Tampilkan postingan dengan label Latest. Tampilkan semua postingan
Tampilkan postingan dengan label Latest. Tampilkan semua postingan

Forget Chromebooks: Chrome OS is Coming to Windows

Posted by Unknown Senin, 28 Oktober 2013 0 komentar



Google didn’t announce any shiny new Chromebooks at Google I/O. Instead, they highlighted their two big “platforms” — Chrome and Android. Whether you’re using Windows, Linux, or Mac, Google will be bringing the Chrome OS experience to you.

Chrome has always been Google’s vision of the browser-as-operating-system. They’re about to take it to the next level, using Chrome to provide apps that run outside the browser on desktops and laptops. Google wants to slowly turn your Windows laptop into a Chromebook.
Introducing Packaged Apps

If you have looked in the Chrome Web Store, you’ll know that most current Chrome “apps” are links to websites. For example, the Netflix app is just a link to Netflix, and the Evernote app is a link to Evernote’s website. Install an app, and you’ll get a large icon for it on your new tab page, but that’s about it.

However, Google is about to change the definition of an “app.” This change hasn’t rolled out to everyone yet, but it’s currently on Chrome’s developer channel. Everything currently in the Chrome Web Store will move to the new “Websites” category. The main “Apps” section will only contain new packaged apps.

A packaged app is a web app put into an offline package containing HTML, JS, and other web technologies — but no Flash content. Packaged apps will run entirely offline by default and will sync with the cloud. Packaged apps will even run in their own windows, outside of the browser.


Chrome as a Platform on Your OS

When you install a packaged app, Chrome will offer to display a Chrome OS-like “Chrome App Launcher” on your Windows taskbar. (This works similarly on Mac and Linux, but is currently in development.) This launcher will display your installed packaged apps and allow you to quickly launch them. When you launch one, it will appear in its own window on your desktop, complete with its own taskbar entry.



This acts as a sort of Chrome-only Start menu — Microsoft has removed their Start menu from your Windows taskbar and Chrome wants to take its place. The Chrome Web Store can evolve to function as a sort of app store for cross-platform, offline-enabled web apps that run on every PC operating system.

To clarify the difference between packaged apps and “old” website apps, a shortcut icon will be placed over all the old apps that are just shortcuts to websites.


Example Packaged Apps

You can actually install these packaged apps on the current stable version of Chrome today, assuming you have direct links to the apps — they won’t appear in searches yet. Current packaged apps include an offline text editor with syntax highlighting, a Cut the Rope Game, theAny.DO to-do app, Google Keep note-taking app, and more. These apps all function entirely offline and can sync when you go online. They run in their own and can support touch input, so they could work on a touch-enabled Chromebook or just in Chrome on a touch-enabled Windows laptop.

Use enough packaged apps and your Windows desktop will start to look an awful lot like a Chrome OS system. Packaged apps can use all of Chrome’s advanced browser features, from NaCL for running native code to WebGL for 3D graphics.


Chromebooks in 10 Years

Google is happy to keep selling Chromebooks for schools, businesses, and as second, third, or even fourth devices for people that want a simple web-browsing gadget to play with. But they’re not trying to position the Chromebook against Windows and Mac laptops for everyone — not yet. There’s a reason the Chromebook Pixel’s tagline is “For What’s Next.”

Google wants you to start using packaged apps in preference to desktop and Modern apps. Developers will have an incentive to create these packaged apps because they’ll work on every operating system and they can be created with web technologies — and unlike Microsoft’s Modern apps, they can integrate with the traditional Windows desktop workflow and taskbar.

This gives Chrome users a path for gradually switching to packaged apps that will work on Chrome OS. Google won’t need to care if you’re using a Chromebook — if you’re using a Windows computer and use mostly Chrome packaged apps, they’ll be happy.

As people switch to more and more packaged apps on Windows and Mac, a Chromebook will eventually start to make more sense — why not get a Chromebook once you start using Chrome packaged apps exclusively on your Windows or Mac laptop, anyway? A Chromebook is much more simple, so it’s a no-brainer if you only use packaged apps.



You’ll find packaged apps appearing as the only “Apps” in the Chrome Web Store as soon as this feature reaches Chrome’s stable channel. The websites section will remain, providing a way of discovering web apps.

Baca Selengkapnya ....

10+ Useful System Tools Hidden in Windows

Posted by Unknown Senin, 14 Oktober 2013 0 komentar


Whether you’re using Windows 7, Windows 8, or an older version of Windows, Windows contains a variety of system utilities that are well-hidden. Some are buried deep in the Start menu, while others can only be accessed via a command.

Most of these tools can be easily launched if you know their names — just open your Start menu or Start screen, search for the name of the program, and press Enter. On Windows 8, you may have to select the Settings category on the search screen first.

Windows Memory Diagnostic


Windows includes a Memory Diagnostic tool that can restart your computer and test your memory for defects, like the popular MemTest86 application. If you want to check your computer’s memory for errors, you don’t need a third-party tool — just open the Windows Memory Diagnostic tool.

Resource Monitor


The Resource Monitor application offers a detailed look at your computer’s resource usage. You can view computer-wide CPU, disk, network, and memory graphics, or drill down and view per-process statistics for each type of resource.

This means that you can see which processes are using your disk or network heavily, view which processes are communicating with which Internet addresses, and more. The Resource Monitor provides much more detailed resource statistics than the Task Manager does.

You can launch the Resource Monitor by opening the Task Manager, clicking the Performance tab, and selecting Resource Monitor. It can also be accessed by searching for Resource Monitor at the Start menu or Start screen.

Performance Monitor


The Performance Monitor application allows you to collect performance reports and view them. It can be used to log performance data over time, including determining how system changes affect performance, or to monitor the performance of a remote computer in real-time.

