Sabtu, 30 April 2011

The carriers are not your customers: mess to update Windows phone 7-Ars Technica microphone

A month ago at Mobile World Congress, Microsoft announced that the Windows Phone 7 copy and paste update, known as "NoDo", would ship some time in the first half of March. That's not going to happen now, as the company has formally announced in a blog post that the update is delayed until the second half of the month.


The reason given is so that Microsoft can take a little extra time to ensure that the update "meets [Microsoft's] standards, your standards, and the standards of [Microsoft's] partners." The statement assured users that the updates scheduled for later this year won't be impacted by this delay, and that multitasking, Twitter integration, and an Internet Explorer 9-powered browser are all going to ship as expected.


The announcement also outlined the way that updates are signed off, first by the hardware companies, then by the carriers. This is a complex process: Microsoft's update delivery channel is used not only for software updates for Windows Phone 7 itself, but also for hardware-specific updates such as new drivers or, I believe, the low-level firmware used to control the cellular radio. This is a complexity that a company like Apple doesn't have—for Apple, all the hardware is its own. On top of that, Microsoft has, regrettably, given carriers the ability to block updates.


It's good that Microsoft has finally spoken a little about what's going on. An official confirmation that there will be delays is better than rumor and innuendo, and the claim that the delays won't have any impact on future updates is also a little reassuring. But the response to the blog post in both the comments and around the Web has been largely hostile, and it's not hard to see why. What we wanted to see was some straight-talking. Something taking ownership of the problems, something to provide confidence that the problems had been solved, something to assure us that these issues were isolated—ultimately, something that would show us that Microsoft would deliver on the promise of its platform. What we got instead was PR-laden equivocation.


A big problem is that the announcement wasn't really telling us anything we didn't already know. A statement made on an official French blog said that NoDo would not roll out until the second half of March. The new blog post just makes clear that this is the case across the board.


On top of this, it offers no real explanation either for the past problems or for the new delays. This makes it hard to believe that the future is going to be any better. Though Microsoft has fixed the problems experienced by many owners of Samsung handsets for most users, there are still some who are having trouble installing the initial February update unless they completely wipe their phones, and since that update is a prerequisite for NoDo, those troubles are unlikely to disappear.


The major issue, however, is not so much these details as it is a systemic lack of effective communication. Microsoft was slow to act in response to the initial Samsung problems, and the news about the delay was similarly circulating for several days before this official confirmation. Microsoft is still treating the OEMs and carriers as if they were its customers. While they're the ones Microsoft is dealing with directly, treating them as the customer will kill the platform. The early-adopting end users—the people who actually bought the platform, are buying the applications, and are encouraging their friends and families to follow suit—have to be treated as king. But they're not, and they're not happy.


Microsoft, instead, is covering for its partners. It covered for Yahoo when a Yahoo bug caused sky-high data usage. And it's still covering. Instead of useful information such as "which carriers have blocked the February update," or "which carriers will block NoDo when it eventually arrives," we get vague comments about "working closely" with the carriers. Even though we already know that some carriers can actually treat their customers with utter contempt and block updates, Microsoft still skirts around actually admitting it—a fine example of PR standing in the way of actually relating to the public. Joe Belfiore already acknowledged that they could, so there's really no need to dance around the issue.


Obviously this is information that might be considered "sensitive," but putting the carriers' needs over the users' needs serves only to alienate the users, and it's Microsoft who looks bad as a result.


Nor does the post do anything to actually explain why the updates are taking so long to deliver. It talks about the OEM involvement and the carrier involvement. But none of it really makes sense.


The OEM issue is certainly the more sticky one. The fact that OEM-specific updates can be pushed out means that there is necessarily communication and testing between the manufacturers and Microsoft. This is a complexity no other phone platform has, and while it will be good in the long run, it's somewhat understandable that there are issues in the short term. However, the blog post doesn't paint a very pretty picture of the process. It may just be an oversimplification, but it sounds like Microsoft basically has to take it on trust that the OEMs have done their job properly. As is obvious from the Samsung issue, that trust isn't earned.


In its previous post about the February update, the company proudly claimed that the update worked for 90 percent of users, with a further 5 percent failing due to trivially diagnosable conditions (lack of free space) that the software didn't actually bother to warn about, preferring instead to try to install and then fail. If a Windows Service Pack only worked for 90 percent of users, leaving 5 percent perplexed with useless errors and another 5 percent with some mystery malady that risked leaving their machines useless, it would be a dismal failure.


The PC space is far more diverse than any cellphone ecosystem, and yet Microsoft makes patching that a routine and highly successful experience. Not flawless, but not far off. That it can't do so for nine different phone models, each using damn near the same hardware, is astonishing.


What would be good to see is an acknowledgement that this process broke down. Instead, we we're told that laboratory testing "can simulate—but never quite equal—the experience of delivering software to thousands of real phones. So basically, we're getting a shrug of the shoulders, and it's probably going to happen again.


As for carriers, the blog post also made clear that carrier involvement was a part of any phone's testing. This is probably true, but it's completely missing the point in a couple of ways.


First and foremost, carriers really don't need to get in the way here. The testing they do just can't be all that important or significant. How do we know this? Because they'll let you stick any phone on their network (at least in the world of GSM networks). Even in the US, with its frequency-based barriers to entry, T-Mobile and AT&T will sell you a SIM card with no phone, for you to slap into any old device and use as you see fit, and this is repeated around the world. Some operators (mostly MVNOs who depend on another network's hardware) don't offer any handsets at all; only SIM cards and the expectation that you'll provide your own handset.


If the carriers can do this safely—and overwhelmingly, they acknowledge that they can—then they can also allow firmware updates through without interfering. If it's safe to use a firmware update on an unbranded handset on a network, it's safe to use a firmware update on a carrier-branded but otherwise identical handset. Plainly an untested firmware can't screw things up too much, or else the only phones they'd allow on their networks would be carefully vetted.


The carrier's involvement with the firmware should end at branding and perhaps a little configuration: the custom boot screen, the custom highlight color, a handful of other settings that carriers are allowed to touch, and the preinstalled applications. And that's it. There doesn't need to be extensive testing (they're not testing every phone on their networks anyway), and there certainly shouldn't ever be reason to allow carriers to block or delay updates. It should take mere minutes for a carrier to produce an appropriately branded firmware and give it the thumbs up.


And if they really can't do that? Microsoft (technically, if not contractually) can put out minimally branded firmwares of its own. That'll lose the preinstalled applications, but so what? They're all downloadable from Marketplace anyway! If the carriers continue to ruin the experience, that's got to be an option.


And that gives way to the second point: we've already seen updating done better, and that's the standard Microsoft needs to live up to. We've already seen the iPhone. Apple already works with dozens of carriers (to whatever extent that it's necessary to do so—Apple prohibits carrier branding), and yet in the same timeframe since Windows Phone 7's launch, Apple has managed to push out four releases containing fixes and/or new features (plus a fifth release for CDMA support). And while the number of different Windows Phone 7 models might create more work for Microsoft, they shouldn't make much difference to carriers, since most carriers only offer one or two models anyway, just as they do with the iPhone.


Plainly, regular updates without carrier blocks are feasible. Not just feasible: they are the standard that smartphone users should be demanding. If Microsoft can offer an iPhone-like update experience with an Android-like selection of handsets, that is undoubtedly a good thing. It is one of the promises of the entire platform. A high-quality update experience is one of the major things that can set this platform apart from Android, just as the delightful user interface already does.


So instead of straight talking or useful facts, we're left with a delay to NoDo so that the company can "learn all [it] can from the February update," and, uh, basically nothing to reassure us that it won't happen again.


Microsoft knows that regular updates are valuable. As the blog post says in its unique PR-laden way, "Delivering regular updates to your phone is a key part of our innovation plans." And we also have quite a bit of evidence that copy and paste has been done for months. A build with copy and paste was shipped to developer handsets on December 5th last year. That build was number 7338. New and presumed-to-be-final builds that have leaked for certain HTC handsets have build numbers of 7339. The emulator that developers use to test their software on NoDo also has build 7339.


That strongly suggests that not too much has happened since the 7338 test build; that even then, the feature was all but done. The company also described it as the "January update" in a webpage (though the original page has long since disappeared into the memory hole, and now no longer mentions January), and even before Windows Phone 7 launched described it as coming in "early 2011"; the tail-end of March hardly qualifies as such. So we're looking at a delay of more than three months.


All this trouble, and for something that at the end of the day isn't even a major update—just copy and paste, some performance tweaks, and some small improvements to Marketplace. And yet Microsoft and its partners are struggling to deliver that much.


One has to wonder what's going to happen if an actual important update needs to ship. A gaping security hole in the browser, for example, that allows rooting the phone and malicious access to personal data. Something where a three-month turnaround is simply not acceptable. Are carriers and OEMs still going to be able to drag their heels and screw up the updating process? Or will this finally give them the spur they so badly need to swing into action?


It's still early days in the life of Windows Phone 7, and none of these update troubles are in themselves fatal. But the communication has been abysmal. It has been consistently reactive, patronizing, and so laden with PR wording that it tells you next to nothing anyway. It's better than silence, but only just, and it's no wonder that the community feels short-changed by it.


Ideally Microsoft would be releasing updates in a timely manner, every month or two, adding new features incrementally and justifying the commitment made by the early adopters. Let the updates flow as fast as they can be developed. We know it's possible. 


But if that doesn't happen, at least have the courtesy to tell people why. Tell people that the update is going to be delayed beforehand. Don't just keep silent and claim, "Well we never actually meant it to go out in January, that was all a misunderstanding." The userbase isn't that stupid. Tell people which carriers are doing what. We know carriers can block things, so don't fob us off with vague claims that we'll get the updates eventually—make sure that if someone is denied an update then they know who to blame.


The current strategy looks bad. It is causing a loss of confidence among early adopters, and that hurts. These are the people who will fall in love with the platform and who will do the real job of selling it to their peers. They have a reach and influence that no marketing budget can buy, and if they feel that the platform is lost, and that Microsoft can't deliver on its promises, and if they no longer have the faith that it will develop into the platform that it deserves to be, they will defect to other operating systems, taking their influence with them. Both the customers and Windows Phone deserve better.

