Home » Archives for September 2011
innervice.blog will soon be posted independently
Posted in
more
|
Thursday, September 29|
gugelian
5 Tips To Set Your Business Up On Twitter
Posted in
know-how
|
|
gugelian
Millions of businesses all over the world are jumping on the social media bandwagon and when used properly this medium can generate some really juicy leads. However, if you’re not using it properly it’s going to end up sucking time and even damaging your businesses reputation. One of the most common social media tools businesses are getting more and more involved with is Twitter, this tool is about more than listening to celebrities telling you what they had for breakfast – it’s a way to get your brand out there and show your customers the people behind the your business.
So what can you do to make sure your using Twitter in the most effective way possible?
Simple User Name
Think of your Twitter username in the same way you’d think about your website URL. It needs to be simple and easy to remember and as unambiguous as possible. Avoid using words that could have more than one spelling and avoid account names with numbers in (people may be unsure as to whether the number needs to be spelled out or written in its number form). You also want to try and avoid anything too pretentious otherwise you’re going to be alienating a large number of potential followers/customers before they’ve even got to your account.
Take Advantage Of What’s On Offer
Twitter gives you that chance to really sell yourself/your business on your home page, make sure you’re using it. Again, think of your website, your home page meta description is going to be as concise as possible whilst getting some important keywords in there too. Your Twitter description needs to do the same – clear and to the point. You’ve also got the chance to leave a URL in there and you can customize the back ground. If you’re going for the tiled background option make sure it’s not too busy or distracting from the rest of the page.
Shout About Your Account
The chances are your Twitter account isn’t going to just fall out the sky into the laps of the people you want to follow you. Make sure you’ve added a link to your Twitter account to your website, your blog, even in your email signature so people know about your account. Add it to your list of social sharing options so people can share your content. If it’s a new account you might even want to do a quick email shot to let all your clients/suppliers know about it. Once the basics are done guest post on some important blogs in your industry talking about what you know about and include your Twitter account in the resource boxes/author bios.
Manage Your Time
One of the biggest problems when you first start a social media account is managing your time and making sure it isn’t all sucked out. You can quite easily spend hours jumping from one Twitter account to another, getting drawn into conversations and exploring various accounts – this isn’t going to be productive. The first thing you need to do is set yourself a time limit then set yourself a task, if you’re looking for people to follow make sure you’re only looking at relevant accounts. If you’re engaging with other people decide if you’re promoting your business or responding to customer or potential customer queries.
Use Useful Tools
There are plenty of tools out there to help you automate your account and your tweets, while it’s not recommended you automate your entire account scheduling a few automated tweets a few times a week will keep your account active. If you have more than one person managing your account you might also find it helpful to use one of the collaboration tools available. One of the most important tools you’re going to want to spend some time with is a monitoring tool that lets you know when your brands (or any other keywords) are mentioned so you can make sure you’re on top of all relevant conversations.
Jesse works for Mozaico who have seen some great benefits from using Twitter to promote their mosaic and art tiles business.
source : http://tips4pc.com/
source : http://tips4pc.com/
Amazon Kindle Fire Just Hijacked Android
Posted in
tech news
|
|
gugelian
One aspect of the Amazon Kindle Fire has consistently been understated by the Amazon team: the Kindle Fire runs on Android.
Amazon didn’t hide the fact that Android powers the Kindle Fire — and allows it to access Amazon’s Appstore for Android — but the message is clear. This is not an Android device; this is an Amazon device.
As John Gruber noted on his blog, the only mention of Android on the Kindle Fire product page is in reference to the Amazon App store.
A True Android Market Alternative
When Amazon launched its Appstore for Android in March, some wondered why Amazon would bother creating an alternative to the Android Market. Now the reason is clear: it allowed Amazon to provide access to apps on its own devices.
Amazon will vet app submissions, just like Apple, and ensure that Kindle Fire users have access only to the apps that work on their device. And while we’re sure that Android hackers will be busy rooting the Kindle Fire, a la the Nook Color, we’re equally sure that Amazon will take as many precautions as it can to keep the device untouched.
The Appstore experience on the Kindle Fire is completely customized, as opposed to the free-for-all Appstore APK for Android devices. And, unlike regular Android — which can exist without the Android Market — Amazon’s approach is much more akin to the way the App Store is built into iOS.
In short, the Amazon Appstore is a fundamental part of the operating system.
A Fork or a New Skin?
Amazon is not the first company to use Android for its devices, only to customize the UI and add its own App Store. Practically every major phone manufacturer has some variation of its own Android UI skin and Barnes & Noble has taken the liberty of hiding most of the Android elements from the Nook Color.
Still, Amazon’s customization of Android goes above and beyond re-theming the interface. Amazon has created its own apps for email, video playback (using Amazon Instant Video), music and books. The Kindle app, while similar in appearance to Kindle for Android [Android Market link], is slightly tweaked and looks distinct in its own right.
Amazon is using Android 2.3 as its base, not the tablet-specific Honeycomb, and we expect that the company has taken the opportunity to optimize 2.3 specifically for the Kindle Fire’s hardware.
Likewise, instead of applying tweaks to the basic Android web browser, Amazon chose to build its own: Amazon Silk. Silk operates both server-side and on the device itself, and is tuned to deliver content quickly and efficiently.
On nearly every Android device I have used, even those which are disguised not to look like Android (like the Nook Color), Android elements still creep into the system anyway. That’s not the case with the Kindle Fire, as it looks like Amazon has taken every step possible to fully customize the interface.
For this reason, I consider what Amazon is doing a fork — that is, taking the software in such a different direction that it no longer conforms to its original guidelines. It is, perhaps, the first true fork of Android. Because much of Android is covered by the Apache license and not the GPL, Amazon won’t even have to commit most of its changes back to the main Android branch. It also means that Amazon can choose to deviate from the official release cycle, focusing on customizing or adding functions to Android 2.3, rather than adopting Ice Cream Sandwich.