Computer Management and Administrative Tools


The Performance Monitor is actually one of many Microsoft Management Console (MMC) tools. Many of these can be found in the Administrative Tools folder, but they can be opened in a single window by opening the Computer Management application. Among other things, this window contains the following tools:

Task Scheduler: A tool that allows you to view and customize the scheduled tasks on your computer, in addition to creating your own custom scheduled tasks.

Event Viewer: A log viewer that allows you to view and filter system events — everything from software installation to application crashes and blue screens of death.

Shared Folders: An interface that displays the folders shared over the network on your computer, useful for viewing what folders are being shared at a glance.

Device Manager: The classic Windows Device Manager that allows you to view the devices connected to your computer, disable them, and configure their drivers.

Disk Management: A built-in partition manager you can use without downloading any third-party tools.
Services: An interface that allows you to view and control the background services running in Windows.



The Administrative Tools folder also contains other useful utilities, such as the Windows Firewall with Advanced Security application that allows you to create advanced firewall rules.

Advanced User Accounts Tool


Windows contains a hidden User Accounts utility that provides some options not present in the standard interface. To open it, press WinKey+R to open the Run dialog, type either netplwiz or control userpasswords2, and press Enter.

This window also contains a shortcut to launch the Local Users and Groups tool, which offers more user management tasks, but can’t be used on Home or standard versions of Windows.

Disk Cleanup


Windows’ Disk Cleanup utility isn’t quite as hidden as some of the other utilities here, but not enough people know about it. It will scan your computer for files that can be deleted, from temporary files and memory dumps to old system restore points and leftover files from Windows upgrades. It does the same job a PC cleaning utility does, but it’s free and doesn’t try to extract any money from you. Advanced users may prefer CCleaner, but Disk Cleanup does a decent job.

Access it by searching for Disk Cleanup at your Start screen or Start menu.

Group Policy Editor


The Group Policy Editor is only available on Professional or Ultimate editions of Windows, not the standard or Home editions. It provides a wide variety of settings that are designed for use by system administrators to customize and lock down PCs on their networks, but the local group policy editor also contains some settings that average users might be interested in. For example, on Windows 8, the group policy editor can be used to disable the lock screen and skip directly to the log-in screen.

To open it, type gpedit.msc at the Start menu or Start screen and press Enter.

Registry Editor


Sure, everyone knows about the registry editor — but it’s still hidden, with Microsoft not even providing a Start menu shortcut to it. It must be launched by typing regedit into the Start menu or Start screen and pressing Enter.

Many tweaks that can be made in the Group Policy Editor have equivalent tweaks that can be made in the registry editor. For example, on Windows 8, users with the standard edition of Windows 8 can’t disable the lock screen via the Group Policy Editor — but they can disable the lock screen with a registry hack.

MSConfig


The System Configuration window is another classic tool that many people know about. Prior to Windows 8, which features a startup-program manager built into its Task Manager, this tool was the only included way of controlling startup programs on Windows. It also allows you to customize your boot loader, which is particularly useful if you have multiple versions of Windows installed.

Launch it by typing msconfig into the Start menu or Start screen and pressing Enter.

System Information


The System Information utility allows you to view information about the current computer — everything from the model number of its CD-ROM drive to its attached peripherals, configured environment variables, and startup programs. It doesn’t provide the slickest interface, nor does it provide all the information a third-party system information tool like Speccy does, but it will display a lot of system information without forcing you to install another program.

Open it by searching for System Information at your Start menu or Start screen.


Once you know these utilities exist, you can do more with the tools built into Windows. These tools are available on any Windows computer, so you can always use them without downloading and installing software.













Baca Selengkapnya ....

7 Skype Tips for Power Users

Posted by Unknown 0 komentar


skype-login
Now that Skype has been merged with Windows Live Messenger, it’s more popular than ever. There’s no way to use Skype with a third-party client, but Skype does offer hidden features that can make it more powerful.
These are a few useful Skype tricks you won’t find unless you go off the beaten path, offering ways to sign into multiple Skype accounts, use IRC-style chat commands, record Skype calls, and even disable some of Skype’s built-in advertising.

Sign Into Multiple Skype Accounts

Unlike some messaging programs, Skype doesn’t allow you to easily log into multiple accounts. Try to launch the Skype shortcut once you’ve already opened Skype and it will just bring your already-open Skype window to the front. But you may have multiple Skype accounts — perhaps you have one for work and one for personal use.
Rather than open Skype as another Windows user account, Skype has a hidden option you can use to open a new Skype instance.
To do this, press Windows Key + R to open the Run dialog. In the Run dialog, enter the following command if you’reusing a 32-bit version of Windows:
“C:\Program Files\Skype\Phone\Skype.exe” /secondary
On 64-bit versions of Windows, enter the following command instead:
“C:\Program Files (x86)\Skype\Phone\Skype.exe” /secondary
Skype will open a second Skype window, which you can log into as another Skype account. If you wanted to use this frequently, you could create a new Windows shortcut that opened Skype with the /secondary switch.
sign-into-multiple-skype-accounts[4]

Disable Contact List Advertisements

Skype will always show advertisements in its home pane, but it also shows advertisements at the bottom of your contact list by default. You can click the X button to close these advertisements whenever they appear, but they’ll just keep coming back. But there’s a better way — you can disable them permanently if you know where to look.
To disable the contact-list advertisements, or “promotions,” open Skype’s Options window, navigate to Notifications -> Alerts & messages, and uncheck the Promotions checkbox.
disable-skype-contact-list-promotions

