Monday, December 31, 2012

China lifts bans on Internet anonymity

China is taking steps to abolish online anonymity by passing a law which requires citizens to identify themselves when signing up for Internet and telecommunications services.

The new law, Bloomberg says, will require people to provide their full names when ordering landlines, mobile phones, and Internet connections, and it will also mandate online services such as Weibo, the Chinese Twitter, to require real names when posting or tweeting or blogging.

“The Internet is a free and open stage,” an editorial in the People’s Daily said on Dec. 24. “But absolute freedom of the network does not exist … the virtual society and social reality are inseparable.”

The editorial paints the prime issue as one of public safety and well-being, adding that with the rule of law, “the network can be more civilized, more healthy, more secure” and enhanced with more “positive energy.” Others, however, are wondering if it isn’t critique of the government’s sex scandals and shoddy handling of disasters that is more the issue.

Whatever the case, the law is certainly going to further impair online freedom in a country that already isn’t shy about censoring and restricting online communications, as Google’s Eric Schmidt said earlier this year. Although some, including Sinocism China Newsletter author Bill Bishop, say there is already no Internet freedom in the country.




Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

Laser cookery makes your food more fun

YOUR toast pops up with a strange pattern burned into it. Pointing your phone's camera at the pattern pulls up a website showing the day's traffic news for your commute. Later, as you're wondering how to make a spring roll, you notice the instructions are etched into the rice paper itself.


These are just a couple of the applications of "laser cookery" envisaged by Kentaro Fukuchi and colleagues at Meiji University in Japan. They reckon laser cutters have done their time in industry and, like 3D printers before them, it's now time for them to come into our homes - as a new breed of laser-enabled kitchen appliances.


At a cookery technology workshop in Nara, Japan, in November, the researchers showed how a bench top industrial laser cutter - normally used to cut or engrave patterns in plastic, wood and metal - could generate a variety of fascinating foodstuffs when hooked up to a computer running graphics software and a webcam.


One delicacy they have developed is the charmingly named "melt-fat raw bacon", an allegedly tasty sliver of uncooked bacon on which the fat is cooked by the laser, using a webcam trained on the bacon to guide the beam. "The well-cooked fat and the fresh taste of the meat can then be experienced at the same time," says Fukuchi. Don't all rush at once.






Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.




[courtesy] Mobiles are no longer an ‘old person’s nightmare’ thanks to Fujitsu!

Here’s a knee-slapper to kick off your weekend: Fujitsu is marketing a new line of smartphones for the elderly.


Some of the features might be just what the 65-and-older market needs — noise cancellation, larger text, and even speech-slowing for better parsing of fast-talking callers.


At a press conference, Fujitsu president Masami Yamamoto showed off the devices, which feature simplified home screens with just a few apps. They’re as bright and colorful as anything you’d see in a nursery, and they’re designed to be drop-dead simple for anyone who is new to smartphones or needs a little extra help with smartphone technology.


Here’s a sneak peek:


raku raku


These phones are already being sold on Fujitsu’s Japanese home turf; as Yamamoto revealed in the press conference, they’ll now be sold overseas. Fujitsu has plans to bring the phones, called Raku-Raku, into the U.S. and Europe first, with a few modifications for each new geography.


“Raku” is Japanese for “easy.” In 2009, Fujitsu rolled out the Raku Raku PC, designed for senior citizens “or any novice computer user.” The principles behind that device remain the same for the smartphone: Color-coding for ease of use, one-touch apps, highlighting of frequently used features and applications, preinstalled software and apps, and larger fonts.


The company last year rolled out a Raku-Raku feature phone. This marvel gave users a button that, when pushed, would immediately connect users to a dedicated customer support call center.







Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

2012 in review

The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog.



Here's an excerpt:
4,329 films were submitted to the 2012 Cannes Film Festival. This blog had 15,000 views in 2012. If each view were a film, this blog would power 3 Film Festivals

Click here to see the complete report.

Friday, December 28, 2012

Santa gets technical: Over 17M iOS and Android devices activated Christmas Day

Christmas Day marked the most iOS and Android device activations than “any other day in history,” according to a report from mobile analytics company Flurry – with over 17 million new smartphones and tablets booting up for the first time.

