accessed everything.<br />
<br />
"Why do you put such faith in a company that allows itself to become open to these simple attacks?"<br />
<br />
Police said Mr Rivera covered his tracks by using a variety of pseudonyms including "neuron", "royal" and "wildicv". He is also accused of using a proxy server to further avoid detection.<br />
<br />
Unlike Anonymous, which is a loosely organised collective of hackers and hacking advocates, Lulzsec was a defined group with its own specifically recruited members.<br />
<br />
The group is also known in longer form as Lulz Security - where "Lulz" is a play on words of the popular internet phrase "lol", meaning "laugh out loud".<br />
Lulzsec swoop<br />
<br />
Several members of the group have been arrested and subsequently appeared in court.<br />
<br />
In the UK, Ryan Cleary, 19, and Jake Davis, 18, both admitted being part of the group in June.<br />
<br />
However, they and two others - Ryan Ackroyd, 25, and a 17-year-old boy - pleaded not guilty to other related charges.<br />
<br />
The group's leader, a hacker who went by the name of Sabu, worked undercover with the FBI to track down members after he was arrested last year.<br />
<br />
Sabu, whose real name is Hector Xavier Monsegur, was last week granted a six month delay in sentencing due to his "ongoing cooperation with the government". He is now set to be sentenced in February 2013.<br />
<br />
Lulzsec claimed to have attacked News International, whose website for The Sun was defaced with a false story suggesting the newspaper's owner Rupert Murdoch had died.<br />
<br />
Lulzsec had previously posted a story on American broadcaster PBS's website suggesting dead rapper Tupac Shakur was in fact alive.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-57160648455510279782012-08-29T05:11:00.000-07:002012-08-29T05:11:12.901-07:00Ten iPad and iPhone Tips and Tricks You Likely Don't Yet<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixxjOPn5fB_xxwbQt1uc2UUerIvc0BFQaCiwdJzWA1jNJbdUyL8okVXtAqW83vF8G2b5GEJjIbhzYyv7baK5O8479xbDHqHjbcJu5Bf74iMzUS18NKitt16yp5k_RKdE_ojJ2DCQcspBc/s1600/iPad.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixxjOPn5fB_xxwbQt1uc2UUerIvc0BFQaCiwdJzWA1jNJbdUyL8okVXtAqW83vF8G2b5GEJjIbhzYyv7baK5O8479xbDHqHjbcJu5Bf74iMzUS18NKitt16yp5k_RKdE_ojJ2DCQcspBc/s320/iPad.PNG" width="320" /></a></div>
Am sure most of us already have an iPhone or iPad and chances are that we are not fully aware of the functions that comes with this beautiful smart devices.<br />
<br />
I’ll be sharing 10 tips you might not know your iDevices can do. Tech followers might be aware of some, but ordinary users likely won’t.<br />
<br />
<b><span style="font-size: large;">1. Directly Access Apps</span></b><br />
<br />
If you're like most people, you have your iPhone set to show some pop-up notifications. They might show up on the home screen when you get a Facebook notification, or a text message, for instance, and even when the phone is locked and the screen is asleep. To open these messages, you don't have to first swipe to unlock your phone and then open the app. As long as your device isn't protected by a four-digit security code, swipe from left to right on the notification to open the app in which the message appeared. If you do use a code, you'll be prompted to enter it after swiping the notification.<br />
<br />
<b><span style="font-size: large;">2. Tap to Scroll Up</span></b><br />
<br />
Give your pointer finger a rest from scrolling up, up, up to get back to the top of a page. Tap once on the status bar—where the time and battery life are displayed—at the top edge of the iPhone or iPad screen and you'll jump up to the top. This works for websites, email, Contacts and many other apps. <br />
<br />
<b><span style="font-size: large;">3. Keyboard </span></b><b><span style="font-size: large;">Shortcuts</span></b><br />
<br />
Tapping on a glass keyboard has its downsides, but a few shortcuts could ease the experience. Tap and hold the "Compose new message" button in Mail to automatically bring up all your saved email drafts. And rather than switching to the number keyboard and then switching back to the letter keyboard, tap and hold the "123" key, then drag it to a number to select it. When you lift your finger from the number, the letter keyboard will appear again.<br />
<br />
When entering an email address, hold down the period key to see other address endings. Add emoticons to your keyboard by choosing: Settings, General, Keyboard, International Keyboards, Add New Keyboard, Emoji. When entering a Web address in the browser, hold down the .com key to see alternate URL endings, like .org and .edu.<br />
<br />
You can split the iPad's on-screen keyboard in two so you can grasp the iPad with two hands and type with your thumbs. This is on by default, though you might not know it. (To check, go to Settings, General, Keyboard and Split Keyboard.) To see the split keyboard anytime you're using the regular keyboard, spread your two thumbs from the center of the keyboard out. Or just tap and hold the keyboard icon (bottom right corner) and select Split. An Undock option also appears and this lets you move the keyboard up or down.<br />
<br />
<b><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;">4. Speed from </span></span></span></span></span></span></span></span></span></b><b><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;">App to App</span></span></span></span></span></span></span></span></span></b><br />
<br />
The iPhone and iPad have many apps running in the background. There are shortcuts for jumping around apps without going to the home screen. Double tap the Home button (a physical button below the screen) to see a pop-up tray of apps and swipe to the left to scroll through them. Select one to jump to it. On the iPad, do this is by placing four fingers on the screen and swiping all of them up at once. This and other multitask gestures are on by default on the iPad 2 and newest iPad. But you have to turn them on with the first-generation iPad by going to Settings, General, Multitask Gestures.<br />
<br />
<span style="font-size: large;"><b>5. Take Screenshots</b></span><br />
<br />
