понедельник, 30 декабря 2013 г.

Computerworld - When Kevin Humphries talks about green IT at FedEx, you won't hear much about reducing the company's carbon footprint. FedEx embraced the new math of green IT when it engineered every inch of its new, LEED-certified 46,000-sq.-ft. data center for maximum operational efficiency. "We found the most optimal mathematical model for capacities and efficiencies," says the senior vice president of IT at FedEx Corporate Services. The result is what he calls "a perfect blend" of green energy usage, fiscal savings and rational utilization of equipment and resources. Elements of the design included flywheel backup power generators, variable-speed fans that help keep the facility's Power Usage Effectiveness (PUE) rating low, and air-side economizers that generate 5,000 hours per year of free cooling for the Colorado Springs building. FedEx also raised the operating temperature in the data center by 5 degrees to cut the cooling bill. Meanwhile, specific rack cooling technologies, alternative energy sources and other systems were not included because FedEx felt they were risky, prone to failure or required undue maintenance. "We had to find the perfect blend of simplicity and advanced technology," Humphries says. Because the hype and excitement over green IT has diminished over the past few years, and the specter of carbon taxes has faded, organizations have begun to put sustainable IT initiatives on the back burner, or even dismiss them entirely. But successful green IT projects usually go hand in hand with operational efficiency initiatives, where benefits drop down to the bottom line while meeting corporate sustainability goals. "Did we make any trade-offs with efficiency versus cost? There were very few," Humphries says. The good news is that there are still plenty of relatively easy ways to make your facilities more eco-friendly. "Your average data center remains relatively inefficient," says Simon Mingay, an analyst at Gartner. And that means green IT affords lots of opportunities for gaining favor with the CFO as well as the corporate sustainability advocate. There's even a road map to follow: The best practices for energy efficiency are now well established and readily available from resources such as The Green Grid (see box below), and standards for water usage, carbon usage, renewable energy and e-waste are evolving rapidly. Green IT Road Maps to Best Practices The following guides to green IT metrics are available at TheGreenGrid.org: • "Power Usage Effectiveness: A Comprehensive Examination of the Metric" • "Water Usage Effectiveness (WUE): A Green Grid Data Center Sustainability Metric" • "Carbon Usage Effectiveness (CUE): A Green Grid Data Center Sustainability Metric" • "Electronics Disposal Efficiency (EDE): An IT Recycling Metric for Enterprises and Data Centers"

download plants vs zombies osx crash download plants vs zombies ita download assassin's creed 3 pc ita download angry birds for java 240x320 download wifi hacker v2 1 download scott pilgrim comics online download k lite mega codec pack windows 7 x86 download keygen cool record edit pro 7 3 1 download vmware vsphere hypervisor (esxi) download slimtype dvd a ds8a5sh firmware download 14th amendment education rights
Computerworld - Israeli start-up Humavox has announced a new hardware platform that uses radio frequency (RF) to transmit power wirelessly to mobile devices. Humavox's Eterna platform is aimed at making it simpler to charge wearable devices such as hearing aids, smartwatches and augmented reality glasses. The wireless charging market - small as it is -- is dominated by companies that today offer products that use electromagnetic fields to create a link to transfer power without cords. As of yet, the marketplace has not settled on an industry standard, though groups have taken positions behind several specifications. Humavox's Eterna hardware platform will be sold as intellectual property to device manufacturers so they can integrate the company's wireless charging element using whatever method works best for them, according to Omri Lachman, founder and CEO of Israel Humavox. The Humavox technology consists of a "NEST" Station -- a design-free RF resonator that charges devices put inside it, with no placement or orientation requirements. The NEST (i.e., like a bird's nest) prototype created by Humavox is a white, plastic ball that can be opened to reveal a small charging bowl. Lachman said the device should be able to charge an enabled product in about the same time as with a charging cord. In tests, the technology's charging efficiency "rarely drops below 90%," he said, referring to the amount of power lost in the wireless transfer. Humavox's other enabling technology is ThunderLink, a wireless charging receiver that integrates with a device in a variety of technologies, from PC boards to aftermarket mobile device sleeves to full ASIC (application-specific integrated circuit) integration, meaning there is virtually no engineering required by manufacturers, Lachman said. Humavox's NEST Station wireless charging prototype. "Our key guideline was to create an effortless and seamless experience for users and manufacturers. We wanted to make charging as simple as dropping a product in a box," Lachman said. "We wanted to take charging from being an oppressive action...for some users to an intuitive action." Lachman compared his company's RF charging technology to magnetic resonance and inductive charging techniques, saying the latter is more difficult to integrate into mobile products. "With Humavox, there is no longer a need for wires, flat surfaces or precise placement onto power-charging mats -- it's as simple as putting a device of any shape or size into a box," he said. "The simple way to illustrate how RF charging works is that it's very similar to how a Wi-Fi router works. "In our case, you have a small unit with an antenna...and it will receive that RF that's converted into DC energy," Lachman said. Humavox plans to demonstrate its technology at next month's CES Conference in Las Vegas. Lachman said his company is in talks with mobile product manufacturers to integrate the technology, but he would not disclose which ones. Humavox's technology transmits RFs over a broad band of frequency waves and converts it to voltage to wirelessly charge the battery, Lachman said. The technology uses coils similar to those used by magnetic resonance to transmit power, but additionally uses an antenna to establish the transmission connection. Humavox is not alone in the Wi-Fi wireless charging space. After six years of development, start-up Ossia has already demonstrated its Cota wireless charging technology, which it says will be available to consumers and enterprises by 2015. Another company, PowerbyProxi, also has a wireless charging technology that allows users to simply place objects into a box to be charged. Earlier this year, Samsung's venture funding arm announced it was investing $4 million in the company.

download swift to-do list 7 download plants vs zombies cheats mac download zip password recovery tool 2.3 keygen download google cloud print apk download uc browser for samsung champ gt c3303i download bluetooth hacking software for nokia x2-01 download nimbuzz new version 2011 for mobile download chromium ubuntu 11 04 download chaos rings 2 english apk download windows 7 network adapter download how do i skype on my blackberry phone
Computerworld - Sometimes it seems as though technology is making our lives more complicated, not less. There's a vast amount of information out there, much of which we seem determined to save. We collect it from the Web, from our scanners and via our smartphone cameras, and it can range from important data such as tax returns, family pictures and contracts to the photo you took of the wine that your friend served you last Thursday. Where do you put it all, and how do you find it again? A number of applications promise to help you track that cacophony of information. Currently, the two kings of this particular castle are Evernote and Springpad. They are both Web-based tools designed to serve as bottomless storage repositories; they're built to enable people to deposit almost any type of digital information and then organize it, categorize it and/or retrieve it when needed. Alternative Applications There are, of course, a number of other applications designed to help users collect and organize digital information, but most of them are more focused (and, as a result, more limited) than Evernote or Springpad. Three popular programs are OS-dependent: Windows users can turn to Microsoft Office OneNote 2010 to collect text, photos, videos and clippings from Web sites, and Mac enthusiasts can do similar things with Yojimbo or Soho Notes. There are also a number of cloud-based applications that are either limited to specific types of data (for example, Simplenote is a text app that works on the Web or with iOS devices) or more suited to people who use specific apps or software suites (Zoho Notebook, for example, is a OneNote-like Web app that works best with other Zoho applications). And a new application called Memonic lets you save Web content; it's available in a Windows client version or as an iPhone, iPad or iPod Touch app. It's a tall order. The idea that you can save almost all digital information and then retrieve it at a moment's notice is a great one -- especially to information magpies who want to hold onto a huge amount of data but don't have the time or the inclination to organize it. But how well do these two programs fulfill that promise? I worked with Evernote and Springpad for several weeks, using them both as professional tools and for personal information storage. I compared the two based on a variety of factors, from the features of their interfaces to their support for social networking. Interestingly, while both applications handle a wide variety of data and are designed for the same purpose -- to help users track everything -- each has a very different approach. Your choice will probably depend on what type of interface you're comfortable with and the type of data you tend to work with. Note: Most of my observations are based on experiences working on Windows-based laptops and an Android-based Droid smartphone. You might encounter some differences if you use Evernote or Springpad on OS X- and iOS-based devices, but the main functionality is the same. How they work The first major difference between Evernote and Springpad is in the access they provide to your stored data: a hybrid local/cloud approach versus an all-cloud service. Evernote Although Evernote syncs everything through the cloud and offers a fairly sophisticated Web-based platform, the application is actually centered on its local clients for Windows and OS X. It also is available in apps for several mobile platforms, including iPhones, iPads, Android devices, BlackBerry phones and the Palm Pre. Your information is synced across these platforms. These local clients ensure that users have access to their data whether or not they're online -- something that is useful for those who depend on Wi-Fi for an Internet connection away from home or the office. For example, if I want to take notes at a meeting where I'm not sure I can get online, I bring up Evernote on my netbook (I haven't joined the tablet forces yet) and type away, secure in the knowledge that as soon as I'm able to connect to the Internet again, Evernote will automatically sync the new note with the rest of the database. Evernote is available in a free ads-included version that allows users to add up to 60MB of additional data per month. (There's no cap on how much aggregate data you can store over time, just a limit on how much new information you can add each month.) A premium ad-free version ($5/month or $45/year) lets you add up to 1GB of new data per month; it also synchronizes any files you attach to your notes, while the free version syncs only images, audio and PDF files in addition to your notes. Premium users enjoy a variety of other advantages as well, such as improved support and access to note history. Springpad Unlike Evernote, Springpad is a completely cloud-based service, and it went through a nasty few days during the recent Amazon EC2 cloud service outage. Like other Web services that depended on Amazon's servers (such as Quora and Reddit), Springpad was completely down for about two days -- and its users didn't have local use of their data. Disconcerting, to say the least. To its credit, the company was very careful to keep in touch with its users during the downtime, telling them exactly what happened, explaining how to back up their data and describing what it will do to prevent a similar incident in the future. Springpad is completely free; it currently doesn't offer a premium service. Addendum As of May 10, 2011, Springpad added offline support to users of the Chrome browser. A new Springpad Chrome Web app will automatically save your data locally and allow you to access it offline with some limitations.

