We participate in marketing programs, our editorial content is not influenced by any commissions. To find out more, please visit our Term and Conditions page.
We participate in marketing programs, our editorial content is not influenced by any commissions. To find out more, please visit our Term and Conditions page.
This was a question asked by a member of crowdanswers that I chose to answer here for the purpose of those who might be asking the same question. Psychedelic Dude Hexagram Version 1.0 is a modified Version of the original abstract Image 766 of abstract image series by Bill M. Trace. This image is a derived image from the old
Trusted, “PSYCHEDELIC DUDE”. This was expanded using the filter, “PERSSIANRUG” from DC special. This effectively quadrupled the original pixel size, since it was rather small. This went on to put the resulting image through the filter, Kalaidoscope 2.1 by Mehdi, set to six mirrow petals, making it A six pointed hexagram star.
Apple and Samsung have been locked in unceasing patent battles over their offerings, and now some people are accusing Samsung of even ripping off the design of Apple’s retail stores. But Apple doesn’t own the corner on using an open floor design and it certainly didn’t invent the idea of minimalism. And any retail store that sells phones and gadgets is going to have tables for playing with them. Microsoft stores do. Samsung recently opened its first North American retail store in Burnaby’s Metropolis at Metrotown, Vancouver, British Columbia and it can’t be denied that it does resemble an Apple Store with its open floor space, demo tables, and blue-shirted staff. But is Samsung intentionally copying Apple Store design?
Image compilation from Apple/Vancouver, B.C. SunImage from BetaNews.com Apple uses wood tables and Samsung has gone with white. Big deal? Not really. From what I’m seeing, Samsung’s store looks similar to countless exhibits you’d see at CES. As for the blue shirts that both Apple Store and Samsung Store employees wear, it’s worth remembering that Samsung’s company color is blue. This is hardly the first time Apple and Samsung have tangled. The former managed to get the latter’s Galaxy Nexus smartphone and Galaxy Tab 10.1 pulled from store shelves recently. A graphic from BetaNews’ Joe Wilcox is a great summation of the attitude many people have regarding Apple’s incessant insistence that other companies, Samsung in particular, are ripping it off. What’s your impression? Does it look to you as if Samsung intentionally cloned the Apple Store in its new retail location?
This week’s roundup of iOS apps is full of old favorites: Cookie Monster gets an app of his own, the creator of Angry Birds returns with Amazing Alex, and the popular Tiny Wings gets an update.
Already this week we told you about a new magazine-reading app called Next Issue, the new TED Books app, a new cloud storage service from Neat, and an updated offering from Stay.com–and we also brought you a roundup of the best comic-reading apps, just in time for Comic-Con.
Here are other new and updated apps that caught our eye this week.
Amazing Alex: The creators of Angry Birds have unveiled a new game that features neither rage nor avians. Amazing Alex is a $1 game for iPhone that features a “whiz kid”–one who comes up with Rube Goldberg-style chain reactions to do chores like cleaning his room. As Alex, you get to devise just how those creations will work, and share your most successful ideas with friends. There are 35 “interactive objects” to build with, and more than 100 levels to challenge players. Users can also download and play levels created by other players. None of those levels, however, involve destroying pigs.
Corel Cinco for Painter: This isn’t a standalone app, but artists and graphic designers may find it useful nonetheless: Corel Cinco for Painter is a free iPad app that makes your tablet into a companion tool for users of the desktop Corel Painter 12 program. The app lets users drag and drop buttons onto the screen–for sketching, accessing a color wheel, and other activities–to let users complete projects efficiently. The button placement can be customized according to your hand size and finger placement. Corel promises the app will make it easier to create an uninterrupted workflow by spending less time in Corel Painter clicking on icons and hot keys.
Google+Google+/Twitter: It was a big week for social networking services on iOS. Google+updated its free iOSapp with full iPad support, the addition of the new Events feature, the ability to attach photos to posts, as well as the option to start and join Hangouts. Twitter’s free app, meanwhile, offers a range of updates: Avatars are now tappable, so that user profiles can be viewed more easily, and users can now set up notifications that let you know when particular people have tweeted. There are other improvements and changes, including a new Twitter bird, as well as an enhanced ability to see media posted to the service’s partner websites.
The Great Cookie Thief: COOKIES!!!!! Omnomnomnomnom! The folks who gave the world The Monster at the End of This Book have returned, shifting their sights from Grover to the Cookie Monster. The Great Cookie Thief, a $1 offering for iPhone and iPad, looks at first glance to encourage both obesity and larceny–but of course, there’s more going on here. Unlike its predecessor, The Great Cookie Thief is less narrative-driven and more focused on activities: Users can make wanted posters in their efforts to track down the thief, just one of a number of tools designed to help children build their visual identification and observation skills. There are also tips for parents on how to help their kids use the app. But no, the app does not include Cookie Monster’s “Call Me Maybe” parody video.
Spacecraft 3D: We’ll admit to worrying that NASA might be getting better at producing awesome multimedia than it is at putting astronauts into space. Luckily, that multimedia is really cool. Have you seen the Seven Minutes of Terror video about the latest Mars probe? Now there’s Spacecraft 3D, a free app for iPhone and iPad from the Jet Propulsion Laboratory, which gives users an up-close-and-personal look at the variety of satellites being used by NASA to explore the solar system and beyond. The app lets users see how the probes move, as well as get a look at the engineering feats used to construct them. Spaceflight is cool.
Tiny Wings. Image from iTunes.Tiny Wings: Macworld’s Phil Michaels called an earlier version of this $1 iPhone game “sneakily challenging and frighteningly addictive.” Now developer Andreas Illiger has updated Tiny Wings to version 2.0, adding a new Flight School game mode in which you compete against AI opponents, as well as 15 levels of gameplay, and upgraded graphics for Retina display. There’s also now iCloud support, allowing users to sync the game with its iPad version. (Said iPad version also includes a local split-screen multiplayer mode.) The fundamentals of gameplay remain familiar, however: The birds have (natch) tiny wings, and use hills and momentum to give them flight throughout the game. Fly, little birds, fly!
Could things really be this bad? From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches, security snafus have ruled the first half of 2012. Here’s a look at some of the worst snafus month-by-month.