Ever see something on your iPhone or iPad screen and wish you could save that image, but can't figure out how? Press the Home button and the On/Off button (top right edge) simultaneously to take a screenshot of whatever you see on the device. You'll hear the same sound as when you take a picture with the Camera app. You can find all of your screenshots stored in Camera Roll, along with your photos, and share them via email or social networks as you do regular photos.<br />
<br />
<span style="font-size: large;"><b>6. Swipe to Search</b></span><br />
<br />
Another way to quickly find apps on an iPhone or iPad is to swipe left-to-right from the home screen. This reveals a search box in which you can type the name of any app to jump right to it. This search also finds contacts, emails, calendar items and texts, as well as other things.<br />
<br />
<b><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;">7. Read Websites More Easily</span></span></span></span></span></span></b><br />
<br />
Stop struggling to read overcrowded Web pages on the iPhone's small screen. Instead, tap the Reader button, found in the URL bar at the top of a Web page, and you'll see a much clearer, predominantly text version of the page. Even better: This view hides advertisements. It doesn't work with all websites. This also works on the iPad.<br />
<br />
<b><span style="font-size: small;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;">8. A Smarter Camera (iPhone)</span></span></span></span></b><br />
<br />
If you've ever wished your iPhone camera had a physical shutter button, look no further. The phone's volume up (+) button doubles as a shutter button whenever the Camera app is opened. This hard button feels sturdier all around, plus it makes it a cinch to take self-portraits or to tell strangers how to take a photo of you and your friends.<br />
<br />
And speaking of handing your phone to strangers, don't forget about the lock-screen shortcut for opening the Camera: Slide up the camera icon (found at the bottom right of the home screen) to open Camera without unlocking the phone. You can do this with anyone's phone, regardless of whether or not you know their password because it only opens the Camera app, locking you out of all other apps—and other photos and videos—on the phone. Just the photos or videos you take at that moment will be visible to you.<br />
<br />
<b><span style="font-size: small;"><span style="font-size: large;">9. Digital Picture Frame (iPad)</span></span></b><br />
<br />
Put your iPad to work as a digital picture frame for a photo slide show. Tap the Picture Frame icon, which appears to the right of the slide-to-unlock bar on the lock screen.<br />
<br />
If you own an iPad case, flip it into its stand-up position, place the iPad on a table, press the Picture Frame icon and walk away. Guests in your home will have to unlock the iPad to access other apps.<br />
<br />
Photos can be pulled from all photos or specific albums, events or images of certain faces. Make these and other slide-show adjustments in Settings, Picture Frame.<br />
<br />
<b><span style="font-size: large;">10. Mute or Screen Lock (iPad)</span></b><br />
<br />
The same button on the right edge of your iPad that locks the screen in portrait or landscape mode can double as a mute button. This comes in handy if you find yourself frequently muting the iPad. Change this button's default lock function by going into Settings, General, Use side switch to: Lock Rotation or Mute. By default, this button is on Lock Rotation. Another quick way to mute is by pulling up the multitask bar by double tapping Home (or using a four-finger swipe up), then swiping left-to-right to see a mute, as well as sliders for volume and screen brightness. </div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-45401618400391784572012-08-28T09:30:00.000-07:002012-08-28T09:30:45.625-07:00Keyboard shortcuts in Evernote for Mac<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVW9Lz4qrx2e4csk9OKhZ2w9gfvhAe8cSomE5B7f0WHguboLt5C5ZbDclgirgKV6i0LenCQSr4Xhr7Xw5zXP9BXLKbGXTleTz7f5CsE4dE2z_38bEs4QJraEQ_RrIkZTzWMHOZ5UZC1rg/s1600/Evernote_for_Mac.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVW9Lz4qrx2e4csk9OKhZ2w9gfvhAe8cSomE5B7f0WHguboLt5C5ZbDclgirgKV6i0LenCQSr4Xhr7Xw5zXP9BXLKbGXTleTz7f5CsE4dE2z_38bEs4QJraEQ_RrIkZTzWMHOZ5UZC1rg/s1600/Evernote_for_Mac.png" /></a></div>
Like Evernote for Windows, the Evernote desktop client for Mac has a large set of useful keyboard shortcuts. Here's a list of shortcuts for Mac users.<br />
<br />
General Application<br />
⌘-N -- new note<br />
⌘-⇧-N -- new notebook<br />
⌃-⌘-N -- new tag<br />
⌘-1 -- list view<br />
⌘-2 -- snippet view<br />
⌘-3 -- card view<br />
⌘-M -- minimize window<br />
⌃-⌘-F -- toggle full screen<br />
⇧-⌘-P -- page setup<br />
⌘-P -- print<br />
⌘-: -- show spelling &grammar<br />
⌘-; -- spell check<br />
⌘-0 -- sync status<br />
⌃-⌘-S -- sync<br />
⌘-W -- close<br />
⌘-Q -- quit<br />
⌘-, -- preferences<br />
⌘-H -- hide Evernote<br />
<br />
Editor<br />
fn-fn -- start dictation<br />
⌘-B -- bold<br />
⌘-I -- italicize<br />
⌘-U -- underline<br />
⌃-⌘-K -- strike through<br />
⌘-A -- select all<br />
⌘-X -- cut<br />
⌘-C -- copy<br />
⌘-V -- paste<br />
⇧-⌘-V -- paste without formatting<br />
⇧-⌘-F -- simplify formatting<br />
⇧-⌘-D -- insert date<br />
⌥-⇧-⌘-D -- insert time<br />
⌘-Z -- undo<br />
⇧-⌘-Z -- redo<br />
⇧-⌘-U -- bulleted list<br />
⇧-⌘-O -- numbered list<br />
⇧-⌘-L -- insert table<br />
⌘-{ -- align left<br />
⌘-} -- align right<br />
⌘-| -- center<br />
⇧-⌘ X -- encrypt selected text<br />
⌘-K -- add link<br />
⌘-F -- find within note<br />
⌘-S -- save<br />
<br />
That's it and if you think we omitted some shortcuts please share with the comment box.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-38315947059695353732012-08-28T09:21:00.000-07:002012-08-28T09:21:49.662-07:00Craigslist embedds maps in real estate listings<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgprD-16D5PUdCusRB3DE5Rct_FUvUbjIk6BLboQdHm6aG1oFvEXqdX9IcGdk5qE4jlUt4WN7ujtE1HnWx9fCGUmWerluIAeJk_oHKds24_dGGekSxMKPdELPgGvFPuEiUXsHFrZxRZlD0/s1600/craigslist-maps.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgprD-16D5PUdCusRB3DE5Rct_FUvUbjIk6BLboQdHm6aG1oFvEXqdX9IcGdk5qE4jlUt4WN7ujtE1HnWx9fCGUmWerluIAeJk_oHKds24_dGGekSxMKPdELPgGvFPuEiUXsHFrZxRZlD0/s1600/craigslist-maps.jpg" /></a></div>
Not long after Craigslist cut off a mapping app that tapped its housing data, the popular online bulletin board has quietly begun embedding maps in certain real estate listings.<br />
<br />