We expect Amazon to start courting Android developers to make customized Kindle Fire-specific versions of their apps.
source : mashable.com/
Twitter Revenue to Hit $400 Million By 2013 [STUDY]
Posted in
tech news
|
|
gugelian
The success of Twitter‘s Promoted Products will propel the company into $400 million in revenue in 2013 compared to $45 million last year, says a new report. Twitter will earn $139.5 million this year, a 210% jump over last year, according to eMarketer. Debra Aho Williamson, principal analyst at eMarketer, credited Promoted Products’ success for the rosy estimate.
“Since their debut in April 2010, Twitter’s Promoted Products have proven successful in the U.S.,” Williamson said in a statement from eMarketer. “Marketers have shown solid engagement rates with Twitter advertising — in some cases better than those on Facebook — despite Twitter’s relatively smaller audience.”
Twitter has 100 million active users compared to 800 million for Facebook.
The growth estimate for Twitter in 2011 is downgraded from eMarketer’s previous prediction of $150 million in revenues in January, a function of Twitter’s slower-than-expected rollout of various ad initiatives, including a self-serve ad platform and ad sales offices abroad. Twitter just created a sales staff in the UK– its first foreign office — this month, which is why 96% of Twitter’s ad revenues will come from the U.S. this year, eMarketer predicts. The researcher says that by 2013, 88% of revenues will come from the U.S.
Image courtesy of Flickr, Shawncampbell
source : mashable.com
USB SIM Card Reader Tool 3.0.1.5 free download
Posted in
software download
|
|
gugelian
Sim card information Backup Machine recovers accidently deleted inbox, outbox, draft messages, address book etc. Datopal SIM Card Micro SD/T-F Card Reader is used with every sim for the purpose of lost sms recovery. Sim card processing tool is used for reading and scanning of sim card and also for recovering the lost forensic information. Sim card data protector manager utility provides very quick and easy solution for retrieving the corrupted sim card data items. Information backup device easily work with all major brands of GSM technology based mobiles phones like Sony, Samsung, Motorola, Siemens etc. Sim card editor PC/SC compliant smart card recovery application restores message sender name and number. This program supports all types of card readers like Dualkey, ACR38DT, M-SIM, ESR4618, Backup Device LG-SBD-002, ACT30, ACR38T, GT-CR-003 etc. Mobile phone sim card reader/writer utility supports all kinds of sim card readers, manufacturer, maker, seller and hardware. Tinpec Super Mini Micro SD/T-Flash card reader is non-destructive and read only software that recovers all important data when your sim is not locked and does not require Any Password or pin code usb 2.0 and win98.
Features:
* Multi card reader has the attractive GUI facility that helps users to operate.
* SIM card information backup machine works on all windows versions like 98, 2000, 2003, XP, ME, NT, Longhorn, Vista and Server 2008.
* USB SIM card data protector restore GSM technology based mobile sim card service provider name SPN and identification number ICC-Id.
* Data Recovery tool recovers all deleted text messages, contact name and numbers.
* Salvage data when your sim is not locked.
* Contact reader software also gives a print option for printing all the information of recovered data.
* Software rescue data from sim card related to any country and network. you can free download USB SIM Card Reader Tool 3.0.1.5 now
Features:
* Multi card reader has the attractive GUI facility that helps users to operate.
* SIM card information backup machine works on all windows versions like 98, 2000, 2003, XP, ME, NT, Longhorn, Vista and Server 2008.
* USB SIM card data protector restore GSM technology based mobile sim card service provider name SPN and identification number ICC-Id.
* Data Recovery tool recovers all deleted text messages, contact name and numbers.
* Salvage data when your sim is not locked.
* Contact reader software also gives a print option for printing all the information of recovered data.
* Software rescue data from sim card related to any country and network. you can free download USB SIM Card Reader Tool 3.0.1.5 now
thanks to http://www.brothersoft.com/
Complete Cleanup 5.2 free download
Posted in
software download
|
|
gugelian
This software will cleanup all major browsers. This works with all versions both past and present.The software displays all your file statistics, improves pc performance, and cleans up all cookies, Cache files, history files, ActiveX controls and java applets, search engine data and auto forms data, previous passwords and userid entries, index.dat files, MRU's, and the location bar.This includes a free spyware system review for you from an actual programmer, and spyware cleanup if necessary. The application also allows you to scan and find all duplicate files, and performs many other disk cleanups, including your recent documents list, temp files, system startup list, and various registry entries, along with the ability for secure file wiping, so the cleaned files cannot be recovered at a later time.Cleanups can be run automatically in the background, and a built-in cache viewer is also provided which allows you to view the found files an Locations. You can even choose to keep or view individual cookies, and you can enter any of your own personal cleanups which you would like to customize for your cleanup list.Complete Cleanup will Improve the performance and disk reading speed of your PC.
Here are some key features of "Complete Cleanup" Serves dual purpose -> Protects internet privacy and frees up disk space. All cleanups found are garbage files only, and the software will safelly remove for you! You do not need any knowledge of computers to use this software. You can choose specific cleanups to perform, or easily "clean all" with one button click. This software has been in use by many for years, and continually enhanced, so it's thoroughly tested. Safely cleans out and removes cookies, web history, browser cache you can free download Complete Cleanup 5.2 now.
Full DVD Ripper Pro 9.0.10 free download
Posted in
software download
|
|
gugelian
Full DVD Ripper Pro rips DVD movies to AVI, MPEG, WMV, DivX, MP4, H.264/MPEG-4 AVC, RM, MOV, XviD, 3GP videos, as well as rips DVDs into MP3, WMA, WAV, RA, M4A, AAC, AC3, or OGG audio files, making them fit iPod, iPhone, Apple TV, PSP, Zune, mobile phone or other digital devices. This DVD rip software lets you clip/split/merge videos, crop video size, change image effect, and add watermark/subtitles/soundtracks to your ripped videos.
New features:
1.Added video profiles supported by the newest iPhone 4.