Selasa, 26 April 2011

HD Nintendo Wii 2 to remove the Video Fortunes around? -GigaOm

Nintendo would announce soon, its Wii game console to the next generation of the EA games label President: Frank Gibeau comments. Analysts believe that the undertaking to inform the Conference of this year's E3 Wii2 in June, which means that it goes up for sale at the beginning of next year.


All significant Wii update must contain HD features that could help the Nintendo wins back the customers who use Microsoft's Xbox 360 and Sony's PS3 home entertainment devices. But in addition, HD video streaming is too little too late?


Gibeau told industry players today that Nintendo has "interest in adding another act": "they can understand the dynamics and the HD consoles is now booming, as part of the business."


Both the Xbox and PS3 HD support both platforms is not just made to use it to play, but video delivery. Xbox to Xbox Live marketplace offers users to use the Netflix and video rentals, as well as ESPN3 directly from Microsoft. An addendum Hulu Plus is imminient's personal page on Stardoll. PS3 also offers its own video rental store, plus the rent through Isley887 and video orders through Netflix and Hulu Plus. Both consoles also offer Access to YouTube and Microsoft have had striking some other content partnerships may display such as the Guild of the Xbox to the page.


Wii Netflix users may also use, but only in the SD bitrates maxing out at with around 700 kbps — sufficient for a VHS hardly similar to the experience. Content producers were initially very excited to bring video to the Wii, but hardware limitations and the growing popularity of options — from connected TVs, dedicated devices, streaming, such as the Roku Player — has led to falling out of fashion for Wii. The BBC iPlayer, which is optimized for the Wii, earlier this year that only about 2% of the users of the service through the use of the game console.


Only by adding HD video might not be enough to convince potential customers that the Wii-2 is a great video entertainment device, in particular, the age, also if Netflix is available in more than 250 devices. Nintendo could, however, take advantage of the fact that the game hardware release cycles are relatively slow. Microsoft and Sony is expected to stick with their current generation hardware has at least two or three years. So what the Nintendo Wii to add that would make it a 2, home entertainment for the game-changer?


One idea would be a TV feed problem that many connected devices are still struggling with. Nintendo could be used for installation, which is similar to the one that introduced the Logitech adapter for Google TV, the daisy-chain cable HDMI devices to display the TV as well as your own content at the same screen. This idea one step is taken and could think of to dance or song of the games will take place, while the other is sent to the TV talent shows.


Another angle would take advantage of some of Nintendo to the listing of its new DS3 with this month, such as Spotpass to carry out social games and exchange information with the other owners of DS3 by moving them on the street, the technology only. Wii 2 to become the media hub to the extension of such data in a field near echanges, for example, recommended videos are based on automatically during the day to have exhausted the people or by even the local news in the places you've visited, is based on the videos.


Granted, all this may sound quite futuristic — but so ability to play dance games without the controller, only a few years ago. It is clear that Nintendo has to go in its entirety if it wants to compete with Microsoft and Sony — and regardless of the company, is a large part of the video.


What kind of features would you like to stay at the Nintendo Wii video in part 2, will See? Tell us your comments!

Nokia Siemens said to renegotiate 1.2 billion dollars from Motorola transaction-BusinessWeek

EDT by Serena Saitto and Diana Ben-Aaron

15 March (Bloomberg)--Nokia Siemens Networks seek to renegotiate 1.2 billion dollar purchase of assets from Motorola Wireless Network Solutions Inc., according to two people close to the situation.

Equipment for network joint venture between Nokia Oyj and Siemens wants to exclude global system for mobile communications, or GSM, a unit of the acquisition and renegotiate the price accordingly in order to win the US antitrust approval from the Chinese Government, said one of the peoplewho refused to be identified because the talks are private. Espoo, Finland-based company said 9 March that the transaction to close in the first quarter, leading the second delay in three months. Motorola solutions, said the Chinese Government extends its period of another 60 days. Purchase, in July, when two companies directed year close, won the approval of regulators of the United States and the European Union. Ben Roome, spokesman of Nokia Siemens Networks, refused to comment. Šaumburg, Illinois-based Motorola solutions spokesman Nick Sweers could not be reached after office hours. the purchase is aimed at buttressing Nokia Siemens position as the second largest producer in the world of equipment for a wireless network, competing with Huawei Technologies co. and the Paris-based Alcatel-Lucent are based on the Stockholm market leader Ericsson ABon China. It will bring more than 50 accounts of existing or new customers, significantly expanding the scope in the United States and Japan, Nokia Siemens said when it announced the transaction. Chinese ObjectionThe, Chinese us antitrust review comes after Huawei, China's largest producer of telecommunication equipment, is head of Motorola and Nokia Siemens Jan 24 says Motorola does not provide guaranteesthat will prevent disclosure of Huawei Technologies and products for Nokia Siemens. Motorola is sold to Huawei wireless networking products under the name Motorola Last month of 2000., Huawei had to withdraw its purchase of Santa Clara-based 3Leaf Systems ' patents, in accordance with the recommendation of the Committee on foreign investment in the United States because of concerns about national security.

Senin, 25 April 2011

Sony Ericsson XPERIA neo against Apple iPhone 4: Smartphone showdown-PC World magazine

This year was set to be a large one for Sony Ericsson. The company is granting the XPERIA branded Android Smartphone in Australia in the coming months, including the much publicised Sony Ericsson XPERIA Sony Ericsson XPERIA plays and an arc. He also is the adaptation of market XPERIA neo: Android Smartphone that is highly specialized for entertainment and yet another phone that will compete with the Apple iPhone, 4.read our detailed review of the Sony Ericsson XPERIA neo and see our Roundup of the best upcoming smartphones in 2011.Sony Ericsson XPERIA neo includes a built-in HDMI port, Bravia graphics engine, which is sought to provide smoother video playback and crisper, together with the 8-megapixel camera, the sensor of the Sony Cyber-shot digital camera line with all this account how does Sony Ericsson XPERIA neo stack against iPhone 4 when it comes to specifications?FeatureApple iPhone 4Sony Ericsson XPERIA NeoVerdict? system (OS) Google Android 2.3 GingerbreadDisplay technologyLED-backlit LCD screen "Reality" Camera5 megapixels, LED flash, Autofocus, geotagging8 megapixels, Autofocus, LED flash, Geotagging, face and smile detectionProcessorQualcomm Snapdragon ' Scorpion ' (1 GHz)


Sony Ericsson XPERIA neo is not as thin as XPERIA arc, but it still has a major emphasis on its construction. It was built by the glossy plastic and features a curved shape that solid, Sony Ericsson is ergonomically designed to fit perfectly in the hand of the user, especially when photographing. Sony Ericsson's XPERIA neo 3.7in is slightly larger than the iPhone, 4 3.5in screen displays. Sony Ericsson it describes as a "reality display"; This sits alongside other fancy display names including iPhone 4 "retina screen", the Samsung Galaxy S II Super AMOLED display and a new "plus" screen "of LG Optimus black. In short, Sony Ericsson claims reality display is brighter and clearer than competing displays. Apple iPhone, 4 used IPS (the same technology used in the iPad, as well as due to its high resolution 640 × 960 pixel he is described as retina displaybecause of the human eye can distinguish individual pixels.sony Ericsson XPERIA Android phone has 3 neo. 7in "Reality screen".

 

Kamis, 21 April 2011

Web companies should practice ' Data Stewardship '-PCWorld

People are talking about privacy here at South by Southwest. Generally, Facebook has played fast and loose with the protection of our personal data, and this has raised the interest in question among developers, many of whom develop programs that is intrin Illustration: Jeffrey Pelosically social. There is also a sense that we are better able to make personal information. But we might need a new way of thinking and talking about it.


A Friday panel here discusses a "social network users ' Bill of Rights" would contain a number of protections for users of social networking sites. (You can read the Twitter stream of the event here.) One of the major themes of the discussion was the idea that we are in a very real sense, pay-to-use free services like Facebook and Google by sacrificing some of our personal information. If we start to refuse to hand over our data, or deny social network Web sites the right to use it, can we find ourselves having to pay for use on Web sites.


If there are issues, which are more sensitive among internet users than their personal integrity, is the prospect of having to pay. We are trained to expect "free" on the Internet, and we do not want to change.


Have I am thinking this personal thing again at the latest. I have looked at it not with regard to the protection of personal information, but in the form of personal information on social networks, ad networks and data brokers who used to earn money "cash".


I think first of all, it is the word "Privacy" has become a politically charged term, loaded. I think the collection and use of personal data can have two different results--a beneficial and other coercive measures and potentially harmful. Company a was able to study my personal and friend data and deliver ads to me, is worth looking at and not just random garbage. Company B, on the other hand, can collect my personal, sensitive information, go out of business, and then allow my data and data of millions of others to fall into the hands of people who want to use it on unscrupulous or illegal ways.


Data collected by the social Web sites do not seem to die easily, and can live on after the company collected it is deleted. I think we need a set of rules, which talk about stewardship responsibility both web companies today and in the future. We need rules that apply directly to the Web-the companies themselves, and not so much a vague set of privacy rules concerning consumers. We must, for example, explicit rules about what the Internet companies must do with a person's personal data when the user exits the Web site or even die (this is actually a big problem).


Social network companies Facebook and Google would like to define rules and police even in private life, without a law. But as USC law professor Jack Lerner points out, we have laws on almost every other kind of data--financial data and health care data, for example--but not about the information in the social graph.


I believe that we need a law, and which has international reach (although I am sure, how you do it), because the Internet knows no borders. But I believe that the new law should focus on data stewardship responsibility of Internet companies.


Senators John McCain and John Kerry, is said to circulate an online privacy Bill, which would require companies to get permission from users to collect personal data and allow users to see exactly which data has already been collected. The potential legislation be taken more seriously than in the past, similar attempt because the two sponsors--each a senior member of his party--represents a bipartisan effort that has a chance to win broad support. On the other hand, this pair of promoted privacy legislation for a period of at least ten years.