Edit or Delete Sent Messages

This feature also isn’t immediately obvious if you’re used to other chat programs. If you make a mistake when typing a message or send a message you didn’t mean to, you can edit or delete a sent message later.
To do so, just right-click a message you’ve already sent and select Edit Message or Remove Message. When you edit a message, Skype will note that the message was edited — and if you delete a message, Skype will display “This message has been removed.”
Of course, if your recipient already saw the original message you sent, there’s no way to edit it out of their mind.
skype-edit-or-delete-message

Record Skype Calls

Skype doesn’t include a built-in call recording feature, but you may find yourself wanting to record a call at some point. Perhaps you’re interviewing someone remotely and you want to create a record of the interview that you can refer to later, perhaps you’re recording a podcast, or perhaps you’re having a business discussion and want a record of any agreements you make. There are plenty of good reasons you may want to record a call — aside from the obvious creepy ones.
As Skype doesn’t include a built-in call-recording feature, you’ll need to use a third-party application that will do the recording for you. There are several options out there — in the past, MP3 Skype Recorder was recommended to us by a reader and we found that it worked well.

Use Screen Sharing

Skype’s screen-sharing feature allows you to share your desktop with a Skype contact. You can use this feature to quickly troubleshoot someone’s PC without making them install additional remote access software. Or, you can us this feature to give a presentation and or show anything else remotely. You could also choose to share a single window instead of your entire desktop, giving yourself some privacy.
While on a Skype call, just click the + button and select Share screens. You could also just click the + button and select Share screens to initiate screen-sharing while not already on a call.
skype-share-screens

Master Text-Based Chat Commands
Bear in mind that, unlike traditional remote-access software, there’s no way to give someone else control over your screen. You’d have to walk the other person through any changes you make to their computer if you were acting as remote tech support via Skype screen-sharing.
If you’re a geek, there’s a good chance you’ve used IRC before. IRC offers a wide variety of chat features that are available as text-based commands, and Skype offers many comparable features.
In a Skype chat room, you can use the /add command to add a Skype user to the chat, use the /topic command to set a topic for that chat room, use the /setpassword command to set a password for that chat room, use the /setrole command to assign permissions to users in the chat, use the /kick command to kick a user from the chat, or use the /kickbancommand to kick a user and ban them from rejoining.
These are just a few of the chat commands Skype offers — check the What are chat commands and roles? page on the Skype website for a comprehensive list. You could also just use the /help command from within Skype to access a list of chat commands, although you’ll only see the full list if you’re in a chat room with more than two people.
skype-chat-commands

Easily Send a File to Multiple People

While you’re in a Skype chat with multiple people, you can easily send a file to them all by dragging and dropping the file into the chat room or conference call. Skype will give a copy of the file to everyone, allowing you to quickly share files without the hassle of sending them as an email attachment, sharing them via Dropbox, or even using Skype’s Send File feature to send it to them one at a time.
You could also create a group in your contacts, and then right-click the group and select Send File to send a file to every contact in that group at once. It’s an easy way to distribute files to several people at once.
skype-send-file

Skype may have become popular because it offered dead-simple voice and video calls over the Internet that “Just Worked” without any firewall configuration, but it’s more than a basic program. It offers quite a few power-user features that geeks will appreciate.

Baca Selengkapnya ....

Ethical hacker scarcity putting a dent in new cyber-security efforts

Posted by Unknown 0 komentar

soviet_hackers-635.jpg


For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back.

Hostile computer activity from spies, saboteurs, competitors and criminals has spawned a growing industry of corporate defenders who can attract the best talent from government cyber units.

The U.S. military's Cyber Command is due to quadruple in size by 2015 with 4,000 new personnel while Britain announced a new Joint Cyber Reserve last month. From Brazil to Indonesia, similar forces have been set up.

But demand for specialists has far outpaced the number of those qualified to do the job, leading to a staffing crunch as talent is poached by competitors offering big salaries.

"As with anything, it really comes down to human capital and there simply isn't enough of it," says Chris Finan, White House director for cyber security from 2011-12, who is now a senior fellow at the Truman National Security Project and working for a start-up in Silicon Valley.

"They will choose where they work based on salary, lifestyle and the lack of an interfering bureaucracy and that makes it particularly hard to get them into government."

Cyber attacks can be expensive: one unidentified London-listed company incurred losses of 800 million pounds in a cyber attack several years ago, according to the British security services.

Global losses are in the range of $80 billion to $400 billion a year, according to research by the Washington-based Center for Strategic and International Studies that was sponsored by Intel Corp's McAfee anti-virus division.

There is a whole range of attacks. Some involve simply transferring money, but more often clients' credit card details are stolen. There is also intellectual property theft or theft of commercially sensitive information for business advantage.

Victims can also suffer a "hacktivist" attack, such as a directed denial of service to bring a website down, which can cost a lot of money to fix.

Quantifying the exact damage is almost impossible, especially when secrets and money are not the only targets.

While no government has taken responsibility for the Stuxnet computer virus that destroyed centrifuges at Iran's Natanz uranium enrichment facility, it was widely reported to have been a U.S.-Israeli project.

Britain says it blocked 400,000 advanced cyber threats to the government's secure intranet last year while a virus unleashed against Saudi Arabia's energy group Aramco, likely to be the world's most valuable company, destroyed data on thousands of computers and put an image of a burning American flag onto screens.

Going viral?
Most cyber expertise remains in the private sector where companies are seeing an steep increase in spending on security products and services.

Depending on the cyber threat, a variety of firms are bidding for cyber talent. Google is currently advertising 129 IT security jobs, while defence companies such as Lockheed Martin Corp and BAE Systems are looking to hire in this area.

Anti-virus maker Symantec Corp is also doing good business. "The threat environment is exploding," Chief Executive Steve Bennett told Reuters in an interview in July.