2.Added Italy language interface
Key features:
1.Capture pictures from DVD movie in batches or take a snapshot in the preview window.
2.The converted DVD movies are compatible with iPod, iPhone, Apple TV, PSP, PS3, Xbox, Zune, NDS, Wii, 3GP mobile phones, Windows Mobile, PMPs, etc.
3.Transfer the converted files to iPod, iPhone, PSP directly after ripping.
4.Clip a title/chapter to extract your wanted parts and optionally merge them into a new title/chapter.
5.Merge several titles/chapters into a file with transitions added Between files.
6.Split a single file into several parts by preset or custom split mode.
7.Cut off unwanted borders of a video to feature a highlight.
8.Adjust the image brightness/contrast/saturation, and create special effects on videos.
9.Add subtitles and audio tracks to the video.
10.Add text/picture watermarks to the video for avoiding piracy.
11.Preview the before and after files side-by-side for comparison to check the after-editing effect.
12.Group the profiles by multimedia devices and optimize their profile settings according to the devices to make you find the most suitable profile quickly.
13.Output multiple output files from one source in one go.
14.Customize the output file size with the BitRate Calculator.
15.Retrieve information online: artists’ name, DVD cover, DVD chapters and titles and more.
16.Support multi-core CPU processing, multithreading and Batch conversion. you can free download Full DVD Ripper Pro 9.0.10 now.
How To Use Quality of Service (QoS) To Speed Up The Internet
Posted in
know-how
|
|
gugelian
Have you seen or read about how doctors are performing surgery over the Internet? Do you ever wonder what would happen if someone in the doctor’s office started downloading a big file from the Internet in the middle of surgery?
If the doctor setup their network correctly and used the latest Quality of Service (QoS) equipment, the answer is that nothing would happen to the surgery, but the file would download a little slower than usual. Tweaking your settings to get a faster internet speedwon’t alter you QOS settings so I will explain what to do.
If the doctor setup their network correctly and used the latest Quality of Service (QoS) equipment, the answer is that nothing would happen to the surgery, but the file would download a little slower than usual. Tweaking your settings to get a faster internet speedwon’t alter you QOS settings so I will explain what to do.
What Quality Of Service Does
There are a lot of different types of quality of service. The simplest is buying more Internet bandwidth than you would ever use so all of your computers can use as much bandwidth as they want. In most places this isn’t feasible—a “fat pipe” can cost hundreds or thousands of dollars a month.
More complex quality of service schemes are used by large organizations—like hospitals—to prioritize their traffic across parts of the Internet. But in between simple and complicated is an easy to setup quality of service scheme that almost anyone can use.
Router based quality of service doesn’t change how your traffic travels over the Internet and it can’t give you more bandwidth. What it can do is prioritize traffic on your home network so that important traffic—like voice-over-IP phone calls and online games—gets transmitted before unimportant traffic—like the 150 GB bittorrent file with all 29 seasons of the various Star Trek TV shows your son is currently downloading.
Now you could prioritize your traffic yourself—you could make sure you limited the bandwidth of your bittorrent download so that there was always enough spare bandwidth for a phone call, but this has two disadvantages.
First, you’d be wasting bandwidth whenever you weren’t making a phone call. You probably pay a fair bit of money for your Internet connection, so why not get the most out of it?
Second, you’d have to manage every application separately. That’s easy if you have only one computer in your house, but what if everyone in your house has their own computer? Try convincing your teenage son not to try downloading Star Trek a little bit faster.
Quality of service runs on your router, so it applies to all of the computers in your house. And whoever controls the password to the router—that’s you, not your son, I hope—controls which traffic has priority.
How To Get Quality Of Service
You need a special router to use quality of service. I say special because it needs special firmware, but these routers are no longer very special—they’re downright common. A search on Amazon.com for “QoS router” in the electronics section turns up 164 items.
One of the things quality of service routers need to do is estimate how much transmission bandwidth you have. They do this by sending a bunch of traffic to your modem and tracking how much of it gets returned. Unfortunately, some routers are bad at estimating how much transmission bandwidth you have—in particular, older Linksys (Cisco) routers perform poorly. My research indicates D-Link quality of service routers are the best.
How To Use Quality Of Service
Most quality of service routers come with a set of default rules that will prioritize voice-over-IP traffic and traffic from popular games. For anything more sophisticated than that, you’ll need to dive in and add your own rules.
Log into your router using its intranet address (router IP Address) and look for it’s “QoS setup” page. Most routers have three ways to identify the traffic you want to prioritize:
- Ethernet Port this is the port (plug) on the back of your router each computer on your network is plugged into. If your son’s computer is plugged into port 1 and your computer is plugged into port 2, you can prioritize traffic that way. Of course, if your son figures it out, he can always just swap the connection. Ethernet ports also don’t work for wireless laptops since they’re not plugged into anything.
- MAC Address this is the unique code that identifies your computer’s network card. You can find a list of the MAC addresses currently connected to the router. On my router, they’re listed on a page called Attached Devices. Using a MAC address also works for wireless cards.
- TCP/IP Port this is the destination port your traffic is going to. For example, almost all webservers use port 80. If you know the ports your software uses, you can set priorities using port numbers. To find the port numbers, you can type the name of the program into Google plus the word “port”. For example: Starcraft port.
Implementing Quality of Service
The first thing I do is identify any devices that require special priority. For example, I used to have a Vonage voice-over-IP telephone device. I like my phone calls to sound clear, so I’d give top priority to the MAC address of the Vonage box.
Next, I’d identify the computers in the house people use to do real work—for example, the computer someone uses as part of a home office. I’d give those computers medium (normal) priority.
Computers belonging to people who did a lot of downloads, I’d give low priority. But for any games played on those computers, I would look up the port numbers and give the game traffic medium or high priority in your quality of service settings
source : http://tips4pc.com/
10 Best Internet Safety Tips to Keep Your Computer Secure
Posted in
know-how
|
|
gugelian
Keeping your computer secure is essential to your online internet safety. It minimizes the risks of catching viruses and having spyware installed on your system. Computer security has to take a variety of paths and you should pay attention to all of them to maximize your own safety. With that in mind we’ve put together a list of internet safety tips dedicated to keeping your computer secure. The funny thing is, Internet safety tips are usually easy to implement but are often ignored.