The year started off with the FBI raiding the cloud file-sharing and storage Megaupload site, based in Hong Kong and founded by 38-year-old New Zealand resident Kim Dotcom, on content piracy charges to the tune of $175 million. And that action, supported by the U.S industries which hailed it as bringing down a big fish that was devouring their intellectual property, has triggered a year’s worth of lawsuits and retributions from all even remotely involved. It turned confrontational when outraged users of Megaupload were invited by hactivist group Anonymous to attack law enforcement and industry websites supporting the raid by downloading do-it-yourself denial-of-service software such as Slowloris. But by March it was apparent some of this DoS advice came from hackers who were merely tricking users into downloading Trojan software, such as Zeus, from infected links. Another twist: A New Zealand judge in March ruled an order granted to law enforcement allowing them to seize luxury cars and other personal effects of Dotcom is invalid mainly because the local police commissioner applied for the wrong type of seizure order that was requested by the U.S. That ruling mean Dotcom has a chance to get back some of his enormous bling, like his Rolls-Royce and pink Cadillac, seized during his arrest at his mansion outside Auckland. But of course, attorneys for the U.S. are arguing otherwise,. Dotcom, free on bail but subject to electronic monitoring, is expected to undergo extradition proceedings in August. Other January Snafus: ” Online retailer Zappos disclosed hackers had likely broken into its network and stolen information on Zappos.com customers, including name, address, billing and shipping address, phone number and the last four digits of credit-card numbers and cryptographically scrambled passwords stored in hash form. Zappos informed customers all passwords were expired and customers should create a new one. ” Researchers from Seculert discovered what they say is a botnet command-and-control serverholding 45,000 login credentials Facebook users exploited by a pervasive worm, Ramnit, infectingWindows and designed to infect computers and steal social networking usernames and passwords. ” Source code used in older Symantec enterprise security products, Symantec Endpoint Protection 11.0 and Symantec AntiVirus 10.2, as well as older versions of pcAnywhere and Norton Internet Security, was exposed online by hackers calling themselves Lords of Dharmaraja with a leader named Yama Tough in Mumbai. The gang claimed to obtain the code from a third-party associated with the Indian military. Symantec, acknowledging the authenticity of the source code, also said the security firm had been subject to the hackers vainly trying to extract an extortion payment of about $50,000 in exchange for not posting the stolen code. Symantec engaged in a cat-and-mouse game to catch them, with help from law enforcement — but so far without apparent success. Symantec said it isn’t certain where the hackers obtained the stolen cache of source code, and the security incident did prompt Symantec to devise security patches it advised some customers using older software to apply, with additional outreach to customers around the incident related to the stolen source code. FebruaryRight in the midst of a conference call the FBI was having with its agents and law-enforcement officials overseas at Scotland Yard, cybercriminals hacked their way into the phone conversation, recorded it and posted it online. The conversation was about hackers facing charges in the U.K. The group Anonymous took credit for the intercepted call. The FBI said it appeared likely the cybercriminals may have hacked into a law-enforcement official’s email to get the information for the conference call dial-in. Other February Snafus: ” Brazilian banks were targets for distributed denial-of-service attacks, with massive assaults against HSBC Brazil, Banco da Brasil, Itau Unibanco Multiplo SA and Banco Bradesco SA. Hactivists took credit for the DDoS spree. ” Whistleblowing website Cryptome.org, dedicated to exposing confidential information, was compromised by an intruder that loaded an attack code that tried to launch drive-by exploits at visitors to the site. ” The University of Florida had to notify 719 individuals that their Social Security numbers were improperly stored on a state website operated by the Bureau of Unclaimed Property for more than six years. ” Verizon had to acknowledge the Verizon 4G LTE network was knocked offline again just two months after its last serous outage. The outage on Feb. 22 lasted from about 10 a.m. to 1:20 p.m. ” Microsoft’s Azure cloud infrastructure and development service experienced a serious worldwide outage on Feb. 29. Microsoft later blamed the outage on a “Leap Year Bug” that was triggered in a key server housing a certificate that had expired on midnight on Feb. 28, and a time-calculation control hadn’t taken into account the extra day in the month of February this year. ” Taiwan-based Apple supplier Foxconn was hacked by a hacker group calling itself Swagg Security, apparently in protest related to media reports about poor working conditions at the electronics manufacturer’s factories in China. The hackers posted usernames and passwords that they said would allow attackers to place fraudulent orders under other companies’ names, including Microsoft, Apple, IBM, Intel and Dell. ” The FBI arrested a computer programmer in New York and charged him with stealing proprietary software code from the Federal Reserve Bank of New York (FRBNY). The software is known as the Government-Wide Accounting and Reporting Program (GWA), which handles all kinds of U.S. government financial transactions, and it cost over $9 million to develop. The accused thief, Bo Zhang, a contract employee at FRBNY, used the GWA code in a private business he ran to train individuals in computer programming. Zhang, a Chinese citizen in the U.S. on a work visa since 2000, is also known as “Bryan Zhang,” and in a plea agreement in April he pled guilty to theft of government property, admitting he’d copied the code onto an external hard drive and then transferred the GWA program to a home computer, knowing that was wrong. March At least 228,000 Social Security numbers were exposed in a March 30 breach involving a Medicaid server at the Utah Department of Health, according to officials from the Utah Department of Technology Services and Utah Department of Health, which theorized that attacks from Eastern Europe bypassed security controls because of configuration errors. In May, Utah CIO Steven Fletcher resigned because of it. Other March snafus: ” The Vatican found its websites and internal email servers subject to a weeklong attack after the Anonymous collective said it was felt justified in this by the fact that the Vatican Radio System has powerful transmitters in the countryside outside Rome that allegedly constituted a health risk, including supposedly “leukemia and cancer,” to people living in the vicinity. Another justification given were claims the Vatican allegedly helped the Nazis, destroyed books of historic value and that the clergy sexually molested children. ” Hackers in the LulzSec group associated with the broader Anonymous movement found the tables turned when they were arrested by the FBI and European law-enforcement agencies — and it was LulzSec leader Hector Xavier Monsegur, alias “Sabu,” who turned in his friends as part of a deal to work as a stooge for the FBI after being arrested in New York City last year. ” By the end of March, LulzSec claimed to be “reborn” and took credit for hacking a dating website for military personnel, MilitarySingles.com, leaking more than 160,000 account details from its database. ” Dutch police arrested a 17-year-old suspected of compromising the account data on hundreds of servers belonging to telecommunications operator KPN. The teenager, arrested in the Dutch town of Barendrecht, “made a confession,” according to Dutch authorities. In the wake of the hacking spree, KPN said it would appoint a chief security officer and set up a permanent control center to monitor its systems. ” A flaw was discovered in Barclays contactless bank cards that could allow customers’ data to be stolen and used fraudulently with them knowing about it, according to an investigation by ViaForensics in conjunction with Channel 4 News. But Barclays dismissed the claims as inaccurate. ” Security firms knew there was trouble when Kaspersky Lab identified code-signed Trojan malware dubbed Mediyes that had been signed with a digital certificate owned by Swiss firm Compavi AG and issued by Symantec. Symantec said it found out that the digital certificate’s private key held by Compavi had indeed been stolen; whether by an insider or an outside attacker wasn’t known. ” A security firm based in Slovakia, ESET, asserted a website operated by the country of Georgia has been used as part of a botnet to conduct cyber-espionage against that country’s residents. But ESET researchers admitted they aren’t sure whether the Win32/Georbot they have been monitoring is being directly operated by the Georgian government or by cyber-spies through a compromised Georgian agency. AprilThe Federal Communication Commission fined Google $25,000, asserting the search-engine giant impeded an investigation into how Google collected data while taking photos for its Street View mapping feature. The FCC maintained in a report that Google “deliberately impeded and delayed” the investigation for months by not responding to requests for information and documents. But the FCC also said it won’t take action against Google over its data collection because it still has questions it wants answered. The FCC had subpoenaed an unnamed Google engineer — now known to be Marius Milner — but he had apparently declined to testify, invoking his Fifth Amendment rights against incriminating himself. Other April snafus: ” Hactivist group Anonymous brought down the websites of trade groups U.S. Telecom Association and TechAmerica, apparently for their support of the cybersecurity bill proposed by Rep. Mike Rogers that would allow the private companies and the government to share any information “directly pertaining to a vulnerability of, or threat to” a computer network. Privacy advocates, including the ACLU and Center for Democracy and technology, contend the bills shreds privacy protections. ” A U.S. grand jury charged two residents of China with 46 criminal counts, including infringing software copyrights and illegally exporting technology to China, for allegedly operating a website that sold pirated software used in engineering, manufacturing, space exploration, aerospace simulation and design, and other fields, with a commercial value of other $100 million. Xiang Li, 35, was earlier arrested by agents from the U.S. Immigration and Customs Enforcement’s Homeland Security Investigations in Saipan, Northern Mariana Islands. Chun Yan