The perception of an increased threat, has also led to explosive demand for the best talent.

The U.S. Bureau of Labour Statistics says the number of Information Technology security roles in the U.S. will increase by some 22 percent in the decade to 2020, creating 65,700 new jobs. Experts say it is a similar situation globally, with salaries often rising 5-7 percent a year.

"Recruitment and retention in cyber is a challenge for everybody working in this area," says Mike Bradshaw, head of security and smart systems at Finmeccanica IT unit Selex. "It's an area where demand exceeds supply it's going to take a while for supply to catch up."

A growing number of security firms - such as UK-based Protection Group International (PGI) - now also offer cyber services. PGI started out providing armed guards to protect merchant ships against pirates but has now hired former staff from Britain's GCHQ eavesdropping agency.

Country or cash?
A graduate with a good computer studies degree can walk into a $100,000 salary with a similar amount upfront as a golden handshake, several times what the U.S. National Security Agency would be likely to offer.

Western universities turn out far too few graduates with the necessary computer skills while some students complain that many of the courses on offer are too theoretical for the challenges of cyber warfare.

But applicants need not have a computer science degree to get lucrative jobs as long as they can do the hardest-to-fill jobs such as finding bugs in software, identifying elusive infections and reverse engineering computer viruses that are found on computers, said Alan Paller, founder of the non-profit SANS Institute in Washington.

SANS has worked with officials in Illinois, Massachusetts, New Jersey and other states to sponsor hacking contests that test skills in those and other areas. Educational background does not necessarily help in these contests.

Those who have "very good" skills in the most-needed areas can earn $110,000 to $140,000, while the very top get paid as much as $200,000 in private sector jobs, according to Paller.

While the private sector offers big cash, the government is still able to retain some talent by appealing to people's sense of public service and patriotism.

"I want to serve my country. What I am doing is important," one hacker who conducts classified research for the U.S. military told Reuters at the Def Con hacking conference in July. He declined to provide his name because he was not authorized to speak to the press.

There is also an expectation that government workers can move to more lucrative jobs in the private sector after several years in public service.

But some senior officers in Western militaries still fear they may struggle to attract the requisite talent, citing both cultural and administrative problems.

General Keith Alexander, head of both the NSA and Cyber Command, told Reuters earlier this year finding the right talent was a priority. He has attended events such as the Def Con hacker conference, trading his uniform for a black T-shirt.

Hiring outsiders has long been thought to be a tactic employed by the United States as well as China and Russia.

Western security officials believe Russia, China and other emerging cyber powers such as Iran and North Korea have cut deals with their own criminal hacker community to borrow their expertise to assist with attacks.

Russia and China, which have been accused by the West of mounting repeated attacks on government and commercial interests, deny direct involvement in hacking.

"We are at the very beginning of this process and we are building it brick by brick," says Colonel Gregory Conti, head of the cyber Security Department at the U.S. Military Academy, West Point. "It's going to be like the creation of the air force - a process of several decades getting the right people and structures."

© Thomson Reuters 2013

Baca Selengkapnya ....

Binatone launches 'App Star' Android tablet for children, at Rs. 9,999

Posted by Unknown 0 komentar

Binatone-android-tablet-635.jpg


Electronics company Binatone has launched its first android-based tablet PC, App Star, designed for kids above 4 years, priced at Rs. 9,999.

"This 'APP STAR' is packed full of software suitable for children of 4 years and above. It has preloaded fun games, educational apps, art studios, e-books, audio-books, music player and camera with video recorder," Binatone Country Head S P Singh said in a statement.

The company has already launched this tablet for kids in UK and other European markets. It has a 7-inch capacitative touch screen and comes with a special cover that protects it from physical damage when dropped from table height.

The tablet has Wi-Fi connectivity option and a battery back of up of 4 hours.

The tablet can be operated in two modes - 'APP STAR' mode for kids and 'parent' mode which is the normal Android screen mode. The two can easily be switched through the parental control.

"The App Star has secured password protected parental control built-in to the software to ensure time control and firewalled Internet browsing for kids," Singh said.

The company also plans to create full ecosystem for kids' tablets with Fun Karaoke, Speaker dock, Racing Car, Helicopter and accessory pack during the X-mas time, the statement said.

Baca Selengkapnya ....

Apple working on 12-inch MacBook, cheaper iMac for 2014: Report

Posted by Unknown 0 komentar

apple-ceo-talks-big.jpg


Apple could be working on a slew of new products including a brand new 12-inch MacBook with a Retina display, if analyst Ming-Chi Kuo of KGI Securities is to be believed.
 
Kuo, who's had a decent record when it comes to Apple related predictions, has mentioned some new products and upgrades in a new research note. The development was first reported by 9to5Mac.
 
According to the research note, Apple will release a 12-inch MacBook with a Retina display, a new iPad with an even better resolution, and a budget iMac desktop computer, all in the year 2014.
 
Kuo predicts that the Cupertino giant will unveil a new smaller MacBook with an entirely new design in second or third quarter of 2014. The laptop will feature a high-resolution (Retina) 12-inch screen but would be as portable as the 11-inch MacBook Air and offer the same level of productivity as the 13-inch MacBook Air. The alleged MacBook will "redefine laptop computing," as per the analyst, mentioning that it would be thinner and lighter than the MacBook Air and feature a new clamshell structure. He also adds that the laptop will be powered by an Intel chip and will cost less than current Apple notebooks.
 
Kuo has also predicted that Apple could ship a lower-cost iMac desktop in Q2 or Q3 2014, as the current iMac sales were below expectations. He expects the desktop to take on Windows powered desktops and boost iMac sales by 10 percent to 20 percent.
 