I hope they get it right, because the law will tone in the way sites like Facebook and Google (and a host of other "social marketing" and online advertising companies) treat our personal information well into the future.

Returns the T-Mobile Sidekick as 4 G Android Smartphone-eWeek

T-Mobile United States teamed with Samsung mobile to bring back the T-Mobile Sidekick, Android Smartphone, sports 3.5-inch display and QWERTY keyboard on the hinge side of pop, Tilt signature for which friend mark is very known.


While the original friend without touchscreen, the introduction of dual modes of friend 4 G phone are designed to appease both the majority of users to have access to your device by touch and type.


However, instead of being on the basis of the danger that the operating system and data service, the property of Microsoft, the new friend will run Android 2.2 and is powered by CPU 1 GHz of T-Mobile 4 G network, capable of delivering potential peak download speeds of up to 21 Mbps.


Friend 4 G won't friend without serious communications capabilities, as is evident from the 5-row keyboard.


The new device includes the friend Group text and text on cloud messaging applications. Group text allows users to participate in the Group text conversations. Cloud text allows users to text friends or groups through computers and friend 4 G.


Friend 4 G includes VGA front-facing camera and the T-Mobile video chat powered by Qik. Friend 4 G also includes physical jump key, which allows customers to switch between live applications during a telephone conversation or assign keyboard shortcuts.


To the best Android Smartphone devices will also be integrated with Google services, including Gmail and Google maps and Android market access.


Friend 4 G comes with DriveSmart by T-Mobile, which calling, and senders the recipient is driving and will respond when it is safe. DriveSmart plus offers the same functionality, although it is activated automatically when handset is located in the vehicle in running order, as well as functions for parental controls for when small drivers are behind the wheel.


New friend 4 G is the rudder with Facebook and Twitter applications with users who can update their status from the notification and review of their channels from the start screen. Users can also sync your social network contacts in the address book of your phone.


Friend 4 G has also "media room" one-stop destination for music, videos, movies, YouTube, T-Mobile TV and Slacker radio. Customers can rent or purchase of their films and Television programs from the Samsung Media Hub.


Device pricing and availability have yet to be announced, although T-Mobile said, the United States can expect in Matt Black or Pearl magenta this spring.


Friend mark seeks to recover after taking some positive results in October 2009, when a hardware problem on servers managed by Microsoft subsidiary danger, containing the personal data of nearly 800 000 friend users phones.

Rabu, 20 April 2011

Homefront in the PS3, Xbox 360 $ 42 new sales-Punch jump (blog)

The retailer Amazon.com Inc. this week are discounted to THQ Inc. Homefront Playstation 3 Sony Corporation and Microsoft Corp. Xbox 360 in less than 42 $ new game sales.


This week in the possession of the Homefront PS3 SKU price reduction to $ 41.96, and the Xbox 360 SKUS in possession of $ 41.96 discount price.


Homefront is a warships based FPS title, which contains the single-player campaign and online multiplayer anti-personnel and vehicle warfare up to 32 users.


Sony sales began on Feb. Playstation 3 160 GB Killzone 3 bundle that includes the PS3 hardware SKU of 160 GB and $ 299 with a copy of Killzone 3.99.


PS3 160 GB SKU sold, for $ 299.99 and 320 GB SKU for $ 349.99.


Playstation move, PS3 console bundle includes the 320 GB SKU, the Playstation move Controller, the Playstation eye and sporting Champions at $ 399.99.


November sales of the Xbox 360, Microsoft began a 250 GB Kinect Special Edition bundle at $ 399.99.


With the Xbox 360 4 GB sells for $ 299 in a bundle Kinect. 99.

Selasa, 19 April 2011

What is the cost? Return on investment (ROI) of social media can be an intangible-The nonprofit times

What's It Cost?
ROI of social media can be an intangible


There's Facebook, Second Life, Myspace, LinkedIn, YouTube, Twitter and now Jumo. There are many smaller social networking platforms. When it comes to deploying assets, where to be in cyberspace is a tough decision.


Catholic Relief Services (CRS) in Baltimore is going through the evaluation process. CRS is one of Facebook's 500 million active users, and also tweets on Twitter and posts videos to YouTube. CRS has a Myspace profile with 3,288 "friends," although it is not seeing a lot of activity there and managers are trying to decide what to do with it. Deleting it is a serious option.


"We, like many other nonprofits, struggle to accurately measure the financial ROI (return on investment) of our efforts," said Laura Durington, online community manager at the CRS. "We look at Facebook Insights, Google Analytics and we look at source code reports in our online fundraising program. But, it only gives us part of the picture. Still, I would argue, although it's more of a hunch, that we are getting something important out of these efforts."


According to an Idealware study, "The Nonprofit Social Media Decision Guide," CRS isn't the only organization considering cutting back on Myspace. The Portland, Maine nonprofit technology group surveyed 460 nonprofit employees, held six telephone focus groups, and a case study collection in which 273 staff members provided details of which social media channels they are using and who they are targeting.


As you might expect, since 2008 Facebook has seen a huge increase in popularity and there has been a substantial decline in Myspace nonprofit users. Many nonprofits aren't investing much time in it and are seeing decreasing benefits.


Myspace cut its staff in half in January, letting go 500 employees. The decision came after the social media website was revamped in October 2010 to run with fewer people. MySpace had 54.4 million unique U.S. visitors in November, down 15 percent from a year ago.


Julie Somogyi, director of integrated marketing and communications for the Girl Scouts of the Greater Chicago area, believes the organization needs to focus on the social media websites where their girls and volunteers are virtually congregating. "Even though we did have some initial interaction with Myspace a couple of years ago, we began investing our time more heavily in Facebook, Twitter and LinkedIn in the past two years because those are the most active sites within our key demographics," she said.


According to Andrea Berry, Idealware's director of partnerships and learning and coauthor of the study, nonprofits are using social media websites for public interest, although the idea of fundraising is always in the back of their minds. "A lot of nonprofits are struggling to use it as a fundraising tool but use it as a way to reach out to new people, potential supporters, engage current supporters and reinforce their brand for key people in their area like the press," she said.
More than 30 percent of people surveyed who use Facebook and Twitter said they know that these social media sites are reaching new supporters for their organization and more than 75 percent responded saying they think Facebook and Twitter are reaching new supporters. The numbers jumped to 80 percent for sites such as Facebook, Twitter, video sharing sites and blogs for nonprofit managers who responded they think that these sites are enhancing their relationship with their audience.


"It's a good way to reach an untapped audience," Durington said. "When we started we weren't sure what to expect three years ago. Every article about it said this is going to be this huge boom for fundraising but very quickly most nonprofits found that not to be the case."


CRS uses Google Analytics, but it's still hard to see the absolute correlation for the Facebook donations because the tracking gets lost and it becomes a "grey area." They also spend more time promoting and encouraging people to go to their own website rather than the organization's Facebook page, although, the Facebook page is becoming a place where people can go to build and engage in an educated community, Durington said.


"Our commenter's seem to be very educated about global issues," she said. "We have witnessed a lot of some interesting dialogue, not just between us and them but also with each other."
It's an interesting experiment to see what people are talking about. CRS's goal is to boost traffic to their website and have Facebook be a referral point. Durington said that the people going from the Facebook page to their website is in the single-digit percentage but it is equal to the number of referrals they get from Google.


Facebook isn't as reliable as a website but it's starting to be a place were people look for information. "A website is always going to be number one. You shouldn't be using a Facebook instead of a website," Berry said.


ROI for nonprofits is hard to calculate, said Thomas A. McLaughlin, vice president of consulting services for the Nonprofit Finance Fund and contributing editor for The NonProfit Times. One way to see if there is anything happening is to look at the overall fundraising of operations. "In reality, even assuming that organizations have record keeping for this, its almost likely the best we could hope is to calculate a marginal interest on fundraising costs and attribute it to social media if that's the only thing that's changed," he said.


Another reason ROI is so hard to determine is it doesn't translate to mean the same thing for nonprofits. "ROI is popular for for-profit businesses and doesn't transfer easily to the nonprofit world," McLaughlin said. "There is no such thing as an investment in the nonprofit world like there is for for-profits. It would be more of a cost."


One cost expense would be if an organization hired an employee solely to work on social media campaigns or trying to break down the time of an employee who works on overall fundraising campaigns. "If organizations can somehow isolate the employees' times in various elements of fundraising, social media will be one of those elements," McLaughlin said. "If you get lucky enough, some organizations might track what that employee spends their time on. In those cases you might be able to strike some approximation on dollars and time spent on social media."


For the Girls Scouts of Greater Chicago and Northwest Indiana, instead of having one person designated exclusively to social media, they include the social media responsibilities in three marketing team members' job descriptions.


Maria Wynne, CEO of the Girl Scouts of the Greater Chicago area, thinks its important to have a place to go on the Internet for all ages, which is why the Girl Scouts just launched their new website, www.worldsstrongestgirl.org for girls 13 and younger. "It's a place for girls where they can express themselves that is safe, with anonymity and the latitude to be imaginary about a story or tell something that is very concrete," Wynne said.


The website is animated with cartoon-like characters that represent badges. Girls can click on a badge and write a story or create their own badge. "The younger girls are very much about something that interacts and engages them," she said.


For girls who are 13 and older, they want to network and talk with people online. One of the reasons why they created the website was to give the younger girls an entry point for interacting with the Girls Scouts online with an activity that isn't threatening.


"The financial value of those communications is secondary and although some decline in the program and marketing print budget has been realized, the intangibles are a bit more difficult to quantify," Somogyi said. "For example, when girls use social media to reach out to their friends and family members to ask them if they would like to order Girl Scout cookies, there is a financial advantage to the girl and her troop because they have reached more customers, and to the council as a whole because proceeds from the Girl Scout cookie program support how we can best support our membership locally."