Li remains at large. Both face charges in the U.S. District Court for the District of Delaware. ” A 31-year-old Russian national living in New York, Petr Murmylyuk, was charged with hacking into accounts at Fidelity, Scottrade, E*Trade and Schwab in a complex scheme that involved making unauthorized trades that profited the gang he recruited to open bank accounts to receive the illegal proceeds. The brokerage firms said they lost $1 million because of Murmylyuk’s fraud. ” VMware’s ESX source code was stolen and posted online, but VMware said the code, amounting to a single file from sometime around 2003 or 2004, doesn’t mean any increased risk to VMware customers. Security firm Kaspersky said it believes the code was stolen from a Chinese company called China Electronics Import & Export Corporation during a March breach. ” A terminal at New Jersey’s Newark Liberty International Airport was shut down for more than an hour on April 27 after officials discovered that a baby hadn’t been properly screened. The baby in question had been handed back and forth between the parents after a metal detector went off sounding an alarm with the mother holding the baby. The father had already gone through the screening, and the parents and baby left the checkpoint to head to the gate. But Transportation Security Administration officials decided to “err on the side of caution” to shut down the terminal and go locate the baby to make sure it went through screening. Some passengers that had already boarded flights said they had to evacuate it and go through security screening again. Speaking of the TSA, one of the agency’s critics, security expert Bruce Schneier, who is involved in a lawsuit with the agency to get them to stop the TSA’s full-body scanner program, had been invited to testify before Congress about the TSA but the House Committee on Oversight and Government Report then “uninvited” Schneier last March after the TSA formally complained about him, obviously preferring not to be challenged directly by him right in front of Congress. ” Automotive manufacturer Nissan admitted a data breach involving employee user account credentials had occurred, and that it had to spend some time cleaning its network of the malware apparently responsible for that before disclosing the breach. ” The hacker who stole Facebook’s source code, Glenn Mangham of York, England, offered an explanation of why he did it, saying, “I was working under the premise it is sometimes better to seek forgiveness than to ask permission.” He said he did little to hide his actions and that even if he got caught, Facebook would let him off the hook. But that didn’t happen, and Mangham was sentenced to eight months in prison in February, though the sentence was reduced to four months by an appeals court in April. He said he only had the source code for three weeks, but never had any intention of selling it to anyone who might exploit it for scams, for example. Mangham even made the grandiose claim that his basic good intentions saved Facebook from “potential annihilation.” ” Payments processing services company Global Payments acknowledged a data breach of up to 1.5 million card numbers had been stolen in a data breach, and in June also said it was investigating whether a server containing merchant applicants’ information had also been breached. Global Payments said its PCI compliance status had been revoked by some of the card brands because of the breach and it was working to regain it. MayHackers claimed to have breached the systems of the Belgian credit provider Elantis and threatened to publish confidential customer information if the bank did not make an extortion payment of $197,000. Elantis confirmed the data breach but said the bank will not give in to extortion threats. Meanwhile, Anonymous claimed it hacked a U.S. Department of Justice website server tied to the U.S. Bureau of Justice Statistics and claimed to release 1.7GB of stolen data from it, with the statement, “We are releasing it to end the corruption that exists, and truly make those who are being oppressed free.” The data was offered on The Pirate Bay. And then Yahoo accidentally leaked the private key that was used to digitally sign its new Axis extension for Google Chrome. Axis is a new search and browsing tool from Yahoo. Security blogger Nik Cubrilovic discovered the package included the private crypto key used by Yahoo to sign the extension, noting it offered a malicious attacker the ability “to create a forged extension that Chrome will authenticate as being from Yahoo.” Yahoo was forced to release a new version of its Axis extension for Google Chrome after that. June The University of Nebraska in Lincoln acknowledged a data breach that exposed information of more than 654,000 files of personal information on students and employees, plus parents and university alumni. The information was stolen from the Nebraska Student Information Systems database; a student is the suspected culprit. Other June snafus: ” Hacker gang Swagger Security strikes again, this time breaching the networks of Warner Bros. and China Telecom, releasing documents and publishing login credentials. The group said it notified China Telecom of the hack by planting a message in the company’s network. “Fortunately for them, we did not destroy their infrastructure and rendered [stet] millions of customers without communications,” Swagger Security, also known as SwaggSec, said in a note. ” About 6.5 million cryptographic hashes of LinkedIn user passwords were stolen and posted online, a breach LinkedIn acknowledged though it didn’t discuss specific numbers, which may be much less due to duplicates. LinkedIn invalidated the passwords of impacted users and the company said emails will be sent to users whose passwords were compromised, though it warned about updating passwords via links sent in email. ” Right after the LinkedIn fiasco, dating site eHarmony also confirmed a breach of 1.5 million passwords that were hashed. ” The Federal Trade Commission announced that data broker Spokeo will pay $800,000 to settle FTC charges it sold personal information it gathered from social media and other Internet-based sites to employers and job recruiters without taking steps to protect consumers required under the Fair Credit Reporting Act. ” The New York Times article asserting that the cyber-weapon Stuxnet is a creation of the U.S. with Israel, and was launched in a covert action authorized directly by President Barack Obama against an Iranian facility suspected of developing a nuclear weapon, has stirred up a firestorm of controversy in Washington about leaked information. Now that another cyber-weapon for espionage, Flame, has been discovered and linked directly with Stuxnet, there’s more concern, with the United Nations division International Telecommunication Union warning countries that Flame is dangerous, and some saying the U.S. is losing the moral high ground as its secret cyberwar efforts become known. Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. For more information about enterprise networking, go to NetworkWorld. Story copyright 2011 Network World Inc. All rights reserved.
Yahoo says it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one of its many services.
The company also provided more information about whose passwords had been pilfered. “We have…now fixed this vulnerability, deployed additional security measures for affected Yahoo! users, enhanced our underlying security controls and are in the process of notifying affected users,” the company announced in a post to its blog early Friday. Yahoo has offered no specific information about the attack, how it was carried out or even when. Itconfirmed the attack Thursday. The hacker group D33Ds Company took responsibility for the breach, saying it had exploited a basic SQL injection vulnerability in a Yahoo service to steal the usernames and passwords associated with 453,000 accounts. The group published the passwords and e-mail addresses on the Web.
Hack Affects Associated Content Accounts
Yahoo also confirmed that the stolen account credentials belonged to registered users of its Yahoo Contributor Network, which was previously known as Associated Content. Yahoo Contributor Network is a platform that generates high-volume, low-cost content by letting writers photographers, and others share their work with Yahoo members and earn money based on the traffic their content generates. Users who contribute to the network are required to sign in using a Yahoo, Google or Facebook ID.
Associated Content, which was founded in 2005, was bought by Yahoo for just over $100 million in May 2010. Yahoo renamed the service in late 2011, when it also launched Yahoo Voices, a portal where users access content posted by the Yahoo Contributor Network. According to Yahoo, only people who registered as providers with Associated Content before the 2010 acquisition were affected by the password theft. “[The] compromised file was a standalone file that was not used to grant access to Yahoo! systems and services,” Yahoo maintained. Just under a third of the stolen passwords were linked to accounts registered to a yahoo.com e-mail address, security company Rapid7 said Thursday. Significant chunks of the file, however, were composed of Gmail (23.6 percent of all accounts) and Hotmail (12.2 percent) addresses. All users with older Associated Content accounts, no matter the e-mail address used, should immediately change the passwords for those e-mail accounts as well as any identical or similar passwords used to secure other online services or websites, security experts have said. Rapid7 security researcher Marcus Carey said Thursday that the file published by D33Ds included 123 government e-mail accounts — ones ending with “.gov” — and 235 military-related addresses (ending with “.mil”). Among the government e-mail accounts, Carey found several associated with the FBI, the Transportation Security Administration (TSA) and the Department of Homeland Security (DHS).
Security Experts Blast Yahoo
Security experts have been scathing in their criticism of Yahoo, in large part because the passwords were stored in plain-text, making the hackers’ job of exploiting the stolen accounts a breeze. Mark Bower, a data protection expert and executive at Voltage Security, said, “It’s utter negligence to store passwords in the clear.” Rob Rachwald, director of security strategy at Imperva, also took Yahoo to the woodshed. “To add insult to injury, the passwords were stored in clear text and not hashed (encoded),” Rachwald wrote in a blog post. “One would think the recent LinkedIn breach would have encouraged change, but no. Rather, this episode will only inspire hackers worldwide.” The LinkedIn breach Rachwald referenced came to light last month, and involved approximately 6.5 million encrypted passwords belonging to members of the networking service. In its Friday blog, Yahoo again apologized to users affected by the password theft.