The maps, which appear on housing ads in the San Francisco Bay Area and Portland, Ore., harness data from OpenStreetMap, a service that offers free maps of the world compiled and edited by volunteers.<br />
<br />
The new feature emerges a little more than a month after Craigslist sued PadMapper, an apartment listings aggregator that collects listings from Craigslist and other services and displays them on a Google map. Craigslist, which has become a popular portal for apartment ads, sued PadMapper and the data harvester it uses -- 3taps -- on copyright infringement grounds. <br />
<br />
The battle began in June when Craigslist sent PadMapper a cease-and-desist letter that claimed the app violated its terms of use, which prohibit "copying, aggregation, display, distribution, performance, or derivative use of Craigslist or any content posted on Craigslist."<br />
<br />
For a short while PadMapper took Craigslist data off its site. But in July, PadMapper said it would resume using the data after it discovered a workaround that creator Eric DeMenthon described as "somewhat dickish" but "legally kosher."<br />
<br />
The solution was provided by 3taps, which created an API that harvests data from Craigslist postings by "indirect means," meaning they aren't subject to the Internet bulletin board's terms of use.<br />
<br />
Craigslist responded with a lawsuit filed in San Francisco's federal court, accusing the two companies of "unlawfully and unabashedly mass-harvesting and redistributing postings entrusted by Craigslist users to their local Craigslist sites." </div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-53692016436502364522012-08-28T09:04:00.000-07:002012-08-28T09:04:05.618-07:00Microsoft Patents an Advanced Multi-Touch Stylus<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmz3TVdhKQjlyWuW4mMBITl1-JsAvFL6OdjNTFDgr3BKJpTMOXoJ-GfpcjCOS7B84iTyCH4OUyc3ZEk_QZkFYDJmnfwGbuhAq9VLRTQ_RMC0W_lH4eSQtOEQ_KPz0LrLQv5Gmekhz3b64/s1600/microsoft-epen-patent.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="272" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmz3TVdhKQjlyWuW4mMBITl1-JsAvFL6OdjNTFDgr3BKJpTMOXoJ-GfpcjCOS7B84iTyCH4OUyc3ZEk_QZkFYDJmnfwGbuhAq9VLRTQ_RMC0W_lH4eSQtOEQ_KPz0LrLQv5Gmekhz3b64/s320/microsoft-epen-patent.jpeg" width="320" /></a></div>
The humble stylus may be getting a radical makeover, with powerful touch and other sensors built into the tablet and smartphone accessory, according to a Microsoft patent recently approved by the U.S. Patent and Trademark Office.<br />
<br />
Microsoft’s next-generation digital pen, or “ePen,” includes not just touch sensors but also a gyroscope, compass, accelerometers, and other sensors. These sensors add functionality that goes beyond just tapping and scribbling.<br />
<br />
The patent application drawings revealed by tech patent analysis site PatentBolt show, for example, that the ePen could let you select ink colors on the fly by changing the angle you hold it, adjust the line thickness by virtually “sharpening” the digital pen with a twist, or turn it into an eraser using a different grip. It’s like the stylus on steroids.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVU1xGOPLl3CsYAF7iPeaUGW6NRYY7zbzqkhPRg79Q9suUXzRNXiewBSMPNvTXqeL82wp1Ean1_kGKbu5vXmdlpgb3RlZCm_z-TJt-9Nuk74asOAZY5p4FoZSB2O9tLdbFPoQrH-SNbbI/s1600/microsoft-epen-patent-sensors.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="255" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVU1xGOPLl3CsYAF7iPeaUGW6NRYY7zbzqkhPRg79Q9suUXzRNXiewBSMPNvTXqeL82wp1Ean1_kGKbu5vXmdlpgb3RlZCm_z-TJt-9Nuk74asOAZY5p4FoZSB2O9tLdbFPoQrH-SNbbI/s320/microsoft-epen-patent-sensors.jpeg" width="320" /></a></div>
These features will obviously appeal to digital artists and other creative types, but there’s also huge potential for this multi-touch pen outside of drawing and painting apps. The ePen could become a new game controller, a music instrument, or simply a better, more customizable input device for your next touchscreen computer.<br />
<br />
Despite Apple’s dismissal of the stylus as a useful accessory, the lowly digital pen is making a comeback. Witness, for example, the wide appeal of the Samsung Galaxy Note’s line of stylus-sporting tablets and smartphones. Microsoft’s upcoming Surface Pro tablet is also designed with an active dual digitizer for digital inking.<br />
<br />
I’ve owned a number of tablet PCs with styluses that could do impressive tricks--for example, turn on the eraser function when turned upside down or bring up the context menu with a press of a button on the stylus--and they were really useful in apps like OneNote and Corel Painter. But none of them were as advanced as the ePen is supposed to be.<br />
<br />
A stylus that can help you not just take notes but also work with your apps more quickly, precisely, and even automatically (e.g., based on your position or grip) could take using your mobile device to the next level.<br />
<br />
This will depend, of course, on whether such an ePen ever comes to market (Microsoft filed the patent application in the first quarter of 2011) and how much it will cost. For now, we’re stuck with imprecise fingers and primitive styluses--but hopefully not for long. </div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-50086362402237799332012-08-28T08:21:00.000-07:002012-08-28T08:21:03.671-07:00Hackers Exploits Unpatched Java Vulnerability<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuwpTJawvDZjLSH7oaiV4bpZzg2VCpUr8SlUfOnlOodm6u1aHc5aohMRAM8LSPvJ3C3pyqYqZ8YOMl4Icioh1aKbXYoUJj7DXKSlkNhz6y8_BBeN4s7RSVI1rqPVFC5tH-CQtq3Y1QQmM/s1600/java.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuwpTJawvDZjLSH7oaiV4bpZzg2VCpUr8SlUfOnlOodm6u1aHc5aohMRAM8LSPvJ3C3pyqYqZ8YOMl4Icioh1aKbXYoUJj7DXKSlkNhz6y8_BBeN4s7RSVI1rqPVFC5tH-CQtq3Y1QQmM/s320/java.png" width="320" /></a></div>
Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye.<br />
<br />
So far, the vulnerability has been exploited in limited targeted attacks according FireEye's senior staff scientist Atif Mushtaq. "Most of the recent Java run-time environments i.e., JRE 1.7x are vulnerable."<br />
<br />
The exploit is hosted on a website that resolves to an Internet Protocol address in China and its payload is a piece of malware that connects to a command and control server located in Singapore.<br />
<br />
The malware installed in the attacks seen so far appears to be a variant of Poison Ivy, Jaime Blasco, a researcher with security firm AlienVault, said Monday in a<a href="http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/"> blog post</a>.<br />