On the Girl Scouts' Facebook page, girls and volunteers are connecting and even creating their own Facebook pages for their capstone projects and other programs that the Girl Scouts participate in. The Girl Scouts are also on Twitter and LinkedIn. "I think it's the way people expect entities to participate in the virtual world today," Wynne said. "Along with having a presence, it is for many the practical way of sharing information."


For example, Wynne has seen new leaders and volunteers ask for advice on their Facebook page and almost immediately there are 10 responses from other members of the Facebook group. "It's a mentoring and networking tool for best practices and a way for people to ask for help in the volunteer community," she said.


Justin Perkins, director of nonprofit strategy for Care2.com, has been working with nonprofits for five years with online marketing and donor improvements. He was inspired three years ago to make the ROI in social media calculating tool when Facebook Causes launched to help nonprofits decide if this would be worth their time and money.


"There was initial skepticism that there was a vital business model there (Facebook)," Perkins said. "Before investing time, it was ideal to come up with a tool to look before you leap."


The calculator was created using typical metrics that nonprofits use to measure online success like how many employees or volunteers are working on a social media campaign, how many hours a week they spend on it, how many "friends" they recruit, how many of those "friends" sign up for an e-mail list and ultimately how many become donors.


The calculator allows nonprofits to plug in their information or number goals in a four-step process to see their potential ROI. It can be found on www.frogloop.com/social-networks-calculator


Perkins believes nonprofits that started using social media had a sort of "gold rush mentality" but they need to figure out if it will actually be promising for them in the end. "What's the actual cost? What's the opportunity cost if we do this at the expense of something else? What is something else we could be doing to have a higher ROI," he said are some questions that nonprofits need be asking themselves when using social media. NPT

Senin, 18 April 2011

Why the importance of computer partnership-InformationWeek

The underlying connection was closed: A connection that was expected to be kept alive was closed by the server. For years, the federal government has launched one policy initiative after another to protect critical IT infrastructure in coordination with the private sector. There's been progress, but the threats--computer breaches from foreign parties, fast-spreading worms, and hidden malware--have outpaced the advances, leaving computer systems and networks across industries more vulnerable than ever.

What can businesses and Uncle Sam to, together, it reverse this dangerous trend? There must be three areas of immediate focus. First, the public and private sectors need to share more information--more parties must be included and new platforms used. Second, they must pay more attention to defending against attacks that threaten critical IT infrastructure and even damage physical facilities. Third, their collaboration must be ratcheted up to the next level-the-real-time identification and response as threats occur and, more to the point, "moving security practices from a reactionary posture to one that's proactive and preemptive," says Rich Baich, leader of Deloitte's Cyber Threat Intelligence Group.


In other words, the growing number of cybersecurity "partnerships" being established between the federal government and the business community are more than a one-way street. The feds may be driving the effort through initiatives such as Homeland Security's 2009 National Infrastructure Protection Plan, developed in response to a presidential directive, but companies stand that benefit from the more resilient cyber defenses that result from such collaboration.


The feds have defined 18 infrastructure areas considered essential national interests. They include the agriculture, banking, chemical and defense industries, as well as government facilities. The goal is to protect the computer systems and networks that serve those vital sectors from increasingly winning threats, including those running the hostile actors such as terrorist organizations and rogue nations.



Even the Department of Defense is looking to work with the private sector. When Deputy Secretary of Defense William Lynn recently outlined the DOD's plans for bolstering its cyber defenses, he called for increased cooperation with industry. "With the threats we face, working together is not only a national imperative to, it's one of the great technical challenges of our time," he said in February at the RSA Conference in San Francisco.


Over the past two years, the DOD has developed "active defenses" that use sensors, software, and signatures to protect its military networks. Next, Lynn said, the agency will make its cyber capabilities available to the private sector "to help protect the networks that support government operations and critical infrastructure," such as the power grids, telecommunications networks, and defense will systems.


Several organizations have laid the groundwork for increased collaboration on cybersecurity. Since 2003, the U.S. Computer Emergency Readiness Team (US-CERT) has been providing updates on threats that industrial control systems and other computing infrastructure. The 42,000 members of InfraGard, and partnership between the FBI and the private sector that dates back to 1996, are devoted to it, creating the "actionable intelligence" for infrastructure protection.


Much of the activity revolves around information sharing in key industries. For example, the National Council of Information Sharing and Analysis Centers supports threat response for companies in financial services, healthcare, public transportation, and a handful of other industries.


Information sharing is important, but it's not enough. Scott Charney calls, VP of trustworthy computing with Microsoft, calls the information "and the tool, not an objective."


Industry-specific initiatives are evolving into something more substantial. The Financial Services Sector Coordinating Council, whose members include Bank of America, Citigroup, Morgan Stanley, and Visa, coordinates the protection of the IT and other infrastructure operated banks, insurance companies, and other financial institutions. The council does that work in collaboration with the departments of Homeland Security and Treasury, and in December it took things a step further via a memorandum of understanding with the National Institute of Standards and Technology, Commerce Department, and Homeland Security that paves the way for financial firms and government agencies to work together on the development of cybersecurity technologies and test beds.

Minggu, 17 April 2011

Security against identity theft-the Times Herald-Record

"Nothing in our garbage, if it is shredded," says Robert Unger, CPA and Certified Fraud Examiner Judelson, Giordano on ampersand Siegel in Ashtabula. DOMINICK FIORILLE/TimesStephen Sacco Herald-Record, the FBI says that identity theft is the fastest growing crime in the United States over time, tax – if it is, And the personal information floating around the Internet and in the mailboxes of citizens – is ruthless to prime attempted theft your personal data.Good news: E-submission by the State, the IRS, or New York is safe – in fact, many experts on the security of your computer is recommended. There are also some bad news: you should be very careful, with everything else, including leaving personal information in your mailbox. E-file. Experts argue that electronically is safe, and probably your refund sooner. If not (e) the file, the envelope directly to the post office, not the location in the mailbox. Keep your tax returns on safe safe. Shred documents that you will not have to keep. Do not use e-mail for sensitive information. Be aware of phishing. The IRS's e-mail. If you receive a call that from the IRS, the IRS to verify by calling 800-829-1040. Source: myID. comGreg Miller, owner of CMIT solutions of Goshen, which provides computer support and security for small and medium-sized enterprises, is warning people about a "phishing scams", or in the practice of sending e-mailin order to filch the personal data. These e-mails look very professional and masquerade as legitimate communications from existing companies, or even the IRS. But following the links in the e-takes you to the website of the lousy thugs trying to trick you to give up its information.So, all verified and never give out your password information or social security number, Miller said. Miller also warns that any personal work on an unsecured Wi-Fi network. In other words, don't try to file to your local coffee shop with free Wi-Fi. But even a home network may be vulnerable, how to use WEP encryption — which is 10 years old technology – instead of the more credible the WPA encryption.If nothing, Miller suggests, consultation with an expert on computer. Many people to wireless routers with the encryption in a credible, he said, but I don't know how to turn it on. "It is not hard to turn on (encryption), but it's not intuitive," said Miller. Rob Unger, CPA and Certified Fraud Examiner Judelson, Giordano on ampersand Siegel in Middletown, said keeping information safe has become a major concern for the people who prepare taxes. "Nothing gets in our garbage when it is shredded, '' he said.Unger encourages people never use email for things such as social security numbers, "shred" confidential documents, and let sit in your mailbox.Patrick Turner, a small pond advice in Wallkill, which also provides computer support and security for small and medium business, agrees with Unger. He said that the main rule should be never include any personal information in e-mail. "Email was simply not designed with regard to safety," he said. Turner also suggest updating all viruses and anti-spyware software.But (e) the application is another matter. Most experts advise people electronically. "(E) programs are solid in terms of encryption practices," said Brad Maione, a spokesman for the New York State Department of Taxation, The practice is also lit up. From 11. March of the 3.9 million New Yorkers their state tax returns filed electronically, in comparison with 690,000 New Yorkers, who on paper, said Maione.ssacco@th-record.com
Reader response we reserve the right at any time delete all content from this community, including, without limitation. Please check our Community rules for more information. We ask that you report content that you believe in good faith violates the above rules, click the flag next to the offending comments. New comments are received, only two weeks from the date of publication.

Nokia and Microsoft; partnership to Trump other smartphones? More Telecommunications News

Separate these two technology companies are hopeless in the market of business smartphone, but you can future partnership between the couple themselves ready to crack the business market of mobile – and inevitably defeated rim and Android device?


This is a funny thought.


Finish phone giant Nokia, has announced the latest plans for the kit, all their smartphones with Microsoft Windows phone 7 software that could lead to revolutionary business phone in making.


Offers an alternative to the popular BlackBerry phone can be difficult to market, but the popularity of Windows personal computers and Laptops may, it has unbeatable advantage of the mobile scene.


Microsoft know business, so that plans to crack the market corporate phone comes as no shock, but with Nokia, exclaiming that the 2011 and 2012 will be its "transition years" This means it can be a fair while, until we see all the signs of which joint device press shelves.


However, with Microsoft, the design of its operating system to comply with the marketing instead of it, is he shot himself in the foot before the war even started?


We think that Microsoft should stick to what he knows best and challenge business minds are identical, the partnership with Nokia can mean a "one size satisfies all the" used by enterprises worldwide, or embarrassing plummet in cellular unknown.


What are your thoughts on loyalty? Who do you think will continue to run High as the best business smartphone?

Sabtu, 16 April 2011

Site gives students Web access to Open Source calculation Tools-Campus Technology

A small British company has launched a set of free open source calculation utilities for students. The bamboo Toolbox includes access to software that is developed by open source communities that runs in a Web browser hosted by Hughes Bennett education. If a student wants to save calculations, he or she can register at a "personal laptop" for a small monthly fee.

A dozen utilities create the current offerings, including:

R Project for statistical analysis and graphical modelingGNU Octave for numerical computationsMaxima for manipulating symbolic and algebraic expressionsObjective-C for the object-oriented features add to c routines.