Protect your Internet & PC privacy for free!
10. Firewall
One of the best internet safety tips is to use your firewall to stop people entering your computer system from outside your location. It also stops programs accessing the internet from your computer if they shouldn’t be. A firewall is active as standard on most computers but you should regularly check that yours is active to avoid having your system compromised. Also your router should have its own firewall and you can enable this by entering the settings by finding the router IP address and logging in.
9. Passwords
Passwords are vital to all computer safety. You should have your computer access itself protected and you should have separate passwords for every online account you make. A strong passwords needs to be a mix of alpha numeric capitals such as 45Te9R7G7 to make it as hard as possible for anyone to break.
8. Encrypted files
Most people do not make use of this internet safety tip and do not realize that you can encrypt files on your home computer fairly easily. Simply right click the folder and choose properties. Here you can find a variety of protection options. This makes files harder to be read by third parties but for added security store important documents on a USB or other portable storage device that is not accessible from your home network.
How to Encryt a file
1. Go to the where the file is stored.
2. Right click on the file and choose properties from the menu.
3. On the General tab click on Advanced.
4. Tick the box next to “Encrypt contents to secure data”
5. Press OK.
7. Update browser for internet safety
Over half of all internet users still use out dated browsers to access the internet. These browsers will not have been updated to the latest security threats and are subsequently much easier for hackers to compromise. It is a good idea to update your browser as soon as an update is made available to maximise your protection.
6. Update software
Out dated software is one of the most overlooked security threats to home computers. Much software accesses the internet and if it is doing so in an out dated way it too is easier to compromise. Hackers often created “back doors” into people’s systems that use out dated software so make sure everything you are using is regularly updated.
5. Protecting your internet connection
It is amazing how many people still use no network security despite the ease with which internet security can be set up and instantly help with internet safety. If you are using wireless broadband then you need make sure you have a security key for it. Simply run set up on your router and choose the security options you want to adjust. Choosing a strong password will stop people hijacking your internet and being able to track your internet use.
4. Updating your antivirus software
New viruses are found on an HOURLY basis and virus removal software is updated on average two or three times a week. If you are using antivirus software (which you should be) then you need to update it at least once a week to protect yourself from new threats. I personally use Avast as I cannot risk a virus infection because my computer is used for important business.
3. Virus scans
Along with the above it’s amazing how many people don’t actually scan there computers regularly. If you use the internet regularly then you need to virus scan regularly. We would recommend you run a full scan at least once a week if you use the internet for more than 5 hours a week.
2. Safe browsing
Safe browsing is essential to keeping your computer secure. If you regularly visit dodgy websites, click advertisements and stream content then you are exposing yourself to high risk. If you think a site doesn’t seem quite right then leave and browse elsewhere. Always search through a reputable search engine and be wary of clicking advertisements.
1. Avoiding downloads
The biggest source of viruses and spyware online comes from downloads both legal and illegal. Whenever you are presented with the option to download something you should make sure you scan it for viruses and also check that the website is reputable by researching it through a search engine. With file transfer and sharing sites you should be extremely vigilant and generally should avoid downloading anything that is illegal.
Computer Gym
The best way to keep secure is to treat your computer as if it is a plant! Attend to it regularly and care for it, clean it (software and hardware/ inside and out), and feed it the best nourishment in secure updates to maintain your hard-drive health.
E-marketing companies compromised to send spam
Posted in
virus
|
|
gugelian
Spammers have gained access to the accounts of email service providers (ESPs) and used them to send out fake order confirmation spam with links leading to malware.
The systems of ESPs are a popular target among spammers: they contain a large number of email addresses and other personal information (which, for instance, was the target of the Epsilon hack earlier this year) and the companies have usually made a lot of effort to ensure their emails have high delivery rates.
Being able to use these systems to send spam is likely to result in delivery rates many times higher than would have been obtained by using a botnet. Incidentally, it was through SPF, a tool used to improve email delivery, that researchers at Websense could confirm that the spam was sent from the systems of an Argentinian ESP.
To the recipients of the emails this may have been less clear: they saw what looked liked a rather genuine order confirmation from a popular clothing retailer. Of course, that fact that they did not place such an order could have prompted them to click on the links in the email to find more information.
If they had done so, they would have downloaded a zip file containing a keylogger trojan. This piece of malware takes screenshots and registers keystrokes when the user visits one of a large number of popular websites, including many banks and e-commerce sites. It is not hard to imagine the amount of harm crooks can do with information obtained this way.
source : http://www.virusbtn.com/index
Alureon trojan uses steganography to receive commands
Posted in
virus
|
|
gugelian
Researchers at Microsoft have discovered a new variant of the 'Alureon' trojan that uses steganography to make itself invincible against the takedown of botherders' domains.
Steganography, sometimes referred to as 'hiding in plain sight', is the art and science of writing messages in such a way that no one but the intended recipient would even suspect that a message is present. Images are often used for this purpose: the sender uses an existing image and modifies the least significant bit(s) of the colour components of each pixel to contain the message. The difference between the old and the new image will be barely noticeable, but the intended recipient can easily extract the message from it.
Alureon (which also goes by the name of TDSS or TDL) is an oft-researched malware family that uses a number of advanced techniques to avoid detection and increase redundancy. Steganography is the latest such technique: the malware is capable of downloading innocent-looking images from free hosting sites. These images contain an updated configuration file and thus provide an extra layer of redundancy against the domains used by the malware becoming unavailable.