download obstetrics and gynecology doctors episode download hp usb disk storage format portable download microsoft outlook hotmail connector 32 bit download java jdk mac 10.6.8 download stairway to heaven korean drama soundtrack download hp 5110 all in one software download backup & restore x10 download d-link usb radio software download flash player 11 update download add fonts to gimp mac download adobe flash player 11 3 gezginler
Computerworld - I've spent the past two weeks flying my experimental two-seater across the country, landing at small airports, pitching my tent wherever I can, bouncing in the thermals, and mostly observing the world from a couple thousand feet up. From that vantage point, youcan learn what a community values. The same is true, in a figurative sense, with organizations. What can you glean from a literal bird's-eye view? Consider the impression I got of Canadian, Texas, a small town near the Oklahoma border. When I looked down on the town from the air, it seemed like a family-oriented place, neither rich nor poor, since most of the housing consisted of single-family homes with small yards. It was easy to see that the town was suffering terribly from this summer's drought. Every yard was brown and dry, as was the terrain for at least 50 miles in every direction, with one small but significant exception: At the southern end of town, a brilliant green football field was surrounded by a bright orange running track and had the name of the team, Canadian Wildcats, emblazoned in the end zones. White bleachers lined both sides of the field, which sat next to a large parking lot. The field looked very much like an oasis. True, you don't get a lot of detail when viewing it from 2,000 feet in the air; I couldn't tell whether the field had been watered, replaced with artificial turf or painted green. But it was clear nonetheless that the townsfolk of Canadian take a lot of pride in that patch of ground. It told me that for Canadians, football is more than a game, and that field is more than just a place for their kids to play. The Canadian Wildcats' field is a public forum where the community can come together, bond and express their pride. All communities, even project teams and companies, make decisions about what's important to them, and those choices are often indelibly marked, visible to the observant -- just as the things that are important to the residents of Canadian, Texas, were apparently visible to me from a couple thousand feet above. Whether you're joining a technical team or working across the divide with nongeeks, the things you learn about what's important in your new environment can determine what sort of first impression you make and whether you will be embraced or rejected by your new colleagues. Violate unspoken rules of conduct, and you may be in for a rough ride. For example, I was called in for a meeting with a potential consulting client. As I arrived, I noticed that the company had cubicles with low walls, cubicles with medium walls, cubicles with high walls, small offices with no windows, midsize offices with small windows, and large offices with big windows and meeting tables. Without exchanging a word with anyone at the company, I knew that this was a place that had a high regard for hierarchy. So I knew that I should focus my attention on the CIO rather than any of his lieutenants; they wouldn't be making any decisions and probably wouldn't voice any public opinions. I acted on that assumption in the meeting, and my suspicions were confirmed. In the end, the CIO hired me. I doubt that he would have if my behavior had not reflected recognition of the company's strict pecking order. So when you engage with new people, pay attention not only to the tasks that you are asked to do, but also to the values of the group. A quick glance from 2,000 feet can tell you all you need to know. Paul Glen, CEO of Leading Geeks, is devoted to clarifying the murky world of human emotion for people who gravitate toward concrete thinking. His newest book is 8 Steps to Restoring Client Trust: A Professional's Guide to Managing Client Conflict. You can contact him at info@leadinggeeks.com. More by Paul Glen Paul Glen: How can you wield influence if you don't know what it is? Paul Glen: For geeks, avoiding blame is a silent career killer Paul Glen: When you've had it with a stakeholder Paul Glen: Nobody wants you to be a technology vending machine Paul Glen: Geeks love problems, so give them some Paul Glen: The secret to keeping processes vital Paul Glen: How to deal with a toxic team Paul Glen: The hazards of literal listening Paul Glen: Even if you can't measure it, you still must manage it Paul Glen: Being right vs. not being wrong Opinions

download integrity is invalid xilinx download game of life twists and turns download wechat untuk hp bb download adobe flash player 10 android 2 1 download asphalt 6 for java phones download uc browser for zen m72 download skype for blackberry from app world download uc browser c2 00 download temple run android application download born to fly by sara evans download internet manager crack 6.11
IDG News Service - EMC is updating its NetWorker backup and recovery software on Tuesday with an eye to greater efficiency, tighter integration with other EMC products, and cloud computing. NetWorker 8 is the most significant new version of the software since 2003, when NetWorker 7 was released. It updates the product in several major ways, both streamlining it for higher performance and enhancing its usefulness. In fact, the basic architecture of NetWorker has been changed for improved performance and scalability. In previous versions of NetWorker, the management of backup appliances ran entirely on the central NetWorker server. With Version 8, that work is distributed among NetWorker Storage Nodes, the servers that send data to backup appliances. Adding more backup systems no longer requires more central server capacity. "Rather than one server managing devices, you now have N number of servers managing devices," said Rob Emsley, senior director of product marketing. "That has allowed us to, with the same amount of infrastructure ... scale to three times the amount of devices," he said. While NetWorker Storage Nodes now can take over management tasks, another new feature called Client Direct lets NetWorker bypass those nodes in the backup process. Client Direct is an addition to NetWorker's client software that can send data directly from the client to a backup target, such as a disk array. This feature reduces the backup path from two hops to one, cutting in half the time it takes to complete the process, Emsley said. Reducing the workload on NetWorker Storage Nodes is the key benefit that Luke Youngblood sees in NetWorker 8. Youngblood is an enterprise infrastructure architect at a large national health-care technology company in the U.S. His company has standardized on Data Domain backup appliances from EMC, using data deduplication to cut the amount of data that has to be transported and stored. The company offers managed services for processing health-care diagnostics and insurance claims, and it has about 2,000 physical and virtual servers in five data centers around the U.S., with about 1 petabyte of data. With its current NetWorker software, Version 7.6, Youngblood's company has to run every backup through a NetWorker Storage Node, he said. That has meant fat 10-Gigabit Ethernet pipes to carry data from multiple servers to the node, plus high capacity within the node to handle the process. With NetWorker 7.6, "You had to be careful not to overload the storage node," Youngblood said. In some cases, that has required his company to stagger its backups so there aren't too many running at once. Once deduplication and backup happen directly between the client and the storage appliance, a Gigabit Ethernet connection will suffice and the company won't have to invest in more storage nodes just for processing, he said.

download pc performer full version gratis download kamasutra hindi movie utorrent download scientific graphing calculator mac download corel draw x3 trial version download kamus digital bahasa sunda download 2 chainz old name download bluetooth software for nokia pc suite download adobe flash player versi terbaru 2013 download amazon video converter 2.1 1 download software mini link ericsson download adobe flash player on lg tv

воскресенье, 29 декабря 2013 г.