<br />
Poison Ivy is a so-called remote administration Trojan program that has been used in many cyberespionage campaigns in the past.<br />
<br />
It's just a matter of time until a proof-of-concept (PoC) exploit is released and more bad guys start targeting the new Java vulnerability, Mushtaq said.<br />
<br />
"We have confirmed the 0-day [unpatched] vulnerability to affect Java 7 update 6 build 1.7.0_06-b24 for Windows," Carsten Eiram, chief security specialist at vulnerability management firm Secunia, said Monday via email. "It should affect other versions and platforms as well."<br />
<br />
Secunia rated the vulnerability as extremely critical because it allows the execution of arbitrary code on vulnerable systems without user interaction.<br />
<br />
"This vulnerability is not a 'memory corruption' type vulnerability, but instead seems to be a security bypass issue that allows running untrusted code outside the sandbox without user interaction," Eiram said. "In this specific case a file is downloaded and executed on the user's system when just visiting a web page hosting a malicious applet."<br />
<br />
Joshua Drake, a security research scientist at security consultancy firm Accuvant, published a proof-of-concept exploit for the vulnerability on Monday. His PoC code was then used to create another exploit for use with the popular Metasploit penetration testing framework.<br />
<br />
A proof-of-concept exploit for the vulnerability was published online on Monday and was then used to create another exploit for use with the popular Metasploit penetration testing framework.<br />
<br />
A Metasploit user also reported testing the exploit successfully on Mac OS X 10.7.4 with Safari version 6.0 and Java 7 update 6.<br />
<br />
At the Black Hat security conference in July, security researchers warned that Java vulnerabilities are increasingly targeted by attackers and that exploits for new Java vulnerabilities are being integrated into attack toolkits faster than ever before.<br />
<br />
"The widespread use of Java makes it an interesting target in itself," Eiram said. "However, another major reason for why Java is interesting from an exploitation point-of-view is how it's affected by certain bypass type vulnerabilities (like this one); these make it easy to reliably create exploits across different versions and platforms without having to worry about various security mechanisms e.g. ASLR and DEP on Windows."<br />
<br />
It's not clear when Oracle will release a patch for this vulnerability. The company did not immediately respond to a request for comment.<br />
<br />
In the meantime users are left with very few options to protect themselves. "We are not aware of any fixes or workarounds except disabling/uninstalling Java," Eiram said.<br />
<br />
However, uninstalling or disabling Java is probably not an acceptable solution for a large number of companies and users that rely on Java-based Web applications to conduct their daily business.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-83449039877401712052012-08-23T05:56:00.000-07:002012-08-23T06:00:00.120-07:00Why A Paid Social App Will Never Work<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5tKB5sf8wqF3NxFYmHwpgqhM-XbpARkiE7kCMSIwZwtKZdesvnhfmgQK8pkPwvslNuabl1tiFJP60ULlGcTyDAFm8GLIE_-jWdLE0HT7B7NMBqzhcls6byAa8pOrLuuMjUDQmj9I6-4o/s1600/app.net.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5tKB5sf8wqF3NxFYmHwpgqhM-XbpARkiE7kCMSIwZwtKZdesvnhfmgQK8pkPwvslNuabl1tiFJP60ULlGcTyDAFm8GLIE_-jWdLE0HT7B7NMBqzhcls6byAa8pOrLuuMjUDQmj9I6-4o/s1600/app.net.jpg" width="580px" height="100%"/></a></div><ul style="text-align: left;"><li>It’s all about saying what’s on your mind, connecting with friends & family and reaching out to the world at large. </li>
</ul><ul style="text-align: left;"><li>"Nobody" is willing to pay for that. </li>
</ul><ul style="text-align: left;"><li>Even if few people pay, non geek won’t see reasons to pay. </li>
</ul><ul style="text-align: left;"><li>Dalton Caldwell's App.net is making a big mistake by comparing the business model of code sharing site (github) with “say what’s on your mind” social site (Facebook, Twitter, Google+). </li>
</ul><ul style="text-align: left;"><li>It’s like comparing C++ with Microsoft word. </li>
</ul><ul style="text-align: left;"><li>One appeals to a selected audience (geek) while the other appeals to a larger audience (non geek / ordinary user). </li>
</ul><ul style="text-align: left;"><li>Non geek don’t give a f**k about advert. </li>
</ul><ul style="text-align: left;"><li><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:DontVertAlignCellWithSp/> <w:DontBreakConstrainedForcedTables/> <w:DontVertAlignInTxbx/> <w:Word11KerningPairs/> <w:CachedColBalance/> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="--"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" Priority="39" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" Name="toc 9"/> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/> <w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/> <w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/> <w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style> <![endif]--> <div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;">Its only geek that installs plugins like Adblock Plus, non geek don't know they even exist.</div></li>
</ul><ul style="text-align: left;"><li>Social media is equivalent to Freedom of Speech and it looks absurd if am asked to pay for that.</li>
</ul><br />
New business idea always spring out from existing business by solving a real problem the latter is ignoring. That’s how facebook, gmail, twitter, dropbox, github, pandora, netflix, e.t.c all came to existence<br />
<br />
Admit it or not the social media business is in a cold war and one disastrous mistake any of them should not make is broadcasting the weakness of their opponent. Your enemy shouldn’t be aware that you’re planning an aggressive attack on them, taking them by surprise is what guarantees victory; it’s a natural law and violating it guarantees automatic failure. Can’t believe App.net did just that.<br />
<br />
Advert business model is now becoming a problem because tech giants are now abusing its usage due to pressure from VC’s to generate more money. And I can’t blame VC’s because they are capitalist, their only concern is to make money period.<br />
<br />