With malware researchers and law enforcement agencies becoming increasingly successful in taking down malicious domains and command and control centres used by botherders, the latter are constantly looking for new ways to control their bots. The use of steganography, as well as for instance the use of DNS TXT records by the Morto worm, show that malware researchers should keep their eyes wide open and may find control commands to be hidden in places where they might least expect them.
source : http://www.virusbtn.com/index
Attack targets government agencies in CIS countries
Posted in
virus
|
|
gugelian
Researchers at Trend Micro have discovered an ongoing targeted attack against, among others, government agencies and diplomatic missions in Russia and its neighbours.
The attack is executed by sending targeted emails to employees. These emails contain attachments that exploit vulnerabilities in popular software and allow the attackers to install data-stealing malware on the victims' machines. In this case the attackers have not relied on zero-day exploits but used older, more reliable exploits; however, researchers have found indirect evidence that zero-day exploits have also been used in the same campaign.
The victims are mainly located in the Commonwealth of Independent States (CIS), which comprises most of the former Soviet Union, with Russia host to the largest number of victims. Targets include diplomatic missions, ministries and space-related government agencies. The ultimate purpose of the attacks is not yet clear, but researchers have found evidence of the attackers attempting to steal specific documents.
It is also not clear who is behind the attacks. The command and control centres used by the malware use IP addresses in the US and the UK, but the registration information of the used domains points to China. The 'Lurid' malware used in the attacks has historically been linked to China, but researchers are hesitant to draw hasty conclusions as the victims include some Chinese entities as well.
This attack is the second of its kind discovered within a short period of time. Early last week it was revealed that a number of Japanese defence contractors, most prominently Mitsubishi Heavy Industries, had been the victim of another targeted attack.
source : http://www.virusbtn.com
Microsoft Big Easy Offer is Back!
Posted in
software
|
|
gugelian
That’s right, folks, Microsoft’s Big Easy Offer 7 is underway and it’s the perfect time for you to take advantage of this fantastic program buying all your Microsoft licenses. Unfamiliar with the Big Easy Offer? Think of it as a Microsoft sponsored reward program: when you go to SoftwareMedia.com and buy qualifying products between now and the end of the year, you will receive a rebate check to use on any future software purchase at SoftwareMedia.com. It really is a big, easy offer!
The Big Easy Offer 7 qualifying products range from Office, to SQL Server, to Visual Studio. You have 30 days after your purchase to submit your rebate claim, and then 90 days to use the funds. There is no limit on the amount of funds you can receive, and your rebate funds can be used on any software purchase at SoftwareMedia.com. Check out all the Big Easy Offer 7 details. You can view a complete list of the qualifying products, use the Big Easy Calculator to estimate your rebate, and more! It’s the best Microsoft licensing deal you’ll find all year!
source : http://www.softwarenewsdaily.com/
Windows 8 Release Inches Closer
Posted in
software
|
|
gugelian
Last week Microsoft introduced Windows 8 to the public via a developer preview build (learn more about the Windows 8 developer preview) . Featuring the new Metro UI, Windows 8 definitely embraces touch technology. Despite the generally glowing reviews available all over the internet (especially for a pre-beta build), people want more. The question on everyone’s lips is, “When is the Windows 8 release date?”
As of right now, anyone saying they know when Windows 8 will be released is simply lying. Microsoft is tight-lipped on anything solid—afterall, the anticipated operating system still has far to go to solidify its features—but there are scraps of information which have fallen to the floor from the Microsoft table. Whether obvious or not, Steve Ballmer announced in May Microsoft is planning on a 2012 release. That would put the Windows 8 release about three years after Windows 7 debuted (wow, has it been almost three years already?!).
The Windows 8 developer preview is the first of many steps to come as Microsoft readies for this monumental release. It’ll mark the start of a full operating system being available not only on desktop computers but also on tablets. The buzz over Windows 8 is sure to increase as people try out Windows 8 first-hand.
My Windows 8 Release Prediction
My guess is the Windows 8 beta will be released late winter/early spring of 2012, say March or April. Microsoft will want to make sure the highlight features are ready as this will be around the same time Apple no doubt releases the iPad 3. I won’t go into what Apple plans for the iPad 3 in this article, but Windows 8 as a fully functional operating system will pose a threat needing to be addressed.
Microsoft will hope the Windows 8 beta and ensuing buzz is able to pull at least some of the attention away from Apple and keep the momentum going, leading into an Autumn 2012 retail release (just in time for the holidays).
source : http://www.softwarenewsdaily.com/
Windows 8 Developer Preview – WOW!
Posted in
software
|
|
gugelian
Microsoft has a new slogan to go with their upcoming operating system: “Windows reimagined.” After watching Steven Sinofsky’s keynote address at the BUILD developer conference held last week, all I can say is “WOW!”
During the address, viewers got to witness Windows 8 in action (an early developer build, anyway). If Microsoft did nothing else to improve Windows 8 and launched this developer build tomorrow, it would probably be an instant success. If you’ve ever used the Windows Phone 7, the UI will be very familiar. The live tiles are back, and better than ever. Very modern and sleek, the interface provides the user with all their important apps, photos, and more within a simple swipe or tap of the finger. Not a fan of the billboard-style flood of information? Windows 8 is fully customizable to mimic the more static Windows 7 design.
Whatever your choice of layout may be, one of the greatest feats the Windows team has accomplished is what happens behind the scene. Windows 7 is powerful but also requires a lot of power to run smoothly. Windows 8 boasts the same power and performance with a fraction of the resource gulping. “So what?” you may ask. “My iPad runs smoother than a greased up baby sliding down a butter slide on the back of a wet seal.” Ahh, but iOS isn’t a full operating system. You can’t just run the same full-blown Apple apps on your iPad. A Windows 8 tablet, however, will be able to run all the same apps a Windows desktop can.
Many other features can be seen in the full BUILD conference Keynote address. Also, it’s still very early in the development stage, and Microsoft is sure to have several surprise features up their sleeve. For those who are a little more daring and merely watching someone play around with new technology isn’t exciting enough, Windows has released the Windows 8 developer preview for the public to download and try out first-hand. I can’t wait to download it myself!
source: http://www.soft-news.net/
Samsung to Pay Microsoft for Every Android Device Sold
Posted in
hardware
|
|
gugelian
Samsung and Microsoft attempt to ruin Android for everyone with patent sharing deal. Will this make all Google's base are belong to them?