Computerworld - Hollywood -- Microsoft launched two 10.6-in. tablet computers dubbed Surface on Monday, built on Windows 8, with two versions of unusual attachable Touch Covers that double as keyboards. The Windows RT version of Surface will go on sale first in 32GB or 64GB versions. It will be priced at the same level as competitive Windows RT tablets from other makers, Microsoft said. The Windows 8 Pro version will ship three months later in 64GB or 128GB versions, and is expected to sell at the price of ultra portable PCs, Microsoft said. The Microsoft Surface tablet, unveiled late on Monday, comes with a built-in "kickstand." In pictures: Surface -- 'A PC, a tablet and new' A full spec sheet for both Surface tablets is posted on Microsoft's site. Microsoft CEO Steve Ballmer called the tablets actual PCs because they are based on Windows 8. "The Surface is a PC...a tablet..and a new experience," Ballmer said. Windows RT will run ARM chips, while Windows 8 Pro will function on X86 architecture. The ARM architecture is widely used in smartphones and even Apple's iPad, while Intel has been the biggest maker of X86 chips for laptops. Ballmer spent time saying he appreciated efforts of various Windows 8 tablet makers with past PCs and coming tablets, but added: "With Windows 8, we didn't want to leave any seam uncovered...Much like the need for mouse [introduced with Windows 1.0], we wanted to give Windows 8 its own companion." Analysts were concerned that Microsoft might rankle its tablet makers. But the news surprised some analysts, including Steven Osinski, a member of the board of the business administration college at San Diego State University. "It seems to me that Microsoft, the sleeping giant, has finally woke up to 2012," he said. "If Surfaces works as well as Microsoft claims, here's a product that will give Apple's iPad a major run for its money." Features in the tablets include a built-in stand, a vent around the perimeter to let off heat and partnerships with Netflix, and inclusion in the Xbox network, he noted. "This will be a threat to Apple's dominance in the tablet market," Osinski added. The fact that Apple has a two year start on Microsoft with its 9.7-in. iPad that starts at $499 will matter. The iPad currently has more than 60% of the market, while various Android makers split the rest. The two covers with the machine are called a Touch Cover and a Type Cover, with the latter offering a touchball experience and the ability to touch type with resistance. An accelerometer in the covers allows a user to never need to remove the covers to orient them for typing. Microsoft demonstrated how they can be attached and used, and offered reporters brief up-close demos. The Microsoft Surface tablet. Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen or subscribe to Matt's RSS feed. His email address is mhamblen@computerworld.com. See more by Matt Hamblen on Computerworld.com. Analyst credits Surface sell-out to Microsoft swinging conservative Best Buy does what Microsoft won't: Takes Surface tablets in trade Deja vu all over again: Microsoft warns of Surface 2 sell-out Microsoft steers same strategic course in Surface do-over Dumping a Surface? eBay averages double the return of a buyback vendor Microsoft's Surface to be under revenue microscope Microsoft's most loyal users ask for Surface trade-in program Microsoft takes second swing at tablets with new Surface 2 lineup Microsoft sticks to guns, will unveil refreshed Surface on Sept. 23 Surface channel distribution tempo shows Microsoft lacks Plan B after sales debacle More on Surface

download 90210 naomi and annie sisters download acer aspire one netbook bios download plants vs zombies steam errungenschaften download nero 7 ultra full version download the elder scrolls iv oblivion for mac download labels halt to increase cd sales download adobe audition 3.0 full version download printable 2012 calendar 6 months download photo viewer for pc download block breaker deluxe 2 para celular download uc browser for 240x320
IDG News Service - Patent firm Eolas Technologies lost an appeal against Google, J.C. Penney, Yahoo and Amazon.com in a long-drawn lawsuit involving key Web patents. The U.S. Court of Appeals for the Federal Circuit affirmed without comment on Monday an order by a federal court in Texas, which had ruled in July last year that several claims relating to the two patents in the suit were invalid. Eolas, in Tyler, Texas, filed a patent infringement suit in 2009, accusing 22 companies including Adobe Systems, Google, Yahoo, Apple, eBay and Amazon.com of unlicensed use of its patents in websites and other products. Some of the companies including Texas Instruments and Oracle settled and signed licensing deals with the company. Microsoft earlier settled a similar lawsuit. A jury in Texas in February last year gave the verdict that two patents that enable Internet browsers to host embedded interactive applications were invalid. Eolas said in its complaint it is an exclusive licensee to the patents which were assigned to the Regents of the University of California. Eolas and the university had in August last year informed the U.S. District Court for the Eastern District of Texas, Tyler division of their intention to appeal its July 2012 order and previous rulings. The case attracted considerable attention with British computer scientist Tim Berners-Lee, who is credited with inventing the World Wide Web, and Pei-Yuan Wei, who developed a web browser called Viola, testifying in the case. The testimonies confirmed that Viola disclosed the claimed inventions before Sept. 7, 1993, the date Eolas claimed it had conceived the technology, and ahead of Eolas' subsequent filing for a patent, the defendants said in a filing. The decision by the appeals court comes in the wake of concerns about unnecessary and sometimes frivolous patent disputes by "patent assertion entities," sometimes described as patent trolls, whose main business is allegedly to collect licensing fees and damages from technology companies. The administration of U.S. President Barack Obama issued in June five executive actions and seven legislative recommendations designed "to protect innovators from frivolous litigation." John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's e-mail address is john_ribeiro@idg.com

download fujifilm finepix a900 software download makehuman 1.0 alpha 5.1 download carousel dancing on my own (robyn cover) download file joiner and splitter download all selected links firefox download dillards 10 off coupon code download ipad 2 icin flash player download adobe soundbooth cs5 mac download ultraiso full vn zoom download geico po box 9515 fredericksburg va download windows 7 styler theme
IDG News Service - Open-source enterprise software company Red Hat has updated its virtualization platform, Red Hat Enterprise Virtualization (REV), to include support for desktop virtualization, the company announced on Monday. The beta version of REV 2.2 will include a number of new programs that will allows customers to run a virtualized desktop infrastructure (VDI). "It will allow you to deploy a RHEL [Red Hat Enterprise Linux] desktop, or Windows XP, or Windows 7, on a secure high-performance hypervisor platform," said Andrew Cathrow, who is a Red Hat senior product marketing manager. "By using a VDI, you are moving the [operating system] from the end user's device into the data center, where it is easier to manage and maintain." REV is a package of a number of different Red Hat applications integrated for offering virtualization capabilities to the enterprise. It comes with a virtualization management console, as well as a bare-metal hypervisor, the Kernel-Based Virtual Machine (KVM). KVM is also included in Red Hat Enterprise Linux (RHEL). REV can run hosted versions of either Linux or Windows. This version of REV includes the SPICE (Simple Protocol for Independent Computing Environments), for remote rendering of desktops. Red Hat acquired this software in its 2008 purchase of Qumranet. The package also includes a connection broker, a Web portal users log into to fetch their desktops form their client machines. Formerly, the desktop capabilities were available as a separate stand-alone beta offering of REV, but with 2.2 the server and desktop editions are merged into a single package. "We believe it is important to have a common platform. Customers don't want to have one tool for desktops and one tool for servers," Cathrow said. In addition to the desktop virtualization, REV 2.2 introduces a number of other new features. Chief among them is the ability to import virtual machines from platforms, such as those offered by VMware, Citrix and Microsoft. To this end, REV uses the Open Virtualization Format (OVF), an open standard for virtual machine images. This is also the first release to include the V2V virtual machine conversion software, which can convert VMware or Xen virtual machines created within Red Hat Enterprise Linux into KVM virtual machines. The company also plans to add functionality that will allow the conversion of virtual machines that were built on Microsoft Windows platforms as well. "It is very simple to migrate [virtual machines] from other hypervisor platforms into REV," Cathrow said. In this release, REV also includes a data warehouse for monitoring the performance and usage of virtual machines, the data from which can be piped into most other SQL-based business intelligence tools.

download age of empires 3 full version for mac download blackberry desktop software 2.0 for mac download internet manager 6.07 full download nokia pc suite c6 download launcher for android 2.2 download descargar el instalador de plants vs zombies 2 download aplikasi wechat di laptop download page for flash player on windows 7 download opera mini to mobile phone download face recognition app for android download i doser gates of hades drg

суббота, 28 декабря 2013 г.

Computerworld - A crystal-clear denouement of U.S readiness to combat threats in cyberspace came at a hearing held March 10 by the U.S. House Committee on Homeland Security. After about an hour of listening to testimony from five witnesses representing government and the private sector, committee chairman Rep. Bennie Thompson (D-Miss.) asked if any of them felt that the federal government was prepared to deal with a cybercatastrophe. Not one did. More than seven years after the terrorist attacks of Sept. 11, 2001, there's widespread consensus that federal efforts to secure cyberinfrastructure are bogged down by a lack of vision, planning and leadership. While the government has struggled to come up with a cohesive national strategy for defending its interests on the Internet, threats in cyberspace have continued to grow and today pose a grave risk to national and economic security. Adversaries, which include unfriendly governments and militaries, intelligence agencies, organized criminals groups and hactivists, have by most accounts already penetrated U.S government and private networks or are actively engaged in doing so. Most of the efforts appear to be focused on leeching away secrets from public and private IT sectors for profit and for espionage. A report released in March by the University of Toronto and think tank The SecDev Group showed how a group with apparent ties to China has systematically breached systems in more than 100 countries, apparently for espionage purposes. At the same time, the potential for attackers to disrupt vital networks and systems in critical infrastructure areas such as banking and power is growing daily. The threat that has not going unnoticed. Earlier this month, Sens. Olympia Snowe (R-Maine) and Jay Rockefeller (D-W.Va.) introduced new legislation that would give the federal government sweeping new authority on the cybersecurity front. Federal efforts to secure cyberinfrastructure are bogged down by a lack of vision, planning and leadership. The legislation would give the government a more direct role in developing and enforcing baseline standards, not just for agencies but also on companies in critical infrastructure areas such as financial services, utilities and health care. It would empower the president to declare a cyberemergency if needed and allow him to disconnect federal or private-sector networks in the interests of national security. The current administration has made cybersecurity a priority. In February, President Barack Obama ordered Melissa Hathaway, a Bush administration official who is credited with helping to develop a multibillion-dollar classified initiative aimed at better securing federal systems, to conduct a 60-day review of the government's cybersecurity efforts. What that report says and any strategies and policies that result from it are going to be critical in the near and long term. "Our digital infrastructure has become the most important underpinning of U.S. national and economic security," says Amit Yoran, former director of the National Cybersecurity Division at the U.S. Department of Homeland Security (DHS). "In order to make good resource-allocation decisions, we need to understand the risk better," Yoran says. According to him and several others across industry and government, these are some of the key things the feds need to do in the near term. Global threats: Are we focusing on the wrong things? Navigating the fog of cyber war Software: The eternal battlefield The grid: Likely target? Cyberwar's first casualty: Your privacy A short history of hacks, worms and cyberterror