Compared to the rest of December, new iOS and Android activations soared 332 percent on Christmas Day. Every other day in December only averaged around four million activated devices. It also squarely beat out last Christmas, which only hit 6.8 million devices activated.

Smartphones and tablets are undeniably mainstream and parents, friends, and significant others are seemingly happy to shell out for the technology everyone wants. It helps that a number of new products entered the market in the recent months, including Apple’s iPad Mini, iPhone 5, Kindle Fire HD, Nexus 4, and Nexus 10. The hype and marketing from these releases surely contributed to people’s holiday wish lists.

Interestingly, however, it seems like people think of tablets as a present, as opposed to an every day expense. Throughout December, 80 percent of activated iOS and Android devices were smartphones, whereas on Christmas Day, tablets rushed up and claimed 51 percent of activated devices.

Apps also saw an expected spike on what has now come to be known as Download Day. Compared with the rest of December, app downloads increased by 112 percent on Christmas Day with 328 million apps downloaded overall. Only 155 million apps were downloaded each day in December prior to Christmas.




Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

[virus] Fake Android app can launch DDoS attacks from your phone

Researchers at Doctor Web found a new trojan app in the Google Play store that can launch distributed denial of service attacks when opened.

Android.DDoS.1.origin, as it’s called, is Russian and disguises itself as the Google Play icon once downloaded. When opened, the app takes its victims to the actual Google Play store so as to distract the user. In the background, however, it searches for its command and control server — and if a connection is made, the app sends the infected phone’s number to the criminals. These hackers then administer commands to the app via text messages.

Commands include launching a DDoS attack or sending other text messages. Doctor Web suggests that the text message function could be used to spam others in the phone’s contact list, prompting them to either download the app or something else the hackers are pushing.

Nowadays when we think of DDoS attacks, we often are reminded of Anonymous, the hacker collective that launches a number of these attacks in the name of political protest. We’ve seen DDoS attacks take down a number of important websites including the CIA’s, financial institutions, and others. These attacks send large amounts of traffic toward a certain website’s servers in an attempt to overload the system and shut it down.

With this app, however, hackers with DDoS intentions are roping in innocent bystanders to do the dirty work. This isn’t the first time we’ve seen a campaign like this. In the case of the CIA website’s take down, Anonymous was accused of distributing links on Twitter to low-orbit-ion-canons (LOIC). These “cannons” send thousands of packets of information to a targeted server per second. When the Twitter links were clicked on, unsuspecting visitors would suddenly be roped into the attack.

Doctor Web goes on to say that the app can cause the phone to perform poorly, and can actually run up the owner’s bill by texting premium numbers.




Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

[Shortcuts] List of Shortcuts on Windows 8


































































































Press thisTo do this

Windows logo key‌ Windows logo key+start typing

Search your PC



Ctrl+plus (+) or Ctrl+minus (-)



Zoom in or out of a large number of items, like apps pinned to the Start screen



Ctrl+scroll wheel



Zoom in or out of a large number of items, like apps pinned to the Start screen



Windows logo key‌ Windows logo key+C

Open the charms



Windows logo key‌ Windows logo key+F

Open the Search charm to search files



Windows logo key‌ Windows logo key+H

Open the Share charm



Windows logo key‌ Windows logo key+I

Open the Settings charm



Windows logo key‌ Windows logo key+J

Switch the main app and snapped app



Windows logo key‌ Windows logo key+K

Open the Devices charm



Windows logo key‌ Windows logo key+O

Lock the screen orientation (portrait or landscape)



Windows logo key‌ Windows logo key+Q

Open the Search charm to search apps



Windows logo key‌ Windows logo key+W

Open the Search charm to search settings



Windows logo key‌ Windows logo key+Z

Show the commands available in the app



Windows logo key‌ Windows logo key+spacebar

Switch input language and keyboard layout



Windows logo key‌ Windows logo key+Ctrl+spacebar

Change to a previously selected input



Windows logo key‌ Windows logo key+Tab

Cycle through open apps (except desktop apps)



Windows logo key‌ Windows logo key+Ctrl+Tab

Cycle through open apps (except desktop apps) and snap them as they are cycled



Windows logo key‌ Windows logo key+Shift+Tab

Cycle through open apps (except desktop apps) in reverse order



Windows logo key‌ Windows logo key+PgUp

Move the Start screen and apps to the monitor on the left (Apps in the desktop won’t change monitors)



Windows logo key‌ Windows logo key+PgDown

Move the Start screen and apps to the monitor on the right (apps in the desktop won’t change monitors)



Windows logo key‌ Windows logo key+Shift+period (.)