>
Google's strategy of making Android available to developers for free has paid off extremely well. The operating system quickly mounted serious competition for Mac OS and Windows and emerged as the world's best-selling smartphone platform by the end of 2010. Naturally, that made Microsoft, still reeling from the end of Windows Mobile, and Apple, unhappy with anything less than Blofeld style world domination, feel somewhat uneasy. Both companies have long claimed that Android 'incorporates' significant aspects from their operating systems and have demanded that Google either pay them or change Android to remove the contested elements. The legality of those claims is still undecided and so far no litigation has resulted, but in a move that the Wall Street Journal notes may move that kind of activity forward, Samsung and Microsoft have reached a huge patent sharing deal.
Samsung will now pay royalties to Microsoft on its Android-based smartphones and tablets, and the two global supercompanies will collaborate to develop new phones and tablets based on Windows rather than Android. Window's stake in the deal is obvious, as it gives them official acknowledgment from the world's second largest smartphone maker that their claim against Android may have merit. It also provides leverage to pressure other cellphone makers to cut similar deals. But Samsung's reasons for pursuing the deal may have to do with more than simply protecting themselves from Microsoft's lawyers. The South Korean company is in the midst of a very bitter worldwide legal battle with Apple involving charges of patent and trademark infringement. Partnering with Apple's chief rival may provide them with an easy out, should they lose that battle and find their current slate of tabs and phones kiboshed.
As of this writing, Google has not made any official comment, but one imagines there are some very loud swear words being exchanged at the top of the company. In a month that has seen them taken to task for alleged anti-trust violations, this is one more headache they don't need.
source : http://www.tomshardware.com/
>
Google's strategy of making Android available to developers for free has paid off extremely well. The operating system quickly mounted serious competition for Mac OS and Windows and emerged as the world's best-selling smartphone platform by the end of 2010. Naturally, that made Microsoft, still reeling from the end of Windows Mobile, and Apple, unhappy with anything less than Blofeld style world domination, feel somewhat uneasy. Both companies have long claimed that Android 'incorporates' significant aspects from their operating systems and have demanded that Google either pay them or change Android to remove the contested elements. The legality of those claims is still undecided and so far no litigation has resulted, but in a move that the Wall Street Journal notes may move that kind of activity forward, Samsung and Microsoft have reached a huge patent sharing deal.
Samsung will now pay royalties to Microsoft on its Android-based smartphones and tablets, and the two global supercompanies will collaborate to develop new phones and tablets based on Windows rather than Android. Window's stake in the deal is obvious, as it gives them official acknowledgment from the world's second largest smartphone maker that their claim against Android may have merit. It also provides leverage to pressure other cellphone makers to cut similar deals. But Samsung's reasons for pursuing the deal may have to do with more than simply protecting themselves from Microsoft's lawyers. The South Korean company is in the midst of a very bitter worldwide legal battle with Apple involving charges of patent and trademark infringement. Partnering with Apple's chief rival may provide them with an easy out, should they lose that battle and find their current slate of tabs and phones kiboshed.
As of this writing, Google has not made any official comment, but one imagines there are some very loud swear words being exchanged at the top of the company. In a month that has seen them taken to task for alleged anti-trust violations, this is one more headache they don't need.
source : http://www.tomshardware.com/
OnStar Changes its Mind About Tracking Vehicles
Posted in
hardware
|
|
gugelian
After it was revealed that OnStar would continue tracking automobiles even after the user cancels the subscription, the company backtracks and revises its Terms and Conditions.
On Tuesday OnStar said that it has decided to reverse its proposed Terms and Conditions policy changes, and will not keep a data connection to customers’ vehicles after the OnStar service is canceled.
The about-face arrives just under a week after the company updated its Terms and Conditions with the right to sell the GPS-derived data it pulls from OnStar systems in an anonymous format. The new terms enabled the company to keep a constant connection to an installed system even after the customer canceled the subscription. Naturally this caused a rush of negative feedback, especially since the policy meant OnStar could track the vehicle's movement and speed, and then possibly sell the info to local law enforcement.
According to OnStar, the new policy wasn't expected to kick in until the beginning of December, but the company began sending out emails last week announcing the new change in terms. Yet even during the aftermath following the new policy's exposure, OnStar pointed out that prior customers could actually call in and request that OnStar halt its unwanted connection. But that simply wasn't enough to keep consumers from lighting up torches and burning their contracts, so the company reverted back to its original Terms and Conditions.
"We realize that our proposed amendments did not satisfy our subscribers," OnStar President Linda Marshall said on Tuesday. "This is why we are leaving the decision in our customers’ hands. We listened, we responded and we hope to maintain the trust of our more than 6 million customers." She added that if OnStar ever offers the option of a data connection after cancellation, it would only be when a customer opted-in, not by force. Even then, OnStar would honor customers’ preferences about how data from that connection is treated.
Last week an OnLive spokesman said that the post-subscription connection was kept alive in order to make it easier for consumers to renew their subscription. But Tuesday Marshall said that the constant data connection was to allow OnStar to provide urgent information about natural disasters and vehicle recalls to the former customers. Sounds like mixed messages, to be honest.
"We regret any confusion or concern we may have caused," Marshall said.
Rumor: Apple to Discontinue iPod Classic and Shuffle
Posted in
hardware
|
|
gugelian
Now that Amazon's mystery press conference is out of the way, we're eagerly awaiting Apple's October 4 iPhone 5 event. However, will Apple also be saying goodbye to a couple of devices this year?
Apple said on the invitations that next week's event is about the iPhone. Most have assumed that this means Apple will finally launch the iPhone 5 (and perhaps the iPhone 4S). However, the fall event is typically for iPods and iTunes, and Apple hasn't given any inclination that it will be devoting even a small portion of the press conference to music. Instead, it appears as though the end may be near for a couple of the iPod models.