download baixaki br game speed adjuster download gta san andreas psp iso 1 link download avast internet security 7.0.1451 full version license download sony ericsson theme creator latest version download file ftp command prompt download plants vs zombies ps3 game download the sims 2 game full version download genius of love mp3 download oil money gang mp3 download smadav terbaru 2013 full crack download advanced paradox password recovery
IDG News Service - Dell sent a message that it intends to keep its PC division alive with the launch of new Venue tablets on Wednesday. The company launched two Venue tablets with Android, and two with Microsoft's latest Windows 8.1 OS. The tablets will come with screen sizes ranging from 7 inches to 11 inches. All the tablets will be available in November. The Android tablets include the Dell Venue 7, which will have a 7-inch screen, and the Venue 8, which will have an 8-inch screen. The Venue 7 will be priced at $149, and the Venue 8 will be priced at $179. The Venue 7 and 8 run on older Intel Atom processors that were announced last year, and not the latest Atom processors code-named Bay Trail. Both tablets have screen resolutions of 1280 x 800 pixels, Micro-SD slots and Wi-Fi. The new Windows 8.1 tablets include the Venue 8 Pro, which will have an 8-inch screen, and the Venue 11 Pro, which has a 10.8 inch screen. The latter can be a tablet, or laptop with attachable keyboard or docking station. The tablets will run on Intel's latest processors. The Venue 8 Pro starts at $299, and the Venue 11 Pro starts at $499. The Venue 8 Pro has a Bay Trail processor and up to 64G-bytes of storage. It has a 1.2-megapixel front camera and a 5-megapixel back camera. It weighs 388 grams. The Venue 10 Pro has a range of processor options ranging from Bay Trail to the latest Haswell processors. The device weighs 726 grams. It has up to 256GB of storage, NFC capabilities and a 2-megapixel front camera and an 8-megapixel back camera. Other features on Dell's new Venue Pro tablets with Windows 8.1 include Micro-SD card readers and LTE mobile broadband connectivity. Dell's new tablet lineup did not include a device with Microsoft's Windows RT OS. Dell's last XPS 10 tablet with Windows RT was discontinued last week. The company does not plan to refresh its line of Windows RT tablets, said Neil Hand, vice president at Dell, during a launch event in New York. Dell's new tablets also revive the Venue brand name, which the PC maker abandoned when it discontinued its shipment of smartphones early last year. Dell earlier launched Venue smartphones running Windows Phone and Android in 2011. The new tablets also indicate that Dell is retaining its PC division. Michael Dell reassured customers that the company would retain its PC division after shareholders last month approved a deal in which the CEO and associate Silver Lake Partners would take the company private for US$24.9 billion. It had been speculated that the poorly performing division might be axed after the company goes private. A billion people will be using a tablet by 2017 and it remains an important category for Dell, Hand said. "We are dedicated to growing a tablet business in the company," Hand said. During a video to start the presentation, the company invoked its reputation as a PC innovator. "It's a very exciting time for us at Dell," said Sam Burd, vice president of personal computer group, during the event. The company also launched three XPS laptops with Intel's latest fourth-generation Core processors code-named Haswell. The XPS 11 is a Windows 8 laptop that converts into a tablet. It has a 2560x1440 resolution screen. The other XPS laptops include the XPS 13, which has a 13-inch screen, and the XPS 15, which has a 3200x1800 display. Agam Shah covers PCs, tablets, servers, chips and semiconductors for IDG News Service. Follow Agam on Twitter at @agamsh. Agam's e-mail address is agam_shah@idg.com

download traktor pro 2.6 update download flash player 11 para mac download icc world cup cricket game download real football manager 2012 gratis download skyfire for android 2.2 download mcafee antispyware enterprise module 8.7i download morphvox junior full version download saved by the bell theme song download plants vs zombies samsung captivate download plants vs zombies ipod yeti download rail rush for mobile
IDG News Service - Facebook on Friday moved ahead with proposed changes to its privacy policies to clarify that users' posts on the site can be used in advertisements, but that users have controls to limit their appearance. In August, Facebook proposed revisions to its Statement of Rights and Responsibilities, in which it said that it can use the names, profile pictures and other data of its members to deliver ads. The proposed changes drew sharp criticism from some users, privacy groups and the U.S. Federal Trade Commission, which launched an examination into whether the amendments violated a 2011 law. The updated policies largely stand and will go into effect immediately, Facebook said on Friday. "Your feedback was clear -- we can do better -- and it led to a number of clarifying edits," said Erin Egan, Facebook's chief privacy officer. Nothing about the update, however, has changed Facebook's advertising policies or practices, she said in a blog post. "The goal of the update was to clarify language, not to change policies or practices," she said. But there was a change made in the policy's language addressing the presumption that minors on the site had received permission from their parents to have their data used in connection with ads. In Facebook's August proposal, one clause said that if a user was under the age of 18, "you represent that at least one of your parents or legal guardians has also agreed to the terms of this section (and the use of your name, profile picture, content and information) on your behalf." Based on feedback received, Facebook determined that the language was confusing and so it was removed, the company said on Friday. "This language was about getting a conversation started; we were not seeking and would not have gained any additional rights as a result of this addition," Egan said. Facebook has a number of ways that it uses people's data to deliver advertisements. One of its most important ad products is its "sponsored stories" program, which led to a class-action lawsuit and then a US$20 million settlement earlier this year. For some sponsored content, for instance, Facebook uses location check-ins or members' "likes" to have their profile name and picture paired with ads, if that "like" was given for a participating business. That advertisement would then be eligible to appear to the person's friends elsewhere on Facebook such as the news feed, timeline, or through the site's new search engine, called Graph Search. But members can still limit who sees these types of ads, Facebook said, based on who is allowed to see "likes." So if a person only allows family members to see that he "liked" a particular business, then only the family members would see the ad paired with the "like," the company said.

download pdf for windows server 2003 download uc browser 7 8 for samsung monte download winrar 64-bit full version for xp download minecraft scuba diving mod 1.2.5 download blackberry pc suite 9000 download apple os x mountain lion for windows 7 download line rider 2 mac download grid wars for mac download ammyy admin full version download plants vs zombies game center achievements download flowplayer video from website
IDG News Service - Some Twitter users were surprised Monday when they clicked a button to share content from third-party websites but instead downloaded a mysterious torrent file.    Twitter fixed a problem with its "Tweet" button Monday that caused some users to download a harmless torrent file. Twitter said the problem, which users said affected websites including TechCrunch.com, FT.com and Businessinsider.com, has been fixed, and the Tweet buttons are now functioning normally. As is the case when something strange happens, users suspected either Twitter or one of its technology partners had been compromised. Twitter uses several content delivery networks (CDNs) to serve content and improve the site's performance. Twitter did not indicate the cause of the issue but said in a statement "to our knowledge, the torrent file was not malicious." A torrent is a small information file that coordinates the download of content on the BitTorrent peer-to-peer file-sharing system. Torrent files are not malicious, but hackers have been known to disguise malware by making their program looks like legitimate files in the hope that people will launch them. Twitter's sharing buttons are widely used across websites and allow users to easily share a link to content on a website by posting a link to their Twitter feed. When a Tweet button is clicked, a JavaScript file is requested. The Tweet button isn't actually hosted on Twitter.com but instead on CDNs, according to the company. Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

download nokia pc suite all download flightgear mac os x download gloria gaynor i will survive mp3 download 69 9th street brooklyn download net spy pro 4.0 build 32 full download reckless racing 2 apk full download usb disk security full tamindir download regclean pro full version download cool edit pro full version chomikuj download sound forge audio studio 9.0 (sfas) download rm to mp3 converter for mac

пятница, 27 декабря 2013 г.