Google’s Hangout feature is once again giving Google+ users a chance to get closer to the stars, this time with a Olympic twist. The New York Times-sponsored series started on Wednesday with basketball stars Carmelo Anthony of the New York Knicks, and Chris Paul of the Los Angeles Clippers. Both are members of the 2012 USA Basketball team. The hangouts will run through next Tuesday.
Google Hangouts have been a favorite stop of politicians, celebrities, and friends.President Obama used the feature to connect with voters back in January, and musical artists the Black Eyed Peas participated in a hangout last October to chat with fans shortly before they took the stage at a concert in New York City. But with the Olympics coming up in short order, it makes sense for these hangouts to feature some of America’s top athletes, doesn’t it? That said, the list of athletes participating is heavy in the marathoner department, with three runners. Friday’s chat featured Shalane Flanagan, a long distance runner planning to participate in the Olympic Marathon. Monday’s Olympic Games Hangout will also feature another runner, male marathoner Ryan Hall, who is expected to contend for a medal in London. His Google Plus hangout begins at 2 p.m. ET. Hall will be followed by brothers Bob Bryan and Mike Bryan, the second ranked men’s doubles team in the world and widely expected to earn a medal in the Olympic tennis tournament. Their chat occurs at 5 p.m. ET Monday.
The Hangout series ends on Tuesday at 6 p.m. ET, with yet another marathoner, Kara Goucher. All chats occur from The New York Times’Google+ page. If you would like to ask a question, either comment on the post announcing the Hangout or post the question to your own Google+ wall with the hashtag #London2012Hangout. Those with the best questions will get the chance to ask them live of the athletes during the event, the paper says.
Australian airline Qantas has announced that it will be giving its pilots iPads for use during flights. Qantas has teamed up with mobile provider Telstra to bring more than 2200 64GB iPads to the cockpit to enable pilots to access operational information digitally, replacing paper charts, flight plans, manuals and forms for good, reports GeekZone. Currently, Qantas prints around 18,000 pages a day, a figure that will be reduced to just 3000 pages with the introduction of iPads. Plus, the weight of the paper on board will drop by 44 pounds (20 kilograms). Each of the iPads will have two apps that have been developed specifically for use by pilots. One app is for flight charts and the other is developed by Qantas itself for other flight information. “The revolutionary capabilities of iPad technology, combined with the powerful customized apps, give our pilots the ability to replace cumbersome hard copies — saving time, resources and costs,” said Qantas Technical Pilot, Captain Alex Passerini. Several other airlines have also been scrapping paper for iPads over the past couple of years, including Alaska Air. It’s not just pilots that are getting their hands on iPads, U.K. officials are also being given iPads as desktop PC and laptop replacements in order to reduce printing costs. Scientists are also getting equipped with Apple’s tablet. Qantas already provides iPads for passengers on board certain of its flights, as do several other airlines.
The world is changing rapidly, don’t let your pains-taking articles go without credits. What am about to introduce to you are mostly used by cooperate news websites like ehow and the likes. This widget is a free service provided by tynt, it automatically add a credit (attribution) links to any text that is copied from your blog or website, it works on blogger, wordpress and websites.
Why is important to use the tynt widget? If you added the floating Social or social media button we earlier discussed in our forum then I suppose many people will be bookmarking or sharing your post using this button. Now when someone shares your article via email our any of the sharing options it automatically add your link at the bottom of the post. Like me, you might be wondering how you can acquire the services of this great widget in your blogger blog, wordpress blog or website. No need to hurry, listen and let me brief you on what you really need to know about this widget.
Important: If you are running a tutorial blog and share a lot of codes, it is potentially recommended that you do not add this to your blog as it will automatically and some texts to the code you are sharing.
Install Tynt on your site
Here we go, follow the simple steps below to install this feature on your blogger blog, wordpress blog and website.
Submit your Email and in the Domain field submit your website address without adding http:// and the back slash (/) at the end of URL. Your link should look as follows:
e.g: If you are using a sub-domain your link should like this: eobasi.blogspot.com If you are using a full domain then your link should look like this: www.ewtnet.com
3. Accept the privacy agreement and hit Submit
4. Now you will be provided with a code. Do not copy it and first Click the customize Script button just below that code
5. Then click the customize attribution button on next page
6. You can now customize what text to display and what to hide. If you wish you can only display the read more link and disable Attribution and social profile links by keeping their fields empty.
Submit your twitter and Facebook usernames if you would like to show them below copied text.
You can also decide whether to display the article URL or Page Title or both. Set URL to canonical. Set placement to “below the copied text” for better chances of being ignored by the copier.
See the screenshot below for settings:
7. Click Save and then press Done
8. Copy the code and go to your Blog (blogger or WordPress). Inside your template search for the closing head tag
</head>
Paste the tynt script just above this tag.
Tip: Blogger users may go to Template > Edit HTML > Proceed and then search the tag.
Tip: Wordpress users will find the head tag by going to Appearance > Editor > header.php
10. Save your template and you are all done!
Visit your blog and copy a snippet of any text you like and then paste it anywhere to see the attribution links working just fine.
Track Reader Engagement
By going to your Homepage at tynt account, you will see 4 options to track the text being copied.
SEO:
Keywords: This is where you will see which keywords are copied the most
Content
Social
You play around with these options to take maximum benefit out of this free tool.
Adsense is considered as one of the most powerful tool in a website publisher’s arsenal. It enables a person to monetize their sites easily. If used properly, it can generate a very large and healthy income for them.
However if you are not using them rightly and just maximizing the income you squeeze from it, you are actually leaving a lot of money on the table. Something all people hate doing.
Start Earning with Google Adsense
How you can start earning money with Adsense can be done easily and quickly. You will be amazed at the results you will be getting in such a short period of time. Start by writing some quality content articles which are also keyword incorporated. There are a lot of people given the gift of being good with words. Writing comes easy for them. Why not make it work in such a way that you will be earning some extra cash in the process.
New Google AdSense Interface (Year: 2016)
There are actually three steps to put into mind before you begin writing your ads and having an effective Adsense.
Keyword search
Find some popular subjects, keywords or phrase. Select the ones which you think has more people clicking through. This is actually a keyword selector and suggestion tool that some sites are offering to those who are just their Adsense business.
Writing articles
Start writing original content with keywords from the topics that you have achieved in your search. Take note that search engines are taking pride in the quality of their articles and what you will be writing should keep up with their demands.
Quality content site
Build a quality content site incorporated with Adsense ads that is targeting the subject and keywords of your articles and websites. This is where all that you’ve done initially will go to and this is also where they will prove their worth to you.
The proper positioning of your ads should be done with care. Try to position your ads where surfers are most likely to click on them. According to research, the one place that surfers look first when they visit a certain site is the top left. The reason behind this is not known. Maybe it is because some of the most useful search engine results are at the top of all other rankings. So visitors tend to look in that same place when browsing through other sites.
Techniques to Maximize your Adsense Earning
Some of those who are just starting at this business may think they are doing pretty well already and thinking that their clickthrough rates and CPM figures are quite healthy. However, there are more techniques and styles to generate more clicks to double your earnings. By knowing these techniques and working them to your advantage, you will realize that you will be getting three times more than other people who have been previously doing what they are doing.
Finally, Adsense has some excellent tracking statistics that allows webmasters and publishers to track their results across a number of site on a site by site, page by page, or any other basis you wanted.
You should be aware of this capability and make the most of it because it is one powerful tool that will help you find out which ads are performing best. This way, you can fine tune your Adsense ads and focus more on the ones being visited the most rather than those who are being ignored.
Another thing you should know. Banners and skyscrapers are dead. Ask the experts. So better forget about banners and skyscrapers. Surfers universally ignore these kinds of ad formats. The reason behind this is that they are recognized as an advert and advert are rarely of any interest that’s why people ignore them.