The latest scuttlebutt is that Apple will be killing off some of the iPods we know so well. According to The Unofficial Apple Weblog, the iPod Classic and iPod Shuffle will both disappear this year. The site didn't name its source, but said that the reasons behind killing off these two versions were to do with numbers (iPod sales make up just 8 percent of Apple revenue) but also the fact that they're kind of out-dated and unnecessary; the Shuffle is basically a Nano without a screen, while the Classic is devoid of flash memory, instead relying on a platter-based HDD.
The news comes hot on the heels of a report from CNet that Apple might kill the entire iPod line. Don Bell writes that, while the it used to be a big money-maker for Apple, now is "really not a bad time for Apple to stick a fork in the iPod."
"For starters, this year (October 24) marks the 10-year anniversary of the iPod," he writes. "That's quite an achievement, but it's also a nice place to bookend things. I can imagine Apple saying, 'It had a great run, now go buy an iPhone.'"
Bell also refers back to Steve Jobs' 2006 advice to Nike CEO Mark Parker. Jobs told him to just "get rid of the crappy stuff and focus on the good stuff." So has the iPod, when compared to the iPhone and the iPad, become 'crappy stuff'?
Do you think the iPod line is past its sell-by date, or do you think that Apple just needs to trim the fat and get rid of one or two models? Let us know in the comments below!
7-inch Toshiba Thrive Slated for December Release
Posted in
tech news
|
|
gugelian
Toshiba is launching a 7-inch version of its Thrive Android tablet in December.
Tuesday Toshiba revealed a 7-inch version of its Thrive tablet that's expected to land in stores this December. It will be powered by Google's Android 3.2 "Honeycomb" OS, Nvidia's Tegra 2 dual-core SoC, and will arrive in two configurations: 16 GB and 32 GB.
"This is a seven-inch tablet done right," said Carl Pinto, vice president of product development, Toshiba America Information Systems, Inc., Digital Products Division. "The Thrive 7-inch Tablet is the first seven-inch tablet in the U.S. market to offer a true HD display that when combined with the selection of ports, premium audio, and a better, more robust Android experience make it a great choice for on-the-go consumers looking for a no-compromise tablet."
According to Toshiba, the device will sport an LED backlit AutoBrite multi-touch display with a native resolution of 1280 x 800, and incorporate Toshiba's exclusive Adaptive Display and Resolution+ video enhancement technologies. To round out the entertainment side, it will also include stereo speakers tuned with sound enhancement technologies from Toshiba and SRS Labs.
ZoomToshiba also said the 7-inch Thrive tablet will include a gyroscope, a rear-facing 5MP camera with an LED flash and a front-facing 2MP camera for video chatting, a mini-USB port, a micro-HDMI port, a microSD card slot, Bluetooth and Wi-Fi connectivity, integrated GPS and more. Software will include Toshiba's exclusive File Manager utility and Google's Mobile Service applications.
The company added that the device will be lightweight and easy to carry, weighing only 0.88 pounds and measuring just under half an inch thin (0.47 inches). The device will also be easy to hold, as it will sport Toshiba's "stylishly" durable and slip-resistant (rubberized) Easy Grip finish.
The Thrive 7-inch Tablet will be available in December at major U.S. retailers, e-tailers and ToshibaDirect.com. So far actual availability and pricing is unknown, so stay tuned
source: http://www.tomshardware.com/
DROID 4 In The Works, Codenamed Maserati
Posted in
tech news
|
|
gugelian
It should come as no surprise that the next Motorola Droid is already in the works. While the company hasn't announced anything official, rumors indicate that the company has codenamed the device "Maserati" which is supposedly derived from the name of the famous Italian sports car brand Maserati GranTurismo. That said, the Droid 4 sounds extremely "fast."
So what are the specs? Again, there's nothing official, but rumors point to the typical DROID slide-out QWERTY keyboard (but sans the D-pad again), a screen somewhere around 4 to 4.3-inches, a removable battery and possible 4G LTE support. And as with the previous three DROID models, this fourth-generation installment will reside on Verizon Wireless.
Unfortunately, that's it in regards to new information. The current Droid 3 smartphone sports a dual-core SoC clocked at 1 GHz, a 4-inch qHD (540 x 960) TFT display, 512 MB of internal memory, 16 GB of on-board storage, a microSD card providing 32 GB of even more storage, an 8MP camera, Android 2.3 "Gingerbread" and more. That said, consumers will see superior specs in the Droid 4, possibly even Nvidia's Tegra 3 "Kal-El" SoC (that's just a guess) and Google's Android "Ice Cream Sandwich" OS.
With the holiday season just around the corner, it wouldn't be surprising to see this phone rear its head before the end of the year. If not then, perhaps during the Mobile World Congress 2012 event in February.
sourece: http://www.tomshardware.com/
So what are the specs? Again, there's nothing official, but rumors point to the typical DROID slide-out QWERTY keyboard (but sans the D-pad again), a screen somewhere around 4 to 4.3-inches, a removable battery and possible 4G LTE support. And as with the previous three DROID models, this fourth-generation installment will reside on Verizon Wireless.
Unfortunately, that's it in regards to new information. The current Droid 3 smartphone sports a dual-core SoC clocked at 1 GHz, a 4-inch qHD (540 x 960) TFT display, 512 MB of internal memory, 16 GB of on-board storage, a microSD card providing 32 GB of even more storage, an 8MP camera, Android 2.3 "Gingerbread" and more. That said, consumers will see superior specs in the Droid 4, possibly even Nvidia's Tegra 3 "Kal-El" SoC (that's just a guess) and Google's Android "Ice Cream Sandwich" OS.
With the holiday season just around the corner, it wouldn't be surprising to see this phone rear its head before the end of the year. If not then, perhaps during the Mobile World Congress 2012 event in February.
sourece: http://www.tomshardware.com/
Adobe Reader 10.1.1 free download
Posted in
software download
|
Friday, September 16|
gugelian
Adobe® Reader® software is the free global standard for reliably viewing, printing, and commenting on PDF documents. It's the only PDF File Viewer that can open and interact with all types of PDF content, including forms and Multimedia.