Computerworld - Amid rumors of layoffs and a possible sale of the company, BlackBerry today announced some good news: its growing BBM instant messaging service will be available for Android and iPhone devices in the next several days. BBM is one of the high points of the failing BlackBerry legacy business, with recent growth in BBM users mainly in Europe and Asia. Until now, BBM has only been available for BlackBerry devices. BBM has 60 million monthly active customers who send and receive more than 10 billion messages a day, BlackBerry said. Messages are quickly read in seconds, which BlackBerry said is an indication of how engaged BBM users are. BBM will be a free download in the Google Play store for Android on Saturday and in the Apple App Store for iPhone on Sunday, BlackBerry said. "With more than a billion Android, iOS and BlackBerry smartphones in the market, and no dominant mobile messaging platform, this is absolutely the right time to bring BBM to Android and iPhone customers," Andrew Bocking, executive vice president for BBM at BlackBerry, said in a statement. In addition to BBM text chat, users can share files such as photos and voice notes. BBM lets a user know that a message has been delivered and read and shows when a friend is responding. Up to 30 friends can join in group chats and share photos and schedules. A function called Broadcast Message allows users to send out a message to all their BBM contacts at the same time. BBM relies on a unique PIN to authorize a user, which BlackBerry maintains is more secure than giving out a phone number or email address to a new contact. The Android download will be available at 7 a.m. ET on Sept. 21 for Android 4 and later. For iPhones running iOS 6 and iOS 7, BBM will be available in the App Store at 12:01 a.m. local time on Sept. 22. Later in 2013, BlackBerry is expected to unveil BBM Channels to allow for conversations between users and communities. The conversations can be organized around common interests, brands, celebrities and more. BBM video and BBM voice calling are also planned for Android and iPhone in a future version, but BlackBerry didn't disclose when. BBM isn't yet available for Windows Phone smartphones, and BlackBerry didn't indicate when, or whether, that would occur. Windows Phone recently overtook BlackBerry as the third-largest smartphone brand shipping globally. Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at  @matthamblen or subscribe to Matt's RSS feed. His email address is mhamblen@computerworld.com. See more by Matt Hamblen on Computerworld.com.

download samsung kies windows xp download unzip for windows xp download angry birds samsung b7722 download garmin mapsource bluechart g2 vision full download a line in the sand evolution download snap n share 1.0 download how do i itunes for windows 7 download shark007 codec pack + media player classic home cinema x64 download gimp mac os x install download lego star wars iii the clone wars pc demo download cinema 4d trial version
Computerworld - Oracle's growth-by-acquisition strategy has slowed markedly this year, and analysts say the firm is concentrating instead on integrating Sun Microsystems products and personnel into the company and finishing work on the long-awaited Fusion Applications. So far this year, the company's acquisitions have been limited to picking up some intellectual property assets in February from privately held Ndevr, a maker of environmental reporting and analytics software, and acquiring U.K.-based Datanomic, a small, venture-funded data-quality vendor, in April. Sale prices were not disclosed in either deal, suggesting that neither is material to Oracle's bottom line. In contrast, the company completed some 70 deals, several of which were major, billion-dollar-plus acquisitions, between 2005 and 2010. Oracle's last big acquisition -- the $7.4 billion purchase of Sun -- closed in early 2010. Since then, Oracle has been working to shore up Sun's hardware business and started pushing a vision of integrated systems that span from disks to applications. In the foreseeable future, analysts expect that Oracle will concentrate on acquiring some key technologies that could improve its standing in fast-growing areas like "big data" management, mobile technologies and social software. Forrester Research analyst James Kobielus said Oracle may be joining "everyone and his brother" in going after technologies related to the open-source Hadoop framework for large-scale data processing. Possible acquisition targets include Datameer, Karmasphere and Cloudera, which offer a variety of Hadoop tools and services, he said. Ray Wang, an analyst at Constellation Research, added that the company is also likely to try to fill holes with mobile technology and social software assets. "There may be a shift in their portfolio [strategy] to pick up those things," he said. Wang suggested that Oracle could take a look at emerging platform-as-a-service vendors such as Joyent or Engine Yard to boost its mobile business. For social applications, Oracle has a wide variety of acquisition choices, he added, among them Jive Software, which has been rumored to be candidate for acquisition. Wang said it's likely that Oracle is interested in adding healthcare applications to its software portfolio, not just for electronic medical records, but also in areas such as nurse recruiting and adverse-event reporting for pharmaceuticals. The healthcare analytics tools would probably be built on top of its core business intelligence stack, he said. Oracle may also be looking to further increase its growing emphasis on hardware. Last year, for example, the company acquired a 10.2% stake in Mellanox, a maker of InfiniBand interconnects. Also, while few analysts expect that Oracle will invest heavily in professional services to compete with the likes of Hewlett-Packard and IBM, it could buy small, specialist systems-integration firms, particularly those that focus on BI projects. An Oracle spokeswoman declined to comment on the company's plans. But once the company is done integrating Sun and developing the modular Fusion Applications, its rapid-growth-by-acquisition strategy could return. Observers note that executives cited former HP CEO Mark Hurd's experience "operating a $100 billion business" as one reason Oracle hired him as a co-president last year. Kanaracus is a reporter for the IDG News Service. James Niccolai of the IDG News Service contributed to this story.

download skype for windows vista business download kies air voor pc download zemfira hochesh lyrics english download motherboard monitor 5 portugues download bb multi unlocker key download frontier airlines safety record download skype para blackberry playbook download we believe in love amy grant download steam game unlocker hack v5.0 download att xda galaxy s3 download jannat 2 leaked song judai mp3
Computerworld - Robert Handler, an analyst at Gartner, will never forget one of his earliest consulting jobs. "I was asked to gather enough data on a CIO to fire him," he recalls. Handler dutifully began researching the CIO's current and past activities but could find no obvious missteps. In fact, the man in question was the best CIO he'd ever met. Eventually, he returned to the CFO who had given him the assignment to ask why the CIO was to be fired. The CFO answered, "'He's spending a lot of money, and everything seems to be working just fine,'" Handler recalls. "And I thought, 'I don't ever want to be a CIO!'" Handler had encountered one of the paradoxes of the IT world: Technological achievements often result in things not happening -- bad things, like outages, lost data or network breaches. "On a good day in IT, nobody knows you're there," says Joe McLaughlin, vice president of AAA Western and Central New York, a Buffalo-based not-for-profit that provides emergency roadside assistance and other services to its 880,000 members. Worse, top executives may know that you and your staff are there, but they think you're updating your Facebook profiles while waiting for requests for help. Like the CFO who Handler encountered, they may assume that if they don't see new technology being deployed or major problems being repaired, there's nothing much going on. But in reality, a good IT person will, for example, "be constantly looking at resources to find out about zero-day attacks and other threats," says Mike Vitale, CTO at TalkPoint, a New York-based webcasting provider that facilitates about 20,000 webcast events per year. "If there is a threat, the provider will put out a patch quickly. But then I have to find out, if I install the patch, will it stop part of the website from working? People don't know about the blocking and tackling that goes on every day." "There's this misconception that you stand up your servers and then they run in perpetual motion from that point forward with no care and feeding involved," adds Chris Brady, CIO at NextGear Capital, an inventory finance provider for used-car dealers whose 75 branches serve 9,000 dealerships. There's this misconception that you stand up your servers and then they run in perpetual motion from that point forward with no care and feeding involved. Chris Brady, CIO, NextGear Capital That misconception is easy to understand. Corporate executives may think enterprise IT systems are like home computers: You set them up and they keep running with little or no intervention as long as security updates and patches are set to automatically download. It's hard to argue with the logic that servers costing $50,000 or more should have at least the same capabilities as the $1,000 Macs or PCs sitting on their desks at home. The same goes for the functions they're accustomed to using easily in the cloud, such as email across many different devices. "A lot of IT teams for the past 10 years have been supporting Microsoft products," Vitale says. "Then -- boom! -- overnight this executive has an iPad and wants it to work on the network. People are getting rid of BlackBerries and want to use Android or iOS devices. It sounds easy to them, but it's not. They just expect it to work, and if it doesn't, there's a good deal of anger." Indeed, IT often goes unappreciated unless and until something fails to work as expected. "I've seen a lot of companies where business units can overrule IT," Vitale says. That philosophy holds, he says, unless an important tech function fails. "Then they're waiting for the IT team to swoop in and save the day. It's the most thankless job in the world right up until something goes wrong." But while it may be tempting to deliberately break something or allow it to fail so as to gain the recognition that comes with fixing a business-impacting problem, deliberately doing your job badly will not be beneficial to your department, your employer or your career. And there are better ways to get IT's value across to top executives, even when things are running smoothly.