"A major obstacle to the adoption of open source software in higher education is the cost of installing, configuring, and maintaining software. The result is that there are many excellent open source software packages for students, but they are not accessible, because students and higher education institutions do not have the money and staff in the difficult economic climate of today, "said Chi Nguyen, editor of the site. "Bamboo Tools removes that barrier by eliminating the cost of installation and maintenance. Now, students and institutions of higher education can be directly used the bamboo Tools software collection with their studies. "


A subscription of £ 2 per month grants the user access to a single laptop for a tool in the Toolbox. The laptop works like a wiki, allowing the Subscriber work done through the software, including previous iterations. Further information can be found here.

About the author

Dian Schaffhauser is a writer who covers technology and business. Send your higher education technology news to her dian@dischaffhauser.com.

China populating the holes in the ' Great Firewall '-The Independent

It seems that China is moving aggressively to plug holes in its "Great Firewall" censorship system, the frustration for businesses and Web users, foreign Internet companies and analysts.


E-mail service Google Gmail is heavily damaged, as well as several popular online services providing encryption software, which depends on many companies and individuals for site security and bypass firewall.


Analysts said that the problems were followed by a call for tender, the weekly "walks" protests in China, inspired by the political uprising in the Middle East and North Africa and an indication that the Government intends to nipping dissent in the bud.


"Tested the new options to determine whether there are technical means to solve with the possibility of organized opposition," said Russell Leigh Moses, a political analyst at Beijing-based, AFP.


China is still expanding the system of control and censorship of the Internet has been dubbed the "Great Firewall of China", aimed at the wick information or comment, that the Government considers a threat to his authority.


Gmail users complained about the access difficulties in recent weeks, which led some to switch to other services, such as Hotmail and Yahoo!, and Google shows his finger on the Chinese Government.


"There is no technical problem on our side-we checked extensively."It's a Government deadlock on the issue is carefully designed with Gmail, "he said in a statement Monday to AFP by Google.


Providers of virtual private networks (VPN)-encrypted tunnels through the Internet to facilitate secure communications and allow users to circumvent the censors also accuse Government-from the point of sometimes colourful.


"Yes ... The Klingon Empire scored a couple of (z) full of hits on the USS Enterprise, "Bill Bullock, Executive Director of the popular VPN provider, WiTopia, said based on China-in the last email, images from the American television show," star trek ".


At least three other VPN providers found that reports of distortion in China recently.


A spokesman for the 12VPN AFP that providers were, to avoid new entries from China and the period of instability. "


"How can we know that it is part of the Chinese response to the invitation to" walk "as a form of protest," he said.


Appeal on a mysterious online demonstrations in dozens of cities around China, every Sunday created a high security at places designated by the protest. Still no apparent protests have been reported.


China faces growing public discontent over official corruption, inflation and growing income disparities-similar to a combination of factors which contribute to Arab riots.


The Beijing Government as the Middle East mess with unease, in large part, blocking or mention of the Chinese Internet.


The impact of the disruption they are looking for Online users to access blocked sites such as the long time Facebook or Twitter and company.


"It's one more attack, which makes it difficult to get complicated in China," said Ben Cavender, Associate Director of market research group based at Shanghai, China.


He said that the company already faces a tough business environment in China, including foreign complaints to the regulatory environment, which discriminates against them.


"And when they have problems of access to information, it is one more important issue to address."


The Chinese Government has repeatedly said that he has the right to the police station of the Internet. The Ministry oversees Internet issues immediately did not respond to a request for comment on the latest violation.


Some observers said foreign companies are particularly affected, as they rely on access to foreign sites for business.


But Chinese netizens expressed dismay, especially also over Gmail, which is popular with users for white-collar and educated.


"This kind of intermittent interference on the Internet-where users have the patience-seriously affects the rate of use (for Gmail)."It's really despicable method, "said one of the online rules of conduct on the popular Web portal Sina.com.

Report: Wii to the Xbox 360 and PS3 Home Media Magazine

The Xbox 360

Microsoft's Xbox 360 and Sony's PlayStation 3 are closing with the Nintendo Wii game console-epäjatkuvuuskohdan report, Strategy Analytics connected to race home devices


The report shall be calculated on the basis of 43.7 million consoles, has been sold worldwide by 2010 3% from the year of 2009, down to the Nintendo Wii unit sales of remaining in the first place (17.2 million). But its unit sales decreased by 24% and the Xbox 360 and PS3 grew at double-digit rates on an annual basis, add a new driver — Microsoft systems and consoles and Sony have Move Kinect.


David Mercer, principal SR. analyst Strategy Analytics ' Nintendo must act quickly if it wants to avoid becoming the also-ran the TV console on the market, "said. "The Wii is ignored, and even contribute to the establishment of the position in the 3DS handheld computer market, the company cannot afford to exclude the TV market of packing list."

Jumat, 15 April 2011

As threats grow, so demand for the safety of the data-The Tennessean

The underlying connection was closed: A connection that was expected to be kept alive was closed by the server.

PHILADELPHIA Aaron Weaver works in the basement of his Pittsburgh Allegheny Co., Pa, home, making the Internet a little safer.

His skills as an information security specialist are in such demand that his employer, Pearson Education, years of him work from home after he told the education-publishing firm he wouldn't relocate it to Colorado when it recruited him.

With increasingly frequent reports of big companies such as Google, DuPont, GE, and Johnson and Johnson being targeted would be hackers, the "infosec" career field is growing "as fast as the online computing is expanding," said Weaver, 33.

As new technologies spread, sat in the security threats, said David Foote, CEO and co-founder of Foote Partners LLC in Vero Beach, Fla., which conducts independent research on information technology jobs.

"It's the blessing and curse of technology," he said, adding, "It's a slam dunk that work in security."

In 2007, spending on security as a percentage of operational IT spending by businesses was 7.2 percent, Foote said. The 2010, it had increased it to 13.5 percent.

Weaver, the married father of three, graduated from Bob Jones University in 2000 with a degree in graphic design, but he was later drawn that computer science.

"To be quite honest, there wasn't that much money in graphic design," said Weaver, who was born in Quakertown, PA., and grew up in Kenya.

As a security specialist for Pearson Education, and global publisher of print and online educational materials, the Weaver works, assure the security of Web applications related to online teaching and protect user data, such as student grades and teacher-student interactions.

He also ensures that the company complies with a wide array of privacy laws and regulations.

Weaver can rattle off numerous examples of where security needs to catch up to the galloping pace of new technologies.

Think about your smartphone and all those nifty mobile apps you trust with your personal data.

Think about "cloud computing" and how it has shifted much of what you once did on your physical computer's online services, such as photo storage.

Think about the regulations that govern information security that differ from the state's state and nation's nation. "Global companies need experts on all regions and what you can and can't do, '' Weaver said.

Information security is not limited to computers, networks and databases. Security needs are emerging with technological advances in the cars that will soon transmit status reports via email, or smart meters that communicate information about household electric usage, said Ed Schlesinger, head of electrical and computer engineering at Carnegie Mellon University in Pittsburgh.

"There's security, even in the recycling and disposal process," he said, referring to personal data left on devices that are discarded.

Just last week, New Jersey's state comptroller reported much warmer than a third of state computers ready to be sold at public auction still contained Social Security numbers, health records, and child-abuse documents.


View the original article here

Recent events, the challenges of data security concerns-Sioux Falls Argus leader

It is the time of the year in the field of data protection.


CRIS Freiwald for a lot of calls lately from the companies, the suspension of the trade and information security.


The main reason for concern is the series of disasters triggered by an earthquake in Japan, or military battles in countries such as Libya. The threat is local and seasonal, and although predictable, still catches some companies not ready.


"Phone calls we are, therefore, the rivers are rising. I get calls every day, "said Freiwald, which sells business continuity services. "It's a flood, that gets people in this part of the country."


Freiwald is Vice President and General Manager of the northern region CoSentry, Omaha-based company which operates data center in Sioux Falls; Kansas City, Missouri; and two in the area of Omaha.


CoSentry services range from providing backup workstations-complete with telephones and computer-security services for the company's computer data. Some companies rent space for storing the computers back up important data. Clients are, however, increasingly, advancing cloud computing option lease capacity computers CoSentry.


Sioux Falls Center occupies part of the former gate of the building in the North-East Sioux Falls. It shares the building with the warehouse Lewis drug.


CoSentry, promotes as the second largest data center in South Dakota. It routes the lowest super Center-profile for automatic data processing in northwestern Sioux Falls.


The difference between CoSentry and ADP is that CoSentry provides services that help other companies to protect data and commercial activities. The recently expanded ADP Center protects data related to payroll services, which ADP provides to clients on a national basis.


CoSentry launched Sioux Falls in 2005 with the client a single anchor: CNA guarantee. Now has 71 clients. Most of them rent of premises for the common location of the computer.


Data Center is also home. Secure leases the Office space at Cajana, which provides services in the field of technology to institutions such as universities.


Qwest recently for its high capacity, fiber optic networks to combine all four CoSentry data centers in the region. That was the problem for the local and national commercial appeal, said Freiwald.


Midcontinent communications providers, regional, and SDN also have data systems, tied to the Center.


Part of the Centre is being adjusted on the basis of the Colorado financial services business will be run on the device. The company will occupy 42 CoSentry currently stocks from 106 computer chassis, each of which represents the seven feet high.


How to use technology to extend to trade, the growing number of undertakings, which are sensitive to human attack, as well as a national disaster.


Many of the recent challenges to CoSentry originate from flooding feared areas in Minnesota and North Dakota. Freiwald expects a similar rush of flood-related phone calls again next year.


Many companies undertook to prepare even more this year, after last year's flooding problems, said Freiwald. "But they weren't."


Business behaviour is obviously not otherwise than human nature. Procrastination often prevails.

Aruba Networks ® architecture step will speed up the access network of the Enterprise ...-Business Wire (press release)

SUNNYVALE, Calif.--(BUSINESS WIRE)--The rapid onslaught of Wi-Fi-enabled mobile devices presents a number of new challenges to IT departments seeking to speed service delivery, significantly lower network-related costs and mitigate risk. Businesses' access networks are critical to meeting these challenges. The recent and exponential growth of enterprise mobility has fundamentally changed requirements for how these networks are built and operated.