But building a paid social app is obviously not the solution if you truly want your innovation to span through the planet. Infact facebook or twitter won’t be half the size they are now if they were paid app.</div>dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-37628988540301919232012-08-22T06:12:00.000-07:002012-08-22T06:13:16.921-07:00Amazon Launches India Kindle Store for Rs. 6,999<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYsnCHf_nITnbhsTwU8AawsoxgZUtEWvrhtVrrXw_zq7dJI5X-cIrA0wz404SWhWJCVl6iwjd4p4rB6-Lb9oYrPmUmof6oLF_abB-Tvik4hR9cD5gbljyWfodu1y6U_zJoHKmmbwtVjEg/s1600/amazon_kindle_croma.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYsnCHf_nITnbhsTwU8AawsoxgZUtEWvrhtVrrXw_zq7dJI5X-cIrA0wz404SWhWJCVl6iwjd4p4rB6-Lb9oYrPmUmof6oLF_abB-Tvik4hR9cD5gbljyWfodu1y6U_zJoHKmmbwtVjEg/s320/amazon_kindle_croma.jpg" width="320" /></a></div>
India seems to be the next destination for Amazon's Kindle Reader as Amazon partners with Indian Electronic Store Retailer Croma to sell the Kindle at the rate Rs. 6,999 across the country.<br />
<br />
The Kindle model is the entry-level, non touch-screen Kindle, which sells for $79 in the U.S. in a "Special Offers" ad-supported version. The Kindle sold in India will not be ad-supported. <br />
<br />
According to Amazon, the Indian Kindle e-book store features titles from a range of Indian authors, including Chetan Bhagat, Ashwin Sanghi, Ravinder Singh and Amish Tripathi. There are some exclusive titles in the store as well such as "Love, Life and a Beer Can" by Prashant Sharma, and "Reality Bites; a not so innocent Love Story" by Anurag Anand.<br />
<br />
“We are proud to launch this new Kindle store for Indian customers – offering Kindle book purchases in rupees and the ability to buy and read the work of many great Indian authors,” said Russ Grandinetti, vice president of Kindle Content, Amazon.com.<br />
<br />
Originally announced in 2007, Amazon has released a total of four generations of the e-reader until now. The latest generation Kindle Touch model features a 6-inch E-ink touch display, 4GB on-board storage and Wi-Fi/3G connectivity. <br />
<br />
It's also worth noting that U.S. writers who use Kindle Direct Publishing (KDP) should now be able to offer their books up in the India Kindle Store and market their titles directly to Indian customers. While the U.S. remains the largest e-book market, the international e-book market is growing at a faster rate and self-publishers are easily able to offer their wares up for sale in those new markets. </div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-86937812439669130812012-08-17T08:00:00.000-07:002012-08-17T08:58:14.580-07:00Twitter API New Rules Destroys Third Party Apps<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirBKlD0hPUAfhu6GISjmw3TNKB67J7FOJv3nEw1oDaBgcmlWg4G6OFiul007qJNJZ_1a2KhTjvlptSkikEp2KS1uDLlA7XlF6p1g9BR_IRbs8Zk1VzrOSkkp0aXaY2M1Ybwd_IaHemcKo/s1600/twitter-api-not-welcomed.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="258" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirBKlD0hPUAfhu6GISjmw3TNKB67J7FOJv3nEw1oDaBgcmlWg4G6OFiul007qJNJZ_1a2KhTjvlptSkikEp2KS1uDLlA7XlF6p1g9BR_IRbs8Zk1VzrOSkkp0aXaY2M1Ybwd_IaHemcKo/s320/twitter-api-not-welcomed.jpg" width="320" /></a></div>
Twitter is tightening the rules for building applications that use its messaging platform, sparking outrage from twits and developers.<br />
<br />
Director of consumer product Michael Sippey <a href="https://dev.twitter.com/blog/changes-coming-to-twitter-api" target="_blank">blogged about changes to version 1.1 of the Twitter</a> software interface that gives the social networking site greater control over how and where tweets are published and re-published, and also a stronger grip on the look-and-feel of third-party Twitter apps.<br />
<br />
The changes seem designed to make it easier for the blue birdy biz to manage its publishing system and cut costs by establishing greater consistency.<br />
<br />
The new rules alter the number of API calls third-party apps can make from different “end points” – meaning a twit's devices or PCs running that application.<br />
<br />
Under API 1.1, apps accessing just one individual “API endpoint” will have their number of authenticated requests limited to 60 calls per hour, down from the current 350 – regardless of the type of information that the application was requesting. Sippey snippily describes this as "well above the needs of most applications built against the Twitter API".<br />
<br />
The Tweet-o-sphere has seized on this as a capping of limits, however apps which require multiple “high-volume endpoints" will have their call number bumped up to 720 per device per hour for calls related to tweet display, profile display, user look-up and user search – a move probably aimed at bigger businesses.<br />
<br />
This will probably help consolidate Twitter further, because it increases the amount of calls to core pieces of data and display info.<br />
<br />
Twitter’s getting tough on its Developer Guidelines, which now become Display Requirements. Highlights of the new requirements and – again on call volume – are that devs will need approval from Twitter if their apps make more than 100,000 individual authentication tokens for Twitter client apps. The authentication tokens are used to access the home timeline, account settings, direct message API end points or User Streams to pull data.<br />
<br />
Twitter’s also capping growth for current applications at 100,000 tokens. Those that reach 200 per cent of their user token count won’t be allowed to grow further.<br />
<br />
Every application request will need to be authenticated using OAuth. API 1.0 doesn't require secure authentication so it’s hard to see who's pulling data from Twitter.<br />
<br />
Sippey wrote: “To prevent malicious use of the Twitter API and gain an understanding of what types of applications are accessing the API in order to evolve it to meet the needs of developers, it's important to have visibility into the activity on the Twitter API and the applications using the platform.”<br />
<br />
The Twitter-client look and feel is also getting boxed in. Among the new rules is one that requires apps displaying tweets to link to the appropriate Twitter profile. Apps must also display all the usual Twitter actions – retweeet, reply and favorite.<br />
<br />
Apps that don’t follow these display rules could have their application key snatched back by the Twitter police.<br />