To really start making money with Adsense, you should have a definite focus on what you wanted to achieve and how you will go about achieving them. As with any other kind of business ventures, time is needed coupled with patience.
Do not just ignore your site and your Adsense once you have finished accomplishing them. Spare some time, even an hour, making adjustments to the Adsense ads on your sites to quickly trigger your Adsense income. Give it a try and you would not regret having gotten into Adsense in the first place.
Mozilla may be best-known for its popular Firefox browser, but some 20 million users around the globe also know it for Thunderbird, its free and open source desktop email client. Just a month after the release of the latest version 13 of Thunderbird, however, a leaked email on Friday apparently forced Mozilla to admit that it’s putting the brakes on internal Thunderbird development.
“Once again we’ve been asking the question: is Thunderbird a likely source of innovation and of leadership in today’s Internet life? Or is Thunderbird already pretty much what its users want and mostly needs some on-going maintenance?” wrote Mitchell Baker, chair of the Mozilla Foundation, in a blog post on Friday. Mozilla’s conclusion, it turns out, is that “ongoing stability is the most important thing, and that continued innovation in Thunderbird is not a priority for Mozilla’s product efforts,” Baker added. Accordingly, it has developed a plan that “provides both stability for Thunderbird’s current state and allows the Thunderbird community to innovate if it chooses,” she explained. Two Thunderbird Tracks Specifically, Mozilla will continue to provide security maintenance updates through an Extended Support Release (ESR) process similar to what it has for Firefox targeting large organizations that use the software. There is already a Thunderbird ESR version, and the next release of that software is due in November. “It will inherit the then-current Thunderbird feature-set,” Mozilla explains in an article on the MozillaWiki. “This release will be updated every six weeks, for the duration of the ESR cycle to ensure the best possible security and stability for organizations.” The non-ESR version of Thunderbird, meanwhile, will be released with the same feature set as Thunderbird ESR and will be updated every six weeks for security and stability. Unlike Thunderbird ESR, however, this version could evolve over time feature-wise if members of the community choose to work on it. Baker’s sentiments were largely echoed in a follow-up blog post on Sunday by Thunderbird Managing Director Jb Piacentino, who noted that Mozilla is increasingly shifting its focus towards Web and mobile projects such as FirefoxOS. A Final Plan in September Indeed, as Web-based email services skyrocket in popularity, it’s not entirely surprising to see Mozilla make this move. Still, as a longtime user of Thunderbird, I can’t help but feel a little sad. I hope that some passionate fans out there will pick up the project and keep it vibrant, but Baker doesn’t sound entirely confident that that will happen. Who knows? Maybe we’ll even see Ubuntu Linux maker Canonical step in, as at least one observer has suggested. In any case, Mozilla is interested in any feedback, particularly from potential developers interested in picking the project up. It aims to share a final plan of action in early September, Piacentino says. I’ll let you know if I hear any significant news before that.
A bootable Mac OS X thumb drive comes in handy when you need to troubleshoot OS issues for yourself, your family, or your friends. It’s also extremely useful for keeping your basic setup consistent across multiple computers, if you find yourself switching hardware regularly; and I’ve had fun in the past setting up a bootable USB keychain loaded with all the apps and files I need to turn any Mac-compatible computer into a viable media center quickly and easily. With Mac OS X Lion and a new piece of free software, it’s easier than ever to create a USB keychain that you can boot from. All you need is a few minutes, a copy of Lion, and a USB flash drive with at least 4GB of storage (though more is preferable).
Preparation
The first step in getting Lion onto your USB drive is to obtain a copy of the OS itself. Unfortunately, the file you download from the Mac App Store to your computer deletes itself after you update to Lion, so you’ll probably need to re-download the OS update.
This is a simple but slightly time-consuming process. Go into the App Store application and open the Purchases tab at the top of the screen. From there, you should see OS X Lion as one of your previous purchases.
Click the Download button next to Lion, note the directory that it downloads to and wait for the download to finish. During testing it took me about 50 minutes to re-download the 4GB or so of content that comprises Lion.
Once the OS has finished downloading (and you’ve verified that Lion has landed safely in your Applications folder), you’re ready to transfer it to your trusty USB flash drive. If you already own a copy of OS X Lion, you should be able to download a fresh copy at any time from the Purchases tab of the Mac App Store.
To streamline the process, download the free Lion DiscMaker app. Downloading a third-party app just to handle this process is a bit of a bother, but Lion Discmaker enormously simplifies the process of installing Lion on a USB keychain.
Now, before you start formatting your drive, back up anything currently on your flash drive that you’d like to keep–because this process will completely erase the contents of the USB drive and rewrite it with a copy of Lion. You have been warned!
Creating Your Bootable Drive
Lion DiscMaker makes this part of the process a snap. Start the Lion DiscMaker app with your USB flash drive plugged in and with the Lion install file sitting inside your application folder. The app will give you the option of creating a bootable drive out of either a DVD or a USB keychain.
Select the USB keychain option. (If you happen to own a Mac with a disc drive, consider creating a DVD backup of Lion. I prefer keeping Lion on a USB keychain so that I can add files to the USB drive to customize the installation; but if you’re just looking for a bootable copy to troubleshoot your hardware, feel free to go with the DVD option and save yourself a little cash.)
Lion DiscMaker makes it easy to create a bootable thumb drive. Once you’ve indicated that you want use a bootable drive, the app will ask whether you’d like to use a USB thumb drive or some other kind of disk. Select the USB thumb drive option again; and when prompted, choose the disk that you’d like to install Lion to. Select your flash drive and you should be ready to rock.
If you’re using a thumb drive that has only 4GB of free space, Lion DiscMaker will remind you that you won’t get a complete of OS X Lion package because there won’t be room for the “additional speech voices” package. This should be no great loss. Select Okay and then, to confirm that you’re aware the volume will be erased, click the Erase then create the disk button.
The copy procedure will take a few minutes and will open a few windows in your finder automatically, but Lion Discmaker should automate the whole process. All you have to do is wait for your Mac to cease displaying its “Copy in progress, please wait…” message, which will indicate that DiscMaker has finished installing Lion onto your flash drive. Once that’s done, you’ll have a bootable USB flash drive that fits in your pocket and can handle system recovery, OS installation, and even basic Web browsing in a pinch.
If you have any space left over on your flash drive, you can add a few of your favorite applications and files, to customize a new installation. Regrettably, these files won’t be accessible when you boot directly from the USB flash drive; but once the installation is finished, they can help you save considerable time while setting up a new computer.
Of course the bootable drive that this method creates is no substitute for a fully customized Mac OS X Lion-based computer, but considering how fast and easy the drive is to set up–and how much time it could save you the next time you need to reinstall or troubleshoot your Mac OS X–there’s no good reason not to make your own bootable copy of Lion to carry in your pocket. Good luck!
In the world of high-tech, gadgets getting tagged as “uncool” can be a death sentence for a product. That’s why Samsung’s win over Apple in a UK court on Monday is being viewed as a defeat by some people. Apple maintained in the case that Samsung’s Galaxy tablets infringed on the iPad design. Judge Colin Bliss ruled against Apple, but he handed Apple some fodder. He found that Samsung’s tablets “do not have the same understated and extreme simplicity which is possessed by the Apple design. They are not as cool.” Galaxy tablets uncool? No cut could be crueler. But it need not be. With the right spin, Samsung could turn Bliss’ slight into a positive marketing campaign. With some slick product shots that scream cool, Samsung could use tag lines like “It’s Cool to Be Uncool” or “Uncool Is the New Cool” or “How Cool Is Uncool?” or simply “Uncool” to sublimely reverse the judge’s verdict where it counts: in the minds of tablet shoppers. Samsung has used courtroom victories to highlight its tablets before. After defeating Apple in the Australian courts, it launched a campaign declaring that its Galaxy Tab was “The Tablet Apple Tried to Stop.”