He also forecasts a new sixth-generation full sized (9.7-inch) iPad featuring a more pixels-per-inch, with a resolution 30 to 40 percent higher than the current generation iPad. He adds that the third-generation iPad mini would feature a 2048x1536pixels Retina display currently seen in the full-sized iPad.
 
As usual, there's no official word on this from Apple, but just like other technology companies, even Apple has to keep on reinventing its products to capture the consumer market's attention (and share). Also, if the prediction about the new lower-cost Macs turns out to be true, the fruity company might be able to make its presence felt in the PC market at a big level, since it would be able to target a wider consumer base. 

Baca Selengkapnya ....

Google reveals plan to use users' name, photos in its ads

Posted by Unknown 0 komentar

google-chair-635.jpg


Google Inc plans to launch new product-endorsement ads incorporating photos, comments and names of its users, in a move to match the "social" ads pioneered by rival Facebook Inc that is raising some privacy concerns.

The changes, which Google announced in a revised terms of service policy on Friday, set the stage for Google to introduce "shared endorsements" ads on its sites as well as millions of other websites that are part of Google's display advertising network.

The new types of ads would use personal information of the members of Google+, the social network launched by the company in 2011.

If a Google+ user has publicly endorsed a particular brand or product by clicking on the +1 button, that person's image might appear in an ad. Reviews and ratings of restaurants or music that Google+ users share on other Google services, such as in the Google Play online store, would also become fair game for advertisers.

The ads are similar to the social ads on Facebook, the world's No. 1 social network, which has 1.15 billion users.

Those ads are attractive to marketers, but they unfairly commercialize Internet users' images, said Marc Rotenberg, the director of online privacy group EPIC.

"It's a huge privacy problem," said Rotenberg. He said the U.S. Federal Trade Commission should review the policy change to determine whether it violates a 2011 consent order Google entered into which prohibits the company from retroactively changing users' privacy settings.

Users under 18 will be exempt from the ads and Google+ users will have the ability to opt out. But Rotenberg said users "shouldn't have to go back and restore their privacy defaults every time Google makes a change."

Information Google+ users have previously shared with a limited "circle" of friends will remain viewable only to that group, as will any shared endorsement ads that incorporate the information, Google said in a posting on its website explaining the new terms of service.

Google, which makes the vast majority of its revenue from advertising, operates the world's most popular Web search engine as well as other online services such as maps, email and video website YouTube.

The revised terms of service are the latest policy change by Google to raise privacy concerns. Last month, French regulators said they would begin a process to sanction Google for a 2012 change to its policy that allowed the company to combine data collected on individual users across its services, including YouTube, Gmail and social network Google+. Google has said its privacy policy respects European law and is intended to create better services for its users.

Google's latest terms of service change will go live on November 11.

© Thomson Reuters 2013

Baca Selengkapnya ....

You can Like but you can no longer hide from search: Facebook to users

Posted by Unknown 0 komentar

Facebook_man_635.jpg


Facebook is getting rid of a privacy feature that let users limit who can find them on the social network.
Facebook Inc. said Thursday that it is removing a setting that controls whether users could be found when people type their name into the website's search bar.

Facebook says only a single-digit percentage of the nearly 1.2 billion people on its network were using the setting.

The change comes as Facebook is building out its search feature, which people often use to find people they know or want to know on the site.

Facebook, which is based in Menlo Park, Calif., says users can protect their privacy by limiting the audience for each thing they post about themselves.

Baca Selengkapnya ....

Karbonn A16 and Karbonn A99 budget Android smartphones available online

Posted by Unknown 0 komentar

karbonn-a16-a99-big.jpg

Karbonn Mobiles has introduced two new budget smartphones for the Indian market, the Karbonn A16 and Karbonn A99. Both the handsets have been listed at ecommerce site, Saholic. The Karbonn A16 is available for Rs. 5,990, while the Karbonn A99 comes for Rs. 6,190. The ecommerce site clearly mentions that both the handsets will be delivered by next week i.e. October 17.

Both the handsets interestingly come with identical specifications; the only difference is that the Karbonn A99 packs a 1400mAh battery while the Karbonn A16 includes a 1350mAh battery. Both the Karbonn A16 and A99 are dual-SIM devices with support for GSM+GSM.

Other specifications of the two budget smartphones include 4-inch WVGA (480x800 pixels) display, dual-core 1.3GHz processor, 512MB of RAM, 4GB of inbuilt storage further expandable up to 32GB with microSD card, a 5-megapixel rear camera, and a VGA front-facing camera. Both the handsets, the Karbonn A16 and Karbonn A99, run Android 4.2 Jelly Bean out-of-the-box.

Some preloaded apps included on both the devices are UC Browser, Opera Mini, Kingsoft Office, Karbonn Live, WhatsApp and Flipboard.

Prior to this, Karbonn rolled out the Smart A51 budget device for Rs. 3,499. The Android 4.0 Ice Cream Sandwich-based Karbonn Smart A51 features a 3.5-inch TFT LCD display with 320x480 pixels resolution. It is powered by a 1GHz processor, though chipset has not been specified in the listing and includes 256MB of RAM. It is a dual-SIM (GSM+GSM) device with dual standby time. There is a 3.2-megapixel rear camera accompanied by an LED flash while there is a VGA front-facing camera. It runs on a 1,100mAh battery, though standby time and talktime have not been detailed.