download gom player full version 2012 download itunes music multiple computers download system shock 2 no cd crack download go hard in the paint instrumental download cd dvd copy protection software download idt high definition audio codec driver windows 7 starter download youtube videos chrome google download 7th heaven t bone download fate with unlimated play without trial download avira antivirus trial version 2012 download program picture collage maker
Computerworld - Now that Apache.org has listed more than 150 enterprises as Hadoop users -- including JPMorgan Chase, IBM, Google, Booz Allen Hamilton and the New York Times -- it seems likely that the big data management system could soon become all the rage among corporate IT executives. But analysts and early users warn that companies should move slowly to take advantage of the open-source technology, noting that Hadoop requires extensive training along with analytics expertise not seen in many IT shops today. Some also noted that the swollen ranks of suppliers of Hadoop technology could soon thin out, leaving some users without vendor support for the complex technology. To be sure, Hadoop clearly has some technical advantages over traditional database management systems, especially its ability to simultaneously handle both structured data and unstructured information such as video, audio and email messages. Hadoop systems can also scale with minimal fuss and bother. Forrester Research analyst James Kobielus pointed out that only about 1% of U.S. enterprises are currently using Hadoop in production environments. That figure should remain small for now, perhaps growing to 2% or 3% over the course of the year, he projected. Concurrent Computer and eBay may be more typical of today's early Hadoop adopters; they use the big data technology for specific applications while maintaining traditional relational database technology for the bulk of their IT operations. As such IT operations build up expertise, they can figure out more things to do with Hadoop, Kobielus said. Online auction house eBay stores unstructured data on Hadoop-based clusters running on "thousands" of nodes, while using relational databases for key tasks like transaction processing, said Hugh Williams, vice president of experience, search and platforms. "We see value in using multiple technologies to work with our data," Williams said. "Hadoop is a terrific choice for certain uses, while other technologies work alongside it for other purposes." In the long term, he said, the idea is to remain "flexible in what technologies we use; we don't see a world [with] one unifying technology." Concurrent, a maker of video-streaming systems, uses Hadoop to "do the heavy lifting, such as large-scale data processing," said William Lazzaro, director of engineering. Concurrent continues to use multiple relational databases, including MySQL, PostgreSQL and Oracle for other tasks, Lazzaro added. Kobielus also warned that today's market for Hadoop technology is "turbulent," with a fast-growing community of vendors that continues to "rapidly evolve." Marcus Collins, an analyst at Gartner, suggested that IT managers take the time needed to seek out hard-to-find Hadoop experts before getting too immersed in the technology. "You need to train your staff and invest in analytics," he said. "It's not trivial," agreed eBay's Williams. "We've put a lot of training in place, so our engineers know how to use Hadoop and can write code. Don't underestimate that." Analysts and users also stressed the need to educate corporate executives on the use of an open-source system for mission-critical applications. Using it for a few under-the-radar kinds of projects is one thing, but using it to develop a massive system for all the world to see is another thing entirely. Weiss is a freelance technology writer. This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.

download brian lara cricket 2005 demo with commentary download addax zoo tycoon 2 download ea sports fifa 2013 game download limpopo instrumental by kcee download kill the messenger chris rock download nxpowerlite desktop edition 5 download descargar donde esta para symbian gratis download kamus for nokia x3 download foo fighters times like these acoustic download kidz in the hall love hangover download video dari youtube pake keepvid
Computerworld - Google has been pushing hard to work its way into the enterprise, but it remains to be seen whether that effort will be aided by this week's acquisition of Motorola Mobility, analysts say. Google Monday announced that it had agreed to buy the smartphone manufacturer, which was spun out of Motorola Inc. in January, for $12.5 billion. Since then, industry observers have been mulling over whether the deal can provide a significant boost to Google's ongoing effort to become a formidable enterprise alternative to rival Microsoft. Seth Harris, managing director of Cook Associates, a consulting company that focuses on merger and acquisition services, said the move should help Google as consumers using Motorola Mobility's popular Droid smartphone and other devices are likely to push their employers to support them for business use. "The consumer now is in a unique position to influence, through their buying behavior, what kinds of platforms and standards their companies need to support," Harris told Computerworld. "Android is a hugely popular operating system. A Google phone with a Google operating system could be quite appealing. Any enterprise now is going to be forced to integrate those platforms into their enterprise for their knowledge workers." And owning the handset hardware, as well as the operating system, is a powerful combination that should further drive Android adoption, he added. "I think Google's acquisition here is pretty important because they're getting a respected handset manufacturer," said Harris. "They have the hardware system and the operating system and this combination has worked beautifully for Apple." Dan Olds, an analyst with The Gabriel Consulting Group, agrees the Google-Motorola Mobility combination will prove popular with consumers, but added that it's likely to take a while for it to affect its enterprise business. "While there might be some way that this purchase links into a Google master plan to dominate the enterprise, I'm just not seeing it now," said Olds. "To me, the major push behind the purchase of Motorola is consumer-based, with mobility and set-top box type devices and using the large Motorola patent holdings as both an offensive and defensive weapon." Rob Enderle, an analyst with the Enderle Group, agreed that the move probably won't immediately boost Google's enterprise business, but added that the search giant can be expected to make additional acquisitions of mobile technologies. He noted that some observers are keeping an eye out for Google to move to buy Research in Motion (RIM), maker of the BlackBerry smartphone that has long been a staple of the corporate world. "[The Motorola Mobility purchase] likely doesn't help them that much, which is why some of us are suggesting they may try to buy RIM next," said Enderle. "RIM has the enterprise connections they really want. The enterprise is very hard to penetrate -- it isn't a product problem, it is a trust/risk mitigation problem. They have to mitigate that to succeed there." The analysts generally agreed that Google will work hard to weave its various offerings -- such as its search engine, Google Maps, Google Docs and Android -- into one cohesive unit. "They're in a wonderful position to tie it all together," said Harris. "There's a lot being said about how the PC might finally be dead and the utility of how we work, how we buy things, how we bank is being pushed down into a single mobile device." Harris noted that tying all of Google's offerings together with popular Motorola Mobility hardware would let people get work done wherever they are without having to lug a laptop around. "Google has got the content, the hardware and the software to enable the enterprise to offer a stable platform for all of those workforce needs," said Harris. "All of the chess pieces are being moved around the board right now." Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is sgaudin@computerworld.com. Mobile wars Verizon LTE getting AWS upgrades, even as execs admit to some performance 'hot spots' Microsoft on 'Threshold' of Windows Phone growth Google's Nexus lineup may not sell well, but still challenges Android makers Android, Windows Phone grow in smartphone share, while iPhone drops In-store AT&T sales of Lumia 1520 start Nov. 22 for $200 and contract Claims surface that Apple will follow Samsung, LG into curved smartphone screens Nokia Lumia 1520 to cost $199 with contract on AT&T The phablet-ization of the smartphone BlackBerry gives up on selling itself as CEO resigns Windows Phone 8.0 smartphones may not be upgradeable to 8.1 More in Mobile & Wireless

download perempuan paling cantik di negeriku indonesia download adobe flex builder for linux download yahoo messenger for iphone direct download lord of the rings online for mac download world of warcraft launcher.exe download password keeper for mac download network monitor mini pro download phineas and ferb songs in english download best rar password recovery software 2012 download microsoft vista allow computer to hibernate download mx video player pro v1 6j apk
IDG News Service - The general counsel of a U.S. spying agency told a Senate committee Wednesday that if Internet companies provide information about the number of surveillance orders they receive for user data, it would alert the country's adversaries on which services to avoid. The government defended its data collection and disclosure policies even as a representative from Google warned the senators that U.S. surveillance practices could lead to the break up of the Internet. "Providing that information in that level of detail could provide our adversaries a detailed road map of which providers and which platforms to avoid in order to escape surveillance," said Robert Litt, general counsel in the Office of the Director of National Intelligence, and Brad Wiegmann, deputy assistant attorney general in the Department of Justice, in a statement in connection with the Senate hearing on "The Surveillance Transparency Act of 2013." The proposed legislation aims to bring greater transparency in data collection by the National Security Agency. Internet companies including Microsoft, Facebook, Google, Yahoo and LinkedIn have asked the Foreign Intelligence Surveillance Court to allow them to publish aggregate data about any orders or directives they have received under the Foreign Intelligence Surveillance Act and related statutes. The companies are trying to counter adverse publicity from disclosures by former National Security Agency contractor Edward Snowden that suggest that some Internet companies provide real-time access to user content on their servers to the NSA, which the companies have denied. The companies are allowed to reveal the number of surveillance requests only if they lump them together with other requests from U.S. law enforcement agencies. Litt's statement, however, indicated that the government is not willing to give much ground on the secrecy surrounding its data collection, which according to documents released by Snowden and the government includes bulk collection of phone metadata and user content on the Internet. While it is "possible and appropriate" to provide information on targets of surveillance, "counting the number of persons or of U.S. persons whose communications are actually collected, even if they're not the targets, is operationally very difficult, at least without an extraordinary investment of resources and maybe not even then," according to the government statement. It's not possible, for example, to determine whether a person who receives an email is a U.S. person, as the email address does not reveal anything about the citizenship or nationality of the person, it said. In cases where it is possible to get information that would help to determine if the person is from the U.S., the research required would "perversely require a greater invasion of that person's privacy than would otherwise occur."

download software switchproxy tool versi 1.3 4 download kamus for windows mobile download xcel energy youtube channel download flash player os x lion download facebook messenger for samsung b3410 download microsoft security essentials windows download plants vs zombies popcap online download justin bieber xbox live download the elder scrolls iv oblivion mobile download connectify win 7 64 bit download resolume avenue for mac

четверг, 26 декабря 2013 г.