Top features
Access to all PDF files
View and interact with PDF files that contain a wide variety of content, including drawings, email messages, spreadsheets, videos, and other multimedia elements. Access PDF files on the go from your mobile device.
Enhanced commenting tools
Make notes and share your feedback with others by marking up PDF documents using the Sticky Notes and Highlighter tools.
Industry-leading security
Take advantage of the security of Protected Mode in Reader, which helps safeguard your computer software and data from malicious code.
Online services
Directly access online services at Acrobat.com from within Reader X. Perform common tasks such as creating PDF files, securely sharing and storing documents, and screen-sharing.
Simplified user interface
View information more precisely and efficiently. Choose reading mode to fit more content on the screen or two-up mode to view PaGE spreads. Use Keyboard Shortcuts like print, zoom, and find within the browser.
Comprehensive file searching
Find and retrieve any PDF document or phrase within a document in seconds. Search for words in page content, annotations, bookmarks, form fields, or document metadata within any PDF file on a local computer.
Opening PDF Portfolios
Open and view contents of a PDF Portfolio, a collection of PDF documents, and other document types, including drawings, email messages, spreadsheets, and videos.
nternational standards
Take advantage of support for the new ISO Standard 32000 for PDF. Also, Reader continues to support PDF/A, the ISO-approved standard for the long-term preservation of electronic documents; PDF/X (printing); PDF/H; PDF/E (engineering); XMP/RDF; and ODBC
Comment inShare3 Sony’s New PSN Terms Of Service Prevent You From Joining Class Action Suits Against Sony
Posted in
tech news
|
|
gugelian
Version 12 (September 15, 2011) of Sony’s new online services terms of service agreement (PDF) states, on page 18:
Any dispute resolution proceedings, whether in arbitration or in court, will be conducted only on an individual basis and not in a class or representative action or as a named or unnamed member of a class, consolidated, representative or private attorney general legal action, unless both you and the Sony entity with which you have a dispute specifically agree to do so in writing following initiation of the arbitration.
Just thought you should know that in order to play games on their service, you’re being required to give up a very relevant method of legal recourse. I actually was about to sign up for a new PSN account, but I think I’ll hold off for a while.
I don’t want to get too deep into this, but the news is making the rounds and it seems to be just the latest shady way in which Sony is manipulating the law and the rights of others to their own liking. Their handling of the Geohot case was repugnant, and while they’ve worked hard at making things right for those affected by the PSN and SOE hacks, their response to that too was less than admirable.
Shenanigans in license agreements and terms of service are nothing new. But that doesn’t mean we shouldn’t be disturbed when Sony makes us agree not to sue them before we can play our games.
You can opt out of the updated arbitration process by actually mailing in a document saying you want to. Simply send a letter to this address containing your name, full address, PSN account number if applicable, and a clear statement to the effect that you do not wish to resolve disputes through arbitration:
ATTN: Legal Dept
6080 Center Drive, 10th Floor
Los Angeles, CA 90045
Be advised that you must do this within 30 days of agreeing to the terms.
taken from techcrunch
Any dispute resolution proceedings, whether in arbitration or in court, will be conducted only on an individual basis and not in a class or representative action or as a named or unnamed member of a class, consolidated, representative or private attorney general legal action, unless both you and the Sony entity with which you have a dispute specifically agree to do so in writing following initiation of the arbitration.
Just thought you should know that in order to play games on their service, you’re being required to give up a very relevant method of legal recourse. I actually was about to sign up for a new PSN account, but I think I’ll hold off for a while.
I don’t want to get too deep into this, but the news is making the rounds and it seems to be just the latest shady way in which Sony is manipulating the law and the rights of others to their own liking. Their handling of the Geohot case was repugnant, and while they’ve worked hard at making things right for those affected by the PSN and SOE hacks, their response to that too was less than admirable.
Shenanigans in license agreements and terms of service are nothing new. But that doesn’t mean we shouldn’t be disturbed when Sony makes us agree not to sue them before we can play our games.
You can opt out of the updated arbitration process by actually mailing in a document saying you want to. Simply send a letter to this address containing your name, full address, PSN account number if applicable, and a clear statement to the effect that you do not wish to resolve disputes through arbitration:
ATTN: Legal Dept
6080 Center Drive, 10th Floor
Los Angeles, CA 90045
Be advised that you must do this within 30 days of agreeing to the terms.
taken from techcrunch
Popular Posts
-
DOWNLOAD NOW Full DVD Ripper Pro rips DVD movies to AVI, MPEG, WMV, DivX, MP4, H.264/MPEG-4 AVC, RM, MOV, XviD, 3GP videos, as well ...
-
Last week Microsoft introduced Windows 8 to the public via a developer preview build ( learn more about the Windows 8 developer...
-
DOWNLOAD NOW Sim card information Backup Machine recovers accidently deleted inbox, outbox, draft messages, address book etc. Datopal SIM...
-
Researchers at Microsoft have discovered a new variant of the 'Alureon' trojan that uses steganography to make itself invincible a...
-
DOWNLOAD NOW Adobe® Reader® software is the free global standard for reliably viewing, printing, and commenting on PDF documents. It...
-
Version 12 (September 15, 2011) of Sony’s new online services terms of service agreement (PDF) states, on page 18: Any dispute resolutio...
-
What do you do if your LCD tv is broken? buy new products, bring to place of repair, or fix it yourself ? in this article I will share abou...
-
to get a lot of visitors on our website, of course, much work to be done. very unlikely if we simply write just to write it but there is no ...
-
Many people have been using their personal computers to watch news, TV programs and movies. However, it's now very easy to set up your c...
-
The success of Twitter‘s Promoted Products will propel the company into $400 million in revenue in 2013 compared to $45 million last year...
Search