“The granular visibility that Aruba's mobile access network services, based on its MOVE architecture, give us into users, devices and applications, speeds troubleshooting and enables us to improve service quality for every user across the network.”


"The 'centers of gravity' for computing and network architectures have largely mirrored each other through the history of IT," said Mark Fabbi, vice president and distinguished analyst at Gartner Research. "However, the trends of server and data center consolidation, hosted virtual desktops (HVDs) and cloud computing have altered the requirements for network services and how the LAN could be architected. IT organizations can easily overspend on highly engineered, expensive, traditional approaches to campus LAN architectures."


To help companies meet new challenges resulting from these shifts, and to facilitate the evolution from Ethernet port-centric to mobility-centric access networks, Aruba Networks®, Inc. (NASDAQ:ARUN) today unveiled its Mobile Virtual Enterprise (MOVE) architecture. Aruba MOVE provides context-aware networking for the post-PC era. Aruba Mobility Network Services are delivered centrally from the data center across thin mobility access “on-ramps.” With Aruba MOVE, IT organizations have a purpose-built but flexible solution for enabling mobility, and a clear path to shift expensive investments away from legacy wired access networks.


NEW! Industry’s First Mobile Device Access Control (MDAC) Solution for Apple® iOS Devices


Providing easy, secure network access to facilitate the “Bring Your Own Device” (BYOD) phenomenon is one of today’s most significant IT pain points. Aruba addresses this with the introduction of Mobile Device Access Control (MDAC). This solution is designed for zero-touch, secure provisioning of Apple® iOS mobile devices. Recently acquired Aruba Amigopod enables self-registration of mobile devices, automated certificate installation on iOS devices and automated authorization of users. Scalable up to 10,000 concurrent sessions, Amigopod also enables seamless Integration of corporate branding for captive portals, and is fully interoperable with multi-vendor networks.


NEW! ArubaOS 6.1 Mobility Services: Enabling Context-Aware Capabilities across Wireless and Wired Networks


At the heart of Aruba's MOVE architecture, ArubaOS Mobility Services enable the development, deployment and enforcement of a single set of network services that manage security, policy and network performance for every user and device on the network, regardless of access type. ArubaOS Mobility Services are centrally deployed, with private or public cloud-based management. This mobility- and user-centric approach enables a necessary shift away from more than 20 years of Ethernet port-centric network architectures to reduce costs and enable workforce mobility.


Mobile Device Fingerprinting, another key innovation announced today, enables the network to identify and monitor Apple iOS and other mobile device platforms. This capability, combined with Aruba Amigopod and Aruba Airwave Network Management, enable the Aruba MDAC solution.


"Since the beginning of the year, we've consistently had two to three times the number of wirelessly-connected devices on the network as we have staff," said Lee Cullivan, manager of data, voice and security networks at Boston Medical Center. "The new device fingerprinting capabilities and the general level of visibility and control that the Aruba MOVE architecture gives me into users, application traffic and even device types helps us ensure that our mobile network is truly enterprise-grade. Aruba gives us the tools we need to ensure that the network not only works, but that it gives our physicians, patients, visitors and staff the best possible experience."


“A mobility-centric approach delivers better security and easier user administration across wireless, wired, remote office and outdoor networks," said Philippe Hanset, network architect at the University of Tennessee. "The granular visibility that Aruba's mobile access network services, based on its MOVE architecture, give us into users, devices and applications, speeds troubleshooting and enables us to improve service quality for every user across the network."


"Working with Aruba gives Accuvant the confidence that we will have the right solution for our customers' mobility problems, whether they are network-, device- or application-based," said Dan Wilson, co-founder and vice president of Accuvant, an Aruba sales partner. "Advanced features like device fingerprinting and application fingerprinting, combined with the new guest access enhancements are truly helping my customers manage the onslaught of mobile devices on their business networks."


The Next Step: Rightsizing for Mobility


With companies already leveraging 802.11n to reduce the number of Ethernet ports provisioned on their LANs from four ports per person to two- or even one-port-per-person, Aruba’s MOVE architecture enables further cost reduction through "Network Rightsizing for Mobility." Rightsizing for Mobility with Aruba’s MOVE architecture reduces the total cost of ownership (TCO) for the access network by up to 70 percent when compared to legacy port-based network architectures.


"Until recently, we built networks based on the assumption that we'd need four Ethernet ports per person - one each for voice and data, with redundancy," said Mike Redeker, CTO for ATB Financial, a leading financial institution headquartered in Edmonton, Alberta. "The Aruba MOVE architecture lets us rightsize our network for mobility, not only greatly reducing the number of physical ports and cables we deploy, but also giving us the ability to better support our increasingly mobile workforce. Taking a mobility-first approach to access network development has decreased both capex and opex, reduced help desk calls and enabled people to work wherever they need to on whatever device they choose.”


NEW! Ubiquitous, Affordable Network “On-ramps”


For more detail on new Aruba access points and additional products announced today, please see the companion press release here: www.arubanetworks.com/news-releases/aruba-networks-announces-the-mobility-centric-enterprise-access-network/


"In a world where users are always on the move and utilizing more than one device, the need for IT to enable context-aware mobility, which identifies the user, device, application and location is critical," said Dominic Orr, president and CEO of Aruba. "The Aruba MOVE architecture represents a real opportunity for businesses to not only rightsize their networks, but to rightsize their operations. Securely enabling users to work when and where they like results in increased productivity for both IT and users, as well as the opportunity for significant cost reduction."


For additional information on Aruba MOVE: www.arubanetworks.com/the-lan-is-dead


(Hilarious!) Videos – Mobility challenges and Aruba MOVE:


About Aruba Networks, Inc.


Aruba is a global leader in distributed enterprise networks. Its award-winning portfolio of campus, branch/teleworker, and mobile solutions simplify operations and secure access to all corporate applications and services - regardless of the user's device, location, or network. This dramatically improves productivity and lowers capital and operational costs.


Listed on the NASDAQ and Russell 2000® Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, and Asia Pacific regions. To learn more, visit Aruba at http://www.arubanetworks.com. For real-time news updates follow Aruba on Twitter and Facebook.


© 2011 Aruba Networks, Inc. Aruba Networks’ trademarks include ®, Aruba Networks®, Aruba Wireless Networks®, the registered Aruba the Mobile Edge Company logo, Aruba Mobility Management System®, Mobile Edge Architecture®, People Move. Networks Must Follow®, RFProtect®, Green Island®. All rights reserved. All other trademarks are the property of their respective owners. Specifications are subject to change without notice.


Forward-Looking Statements


This press release contains forward-looking statements, including statements related to expected benefits and availability of our products, expected performance of our products, anticipated demand for new products and features offered by us, future market and customer demand conditions and position of our products in the market. These forward-looking statements involve risks and uncertainties, as well as assumptions which, if they do not fully materialize or prove incorrect, could cause Aruba's results to differ materially from those expressed or implied by such forward-looking statements. The risks and uncertainties that could cause our results to differ materially from those expressed or implied by such forward-looking statements include our ability to react to trends and challenges in our business and the markets in which we operate; the adoption rate of our products; shortages or price fluctuations in our supply chain; our ability to compete in our industry; fluctuations in demand, sales cycles and prices for our products and services; and our ability to successfully market and transition customers to next generation products; as well as those risks and uncertainties included under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations," in Aruba's report on Form 10-Q for the fiscal second quarter ended January, 31, 2011, which was filed with the SEC on March 11, 2011, and is available on Aruba's investor relations Web site at www.arubanetworks.com and on the SEC Web site at www.sec.gov. All forward-looking statements in this press release are based on information available to us as of the date hereof, and we assume no obligation to update these forward-looking statements.

Kamis, 14 April 2011

MIT and the University of Wales, train cyber technicians-ComputerworldUK

University of Wales may become one of the Great Britain in particular, computer education and training centre after the recent Conference produced a lot of work with the prestigious MIT geospatial data centers in the us.


What will emerge from cooperation in concrete terms, it is still unclear, but the Declaration after the Summit this week in Cardiff this week spoke of an agreement, "working together to create solutions for cyber security leadership and training, an agreement that will be Wales, led by developments in this area."


WikiLeaks-fearless nevymenovaly or irresponsible nuisances? Updates with latest developments. Read more:


"The Conference came to the conclusion that the multidisciplinary team it is necessary to solve the problems of cyber security and that the United Kingdom and the United States will have to produce thousands of experts in this field, in the next few years," said Professor John Williams, Director of the MIT geospatial data centre.


As well as University and MIT in institutions such as Harvard University, the University of Oxford, the University of Memphis, Boston University and the University of Central Florida.


Currently in Great Britain, becomes the cyber security training in FF. scattered way University courses throughout the country, or through the computer science engineers, who professionally later change in the direction of their career.


Stenografu as some outside expertise and the experience gained from the preparation of which the UK is still lacking, even if there is a lack of trained personnel in the US, as it stands.

Rabu, 13 April 2011

HTC Thunderbolt new sense comes to Verizon 4 G-Gulfstream news

HTC Thunderbolt new sense comes to Verizon 4 G-image using Youtube


The introduction of a new sense of HTC, HTC Thunderbolt Smartphone is useful and exciting and is available at Verizon. Processor 1 GHz Snapdragon for packing and running on Android 2.2, it seems a little large handset first.


Display touch 4.3-inch (WVGA) only added already nice features. Phone has also kickstand as part of its base, which hides the Dolby SRS speaker.


"We are proud to not only import one of the first 4 G LTE Android smartphones on Verizon Wireless network, but to offer people an unprecedented speed and ease of use, which Thunderbolt HTC granted for them," said Jason Mackenzie, President of HTC America. "What makes 4 G so compelling is not only technology, but what the technology allows people to make. With HTC and Verizon Wireless Thunderbolt 4 G LTE 4 G network is brought to life by remaining connected with friends, family, and content faster than ever before possible people. "

HTC sense 2.0 will include widgets, which will enable the consumer to live updates from Twitter ™ and FaceBook ™, as well as forecasts of the time, ensuring continuous updates. As a large plus sense will help if you have lost your Thunderbolt and is nearby. Through the use of protected HTC Web portal you can signal your HTC to ring their loudest, even if it is set to vibration.