Computerworld - Apple on Monday updated OS X Mavericks for the first time since it released the free upgrade eight weeks ago, patching a handful of security vulnerabilities in Safari and addressing issues with Gmail and Contacts. OS X 10.9.1, which weighed in at about 243MB, was couched as a combination of security, stability and compatibility fixes, and followed a narrow Nov. 7 tweak that targeted only Mail, Mavericks' email client. It appeared significantly later than previous first updates: Mountain Lion's 10.8.1 and Lion's 10.7.1 shipped approximately four weeks after the original. Apple called out several non-security changes inside 10.9.1, including additional fixes to Mail and how it handles Google's popular Gmail email service; improved support for the VoiceOver tool on Facebook; and resolutions of multiple problems with Contacts, OS X's address book. On the security side, 10.9.1 patched nine vulnerabilities, all in Safari, with eight rated critical by Apple, which declines to assign threat scores but instead tags such bugs with the phrase "may lead to ... arbitrary code execution." Three of the vulnerabilities were originally reported by Google's Chrome security team, which continues to contribute to the WebKit open-source browser engine project, which powers Safari, even though Google has moved to its own WebKit fork, dubbed Blink, as the foundation of Chrome. In a separate security-only update, Apple patched the same nine vulnerabilities in 2012's Safari 6, pushing the version number to 6.1.1, which became the most current edition for OS X 10.7, aka Lion, and OS X 10.8, or Mountain Lion. The omission of an update to Safari 5, which debuted in 2010, is a clear signal that Apple has retired OS X 10.6, better known as Snow Leopard, from support. Safari 5.1 is the newest version that runs on that 2009 operating system, and was last updated in September 2013. Snow Leopard has faced the chopping block for more than a year, but as its users have resisted upgrading -- some because it is the last version of OS X able to run old applications designed for the PowerPC processor -- Apple has continued to ship security updates for the aged OS. Last month, 20% of all Macs ran Snow Leopard, according to data from Web analytics vendor Net Applications. OS X 10.9.1 and Safari 6.1.1 can be retrieved by selecting "Software Update..." from the Apple menu, or by opening the Mac App Store application and clicking the Update icon at the top right. Mavericks 10.9.1 can also be downloaded manually from Apple's support site. Mavericks 10.9.1 patched a handful of Safari vulnerabilities, but was billed as a stability and compatibility update for Apple's free OS X. Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, or subscribe to Gregg's RSS feed . His email address is gkeizer@computerworld.com. > OS X Mavericks New tech device? Make the most of it Apple ships first OS X Mavericks update, tackles more email issues Free Mavericks sets OS X adoption record Apple's giveaway of Mavericks is 'irrelevant' to Linux, says Torvalds Apple's Mavericks off to strongest-ever OS X start Mavericks rushes onto Macs as uptake easily beats predecessor to 10% mark After first day, OS X Mavericks on 1 in 18 Macs 9 out of 10 Macs are eligible for free Mavericks upgrade QuickPoll: Why did Apple decide to give away OS X Mavericks for free? Apple gives away OS X Mavericks More in Apple Update

download skype for sony ericsson x1 download morphvox junior 2.7.5 full download quotes about life on tumblr download pci simple communications controller for dell download acer aspire one bios corrupt download bascom x lonely girl download descargar antivirus usb disk security gratis download geforce tweak utility deutsch download skype for windows 2008 download kbb cars for sale download avira internet security 2013 full version
PC World - The war between Google and Microsoft is heating up. Each tech giant offers a productivity suite serving the essentials for serious work online: word processing, spreadsheets, email, and calendars. Should you ally with Google Apps for Business, or root for Microsoft's Office 365 for Small Business? My experience with both brands' productivity tools reflects the workflows many small businesses face.A In 2007, with staff scattered across several countries, my editorial company started usingA Google Apps for Business. It offered email, plus shared text documents and spreadsheets all under our company domain name and logo. Meanwhile, on the desktop, we used Microsoft Word and Excel, particularly for complex documents that we shared with clients. If we were starting over today, we would seriously consider Microsoft's Office 365 for Small Business. For years Microsoft wasn't putting significant functionality online, butA next week's release of Office 365 Small Business Premium is a big step forward. Google and Microsoft each allow personal and business use of their online platform, as well as simultaneous logins to multiple accounts in different browser tabs.A Beyond that, however, their platforms differ greatly in usability, functionality, and mobile support. Read on to discover the standout features and surprising weak points of each. Word processing and collaboration \Google's word processor offers more features than Microsoft's Word Web App, and they work extremely well.A Google's word processor can't create an index, but it has all the standard formatting, as well as hundreds of fonts. If I have a document pulled up in my browser while someone else is editing it on, say, their smartphone, I see the changes as they are typing them, letter by letter. Google's word processor is a what-you-see-is-what-you-get app--unlike Microsoft's Word Web app. The way a document looks onscreen is the way it will look when downloaded to your PC as a Word or PDF file, when printed, or when published as a Web page. Critically important: Google saves your documents A automatically. Back in the old days--2008, say--you might lose all your work at any moment. Today, changes are saved instantaneously, and if you lose Internet connectivity, you're alerted immediately. Google Drive can sync documents on multiple machines and in the cloud. If a Google document is edited offline, there's a potential for conflict with other editors, and again if users apply Word formatting that isn't yet supported by Google. If there are no conflicts, the document syncs automatically. Otherwise, either a brand-new document is created with the changes, or you can choose which changes to use. Microsoft Office 365 shares Google's synchronization problem when documents are edited locally. The Word Web App that comes with Office 365A has a bit less functionality--in addition to the real estate--hogging "ribbon" interface.A But, most important, it lacks auto-save and what-you-see-is-what-you-get. Also, unlike Google, the Word Web App attempts to maintain a level of compatibility with the standard desktop version of Word, but it can't yet display all the formats. Say, for example, that you have white letters on a dark background.A It looks fine when first uploaded and viewed in the Reading View. But click on Editing View,A and the rA(c)sumA(c) sections are immediately misaligned, formatting commands butt into the text, and background colors all disappear. To make sure the edits look right, you'll need to switch back to the Reading View. Editing the same sample rA(c)sumA(c) in Google is an easier matter, as this image shows: With Microsoft's Word Web App, trying to edit the same document from multiple locations is difficult since changes are not saved in real time. There's a complex process of locking, unlocking, and reconciling files if multiple people edited them at once.A If your employees need to do any serious editing, they'll need to use the desktop version of Word 2013, available within pricier Office 365 subscriptions. (Collaborative editing in Word 2013 works only with the step-up Office 365 plans that add SharePoint.) Microsoft's mobile functionality is in place only if you're using the well-built Office apps for Windows Phone 8, or if you've paid for Office desktop software for a Windows 8 tablet. There are no iOS or Android apps for Office 365, though third-party apps let you edit Office documents. Google, on the other hand, offers free apps for iOS and Android, but not for Windows mobile devices. Winner: Google Apps wins. Microsoft's Word Web App isn't ready for prime time. Next page: Spreadsheets, email, calendars, and costs... Online spreadsheets Google's spreadsheet app supports basic Excel functionality--multiple sheets in a workspace, cross-sheet references, and standard formulas. It also has formatting options, charts, drawings, images, gadgets and scripts. Yet, when saving a Google spreadsheet in Excel format, the charts may look a little different, and some functionality might be lost. The same is true when converting an Excel document to edit in Google Apps. The Excel Web App does have autosave, background colors on cells work fine, and multiple people can edit online at once. It supports many more features than Google's spreadsheets do. Cell formats, charts, formulas, and many other advanced functions work perfectly. Not everything is supported, such as objects or tables that pull in data from outside sources.A However, if you upload files saved in older Excel formats, such as .xls, you will need to re-save them first in the latest .xlsx format to edit them. Winner: Microsoft's Excel Web App is superior to Google Spreadsheets. Email and calendars Microsoft's Outlook, Calendar, Contacts, and Tasks are similar to Google's counterparts. Outlook allows emails to be grouped into folders and subfolders, while Google has labels and sublabels. A Google email can have multiple labels, but an Outlook email can be copied to multiple folders, and a "Category" option is similar to Gmail's labels. So it's pretty much a wash. Gmail integrates well with many of Google's other tools. Get a foreign-language email? Gmail offers to translate it. Text chat with your contacts without leaving Gmail, add them to your Google+ circles, start a voice or video call, or set up a hangout video conference with several people. Both Outlook and Gmail have nice text editors. The Outlook Web App opens a new pop-up window when a user is reading or creating email--an annoying habit since I have pop-ups blocked. If you've used the free Outlook that comes with Microsoft's personal SkyDrive service, you'll find quite a few differences. The SkyDrive version has some nice tools not in the Office 365 version of Outlook. For example, the folder navigation sidebar on the left includes "Quick views" to quickly scan through emails with attached documents, photos, or shipping updates. Microsoft's online Outlook and Calendar can be used as is. The one significant exception for businesses is the lack of an online mail merge function--you'll have to switch back to the desktop Office suite for that.A (Google Apps supports mail merge through either built-in scripting or withA third-party apps.) Both Gmail and Outlook allow you to manage multiple email addresses from the same account, but Gmail lets you set up different signatures for each address. Both platforms lets you view appointments from multiple calendars. For example, you might have a personal calendar for your own appointments, a group one that everyone on your team has access to, and a home calendar associated with your personal email account. Events from all three calendars will show up on the same screen, color-coded so you can tell them apart. In addition, both calendars can send you reminders by email, pop-up alerts, or via text message to your cell phone. I've used Outlook both on the desktop and on the Web, and I find Microsoft's online interface--for both the Office 365 Outlook and the new consumer-oriented Outlook.com--to be simpler and clearer than the desktop version. But I prefer Gmail to both, not because of any particular features, but simply because I'm more used to the interface after all these years. If your employees have been using Outlook all along, they would probably be happier with the Microsoft's online email client. Winner: Tie What they cost Google Apps for Business starts at $5 per user per month, or $50 per user per year. Each user gets 25GB of storage for email, plus 5 GB of storage on Google Drive. Upgrading to Google Apps for Business with Vault costs $10 per user per month, adding more security and e-discovery features. There are no limits on how many users each company can have on the platform, and additional storage space is available at $4 per month for 20 GB--though storage prices have been falling, and are likely to continue to do so. Office 365 for Small Business costs $6 per user per month for up to 50 users. For more users, you'll need to upgrade to the midsize business and enterprise plan, which starts at $8 a month. The latter is also available at $20/user per month, which adds a subscription to Office Professional Plus 2010 for up to five devices per user, as well as email archiving and unlimited email storage. Both platforms offer free trial periods. Winner: Google Apps for Business costs less. Add-ons and apps Google Apps has its own apps store (not to be confused with the Android Apps Store) in the Google Apps Marketplace. These applications, many also available for mobile devices, integrate with the Google platform. For example, they might allow single sign-on, or add functionality to your calendars, emails, contacts, or documents. By contrast, Microsoft has been slow to the Web, although it still dominates the offline world. Microsoft's Office Store sells apps that integrate with its desktop Office software, not the Web Apps. However, the Office file formats are the default standards for business documents shared with other businesses. An entire industry of developers and service providers helps companies expand on their Microsoft applications, and a great deal of legacy code is designed to work on the Microsoft platform.A Microsoft's offline ecosystem isn't likely to disappear any time soon. If your company has time and money invested in this ecosystem, it makes sense to consider Office 365 for online collaboration, and to be patient while Microsoft improves the feature set. Winner: Google is ahead with its Web ecosystem. Which suite should you choose? For startups and small companies without a great a deal of existing investment in Microsoft Office documents and applications, Google offers a robust and quickly evolving online ecosystem, with broad mobile support. Google Apps is part of a wide Google ecosystem and was born on the Web. Every document--text, spreadsheet, graphic, or presentation--can be instantly published to the Web for public access, or access by a limited group of users. Data can be pulled in from Google's various other applications, including Google Finance, or from easy-to-create online forms. If you're on the fence, ask yourself how important it is for you to edit complex Excel spreadsheets online; if you really need online access to Excel charts, complicated formulas, and fancy graphics, go with Office 365 for Small Business. Otherwise, Google Apps for Business offers the more compelling option.