It has also shown that it’s capable of spinning Apple’s cool image against the American company. In its “Next Big Thing” campaign launched at the end of last year, Samsung mocked Apple diehards who lineup outside Apple stores for hours to be among the first to get a new product from the company. So Bliss’ “uncool” opinion of Samsung’s tablets isn’t the death sentence some commentators make it out to be. In fact, it could be the kernel of a successful marketing campaign for the Korean company. All Samsung has to do is embrace the uncool.
Verizon Wireless announced the BlackBerry Curve 9310 smartphone will go on sale for $49.99 after rebate, with a two-year service plan, starting with online sales Thursday and in stores in the “coming weeks.” The BlackBerry Curve 9310 smartphone. The announcement came just minutes before BlackBerry maker Research in Motion was set to begin its annual shareholders meeting. About two weeks ago, the company reported $500 million in reduced first-quarter profits and a 40% decline in sales. RIM also announced then that it would ship BlackBerry 10 smartphones in early 2013, a further delay that helped send RIM’s stock price plunging 19% in one day. The Curve 9310 and runs the current BlackBerry 7.1 operating system and comes with a physical keyboard, the preference among some of RIM’s most solid customers. The 9310’s styling looks like many previous Curve models, with its smaller 2.44-in. screen, below which sits a central touch navigation keypad and physical keys in a Qwerty keyboard. Many analysts and even some at RIM have admitted the BlackBerry has not kept up with successful touchscreen smartphones with large screens like the 3.5-in. iPhone and Android phone models that range from 4-in. to 5.3-in. in screen size. The 9310’s display is 320 x 420 pixels, putting its resolution well below more expensive smartphones. Verizon and RIM noted in a statement that the 9310 is intended to “help customers make the move from a basic phone to a smartphone,” which is partly indicated by its low price. There is also a dedicated key for access to BlackBerry Messenger, RIM’s social network that is most popular outside of the U.S. Facebook and Twitter apps are easily accessible for real-time updates with RIM’s Social Feeds 2.0 app. A 3.2-megapixel camera is included, as well as a microSD card slot for up to 32GB of storage. It runs a 1,450 mAh battery and overall is 4.29 in x 2.36 in. x 0.5 in. in size and weighs 3.66 ounces. Verizon requires buyers to sign up for a Share Everything plan starting at $80 a month for unlimited text, talk and 300 MB of data service that can be shared with up to nine other devices. About The Author This article was originally published By Matt Hamblen, Computerworld Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen or subscribe to Matt’s RSS feed. His email address is [email protected]. See more by Matt Hamblen on Computerworld.com.
Google to dismiss igoogle? Get a new homepage! For as long as I can remember, iGoogle has been my home page. I’ve used it for everything from monitoring my favorite blogs and news sites to tracking the number of days since I last added salt to my water softener. So it came as something of a shock to read that iGoogle is going away on November 1, 2013. That’s only 16 months from now, barely enough time to vet a replacement. I kid, I kid — that’s more than enough time. The question is, where should you hang your home-page hat? What should be the first thing that appears when you open your browser? I’ve got five suggestions: MSN or Yahoo Like to scan news headlines? Then you can’t go wrong with MSN or Yahoo, which bring you the latest stories followed by sections like sports, entertainment, local news, and money. You don’t need an account with either service to take advantage of their portals, though signing up for one nets you an extra email address and, in the case of Yahoo, some customization options for your home page (including what content appears and where).
Personally, I think Yahoo is the better of the two pages, but you’ll definitely want to browse both to see which one suits you best.
NetVibes This old-school Web portal has reinvented itself as a Web-analytics tool for businesses, but it still offers a consumer-friendly custom dashboard where you can monitor all the media that’s important to you: news, email, tweets, tasks, status updates, and so on. Where NetVibes excels is in letting you pick the “apps” (i.e. widgets) you want to include, then organizing them to your liking. For example, you can choose the number of columns you want for your dashboard and how you want them arranged. There’s also a Reader mode that’s great if you add a lot of RSS feeds. All told, NetVibes probably comes closest to replacing the look and feel of iGoogle.
If your browser favorites list hooked up with StumbleUpon, the result would look a lot like All My Faves. The site is essentially a massive collection of other sites, all represented by thumbnail icons of their logos. It’s a little overwhelming at first, but there’s an interesting portal beneath all the noise. Indeed, once you sign up for an account, you get to create your own batch of “faves” you can use to quickly jump to your favorite pages. You also get to choose up to seven areas of interest (cooking, movies, tech, etc.) that AMF will use to generate batches of sites you might like. After you finish the setup, you’ll see a much less intimidating tabbed display of your favorites and your areas of interest. And thanks to the AMF bookmarklet, it’s a simple matter to add sites to your start page. I’m not sure All My Faves is really my cup of tea, but if you want a favorites-oriented home page with lots of personalization options, this service is worth a look.
Protopage A little bit NetVibes, a little bit iGoogle, Protopage offers a simple, attractive, customizable home page you can stock with news, comics, Twitter feeds, email, podcasts, and more. The site starts you out with a wide assortment of popular widgets, everything from Dilbert to Engadget to PC World. You can drag and drop these to create just the layout you want, while clicking Add Widgets lets you choose from a huge selection of additional tools and content. Protopage really reminds me of the portals of old. If you’re already mourning iGoogle, this should help ease the pain. Nothing Nothing? If you’re not a news junkie and don’t tend to look at RSS feeds and the like, you might just prefer to leave your browser without a traditional home page. To that end, all the major browsers now have the option of starting you with a “blank” tab, one that doesn’t open a particular page but does show thumbnails of your most visited/most popular sites. You can also automatically open multiple sites in multiple tabs, which is helpful if you like to start each browsing session with, say, ELITES WORLD OF TECHNOLOGY, Facebook, and a favorite blog. Just open the tabs you want to reappear, then venture into the settings and choose “use current” for your home page. (The latest versions of Chrome, Firefox, and Internet Explorer all let you load multiple pages at startup.) Your Pick? Those are, of course, just five options out of many. If you’ve found another portal, home-page, or browser-startup option you like better, tell me about it in the comments.
Adsense is one of the most trusted way of making money online but after handing series of suspension to publishers it becomes potentially unreliable to use adsense.
Don’t get me wrong: Many people started blogging for the sole reason of earning money and after they put in so many hardwork to setup a decent blog they still found their adsense disapproved or suspended.
Now that doesn’t sound good at all, that was why I came up with this tutorial on how to make adsense your 12th choice for making money online.
Here Are The Lists Of The Top 11 Alternative to Adsense
Clicksor:Clicksor offers contextual ads based on your site content. You’re paid 60% of what advertisers. They provides in-text ads, text banners, image banners and even popup-unders.The payment process is via paypal, check or bank wire. The minimum payout is $50 if your payment process is via bank wire and paypal or $100 if your payment process is check.
Chitika: If you wish to run a different ad platform on your blog alongside Google Adsense, you should consider choosing Chitika. It complies with Adsense policies and they offer great contextual ads based on users’ search query and this gives you a high CPM. The minimum payout is $10 and it’s either by check or Paypal.
Luminate: This is very different from others and it’s ideal for you if you use lots of images on your blog. It notes the keywords that have been tagged with your image and displays relevant ads.The minimum payout is $10 which can either be through PayPal or Standard Cheque.
Bidvertiser:Bidvertiser works a bit differently from others. It allows publishers to sell ad space directly to advertisers and also delivers text and image add. They also offer a mouth-watering payout of $10 via paypal or check.
Adbrite: Adbrite is a trusted name in contextual advertising and it’s been said to be a major alternative to Google Adsense. The default payout is $100 but you can set it to any amount above $5. payment is by check and paypal
Addynamo:Ad Dynamo offers pay per click advertising worldwide for both web and mobile. Ad Dynamo was actually where I had my first experience on PPC and is very cool and you sometimes get $0.50 per click. The payout is only $20 and you can get your money through paypal or check. The one problem you may encounter withthem is the way they advertise their program on your blog when they’ve got no ads to serve and it takes a very long time before real ads start showing on your blog.