In the Web portal, access to the HTC sense, allows the user to send calls and messages, if cellphone is leave elsewhere and it is Inconvenient to retrieve. All these features and more make this HTC annex must have. Through Mobile HotSpot you can share 4 G network with up to 8 WiFi capable devices.


Update: according to the latest news HTC sense is to be included, HTC sense, the site does not reflect maintenance at this time.


* Update: according to various sources, Skype ability seems to have disappeared as well.

It is surprising that the UK loves social networking best-Telegraph.co.uk

According to Experian Hitwise reportis the latest social networks like Facebook and Twitter the UK's favorite online destinations, banks entertainment places such as the BBC iPlayer and Channel 4 's website from the top.

Analysts say high UK Facebook adoption and usage leads to the increased popularity of these sites. In fact, last month Facebook announced that it now has 30 million registered users in the UK alone – accounts for half of the population.

The watering down of the two spaces, social networking and Entertainment Web sites, also accounted for the increase in UK traffic to the likes of Twitter.

Robin Goad, Experian Hitwise Research Director, said: "the relationship between the two categories will get much closer with more and more people sharing content from entertainment sites on social sites such as Facebook. Increasing social networks plays host to content from Web sites, entertainment. This does not mean people do not longer have to visit the sites or the content of entertainment, but it just means they now work more with the material, they often look first via a social network – when a friend has shared a link on a site like Facebook – rather than going directly to the source Web site. "

This idea of social networks will be "web in the web" has long been Facebook founder Mark Zuckerberg ambitions. His vision, which he shared at the recent Summit in Web 2.0 in San Francisco, is that everything online should be interpreted using social and only businesses that enables social features of their online presence will win in the traffic and consumption.

On the stage provided Zuckerberg own evidence showing that a social version of an existing product always wins, and not surprisingly, chose to give an example of his own website success. In fact, it was an apt. He spoke about how Flickr, Yahoo!-owned photo sharing site, which was the largest and most popular online destination for people to share and store pictures, was great. However, when Facebook came, took over the lead in the same room, because it had people and greater social elements, so that users could really work around content.

According to Zuckerberg the next five years almost every vertical on the Internet product will be social as people will generally not make recommendations from friends or followers on what they should see, read or listen to online.

And it is this growing love for all social sites that have driven Google's hunger to create its own social network, the service so-called circles , rumors, which made the rounds earlier this week. For Google know better than anyone that social networking sites are quickly becoming the dominant force needs online and it is a piece of the action and quickly.

Selasa, 12 April 2011

Ovum: The Android will fuel a Smartphone market, doubling from 2016-FierceWireless

Global shipments of smartphones will reach 653 million by 2016, double the amount sold in 2010, according to a new forecast by the company, market research, ovum. The company is convinced that Google's Android platform will be a driving force for this abrupt, which will see the category for the device of the Smartphone has a CAGR of 14.5% between 2010 and 2016.


During this period of axis of Google will competed at Apple iOS with 38% share of the Smartphone market, compared to the Apple 17.5 percent, according to ovum.


"The Smartphone Market will see a significant increase over the next five years, outperforming the wider market of mobile phone," said Ovum analyst, Adam Leach in a statement to the press. "For the success of the Android platform is managed by the sheer number of vendors of hardware, supporting it on high and low end of the market."


According to the latest forecast of Ovum 17.5% of the market share held by the Angel iOS in 2016 will be only on a Microsoft Windows phone 7 to 17.2 per cent, which in turn will be followed closely by the BlackBerry OS in 16.5%.


Hedging his bets, Leach added: "we expect at least one other platform to achieve mainstream success at the time of the estimate. This can be an existing player on the market as Bada, WebOS or MeeGo, or is a new entrant in the market place. "


Note analyst contends that Nokia/Microsoft partnership has the potential to revamp of the Smartphone market, which will see a significant reduction in the number of based on the Symbian phones were shipped in the world, such as Nokia switches in Windows phone as a Smartphone, which is the selected axis.


However, the ovum study highlights the potential problem for Microsoft, that other handset vendors currently supporting Windows phone may sailed away the alternative OS vendors if competition of Nokia became too fierce.

Ottawa urged to fight with the grid hackers-Vancouver Sun

Computer hackers are infiltrating the distribution in Canada, say insiders, industry, who want the Federal Government to act.


"Of course we know from our customers that have been infiltrated their systems. It already for some time, "said Doug Westlund, President of N-dimension solutions, company, Richmond Hill, Ontario, computer security, which works with national instruments.


"You don't even know who they are, but are close to home."


Westlund, whose company is part of a research project sponsored by the United States Department of energy to protect the emerging digital "smart grid" against cyber attacks, compared to the penetration and exploration of the American intelligence system incidents in 2009.


You also allegedly embedded software cyberspies in tools for computer, which would disrupt future services. Officials speculate, Russia or China was responsible.


Westlund said that Canadian intrusion think that was the transition to the systems and their controls to embed malicious codes.


Francis Bradley, a Canadian Electric Association, said that "sometimes, we see potential attacks" against portions of the grid.


"Intrusion detection Systems on the company to pick up some of the people effectively ping servers. We haven't seen the loss of energy to customers as a result of the cyber-attack. "


Security jitters about North American power system interconnected deepens as the industry evolves from largely isolated systems electromechanical world into the grid, built around the interoperable, wireless digital technology. The objective is to optimize the production, transmission and distribution.


The most disturbing change includes tens of millions of wireless "smart meters" installed in homes and businesses for faster and more effective two-way communication with the local Utility, which subsequently combine operators of transmission and generators.


"There will be greater and greater potential for cyber attack, because there are potentially multiple vectors of attack," said Bradley. "It is real. I see that the types of resources that companies are putting into it and they even devoting a number of resources that are on IT security on an ongoing basis, if it is not real. Their answer is proportional to the threat and the response is significant. "


But understanding the shrill claims that smart grid is dangerously insecure.


Capture of critical infrastructure is going on in tandem with the militarization of all on the Web-and Governments are responding.


The US said its digital infrastructure a strategic asset and computer security a priority of national security. Britain has computer security a matter of the highest in its national security strategy.


Canada last fall revealed the national cyber security strategy, which is similar to the more political than the framework action plan, with which many for a measly $ 90 million in the five years of funding.


Bradley, who in the past criticized the Federal inaction, but now it seems that her Government confirmed.


"For the first time in many years, at least on IT security, I'm very positive steps the Federal Government, it seen." He refused to elaborate.


The news came out this week that security chiefs in Britain have signed up, Prime Minister David Cameron's press company responsible for the critical national infrastructure, including the National Grid, the Government agency electronic spy watch for hackers on their systems.


Unlike water or gas electricity cannot be stored in large quantities; must be generated and then immediately use. It is in the world of extreme just-in-time commodities.


This means, for the production and the transfer operation must be monitored and controlled by doling out millions of wireless devices across the continent to the Internet, potentially all the time, still exposing system able to hackers and other cyber attacks.


It is the arrival of smart meters, which potentially opens up a huge new front "ways of attack" that could allow sophisticated intruders access to the system-for anything from attacks denial-of-service and identity theft, stealth attacks on power stations.


Most models of smart meters now have at least basic security functions, although the instrument-sponsored tests in the us are still successfully hacked into some.


"The general consensus among colleagues and most of us in the security business, the technology of intelligent meter out of security technologies," said Mark Weatherford, Chief Security Officer for Washingtonbased North American Electric Reliability Corporation. NERC enforces reliability standards for North America, a huge and interconnected bulk power system of generators, transmission lines and control systems.


Although the smart meters are next to the distribution grid, Weatherford fears could manipulate to distort the balance of the generation and transmission.


For example, the hacker can exploit some of the common errors in metres, serves the city could potentially turn off 100 000 or more meters, or "flip" the power on and off, causing the electrical load back through the system, tripping breakers "ripples", throwing power plants offline and, where appropriate, frying equipment.

Senin, 11 April 2011

T-Mobile to astound (Nokia C7) breathes life into Symbian-Digitaltrends.com

Nokia may be to Windows phone, but with T-Mobile to astound (C7), it shows that with a few necessary upgrades, Symbian is still able to function as a good basic Smartphone.


Nokia may have signed a contract with Microsoft, but it is not ready to abandon Symbian just yet. While it readies its first batch of Windows phones, the Finnish handset maker gives Symbian, one more shot in the market of the United States. Together with T-Mobile, wireless operator, which will similarly transferred himself to AT&T in the following year, he was placed under a new name C7 friendly "T-Mobile Astound." and astound it does. It took a complete death of the American market, but Nokia has fixed some of the most Glaring problems with the latest shale Symbian devices and we are happy to say that C7 is respectable beginner device for those who want to Wade is not plungein the land of smartphones.


If you used the Nokia N8 or other recent Symbian devices, the first thing you'll notice is how beautifully to Astound. Nokia took steps to speed up the responsiveness of homescreens and app Starter C7 and their efforts are well worth it. With widgeted homescreens Symban 3.0 Astound looks and acts as part of the Android and iOS band.


Combined with its optimised response speed is a new QWERTY keyboard for landscape and vertical orientations. Better still comes with a tap, the same finger slide to the type of service that has been implemented in a number of Android devices. The result is much more usable and efficient than the old T9 keypad Nokia and old Symbian 3.0 keyboard. I'm not very familiar with the press, since I am still stuck with the original Motorola droid, but I picked up it fairly quickly in testing, C7. The keyboard is still used a few tweaks, but I'm not complaining. This is a good step forward for Nokia.


In the era of mobile Web pages on previous Nokia Symbian 3 browser is completely unacceptable. It has a navigation and sensation of five years mobile browser and its implementation is dreadful. In response to these criticisms Nokia was built a new browser for T-Mobile to astound in the set with popular tools that WebKit is the same technology that is at the core of the Apple Safari, Google Chrome and many mobile Web browsers.