download vmware workstation 6 5 beta download skype phones blackberry 9800 download google earth 0 7 download 9mm ammo shortage 2013 download softerra ldap administrator 3.5 download 4u wma mp3 converter 6.3.6 download latest version of itunes 2011 download high speed web browser download adobe photoshop cs6 gratis con crack download seed of chucky mp4 download hp colour laserjet 2600n driver vista
Computerworld - Google's corporate network was hacked because its workers were running rival Microsoft's Internet Explorer browser, a point that didn't escape the notice of security researchers and Web users. "More interesting than the IE zero-day, is why wasn't Google running Chrome?" asked Andrew Storms, director of security operations at nCircle Network Security, shortly after Microsoft issued a security advisory that told users of a critical, unpatched bug in Internet Explorer (IE). Thursday, Microsoft acknowledged that the IE exploit had been used in the attacks against Google and other major corporations. "We have determined that Internet Explorer was one of the vectors used in targeted and sophisticated attacks against Google and possibly other corporate networks," said Mike Reavey, director of Microsoft's Security Response Center (MSRC). In fact, the malware that Microsoft and others researchers have examined was designed to exploit IE6, the eight-year-old browser that's most often used with Windows XP. Others, in addition to Storms, questioned why Google wasn't "eating its own dog food," the phrase used to describe software development companies running their own products, often in early editions long before they're made public. "I have to wonder, why the hell is Google using IE, and why IE6?" asked a Computerworld reader in a comment appended to a story on the IE bug. "In fact, why Windows-based servers? Eat your own dog food, Google." "Actually, it's the norm within companies, especially technology companies, for employees to run multiple browsers," said John Pescatore, Gartner's primary analyst on security subjects, noting that Google's workers may have, say, Chrome and IE on their machines. "But it's almost impossible for IE not to start up at some point during the day." Sheri McLeish, a Forrester analyst who covers browsers, wasn't surprised by the fact that Google workers run IE, even the aged IE6. "I don't have first-hand knowledge of why Google is using IE6, but what's under the hood at enterprises isn't always best practices," McLeish said. "There are likely business reasons why Google runs IE, because if they were easily able to upgrade [to IE8], they would." Microsoft said, and independent researchers confirmed, that the exploits which struck Google would be largely deflected by IE7 and IE8, particularly the latter because it enables DEP (data execution prevention) by default. "What these attacks point to is the fact that a lot of companies are running IE6," McLeish said. "Microsoft wants to kill IE6, a lot of companies want to kill it. But they can't." As McLeish said, Microsoft has urged customers to upgrade from IE6 to newer editions of its browser. It kicked off a campaign last August when Microsoft's general manager for IE said, "Friends don't let friend use IE6." The efforts haven't been entirely successful. Last year, as users began switching to IE8, they were more likely to desert IE7 than the even older IE6. According to Web metrics company Net Applications, IE6 lost 38% of its usage share during 2009, but IE7 lost even more: It dropped by 56%. Because of IE's dominance in enterprises -- one recent estimate is that IE runs on 80% of corporate computers -- it remains a prime target, and exploits that leverage its vulnerabilities make ideal vectors for attacks against businesses, Pescatore said. The attacks that exploited IE's unpatched flaw first came to light Tuesday, when Google announced that Chinese attackers had made off with intellectual property from its corporate network, and also tried to access the Gmail accounts of Chinese human rights activists. Google said the attacks, along with increasing censorship of the Web by China's government, had prompted a reevaluation of its business in the country. Researchers at McAfee said their investigation showed that the attacks began in mid-December 2009 and stopped Jan. 4, 2010, when the hackers' command-and-control servers were taken offline. Google did not reply to a request for an explanation of why at least some of the company's workers use Microsoft's IE. Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, send e-mail to gkeizer@ix.netcom.com or subscribe to Gregg's RSS feed . Web giants attacked White House orders security review in wake of WikiLeaks disclosure Leaked U.S. document links China to Google attack Update: Researchers track cyber-espionage ring to China Google, China now playing cat and mouse? McAfee: 'Amateur' malware not used in Google attacks Military warns of 'increasingly active' cyber-threat from China China: Google 'totally wrong' to stop censoring Update: Google stops censoring in China Google's China ad partners wait in 'incomparable pain' Google may soon leave China, reports say Full coverage: Web attacks

download temple run on mobile9 download uc browser terbaru untuk java download best facebook password hacker download old navy quincy ma download easy money rodney dangerfield download easy ftp server 1.7.0.11 download securom support gta 4 gta iv pc offline installer download epson photoquicker hong kong download big lots 72nd tacoma download angry birds space in computer download naturpic video cutter software
IDG News Service - Cisco Systems and Google will give digital-video-recorder pioneer TiVo lump-sum payments totaling $490 million as part of a deal that will end the companies' litigation over patents for set-top technology. TiVo had been at odds with the two companies, as well as with Time Warner Cable and broadband device maker Arris Group, over the licensing of TiVo's patents, including patents on its DVR technology. Under the settlement, which the companies agreed to on Thursday, all patent infringement claims will be dismissed. Cisco will make a lump-sum payment of $294 million to TiVo and pay licensing fees in future years, Cisco said in a filing to the U.S. Securities and Exchange Commission on Friday. It will receive a perpetual license to the TiVo patents, and the two companies will enter into a limited cross-licensing agreement for video-related patents. Cisco and TiVo also agreed not to sue each other over patents for five years. Google's involvement in the case stems from its acquisition of Motorola Mobility, a deal that closed last May. In December, it sold Motorola's set-top box business to Arris for $2.35 billion. Google was not able to confirm how much it would pay TiVo. Cisco entered the set-top box business through its acquisition of Scientific Atlanta in 2006. Used as gateways to customers' homes for service providers, these have become a key part of Cisco's remaining consumer-focused business. Cisco estimated the lump-sum payment would reduce its earnings per share by approximately $0.03 in the company's fiscal fourth quarter, which ends in July. It doesn't expect the future licensing payments to materially affect its results. TiVo said Friday that it has won approximately $1.6 billion so far in awards and settlements over its intellectual property. After TiVo accused Cisco of infringing its patents, Cisco sued the company last year seeking to invalidate the patents. Cisco alleged that TiVo had resisted granting a broad license to its technology, according to news reports at the time. Stephen Lawson covers mobile, storage and networking technologies for The IDG News Service. Follow Stephen on Twitter at @sdlawsonmedia. Stephen's e-mail address is stephen_lawson@idg.com

download java se development kit 6u17 for linux x64 download chromium for windows 8 download asf to avi converter 3.1 download i m gonna serve you 4 download plants vs zombies 5 1 walkthrough download apache poi 3.7 jar download amd catalyst for linux download angry bird for galaxy 5 download fifa street 3 pc warez torrent download nitto gear ratio calculator download java development kit for windows vista