Adstract:Adstract is a global video-based advertising network that specializes in video ads, video distribution and monetization. Is particularly similar to adsense (But they don’t get your account suspended) But has a quicker payment system. They pay through check ($100 minimum payout), wire transfer ($300 minimum payout) and payoneer ($100 minimum payout).
Buysellads: Buysellads is an online advertising platform that brings publishers and advertisers together directly and this advertising platform allows advertisers to choose which website to display ads on based on the site content and advertisers budget. Lots of bloggers with good traffic are earning big with them but they charge 25% of your earning for the service they offer. You can withdraw through Paypal, cheque or bank wire transfer and the minimum payout is 50$.
Infolinks: Infolinks offers in-text ads and and it’s the best in this aspect. The in-text ad is unobtrusive and you can as well use it along with Google Adsense. Minimum payment is 50$ for Paypal and debit cards and 300$ for bank wire transfer.
Kontera: Just like Infolinks, Kontera offers in-text advertising and it won’t take up any space on your blog. It turns keywords to ads and you can use it along with any other contextual advertising platform you use. You get paid by Paypal or cheque and the minimum payout is 50$.
Yahoo! The Yahoo! Bing Network Contextual Ads program enables web publishers to easily and effectively earn advertising revenue. Publishers can now use the Media.net self-serve platform to create and customize ad units that display relevant text ads consisting of sponsored links and ad topics from the Yahoo! Bing Network. They only accept publishers per invitation and the payment method is paypal and check.
Google Adsense:Now adsense is what might have disapproved or suspended your account quite a number of times. Do you still want to continue it or try other alternatives? Share your views below.
Google AdSense & Blogger: An introduction
If you’ve been thinking about monetizing your blog and are unfamiliar with how Google AdSense works, here are the three things you need to know:
1. AdSense is built into Blogger: You can easily sign up and start showing ads on your blog, without having to leave Blogger, by clicking on the “Earnings” tab in your dashboard. After completing the AdSense application, the next step is to designate where you want the ads to appear on your blog. Once your application is approved, we’ll start serving ads and you’ll start making money. And unlike many other blogging platforms, Blogger doesn’t take a cut of your revenue.
2. AdSense serves relevant ads on your blogs: AdSense works by matching text and image ads to your blog based on your content and the types of users that visit your site. For example, if you write about running, your readers may see ads next to your post about running shoes and equipment. Ads are created and paid for by advertisers who want to promote their products.
3. Great content is key: Posting high quality content is the best way to maximize your returns with AdSense. It’s important to take a little extra time defining your topic, creating a post that is engaging and matters to your readers. The more interesting and appealing your content is, the more likely your readers will be to click on the ads on your blog. http://www.youtube.com/embed/32VknlEnYgc?feature=player_embedded This short video will also give you a quick overview of AdSense and how it works with Blogger:
Stay tuned to the Blogger Buzz blog for more tips and tricks about monetization in the coming weeks. If you are already a google adsense user I recommend you read How To Avoid Getting Your Adsense Account Terminated
Important Notice: Tweet this article with the bookmark social media share below to stand a chance to win an ipad or start making money with your twitter account (it works only with your twitter account and the more articles you tweet the more you stand a chance to win an Ipad)
A High Court in the U.K. has ruled that HTC did not infringe on Apple’s photo management patent, while stating that three other patents Apple claimed in the lawsuit were invalid, according to HTC. The three patents declared invalid, include Apple’s “slide to unlock” feature, which Apple alleged HTC had infringed on in its smartphones and tablets. A multi-touch software that Apple had claimed certain HTC devices using Android 2.3 had infringed on was also found not to be patentable, with the Judge declaring it to be computer program. ” HTC is pleased with the ruling, which provides further confirmation that Apple’s claims against HTC are without merit,” the company said in a statement. “We remain disappointed that Apple continues to favor competition in the courtroom over competition in the marketplace.” Apple could not be immediately reached for comment. The ruling, which was issued on Wednesday, gives HTC a victory as the company faces ongoing patent battles with Apple across different countries. Both companies are fighting legal battles against each other in the U.S., and have sought for import bans on products allegedly infringing on their patents. Shipments of HTC smartphones to the U.S. were recently delayed, as a result of a ruling by the U.S. International Trade Commission that went in favor of Apple. Apple was denied an emergency ban on HTC phones earlier this week by the U.S. International Trade Commission. ITC said it found that Apple had not demonstrated the propriety of temporary emergency action.
Important Notice: Tweet this article with the bookmark social media share below to stand a chance to win an ipad or start making money with your twitter account (it works only with your twitter account and the more articles you tweet the more you stand a chance to win an Ipad)
Building an amazing desktop computer is easy, but even after you stuff your new system with the latest hardware, hook up your cabling, and make room for your giant monitor, you’re not quite done. Make it easy on the eyes with this handy guide.
Building a desktop computer that’s amazing is easy, if a little time-consuming. But even after you’ve stuffed your new system with all the latest hardware, hooked up your cabling, and cleaned off your desk for a giant monitor, you’re not quite done. Your new desktop masterpiece is going to do you little good if you can use it for only a few hours each day. And you have the failure of your own biology to thank for that: Humans were made to be hunters, gatherers, and thinkers, not desk jockeys. Spend too much time in front of your screen, and you’re going to wreck your eyes—and no, we’re not just channeling our worried mothers. Computer Vision Syndrome (CVS) is a real condition with real symptoms that you’ve likely already noticed at some point in your tech-centric life: bloodshot peepers staring at you in the mirror after a long day of gaming; the tired, dry feelings that you attempt to relieve by rubbing your eyes; or perhaps a bit of burning, itching, or increased sensitivity to light. There are plenty of ways to keep your eyes from rioting every time you fire up your favorite Web browser. Most of them are super-easy to set up and require more time than money, although fancier (and pricier) solutions can give you a beautiful desktop setup and happier eyeballs all at once. In any case, your eyes will forever thank you for your investment.
Basic Lighting
While you might think that you’re looking at a crisper, more pleasing picture in a dim or otherwise darker environment, you’re just forcing your eyes to work that much harder to process extreme differences in contrast. And a similar situation happens when you set up your screen in a location that creates a ton of glare: not only does your picture look horrible, but all that light mucks up the quality of your picture and forces your eyes to do a lot more refocusing to achieve better clarity. So if you’re sitting at a computer under fluorescent lights and you aren’t at work, just stop: This kind of overhead lighting is one of the harshest environments for your eyes to deal with.
The best setup? Plain ol’ natural light, best deployed in the form of a window angled perpendicular to your computer screen. You might be tempted to slap your monitor or laptop in front of a huge window to enjoy some scenery while you work, but the brightness of your exterior view could stress your eyes out. You could always use blinds or curtains to limit the amount of light coming in when it’s especially bothersome, but that kind of defeats the point of the view, doesn’t it? When placing your screen perpendicular to your natural light source, you want to make sure that you’re balancing ambience with glare reduction: Angle your display so that extra light isn’t bouncing off your screen. And take some time to play around with your PC setup; a few minutes now will save you countless hours of agony later. Again, blinds or curtains can be an eye-saving device if the sun is really giving you trouble during certain hours of the day. You’ll want to supplement this natural light (or lack thereof, as the day turns to evening) with artificial lighting. And overhead lighting—even incandescent—still isn’t the best option due to its potential for glare. But you shouldn’t go to the other extreme, either. Resist the urge to purchase the classic “spotlight” desk lamp and slap its narrow cone of light somewhere on your desktop. Remember, you’re also trying to avoid sharp differences in contrast. You don’t need that much light around a monitor or laptop screen, and what you pick needs only to supply indirect light in a general area around your desk and display. A small lamp on a desk that creates a pleasant diffusion of light behind your display and prevents glare is great; a full-sized floor lamp can also work wonders, provided it physically fits into your particular desk setup. As for bulbs, consider those of the natural light (and low wattage) variety: If you need more brightness, switch to higher wattages or add another light source.