<br />
The changes have upset plenty, not only because of the thickly worded nature of Sippey’s blog post that many have struggled to interpret.<br />
<br />
Among those annoyed are<a href="https://twitter.com/levie" target="_blank"> Aaron Levie</a>, chief executive of Box, a cloud collaboration company. “Twitter’s API has more rules than North Korea,” he tweeted. Marco Arment, creator of Instapaper – an app that lets you keep book mark and read articles on computer, iPhone/iPad and Kindle, issued a retaliatory de-construction of the changes <a href="http://www.marco.org/2012/08/16/twitter-api-changes" target="_blank">here</a>. He also <a href="http://twitter.com/marcoarment/status/236246358183530496" target="_blank">tweeted</a> about what it means for his apps: “I suspect that I’ll have to remove Twitter from most of Instapaper’s 'Liked By Friends' functionality.”<br />
<br />
No matter what the feeling, Twitter’s fellow travellers will have six months to move their app from the old to the new API once it’s introduced. </div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-13252535596866799872012-08-17T07:30:00.000-07:002012-08-17T07:49:55.519-07:00Eight Hidden Controls of the iPhone Headphones<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhARh0FtfaY0ZxFAiGqApe-IhuPRN5jdXo_AAUANJ-eQXmWu5GIDARf0U3G9FlKmElRzjVqsgBV-GcK5u2w9coUehDblDygVbejWitD4GT69Af743r93dVWs__3pvVppJeyEZE2y0Se6yM/s1600/Apple-Headphones.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhARh0FtfaY0ZxFAiGqApe-IhuPRN5jdXo_AAUANJ-eQXmWu5GIDARf0U3G9FlKmElRzjVqsgBV-GcK5u2w9coUehDblDygVbejWitD4GT69Af743r93dVWs__3pvVppJeyEZE2y0Se6yM/s1600/Apple-Headphones.jpeg" /></a></div>
Am sure most people use the headphone that came with their iPhone but only utilize the buttons when making call (i.e. to receive and end call) or increase/decrease the volume when listening to music not knowing that there is more to it than just that.<br />
<br />
I'll be sharing some examples you can use with the 3 buttons to fully maximize the power the comes with the headphone without taking your iDevice out of your pocket and thanks to tekserve for this tips.<br />
<br />
<b><span style="font-size: large;">1) Answer and End Phone Calls</span></b><br />
<br />
When receiving an incoming phone call, press the Center Button once to accept the call. Press the Center Button again to end the call.<br />
<br />
<span style="font-size: large;"><b>2) Fast-forward/Rewind</b></span><br />
<br />
To fast-forward through the current track, press the Center Button twice and hold the second press. To rewind, press the Center Button three times and hold on the third press. Release the Center Button to resume playing.<br />
<br />
<span style="font-size: large;"><b>3) Skip to the Next Song or Chapter</b></span><br />
<br />
You can skip to the next song or chapter by pressing the Center Button twice quickly. This makes it easy to navigate through playlists and albums.<br />
<br />
<span style="font-size: large;"><b>4) Play/Pause a Song or Video</b></span><br />
<br />
The default function of the Center Button is to play or pause your music and videos. Simply press the Center Button once to Play/Pause your current audio.<br />
<br />
<span style="font-size: large;"><b>5) Snap a Picture</b></span><br />
<br />
Take a picture from within the Camera app by pressing the Volume Up (+) button. Unfortunately, this feature only works with Apple’s Camera app, not third-party apps like Camera+, Facebook Camera, or Instagram.<br />
<br />
<span style="font-size: large;"><b>6) Activate Siri</b></span><br />
<br />
iPhone 4S users can interact with their intelligent personal assistant without ever having to touch their phone. Press and hold the Center Button to engage Siri.<br />
<br />
<b><span style="font-size: large;">7) Decline Phone Calls</span></b><br />
<br />
You can ignore an incoming phone call by holding down the Center Button for roughly two seconds. After you release the button, two beeps will let you know the call has been successfully declined.<br />
<br />
<span style="font-size: large;"><b>8) Phone Calls</b></span><br />
<br />
Press the Center Button once to switch between current and incoming/on-hold calls. You can also end your current call while switching to another call by holding down the Center Button for two seconds. Two beeps after the release of the button will let you know the first call has ended.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-19870476298269235342012-08-16T10:01:00.000-07:002012-08-16T10:02:09.233-07:00Judge Urges Apple and Samsung to settle or trial will end in tears<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuWThoCZGjMNsV_aU0N4GV3S1IEaurlhXCz0Ia94uJCjLeuapR_gA5srYKvkVNOPGsprRPabkMyjRI25T1FXo-obxaaoz_9glPT___uNQqGsL-EvpYb23tBY50aG5g7kpMutlJc5vsACc/s1600/Samsung-Galaxy-S-Vibrant-vs-iPhone-4.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="275" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuWThoCZGjMNsV_aU0N4GV3S1IEaurlhXCz0Ia94uJCjLeuapR_gA5srYKvkVNOPGsprRPabkMyjRI25T1FXo-obxaaoz_9glPT___uNQqGsL-EvpYb23tBY50aG5g7kpMutlJc5vsACc/s320/Samsung-Galaxy-S-Vibrant-vs-iPhone-4.jpg" width="320" /></a></div>
Judge Lucy Koh has urged Apple and Samsung to kiss and make up, and end their bitter legal battles.<br />
<br />
Judge Koh, who is overseeing the two tech titans' iPhone patent trial in the US, asked the chief execs of Apple and Samsung to talk at least once more on the phone before the jury goes away next week to consider its verdict. Sammy is accused of copying its fruity rival's smartphone design for its own products and denies any wrongdoing.<br />
<br />
"It's time for peace," the judge pleaded on Wednesday, according to Reuters.<br />
<br />
Before the jury returned to the court for the day's hearing, she told attorneys that both sides had succeeded in raising awareness of the importance of their patent rights - but said both companies could be in trouble if they leave the decision up to the panel of ordinary folk, who certainly aren't intellectual property experts.<br />
<br />
"I see risks here for both sides," she added.<br />
<br />
Once the jury filed in, Samsung continued presenting its witnesses, who claimed that the South Korean firm spent ages working on its own designs for its gear; its designers did not copy Apple; and that Apple's design patents are invalid because the features they cover are obvious and not original.<br />