Karbonn A16 key specifications
  • 4-inch WVGA display with 480x800 pixels resolution
  • 1.3GHz dual-core processor
  • 512MB of RAM
  • 4GB inbuilt storage, expandable up to 32GB via microSD card
  • Android 4.2 Jelly Bean
  • Dual-SIM (GSM+GSM)
  • 1350mAh battery
Karbonn A99 key specifications
  • 4-inch WVGA display with 480x800 pixels resolution
  • 1.3GHz dual-core processor
  • 512MB of RAM
  • 4GB inbuilt storage, expandable up to 32GB via microSD card
  • Android 4.2 Jelly Bean
  • Dual-SIM (GSM+GSM)
  • 1400mAh battery

Baca Selengkapnya ....

Easily fix spots and other problems in photos

Posted by Unknown Sabtu, 12 Oktober 2013 0 komentar
Expensive programs such as Adobe Photoshop have a feature known as Content-Aware, which allows them to fix spots and other problems in a photo with little work. The free online service Webinpaint has the same capability and allows you to easily remove spots, blemishes, scratches, objects, and any other problems you may have in a picture. For example, in the below picture I start off with an image with four big air balloons and one small air balloon in the middle. I think the image would look better without this small balloon, so I draw over the balloon and then click the Inpaint button to remove the small balloon from the picture.


Once the changes have been made I can save the new photo and be done with a fairly difficult photo edit in a less than a few minutes. Webinpaint can be done online without having to download any software or can be done using the free download also found on their website.


Baca Selengkapnya ....

iOS 7: Six Things Apple Got Right and Six That Are Still Missing

Posted by Unknown 0 komentar
Despite how much people claim to like change, at the core we are creatures of habit. Just as we saw when Facebook introduced Timeline and as we will see when Twitter makes its next significant change, people are going to get up in arms about it. Apple’s iOS 7 was no different.
Described as the biggest change to iOS since the introduction of the iPhone, iOS 7 has been available to the general public for roughly two weeks at this point. That’s given everyone plenty of time to get accustomed to all of the changes and vent about them, but for us, it’s served as an evaluation period.
Looking beyond the flat UI and the animated background, has that much really changed in Apple’s mobile OS? What did Cupertino get right with the update and what areas or features are still missing? To help answer these questions, I’ve put together a list of the top six things that are still missing in iOS 7 as well as the six things that Apple nailed with the update.

The Good

1
Control Center
Control Center is one of the best additions to iOS 7 even if it is a shamefaced adoption from Android. The panel provides quick access to toggle features like Bluetooth, Wi-Fi and Airplane Mode as well as sliders to adjust volume and screen brightness. There are even shortcuts to useful apps like Clock, Calculator and Flashlight.
To access Control Center, just swipe up from the bottom of the screen.
2
Block contacts
It’s about time Apple implemented a way to block unwanted communications. There are two methods to block offending callers in iOS 7. If someone is already in your address book, simply tap on their profile, scroll to the bottom of the list and select Block this Caller. You can also add numbers to the block list by going to Settings > Phone > Blocked.
Blocked contacts will not be able to call, send messages or initiate a FaceTime video chat.
3
Timestamps in Messages
Timestamps in Messages aren’t exactly new as iOS 6 offered similar functionality. The problem, however, was that the OS would selectively provide timestamps – like when a new conversation was started or after a long period of silence.
With iOS 7, that’s no longer an issue. Simply swipe to the left while in a conversation to see when each message was sent or received. It’s convenient that it the timestamps aren’t always there to serve as a distraction but can be accessed on-the-fly.
4
New Icons
I was unsure whether or not to list this as a positive or negative as people seem to be split pretty evenly across the board. I ultimately see it as a pro simply because A) the old layout and icons were extremely outdated and B) Apple is teasing live apps.
If you haven’t already noticed, the Clock app icon now serves as a watch face. Sure, it’s a little gimmicky and not entirely useful since there is a clock at the top of the screen but if Apple opens such functionality up to developers, we could see all sorts of things like live weather feeds directly on an icon without having to open the app.
We’ll keep our fingers crossed on this one.
5
Improved multitasking
Multitasking has been around on Apple devices since iOS 4 but it was really limited. Developers now have a bit more freedom in iOS 7 and the interface to switch between apps is greatly improved. The new system, similar to the jailbreak tweak Auxo, uses a card-based interface to see which apps are open and lets you get rid of them with a simple swipe up.
Along the same lines, a new feature called Background App Refresh allows apps to refresh their content or use Location Services in the background. The feature is enabled by default although some (Apple included) say turning it off could improve battery life.
   
6
Automatic updates
Previous versions of iOS would alert a user when a new update was available for an app with a small badge on the icon. The gesture was nice but it also meant you had to manually update everything. Not anymore.
With iOS 7, app updates take place automatically in the background. The setting seems to be disabled by default so if you’d like to turn it on, navigate to Settings > iTunes and App Store and slide the slider for Automatic Downloads: Updates to the “on” position.

The Bad (or Still Missing)