Snaps an app to the left



Windows logo key‌ Windows logo key+period (.)

Snaps an app to the right







Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R. Courtesy By: Windows

Saturday, August 25, 2012

Fact for the day: 25-07-2012

Sara Lhadi logged 16,799 hours grinding away in Runescape between November 2004 and October 2009 . That's nearly 700 days, which is nearly two solid years of game time!!!! Also, that averages out to 9 hours 20 minutes a day.

One million domain names are registered every month!!!

In a recent survey conducted by security specialist Symantec of the 100 most unsafe and malware infested web sites, 48 per cent of them feature adult content.

Bit torrents, depending on location, are estimated to consume 27 to 55 per cent of all internet bandwidth as of February 2009.


Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

Wednesday, July 25, 2012

Cyton Gamma robot arm to work with humanity

Ready to hold hands with a robot arm? Lighter than a laptop, this articulated mechanical limb "is not just another robot for roboticists," says Robai.


A new robot arm extends its manipulator in a gesture of friendship. Will you shake it?


Philadelphia-based robotics firm Robai hopes so. The latest of its Cyton robot arms is the Cyton Gamma, and it's designed to work with us meatsacks.


The Gamma's seven joints are "kinematically redundant," Robai says in a release, meaning it can move various ways to position itself. This gives it more dexterity.


The increased workload on the control system is handled by Actin, software from Energid Technologies that was developed for robots at NASA. The system uses a simple 3D graphical interface.


The Cyton Gamma weighs 4.4 pounds and has a reach similar to the human arm. It connects to Linux, Windows, or OS X systems via USB. Aside from programming with the GUI, it can be "trained" by being physically moved in space.


It also has support for ROS, the common robot programming framework being developed by Willow Garage.


"Our obsession has been on ease of use. We want the Gamma to be the first accessible robot on the market," Robai COO Neil Tardella says in the release. "This is not just another robot for roboticists."


It's been tested in applications such as remote inspection, manufacturing, and healthcare, according to Robai. The firm's Web site lists the Cyton Gamma MX-2 for $9,799.


The company's other arms have been used to test U.S. Army battlefield robots and to check under cars for dangerous objects.


What would you do with a robot arm?




Fact for the day: 25-07-2012

MS-DOS was a rough imitation of CP/M, one of the first portable operating systems. 'Portable' here means that the OS could run on different hardware.


Finger' is an Internet tool for locating people on other sites. It gives access to non-personally identifiable information.


The term 'petabit' is used in discussing possible volumes of data traffic per second in a large network.







Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

Tuesday, July 24, 2012

Can you negotiate prices online? Well, maybe, with Netotiate

The old cynic’s line about air travel is that never, in the history of flight, have two people on the same airplane paid the same price for a ticket. Online, that’s getting more and more true as well, as companies such as Amazon and Orbitz experiment with variable pricing for different clients.


Now one company, Netotiate, is asking: Why should online retailers have all the variable pricing fun?


(Awful name, I agree. Until you realize it rhymes with negotiate.)


Netotiate is providing a way for online shoppers to revisit markets of a former day, when a price was not just a number on a sticker but the result of a negotiation between buyer and seller. Netotiate co-founder and chief executive Amir Farhi explains why that’s important, even today:




“If a visitor to your site wants to buy a product from you, if your listed price isn’t right for the visitor, many will simply leave and look for a better deal elsewhere.”



The value to the retailer, of course, is the opportunity to capture business that is walking out the virtual door. That TV a consumer doesn’t want at $1500 might be the perfect purchase at $1400 … and if your profit margins support the lower price, why not take the business now?


Retailers can add the functionality to their sites with a simple plugin, and customize it to offer discounts, incentives, free shipping, and more. In addition, online store managers can set up conditions in which the Netotiate plugin will activate based on user activity such as number of visits and time on site.