<br />
The South Koreans had yet another designer on the stand to reveal how Samsung Galaxy products were made: Jin Soo Kim talked the court through the rationale behind decisions on features of the Galaxy Tab 10.1, highlighting how cost calculations and anticipated consumer appeal drove Sammy to specify, say, the size of screen.<br />
<br />
Samsung also produced a wireless expert, Tim Williams, to talk about how the iPhone and iPad infringe on two of Sammy's patents.<br />
<br />
Apple once again had internal documents, this time emails between Google and Samsung in which a Google employee described the Galaxy products and Apple's iDevices as too similar.<br />
<br />
Cupertino lawyers also quizzed Williams on the fact that the patents he said Apple infringed actually cover Intel chips, a company that Samsung has a cross-licensing deal with.<br />
<br />
Judge Koh has tried from the start to make Apple and Samsung settle into a cross-licensing agreement that would keep both sides happy, or at least reasonably satisfied. But talks between the companies haven't brought them any closer together and it's unlikely that the courtroom sniping is endearing either side to the other.<br />
<br />
Leaving a case like this in the hands of a jury is risky: the complexities of intellectual property law are not easy for even judges to understand, let alone juries, and the cases run the risk of becoming a popularity contest between the firms or relying on the gut feeling of the panel.<br />
<br />
Both Samsung and Apple have played the popularity card in this case, each aiming to convince the jury that the other side is evil with motions and arguments that have had Judge Koh tearing her hair out.<br />
<br />
The jury has also come in with its own unavoidable preconceptions based on the press coverage of Apple and Samsung patent cases worldwide and whether they themselves are fanbois or fandroids. While they will make every effort to judge the case on what they hear in the court alone, as instructed, those preconceptions can be hard to shake.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-85544981601710422842012-08-16T09:29:00.000-07:002012-08-16T09:29:47.025-07:00Google Offers Millions for Chrome Bug Hunters<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoI3xchR3fP760vkDv1YCu_n1GeFuaeOd3P1BanciNJvWnaSAvs0695MaLZHcuJTI9-1OmEQxtokxq2_1feApXxTfLLq89e3vM31VbmqQzbhiNzZyzzKET2dkx9PJWhopdJaAVIoXxNYk/s1600/google+chrome.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoI3xchR3fP760vkDv1YCu_n1GeFuaeOd3P1BanciNJvWnaSAvs0695MaLZHcuJTI9-1OmEQxtokxq2_1feApXxTfLLq89e3vM31VbmqQzbhiNzZyzzKET2dkx9PJWhopdJaAVIoXxNYk/s200/google+chrome.jpg" width="200" /></a></div>
If Google hadn’t made the message clear enough already: It really, really wants you to hack its software.<br />
<br />
On Wednesday the company announced that it’s holding another competition for hackers to target its Chrome browser, following the Pwnium competition it held in Vancouver last March, where it offered a total of $1 million in hacking prizes. This time the company’s putting a total of $2 million in rewards on the table for anyone who can find bugs in its browser, exploit them, and tell Google’s security team the details of their techniques.<br />
<br />
<blockquote class="tr_bq">
“The first Pwnium competition held earlier this year exceeded our expectations,” Google security engineer Chris Evans wrote in a blog post. “Most importantly, we were able to make Chromium [the open-source code base on which Chrome is built] significantly stronger based on what we learned.”</blockquote>
<br />
The contest will be held in October at the Hack in the Box security conference in Kuala Lumpur, Malaysia. “We hope this gives enough time for the security community to craft more beautiful works, which we’d be more than happy to reward and celebrate,” Evans wrote.<br />
<br />
Google is offering up to $60,000 for a single working Chrome exploit. While several other companies including Mozilla, PayPal and Facebook offer bug bounties, none publicly offers such a high sum.<br />
<br />
In another blog post Tuesday, Google wrote that it had already paid out $1 million in total bounties, and would be adding small bonuses for certain categories of exploits.<br />
<br />
Bumping its total payout for the competition, which it’s calling Pwnium 2, may be more of a marketing stunt than a significant change. In the last Pwnium contest (whose name comes from the word “pwn,” hacker jargon for compromising or taking over a target) Google only found two hackers willing and capable of winning its $60,000 prize and gave out only a small fraction of its $1 million bounty.<br />
<br />
Even with $60,000 rewards, it’s not clear that hackers able to take Chrome apart will come forward to claim the prizes. Google’s bounties likely can’t match the sums offered by government intelligence and law enforcement agencies who buy similarly rare exploits with the intention of using them for spying on and tracking targets rather than helping software vendors fix their security flaws.</div>
dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0tag:blogger.com,1999:blog-4825651172481822442.post-91782177862117247452012-08-11T05:39:00.000-07:002012-08-11T05:41:22.492-07:00Download The Best BitTorrent Site For Free<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="text-align: left;" trbidi="on">Bittorrent networking is the most popular form of modern P2P (peer-to-peer) file sharing. Since 2006, bittorrent sharing has been the primary means for users to trade software, music, movies, and digital books online. Torrents are very unpopular with the MPAA, the RIAA, and other copyright authorities, but are much beloved by millions of college and university students around the planet.<br />
<br />
Bittorrents (also known as "torrents") work by downloading small bits of files from many different web sources at the same time. Torrent downloading is extremely easy to use, and outside of a few torrent search providers, torrents themselves are free of user fees.<br />
<br />