1
Landscape orientation for all
Apple’s iPad works in landscape orientation under almost every usage scenario, so why doesn’t the iPhone get the same treatment?
I’ve used both devices and can say it’s rather annoying to be restricted to entering a passcode and navigating the home screen on the iPhone in portrait mode only. Sure, it’s a minor inconvenience and one can get to where they want to go even when looking at things sideways but it shouldn’t have to be that way. It wouldn’t take a ton of work on the UI side to allow landscape orientation phone-wide even with the iPhone’s limited real estate.
2
Different default apps
One can’t help but notice that Apple still doesn’t allow users to select a third-party app as a default app. Don’t like Safari? Tough, you’re stuck with it as you can’t replace it with Chrome as your default browsing app. Not a fan of Mail? You’re out of luck again as you can’t set another program like Mailbox as your default client.
From a marketing and strategy standpoint, it makes sense – Apple wants you to use their apps, not someone else’s. But from a user’s perspective, the freedom to use Chrome as default over Safari or Google Maps over Apple’s own app shouldn’t be out of reach.
3
“Select All” option in e-mail app
I’ve had the same e-mail address for several years and as such, I tend to receive a lot of messages each day. It’s not uncommon to get 100+ e-mails a day after spam filtering which is why it’s so annoying to check my e-mail on an iOS device. Why? Because there is no easy way to delete multiple messages.
It’s beyond me how such a basic function has eluded iOS for so long. If you want to delete multiple e-mail messages, you have tap Edit then methodically select each and every message for deletion. A “Select All” feature would be extremely easy to implement and save people like me a lot of time and frustration.
4
Custom keyboards
While it’s true that the keyboard in iOS 7 has undergone some under-the-hood improvements and even a visual makeover (but __why__ remove the .com button?), users still don’t have the ability to use true third-party keyboards. Android users have enjoyed access to popular third-party boards like SwiftKey for some time and we think it’s about time that Tim Cook and company open up the platform to allow for third-party keyboards.
Earlier this year at the D11 conference, Cook promised to open the platform up a bit more but “not to the degree that we put the customer at risk of having a bad experience.” That’s understandable as there would no doubt be some third-party keyboard apps that would offer a bad experience but the potential for some really great keyboards far outweighs the negatives in my opinion.
5
Greater home screen widget control
Or rather, any control at all. Look, I get it. Just as with the custom keyboard argument, Apple doesn’t want to run the risk of having people turn their home screen into a gaudy MySpace profile. But a little more flexibility in the home screen widget department would go a long way in making the overall experience seem a bit more custom-fit for each user.
I suspect Apple will loosen the reins a bit more over time but Android-like home screen customization likely isn’t in the cards.
6
Can’t remove Apple bloatware
The inability to remove pre-loaded Apple software continues in iOS 7. In the event you don’t use apps like Newsstand or Passbook, you’re stuck with them as there is no way to delete them. We’ve seen this on other phones and operating system and it’ll likely continue but truth be told, it’s annoying. Apple should let users uninstall these apps. If you need them again, simply grab them from the App Store.
Until that day comes, you’re stuck with burying these unused apps in a folder and forgetting they ever existed.

Baca Selengkapnya ....

iOS 7 has five issues, but here's how to fix them

Posted by Unknown 0 komentar

Apple's shiny new iOS 7 mobile operating system was released September 18 to mostly positive reviews, but it has five issues, nevertheless. And in this article we will show you how to address them.

It was the biggest change to iOS since it was introduced in 2007, overhauled to add a slate of new features and a more streamlined, abstract look.

But to be fair to Apple, it's not totally unusual for new operating systems to have some glitches here and there in their earliest days.

Nobody's talking about anything cataclysmic this time, like the Apple Maps fiasco on iOS 6 that led CEO Tim Cook to issue a rare apology -- and which some say led to the ouster of Apple senior vice president Scott Forstall.

But just a couple of weeks into its existence, iOS 7 has prompted a handful of complaints from some users. Here are five of the most frequently heard, along with tips for how to fix, or at least bypass them.

iMessage failing
Apple says it's aware of an issue that's causing texts sent through its iMessage app not to go through for some users. On various Apple-oriented message boards, iOS 7 users were complaining that they'd send a message which appeared to work fine, only to later see a red exclamation point that means it wasn't actually sent.

"We are aware of a problem that affects a fraction of a percent of our iMessage users, and we will have a fix available in an upcoming software update," Apple said in a statement e-mailed to media outlets. "In the meantime, we encourage any users having issues to reference our troubleshooting documents or contact AppleCare to help resolve their issue. We apologize for any inconvenience this causes impacted users."

Until the update rolls out, some users say they've been able to get rid of the issue by turning their phone off and back on.

Animation flu
Some folks say they're already sick of iOS 7. Phone and iPad users, or at least a few of them, say they're getting symptoms similar to motion sickness while looking at iOS 7 animations. On the new system, images zoom in and out when users switch between apps. As TIME explains, the brain gets unsettled when the eyes try to focus on images that don't match up -- for example, when you're on a rocking ship or moving car and trying to read a stationary item, like a book.

To clear that issue, iOS 7 users can go to "Settings," then "General" and then "Accessibility." Click on "Reduce Motion" to make the zooming go away.

Battery drain
This one has been mostly reported by users of older phones like the iPhone 4S. Simply, they say iOS 7 seems to drain their batteries faster than iOS 6 did. One factor may be that iOS 7 expands the ability to run apps in the background while focusing on another task.

To repair that problem, go to "Settings" and "General," but then choose "Background App Refresh." From there, you can choose which apps you'll allow to run in the background and which you won't.

There are also general battery-saving steps, like dimming your screen and making sure things like GPS and Bluetooth are switched off if you're not using them.

Certain apps log you out

This one might take care of itself over time. When Apple updates its operating system, apps that rely on parts of it (like Camera) must update as well. Until they do, they sometimes kick users out. On Apple message boards, users were mentioning apps like Snapchat and Mailbox as frequent offenders.

Some developers may have already tweaked their products, and other fixes are probably on the way. But if you're still having problems, you can go to "Settings," "General" and "Background App Refresh" again. Turn off any apps you're having problems with.

Lock screen bypass
This one has already been addressed in an iOS 7 update from Apple just days after the new operating system rolled out. For the first few days, iPhones and iPads apparently were vulnerable in one particular instance. If users were running the Camera app and had Control Center activated on their Lock screens, there were a few steps someone could take to unlock their phones.

But the iOS 7.0.2 update, released on September 26, "fixes bugs that could allow someone to bypass the Lock screen passcode," according to Apple.