Those conditions help ensure that discounts are not given to customers who were going to purchase already.


When potential customers do see the Netotiate option, they submit a bid anonymously. The software will give supply clues indicating whether or not their offer is likely to be accepted, so store owners are less likely to see a flood of bargain basement might-as-well-try offers. Then the store can accept, decline, or counter the offer.


The Netotiate plugin is getting some traction, according to Elliot Moskow, CEO of Pricefalls.com.


“Sometimes shoppers need some incentive to commit to a transaction.”


True enough. However, I’m not sure Amazon.com will be signing up anytime soon.


Netotiate is a venture capital backed company with a head office in Newton, Massachusetts and R&D offices in Tel-Aviv, Israel.






Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.




Iran nuclear facilities 'Thunderstruck' by AC/DC malware

955852j


In 2010, Iran's nuclear facilities were infiltrated by Stuxnet, the centrifuge-wrecking malware allegedly cooked up by the US government. Now they seem to have been hit again by a bizarre attack forcing nuclear plant workstations to pump the song Thunderstruckby heavy metal band AC/DC through the speakers at full volume.


News of the attack comes from Mikko Hypponen, chief research officer at Finnish computer security firm F-Secure, who says he recently received a series emailsfrom a scientist working at the Atomic Energy Organization of Iran (AEOI):


"I am writing you to inform you that our nuclear program has once again been compromised and attacked by a new worm with exploits which have shut down our automation network at Natanz and another facility Fordo near Qom."


The Iranian scientist goes on to say that they believe the attackers used Metasploit, a common hacking tool which provides a variety of ways to penetrate supposedly secure networks. "There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out," says the scientist. "I believe it was playing 'Thunderstruck' by AC/DC."


While the US military has used heavy metal music as a weapon in the past it seems unlikely that a Stuxnet-like stealth attack would announce its presence with a few blasting power chords, suggesting the hit is more likely the work of a thrill-seeking hacker. Hypponen says he has been unable to verify any details of the attack, but has confirmed that the emails were sent and received from within the AEOI.






Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.




Fact for the day; 24-07-2012

CD-ROM XA (Compact Disk-read-only memory, extended architecture) is a modification of CD-ROM that defines two new types of sectors that enable it to read and display data, graphics, video and audio at the same time.


The first optical data storage disk, developed by Philips, had 60 times the capacity of a 5.25 inch floppy disk.


Though the highest possible encryption in Windows 2000 was 128 bit, Microsoft only sent the 40-bit version to India, because India was under US sanctions after Pokhran.


WinPad was Microsoft's failed handheld PC operating system, which it developed and killed before coming up with Windows CE, Microsoft scrapped the WinPad project reportedly because they couldn't figure out how to squeeze a variant of Windows into an affordable handheld size.







Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

Quote for the day: 24-07-2012

The willingness to accept responsibility for one's own life Is the source from which self-respect springs.
~ Joan Didion







Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

Monday, July 23, 2012

iPhone 5 will launch with 19-pin Dock connector


The company's current iPhones has a 30-pin port. The smaller connector will make room for the headphone jack on the bottom of the device.



Apple's next iPhonewill come with a smaller Dock connector port, according to a new report.


Although Apple's current mobile devices, including the iPhone and iPad, come with a 30-pin port, the new iPhone will sport a 19-pin connector, Reuters is reporting today, citing sources. The switch will help Apple make room on the bottom of the handset for a headphone jack. The headphone jack currently sits at the top of Apple's iPhones.


Reuters' report on Apple's Dock connector is just the latest in a string of rumors surrounding Apple's plans for that port. Over the last few months, an increasing number of reports have cropped up, saying that Apple will be ditching the 30-pin connector for a smaller, 19-pin option.


Back in May, for example, Apple site iLounge reported, citing sources, that the new connector is "closer to a pill shape." In addition, the site said that the connector will be available on all future mobile devices Apple launches.


For its part, Apple hasn't commented on its plans for a new Dock connector, but blowfish12 has contacted the company for comment on the Reuters report and will update this story when we have more information.


If Apple does, in fact, decide to launch a new Dock connector in the iPhone 5, its latest handset would, out of the box, seemingly be incompatible with the many accessories that connect to its devices with a 30-pin connector. Whether Apple will offer up an adapter to ensure legacy products still work with its products remains to be seen.






Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R,




Virtual germ created on computer for first time

image


In a move that promises to bring the advantages of computer aided design (CAD) to genetic engineers, the first computer model of a complete bacterium has been produced in the US. It means researchers will soon be able to modify models of an organism's genome on a computer screen - or create artificial lifeforms - without the risks of undertaking wet biology in secure biosafety labs.


The pathogen is called Mycoplasma genitalium, a bacterium implicated in a number of urethral and vaginal infections. The bug was ripe for modelling say researchers at Stanford University in California, because it has the smallest genome of any free-living organism, with just 525 genes. By contrast, the popular lab pathogen E. colihas 4288 genes.


The modelling was undertaken by bioengineer Markus Covert and colleagues. To get the raw data for their model, they undertook an exhaustive literature review - spanning 900 research papers - to allow them to program into their model some 1900 experimentally observed behaviours and molecular interactions that M. genitaliumcan take part in during its life cycle.


In software terms, they found the behaviours of the 525 genes could be described by 28 algorithms, each governing the behaviour of a software module modelling a different biological process. "These modules then communicated with each other after every time step, making for a unified whole that closely matched M. genitalium's real-world behaviour," claims the Stanford team in a statement. Their research appears in the journal Cell (doi: 10.1016/j.cell.2012.05.044).


Such models will ultimately give biologists the freedom to undertake "what if" scenarios common in regular engineering - changing parameters in a genome design, say, like a civil engineer adjusts the width of a bridge deck on a computer to see what happens. As well as being experimentally useful, allowing artificial organisms and synthetic lifeforms to be created virtually (harming no-one), they could also boost biosafety by preventing accidental creations of lethal pathogens. In 2001, for instance, researchers in Australia accidentally created a lethal strain of mousepox.


In a commentary article in Cell, systems biologists Peter Freddolino and Saeed Tavazoie of Columbia University say they hope the work will soon be extended to more commonly used lab bugs like E. coli- but also warn that the technique's accuracy has yet to be demonstrated. It is unclear, they say, "how well overall behaviors will be predicted from a collection of separately obtained parameters" gleaned from hundreds of research papers.


But the US National Institutes of Health, which funded the modelling work, is excited. It believes the model a major step towards finding "new approaches for the diagnosis and treatment of disease", says James Anderson, an NIH program director.






Blowfish12@2012 blowfish12,tk Author: Sudharsun. P. R.




Fact for the day: 23-07-2012

Many Nokia phones come with a reserve battery. To activate the battery, key-in *3370# your cell will restart with this reserve and your instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.


The name Epson for the popular brand of printers was coined when the subsequent models of their first printer 'Electronic Printer 101' were called 'Sons of electronic Printers'


A CD-RW disk can, in general, be-written about a thousand times. In contrast, a hard disk can be written over virtually an unlimited number of times.


When desktop scanners were first introduced, many manufacturers used florescent bulbs as light sources.







Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R.

Google acquires hot iOS & Mac e-mail app Sparrow (updated)

Google has just acquired Sparrow, a company that has gained notoriety for its innovative iOS and Mac e-mail clients.


“We care a lot about how people communicate, and we did our best to provide you with the most intuitive and pleasurable mailing experience,” Sparrow CEO Dom Leca wrote on the company’s blog this morning. “Now we’re joining the Gmail team to accomplish a bigger vision — one that we think we can better achieve with Google.”


Sparrow’s apps have gained a devoted and vocal fan base, thanks to their clean design and elegant functionality. The apps integrate particularly well with Gmail, so it’s not too surprising that Google was interested in snapping up Sparrow. On iOS, Sparrow filled the gap for a truly powerful Gmail client (Google released its own Gmail iOS client in November, but it had a very rough start).


When it comes to Sparrow’s existing apps, we’re hearing that Google will support them with critical updates, but don’t expect any new features.


Sparrow is based in Paris and has received seed funding from Kima Ventures. Terms of the deal weren’t disclosed.


Update: Sources tell the Verge that Sparrow was acquired for under $25 million.













Blowfish12@2012 blowfish12.tk Author: Sudharsun. P. R. Source: TheVerge




Infolinks In Text Ads