<a href="https://www.thepiratebay.se/" target="_blank"><span style="font-size: large;"><b>The Pirate Bay</b></span></a><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSmD_rdu_aBFdsKFMJX00JoY2KKa-RBr4ni0UKiDjrKbn6byzRwJPS385BKJg1zP5qti84Nuh4E7BjyrY7SNDkob3CmaatEnCl3WwJjEZ-EvePn23IYOfa4k1cZbx26KMDNf0JMM_yX2U/s1600/The_Pirate_Bay.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSmD_rdu_aBFdsKFMJX00JoY2KKa-RBr4ni0UKiDjrKbn6byzRwJPS385BKJg1zP5qti84Nuh4E7BjyrY7SNDkob3CmaatEnCl3WwJjEZ-EvePn23IYOfa4k1cZbx26KMDNf0JMM_yX2U/s200/The_Pirate_Bay.png" width="176" /></a></div>The Pirate Bay (commonly abbreviated TPB) is a Swedish file-sharing website founded in 2003 that hosts magnet links and that bills itself as "The world's most resilient BitTorrent site" (as of 2012, "The galaxy's most resilient ..."). The Pirate Bay is currently ranked as the 71st most visited website in the world and 12th in Sweden, according to Alexa Internet. The Pirate Bay has over five million registered users and as of May 2012 hosts over four million torrents. According to the Los Angeles Times, the Pirate Bay is "one of the world's largest facilitators of illegal downloading" and "the most visible member of a burgeoning international anti-copyright or pro-piracy movement".<br />
<br />
<a href="http://www.isohunt.com/" target="_blank"><span style="font-size: large;"><b>Isohunt</b></span></a><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA1_L0sWCzGWT5kMJp0EBGWeX7QAQzMF4JBFt1V72biLiksQKzVQPMk22nsu-EZukc-QBWIKMKSINqIRSA1glhxslnLTWKEzHLhjpFY2Dwh_n1IIX7mfPqLTBdMVWcUCkgLJm2D-kxXlw/s1600/isoHunt.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="52" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA1_L0sWCzGWT5kMJp0EBGWeX7QAQzMF4JBFt1V72biLiksQKzVQPMk22nsu-EZukc-QBWIKMKSINqIRSA1glhxslnLTWKEzHLhjpFY2Dwh_n1IIX7mfPqLTBdMVWcUCkgLJm2D-kxXlw/s320/isoHunt.png" width="199" /></a></div>isoHunt is a BitTorrent index with over 1.7 million torrents in its database and 20 million peers from indexed torrents. With 7.4 million unique visitors as of May 2006, isoHunt is one of the most popular BitTorrent search engines. Thousands of torrents are added to and deleted from it every day. Users of isoHunt perform over 40 million unique searches per month. On October 19, 2008, isoHunt passed the 1 petabyte mark for torrents indexed globally. The site is the third most popular BitTorrent site as of 2008. According to isoHunt, the total amount of shared content was more than 14.11 petabytes as of June 13, 2012.<br />
<br />
<a href="http://torrentz.eu/" target="_blank"><span style="font-size: large;"><b>Torrentz</b></span></a><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikEIRKLDCdvXN4as96FDkmJE9NX5uJJwP7MxO4SfT9m2vkK4krU4xIAGXxhC7-sAzGxBqAeTU5eyd69-IjEhk-S8ReCoHkA_mPHmwRVVKdwFJqctE4V3rDDdrW4Je4PiYE5uCYC9ZWagc/s1600/Torrentz_logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="110" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikEIRKLDCdvXN4as96FDkmJE9NX5uJJwP7MxO4SfT9m2vkK4krU4xIAGXxhC7-sAzGxBqAeTU5eyd69-IjEhk-S8ReCoHkA_mPHmwRVVKdwFJqctE4V3rDDdrW4Je4PiYE5uCYC9ZWagc/s320/Torrentz_logo.png" width="320" /></a></div>Torrentz is a Finland-based meta-search engine for BitTorrent that is run by an individual known as Flippy. It indexes torrents from various major torrent sites such as yourBittorrent and offers compilations of various trackers per torrent that are not necessarily present in the default .torrent file, so that when a tracker is down, other trackers can do the work. It was the second most popular torrent website after The Pirate Bay in 2010, and it currently has a traffic rank of 145 on Alexa.<br />
<br />
Torrentz was blocked starting 3 May 2012, in India under orders of the Indian Department of Telecom without any stated reasons or prior warnings. The block was enforced by a number of ISPs, including Reliance Communications, Tikona Digital Networks, Airtel, Aircel, MTNL, BSNL and Vodafone. Other ISPs however, did not enforce the block, such as You Broadband and Hathway. The ban was lifted after a few days. As of 17 May 2012 the Site has been blocked with the error message "Access to this site has been blocked as per Court Orders" It is operational as on 28-05-2012<br />
<br />
<a href="http://yourbittorrent.com/" target="_blank"><span style="font-size: large;"><b>YourBittorrent</b></span></a><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAM95esfD-5_dCFWZhVurujI6umzXNeNLuZQ6TxuV8vgvwqMMNZJdovWweNgxVzPLDpv5_b0hVqx6rEWvosyj1IVayltIRk5Srk5HrL8CaD_4NBXrHgW_Z9MBvU_6vRRSPpwQnMX4Q4R0/s1600/yourbittorrent.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="78" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAM95esfD-5_dCFWZhVurujI6umzXNeNLuZQ6TxuV8vgvwqMMNZJdovWweNgxVzPLDpv5_b0hVqx6rEWvosyj1IVayltIRk5Srk5HrL8CaD_4NBXrHgW_Z9MBvU_6vRRSPpwQnMX4Q4R0/s320/yourbittorrent.png" width="320" /></a></div>Founded as myBittorrent in 2003, the new site yourBittorrent is the result of a split in ownership in 2009. The site is a torrent tracking website for the P2P BitTorrent network. As such it does not host files, but hosts information about the location of these files in an indexed torrent file. These torrent files are read by a client located on an individual's computer.<br />
<br />
yourBittorrent uses automated software to search the Internet for host file information and does not actively oversee what is indexed in its database. With a lack of oversight, the site hosts some torrents which allow users to access software, movies, music and other items under which are under copyright and thus illegal to publicly distribute, though the files themselves remain on other servers. Illegal trackers are removed by the site when a request is made by a legitimate party.<br />
<br />
<a href="http://www.demonoid.me/" target="_blank"><span style="font-size: large;"><b>Demonoid</b></span></a></div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqm3u_TXif2Tl0-gwwm5oReacIo-L-BtQsdUKByNq5H65UOfuWJUuuQPCTvZHThLDP_wuUcJG9m6GUK_q6y6Fzm82ZRnTMSNQUOcX2uAk4ITQSCM8cB8aaHX8T_cFYBYbbDQehhfEb9Mk/s1600/Demonoid.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqm3u_TXif2Tl0-gwwm5oReacIo-L-BtQsdUKByNq5H65UOfuWJUuuQPCTvZHThLDP_wuUcJG9m6GUK_q6y6Fzm82ZRnTMSNQUOcX2uAk4ITQSCM8cB8aaHX8T_cFYBYbbDQehhfEb9Mk/s320/Demonoid.png" width="160" /></a></div>Demonoid is a website and BitTorrent tracker. Demonoid.com was ranked the 538th most popular website overall in December 2010, according to Alexa. Demonoid's torrent tracker had an estimated three million peers in September 2007. The site had over 377,990 torrents indexed as of May 26, 2012. On August 6, 2012, Ukrainian authorities shut down Demonoid manually from Ukraine's largest data center ColoCall.</div>dfgdfghttp://www.blogger.com/profile/08507370230056793339noreply@blogger.com0