Are you encountering issues with iOS 7? If so, have you found a way to fix them? Let us know bywriting to us.
T-Mobile's new strategy appears to be getting a little help from sales of Apple devices. According to recent numbers from Kantar Worldpanel, T-Mobile grew to 13.2 percent of smartphone sales in the U.S. market in the 3 month period ending August 2013, marking its highest share of sales over the past year.

The market share represents growth of 1.1 percent, reversing an on-going trend of a year-on-year decline. The iPhone 5 remained the top-selling smartphone at T-Mobile, with 17.1 percent of sales.

Kantar's global strategic insight director, Dominic Sunnebo said that when iOS first debuted on T-Mobile in mid-April, the majority of sales came from consumers upgrading from a featurephone to their first smartphone.

"But, looking at those who purchased an iPhone in the August period, 56 percent of those consumers came from another smartphone, including 38.5 percent from an Android device,” Sunnebo said in a statement.

The Kantar numbers shows Android retaining its lead for the period, with a 55.1 percent share of the market. Apple's iOS follows with a 39.3 percent share, an increase of 5.4 percent versus the same period a year ago.
Overall, little movement is seen among the other operating systems in the market, at least for now anyway. Windows saw about a 2.9 percent increase in sales in the August period, while BlackBerry was down to just 1.7 percent of sales.

And Verizon sold the most smarpthones, with a 37.1 percent market share of all sales, which amounted to growth of 6.9 percent. For its part, AT&T maintained a second position at 21.7 percent, and Sprint took home third with a 14.6 percent share of smartphone sales.

In other mobile news

A British police investigation into the massive DDoS attack against internet spam killer Spamhaus has led to the arrest of a 16-year-old London schoolboy who is allegedly part of an international group of cyber criminals and activists.

"The teenager was found with his computer systems open and logged on to various virtual systems and forums," says the police document shown to the London Evening Standard.

"The suspect has a significant amount of money flowing through his bank account. Financial investigators are in the process of recuperating all that cash."

The schoolboy was arrested in April at the same time as a 35 year-old Dutchman, thought to be Sven Kamphuis, the owner of hosting firm Cyberbunker, as part of an investigation into the Spamhaus attack by British police dubbed Operation Rashlike.

The arrest was kept completely secret, and the boy has been released on bail pending a trial date later in the year.

British police documents state that the Spamhaus attack in March was the "largest DDoS attack ever seen," and claims that the performance of the London Internet Exchange was also hard hit.

The DDoS attack caused worldwide disruption of the functionality of the internet, it states. On March 18, Spamhaus and its networking partner CloudFlare started getting attacked at around 90 Gbps.

When that failed to take the site offline, the attackers went upstream to ISPs and internet exchanges in Amsterdam and London, and by March 22nd, over 300 Gbps was hitting the Spamhaus servers.

But despite all the activity, the attack didn't seriously interrupt the flow of internet data. The London Internet Exchange reported "minor amount of collateral congestion in a small portion of our network," and Spamhaus' services weren't seriously disrupted.

"Only the website and our email server were affected," said Steve Linford, chief executive for Spamhaus. "All Spamhaus DNSBL [DNS Block List] services continued to run unaffected throughout the attack. In fact, Spamhaus DNSBLs have never once been down since we started them in 2001."

Spamhaus is more targeted than most because of the work it does. The organization compiles lists of ISPs, domains, and email servers that are known spammers so that service providers can block off huge chunks of incoming emails offering fake Viagra tablets, suspicious dating sites, viruses and malware.

In 2011, Spamhaus temporarily blacklisted Dutch hosting firm Cyberbunker, which allows customers to use its services for absolutely anything "except child porn and anything related to terrorism."

For its part, Cyberbunker denied responsibility and claimed that Spamhaus was acting as an internet vigilante, although it appears that Cyberlocker's owner may have taken a more direct approach against the watchdog.

Just how a 16-year-old schoolboy got mixed up in all this still remains to be seen. Shifting large amounts of cash through a teenager's bank account isn't the smartest move in the criminal playbook, but it wouldn't be the first time such basic mistakes have led to arrests.

In other internet security news

All roaming rate charges paid by mobile phone users when they're travelling inside Canada and the United States will soon get a lot more scrutiny by the CRTC, which is strongly considering possible stiff regulations as a result of several consumer complaints from Canadians.

About than thirty-six telecom companies and wireless carriers had to submit information on the terms and conditions of their roaming rates to the Canadian Radio-television and Telecommunications Commission (CRTC) by Friday of this week.

The CRTC had set the deadline after hearing consumers' concerns that the cost of roaming on another carrier's network could be "unreasonable."

"A decision on whether there is a need to intervene will be made once the CRTC has reviewed the information it has asked the wireless companies to provide," the CRTC's Chris Seidl said in an emailed statement.

The additional information will also help it determine the options available to consumers and the competitiveness of Canada's wireless industry, said Seidl, executive director of telecommunications at the CRTC.

Telecom analyst Eamon Hoey said he expects the CRTC to regulate roaming rates, adding it's the beginning of more regulation for the wireless industry.

"Canadian consumers are more than just a bit annoyed at the rates that they're paying now, not only for basic cell phone service, but also for roaming charges, for additional charges, for so-called contracts, you name it-- the list goes on and on," said Hoey, of Hoey Associates Management Consultants in Toronto.

Hoey also said that Bell, Telus and Rogers didn't do themselves any favors with consumers or the federal government with their publicity blitz against big U.S. carrier Verizon, which had expressed some interest in Canada's wireless market but decided against coming north earlier this month.

Rates aren't low enough, he said, adding that Canada's wireless carriers "pay in pennies per minute" to foreign carriers such as Verizon, AT&T and U.K.-based Vodafone for their roaming agreements.

Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of android mobile9.