Advanced Lighting
If you’re looking for a setup that looks a little bit cooler than a tiny lamp on your desk—or if your particular desktop setup has no room for any bulkier lighting equipment—you might want to consider trying out some bias lighting. You’ve probably seen the concept before, likely on a Philips HDTV with ambient lighting (or as Philips brands it, “Ambilight”). The gist is simple: LED lights attached to the rear of your monitor blast the background with colored light (desktop systems only—unless you really want to silly up your laptop), helping to reduce glare in dimly lit environments, to make your picture appear sharper, and to transform your boring ol’ monitor into a glowing beacon of cool. As Sound and Vision’s Timothy Seppala describes the benefits of bias lighting, in an interview with Ars Technica, “It works because it provides enough ambient light in the viewing area that your pupils don’t have to dilate as far. This makes for less eyestrain when a flashbang gets thrown your way or a bolt of lightning streams across the screen.” Tim actually wrote a great guide to getting the most out of your HDTV for PCWorld that includes some tips on lighting your home theater for optimal movie watching, and you should definitely check it out if you’re a serious PC enthusiast seeking to optimize your display. When it comes to PC building, though, the problem with bias lighting is that few devices and software combinations exist that will allow you to achieve the perfect setup: ambient lighting that changes to match the colors appearing on your screen. We’ve had a lot of luck with Mad Catz’s Cyborg Gaming Lights. They’re a bit pricy at $100, but you get two little lighting modules that contain three LEDs (red, green, and blue) for creating any color you’re looking at. You just need to plug the lights into two of your system’s free USB ports (after plugging the lights’ power adapter into the wall), stash them behind your monitor, angle the lights up toward the wall, and fire up a software utility. You can then pick the color that you want to live behind your screen or set your lights to slowly rotate through a series of colors. You can also have the lights dynamically switch their appearance based on whatever happens to be on your screen—be it a game, a movie, or a picture. If you’re looking for a more inexpensive way to build bias lighting into your desktop monitor, you can always pick up Antec’s Halo 6 LED Bias Lighting Kit. For a mere $13, you can slap a strip of six white LEDs to the rear of your display. These lights—or a similar style that you can pick up at your local IKEA (Ledberg or Dioder)—aren’t going to modulate to fit whatever’s on your screen. But at least you’ll be able to reap the benefits of bias lighting without breaking your bank account. A bias lighting strip that you would attach to the rear of your display.
Beyond Lighting
Other tricks you can employ to reduce the harmful effects of extended computer use on your eyeballs include installing little apps to remind yourself to take a much-needed eye break. Chrome users can grab the extension Gimme a Break! and Firefox fans can hit up the simple Auto Timer extension to schedule some rest time for tired eyeballs. For every 20 minutes you spend staring at a screen, you need only to focus your eyes on something else for 20 seconds—that’s not so hard, is it? The software fun doesn’t end there. Odds are good that you’re running your display at fairly high brightness and contrast levels, as monitors are sometimes shipped with factory-default settings that use inordinate amounts of brightness to convince you that the picture is awesome. Not good. You’ll want to fire up the Lagom LCD monitor test pages and use their instructions to set your monitor’s settings to their correct levels. Why blast your eyes with excessively bright light if you don’t have to? Your monitor’s color temperature can also adversely affect your eyes after prolonged periods of staring. An app like F.Lux (click on the Download link at the top of the site) will automatically adjust your monitor’s temperature to match the time: Cooler lighting during the day, mimicking the temperature of common daylight, and warmer lighting in the evening, when “you probably shouldn’t be looking at the sun,” says F.Lux. Finally, you can also opt for a pair of geektastic computer glasses to help you handle your display temperature situation and reduce screen glare—we’re speaking specifically of Gunnar Optiks’ line of Advanced Computer Eyeware (the company’s term, not ours). Gunnar Optiks claims that its glasses also help increase the moisture within your eyes—a function commonly performed by blinking, which one tends to do much less when focusing on a computer screen. We can’t say whether Gunnar’s glasses turn eyeballs into swimming pools, but we did tend to notice less eye fatigue (and didn’t seem to have the same headaches as before) after a few marathon computing sessions when equipped with its glasses. Their yellow tint does take some getting used to, however!
Important Notice: Tweet this article with the bookmark social media share below to stand a chance to win an ipad or start making money with your twitter account (it works only with your twitter account and the more articles you tweet the more you stand a chance to win an Ipad)
We sometimes like to shine a spotlight on deserving Kickstarter games but this week’s project is a little different. Instead of a game played on technology it’s a game played with technology, and it promises to make the online lives of tabletop gamers infinitely easier. Anyone that’s ever tried to run a game of Dungeons and Dragons or another tabletop roleplaying game online knows that trying to take your game to the Internet add an extra layer of complexity on top of an already complicated game. In addition to keeping track of all of the dice rolls, map positions and NPC information you normally need, you also have to figure out some way of selectively informing the other players of all the pertinent information without the convenience of them sitting right next to you to see it.
However, the team at Tabletop Forge thinks they’ve found a solution. By adding some robust tabletop gaming tools to the Google+ Hangouts feature, the team believes they’ve found an ideal way to help tabletop gamers play online. Tabletop Forge adds great RP specific features to the group videoconferencing features of hangouts that allow you to use virtual dice rolling, battle maps for laying out combat quickly and easily online, and even a macro system so you can edit any commands the team might not have thought of into Tabletop Forge. The core Tabletop Forge system is already in working order, but the team is running a Kickstarter to get some professional art assets into the Forge so that gamers can quickly and easily pick out maps and monsters that are right for their campaign and get started playing faster. The team has already easily surpassed their initial $5000 goal and are in the home stretch to meet a final $38,000 stretch goal that will add even more features and maps to the Tabletop Forge arsenal. If you’re interested, head on over to their Kickstarter Page and take a look at their donation options.
Important Notice: Tweet this article with the bookmark social media share below to stand a chance to win an ipad or start making money with your twitter account (it works only with your twitter account and the more articles you tweet the more you stand a chance to win an Ipad)
Flaws in Apple’s App Store have made the updates to well over 100 apps completely unusable, creating headaches for both developers and users over the holiday. Apps affected become unusable and crash immediately upon setup, according to reports. Apple has not acknowledged the issue, but it is believed to have something to do with updates the company made to its app-updating mechanism. Some developers have reported that users are now able to successfully update apps, so it appears that the issue is being fixed. Here’s what you need to know about Apple’s App Store mess. Who’s affected? At least 100 apps updated between July 3rd and July 5th are believed to have been affected. Three major apps–Instapaper, Angry Birds Space HD, and Angry Birds Space Free–reported issues, along with a host of others. Apps downloaded between July 3rd and July 5th are not necessarily affected–apps are only affected if the developer submitted, and had approved, an app during that period. What happens? The issue affects both iOS and Mac apps. With iOS apps, the screen will fade to black and crash immediately upon startup, returning you to the homescreen. With Mac apps, an error message will appear, stating that “[App] is damaged and can’t be opened. Delete [App] and download it again from the app store.” If you are upgrading apps through iTunes, iTunes may pop up error 8324 or 8326 while attempting to update your device’s apps. What should you do? If you have a corrupted app on your device, you must delete it and reinstall it to fix the issue. If your app contains data that may be lost in the event of app deletion, you can follow these instructions from the developer of iPad app Goodreader to save your data. Fair warning: these instructions are a bit intensive and require backing up your device. The issue appears to be getting fixed, though Apple has yet to confirm this publicly. Therefore, it’s recommended that users with affected apps wait a couple of days before reinstalling said apps.