Izvinâvam of how quickly the agent passes through the browser in the video below, but rest assured that it rendered pages with competitive speed and I had no problem shearing-to-zoom and other essential functions. Nokia also has a tool button in the lower-right, which brings up a menu with options, if you want to do something like find the bookmark.


Nokia C7 (T-Mobile to astound) has a touchscreen AMOLED of 3.5-inch and relatively thin frame 10.5 mm. It has 8 GB of internal storage, MicroSD slot and supports T-Mobile "4 G" HSPA + network. Cannot find out how powerful processor or how much RAM is the device, but it is made from 60 percent recycled material, which makes it a pretty green phone. Press releases of Nokia tout how energy efficient your phone as well.


And finally, one of the strengths of Nokia has its Chambers and C7 8MP camera comes with a solid dual-LED flash. For Smartphone camera it performs very well as most phones of Nokia.


You will not be fair if I did not mention that there is a host of obsolete and ineffective functions inherent in the Symbian. Although shot in the arm of Nokia has given the aging OS its problems will shine through, if you use the device for more than its main functions. Not recommend C7 (and neither does Nokia) for advanced users, but beginners can do far worse. With that said, if T-Mobile to astound is sign of things to come from the Finnish handset maker, marked me as interested.


Astound will hit T-Mobile on 6 April for $ 79.99 with contract for two years.

Minggu, 10 April 2011

Facebook At Google Dealmaker-Wall Street Journal (blog)

Facebook Google Director of engagé part to foster corporate development, Amine, Zoufonou, that his principal entreprise development, where his responsibilities will include other specialists probablement embauche development business with ofisy'el data with our partners.

The signaux Braconnage intensifier competition for talent between the two sociétés and is Facebook in February embauche de Google Chief de vente in Latin America. Last year, Facebook also engagé real estate executives and engineers a software key from Google to embrace.

A Facebook spokesperson told Hilboroug that Zoufonoun will begin developing Facebook in the coming weeks, and will report to Vaughan Smith, who supervise the development of corporate efforts in social giant réseau.

Zoufonoun, 40, Google in 2003, where he was a senior member of the team entreprise development giant looking. LinkedIn profile was according to him, he was '' in talks on strategy and execution, evaluation, and negotiator of the fusions, Google data and investment. "

Zoufonoun noted that he was directly involved in a number of business strategic product initiatives, and directed '' key strategic and investment data '' On2, Grandcentral, (Google Voice), and Feedburner.

Additionally, Zoufonoun, a law degree from Santa Clara University Technology Apiary School of the law, said he sent a number of application inventeur on a Google patent.

CTIA 2011 wrap-up: Android again-CNET is dominated (blog)

After a Hectic fall CTIA Show, CES and World Mobile Congress, we suggest that the spring CTIA Show will be quieter. It is also not was the bombshell, reduced AT&T two days before the concert began.


News of the proposed merger was followed on Monday by Google forces with Sprint to Google voice almost any Sprint phone. The announcement went hand in hand with the Sprint news that it has added to Android 2.3 gingerbread series 4 G-link s to the line-up.


Speaking of Sprint, the carrier unveiled two spinoffs of its Android-powered Evo brand, made by HTC. There has been no HTC Evo 3D--which offers a lensless 3D experience for photos, videos and games--and the HTC Evo view tablet rebranded, 4 G-ready version of the package insert for HTC, we saw in the world Mobile Congress.


HTC is the only manufacturer to trot, 3D phone. LG strikes back with their LG thrill for AT&T, the American version of LG Optimus 3D first glimpsed in Barcelona, Spain, last month. Like its competitors Evo 3-d thrill comprises two 5-megapixel camera on the back for shooting 3D video and stills traditionally. LG also has a T-Mobile G2X, our picks for the top phone, and yet another rebrand of dual Android phone, the LG Optimus 2 X, the first of the CES. To round off its Optimus topic cricket announced Optimus c for LG, and later in the line of inexpensive, basic Android Optimus.


In addition to the Optimus c two more Android phones joined the Cricket Board, Samsung Galaxy, ekzoticniât and 2 for ascent of Huawei.


Android March continues with the integration of HTC, the first CDMA Android phone world of the manufacturer of your phone and three new tablets to accompany the HTC Evo view. Has the Acer Iconia in section A501, 10-inch, dual, 4 G-Android 3.0 Hexagon efforts. Samsung also made two tablets to join his family in the section, the extraction Galaxy 8.9 of Samsung and 10.1 tablets, which now are hair fine iPad the Apple 2. Not only have many more premium authorities tab for the first Galaxy, they also sport the new Samsung TouchWiz UI UX to play nice with Hexagon OS.


Androida devices again dominated the show, except for the HTC HD7S, Windows 7 phone, which is almost identical to the HTC HD7 for T-Mobile, with the exception of its improved Super LCD screen, and Nokia Symbian phone Astound, new to T-Mobile.


For the first time in a long time BlackBerry has very little presence and announced no new phones. One peep, we hear is that BlackBerry tablet PlayBook will be able to run Android applications. Although the news landed during the CTIA, it has not been brought to after the show floor is closed.


Take the final trawl through all the other big news, videos and photos of the week.

Experts: Vehicle systems can be hacked-UPI.com

SAN DIEGO, March 16 (UPI)--computer systems in modern cars are susceptible to hacked, allowing criminals to gain control of them remotely, American security researchers say.


A team of security experts from the University of California, San Diego and the University of Washington has identified a number of vulnerabilities through which hackers can gain access to the computer system of the vehicle remotely, NewScientist.com reported Tuesday.


In one test was attacked by a cell phone hardware installed in luxury cars, allowing the team to inject malicious code into the electronic management of the car.


In theory the hackers would then sell the car thief, giving them their position and the unlock is remotely.


The team also managed to take control of the car using malicious applications on Smartphones with Bluetooth system in the car.


Another weakness identified was a stereo system, as the scientists were able to show that the software embedded in the MP3 file to install the firmware into the car, allowing similar abuse.


Previous research has revealed how an automobile computer systems could also be accessed via the on-board diagnostics port, the access point usually used by dealers and repair businesses to download data on the health of the vehicle.

Sabtu, 09 April 2011

The AT&T LG Thrill 4 G, HTC and Acer HD7S: hands of Iconia Tablet-PC Magazine

We round the new AT&T devices in the CTIA trade show.

ORLANDO – AT&T debuted two new phones and tablet in the CTIA trade show this week, including 3D phone and large screen Android tablet from Acer. I got some hands-on time with the versions of the three products, although two of them are not ready for prime time.


LG thrill 4 G is the American version of LG Optimus 3D and LG and AT&T are showing a model of International Optimus 3Ds and says they are working in the same way as the thrill of will. Well, then.


The thrill of 4 G is no glasses 3-d display, the HTC EVO 3D for Sprint. But there are some major differences between the two 3D phone. The thrill of 4 G is the lower resolution 4.3-inch screen, 800 x 480 for the difference of the EVO 3D 960 x 540. This makes the 3D content look grainy on LG phone. 3D videos are less sharp, but strange labels for a little easier to focus on and viewing angle seemed wider than pure EVO screen.


LG thrill there is also a 3D user interface option, rotating Carousel of icons, which allows you to live in a world only for 3D. You can switch from 3D Carousel 3D games, YouTube, images or video. EVO 3D interface is everything in 2D.


Thrill characteristics reflecting HDMI, which is very pure: the T-Mobile LG Optimus 2 X, if you turn on the HDMI cable, the phone will play anything of their screen-including games and streaming video-TV. This even can extend other video streaming apps like Hulu and TV.com, although AT&T still have the possibility to conclude that down at the last minute.


And how about this 4 G? LG largest revenue are a little unclear how fast the new phone is actually a global version is HSPA + 14.4, which is not quite 4 G, but LG Republic said that the version of the United States may be HSPA + 21, which is more widely accepted as 4 G speed.


Also as EVO 3D and LG G2x, thrill 4 G is a dual phone. This phone has a 1 GHz dual processor TI; EVO has 1.2 GHz Qualcomm unit, and is 1 GHz Nvidia G2x.


All told, the thrill of 4 G look good – but the EVO 4 G look a little better.


HTC HD7S is a new Windows phone for AT&T, and is somewhat of a hybrid: take the hardware of the T-Mobile HTC HD7, large touchscreen Windows plate and add the software from the AT&T HTC surround, which is the AT&T U-verse mobilenT?rgovec AT&T and such. A change in the hardware: the screen seems to agree the LCD technology for Super-LCD, (this is the "S" in HD7S), but honestly, my time with it, could not understand what is all that great for display. This is a nice LCD, just not alarming in any way.


No new land is presented here. HD7 is large, useful Windows phone. So it is HD7S. Perhaps HD7S will have the strongest negative effect on similar HTC surround the AT&T, which is thicker because it includes a large, sliding and not very useful microphone.


The AT&T Acer Iconia tab A501 is declared as a surprise today, but this is a long way from release. Acer and AT&T says that comes this summer, so that you will have to Excuse this opinion Hexagon based, 10.1-inch tablet running entirely unsuitable Froyo OS in the show. The section "Iconia" is a large, relatively thick and heavy Nvidia Tegra 2-powered plate, it seems designed to give AT&T something to rebut the Verizon Motorola Xoom, the Sprint HTC EVO view and T-Mobile G-slate with.


Tablet has a 5 megapixel camera on the back and 1.3-megapixel camera, HDMI output, and the same HSPA + modem, although AT&T does not say how quickly. Honestly, it is difficult to say how will sustain this tablet on the market, especially if AT&T gets hold of the sleeker Samsung 10.1 of the Galaxy. Unless Acer model is cheap, it looks a little container. I play the game of the Tablet, and Nvidia chip inside delivered the usual excellent graphics performance – but without the honeycomb Board yet, it is difficult to see how the tablet really will work for most tasks.