Uncategorized

Microsoft May Soon Replace Internet Explorer With a New Web Browser?

Microsoft’s Windows 10 operating system will debut with an entirely new web browser code-named Spartan, according to a report citing anonymous sources.

ZDNet’s Mary Jo Foley reports that this new browser is a departure from Internet Explorer, the Microsoft browser whose relevance has waned in recent years. According to Foley, it will be a “lightweight” browser that looks and feels more like the Google Chrome and Mozilla Firefox browsers. But her sources also indicate that Spartan will be offered alongside IE when Windows 10 debuts next year.

With Mozilla Firefox and Google Chrome grabbing so much of the desktop market—and Apple Safari, Google Chrome, and Google’s Android browser dominating the mobile market—Internet Explorer is no longer the force it once was. There was a time when it handled about over 90 percent of all web traffic on desktop and laptop machines, but according to research outfit Net Applications, its share has now dropped to 58 percent. On mobile, its share is about 2 percent.

Spartan attempts to address both these markets, according to Foley. Windows 10 is designed to run across a wide range of devices, and according to Foley, the new browser will be available on phones and tablets as well as laptops and desktops. It’s unclear whether Spartan will run on Android, Apple’s iOS, and other operating systems that compete with Windows, but Foley says there’s a chance it will.

Under new CEO Satya Nadella, the company realizes that, in the modern world, its software must run on more than just Windows. In March, Microsoft revealed a new version of Microsoft Office for the Apple iPad. In November, it debuted free versions of Word, Excel, and Powerpoint versions for the iPhone. And earlier this month, the company acquired the mobile email startup Acompli, an email client compatible on both iOS and Android mobile operating systems.

Maybe with this news IE jokes going to disappear?

Standard
Uncategorized

WhatsApp Voice-Call

WhatsApp-CallingA few weeks ago, WhatsApp’s Call feature made a small appearance for a few users, but at the time almost no one was able to trigger it reliably and keep it activated. The company appears to have flipped a few switches in its servers and the function is confirmed to work for those running version 2.11.528 from the Play Store, or 2.11.531 from WhatsApp’s website (also uploaded to APKMirror).

indexA few users have emailed us reporting getting the function activated over the past hours, and I just got mine up and running after receiving a call from Clinton (who got it from another friend, and so on). So as you are suspecting, the “invite” or, more accurately, the trigger that enables the feature has to be the reception of a call from someone who already has it. (Or maybe this terminal trick still works, I’m not sure.) Once that happens, WhatsApp’s UI switches (either immediately or after you exit and reopen the app) from just showing chats, to a 3-tab layout with calls, chats, and contacts.

Calls are well integrated in WhatsApp. The dedicated tab shows incoming, outgoing, and missed calls with precise timing. Ongoing calls stay in the notification panel until you hang up while missed calls leave a notification that you can later check out. While on a call, you can activate the loudspeaker or mute the microphone. If you open your text chats with any contact, a call button appears in the action bar, right next to the attach icon and the menu, to make it easier to talk to them. And finally, if you click a contact’s avatar, you now get a bigger profile image with the options to message or call them, or view their information.

The call button for all contacts now defaults to a WhatsApp call instead of going through your phone. I can’t find a way to trigger a regular network call from the app, which is a bit annoying because you might be in a spotty area or your contact might be offline. (For the record, in this case, the WhatsApp call still rings for a while, no one answers, and then gets disconnected. When the person goes back online, they see it as a missed call.) You’ll have to go to your regular Phone app to initiate a network call.

When you’re lucky enough to receive a WhatsApp call from a friend, you can go on enabling the feature by calling your other contacts. If they’re running an older version of the app that doesn’t support it, you will instantly see a message notifying you of that so you can tell them to update their app before you call them. Now all you have to do is cross your fingers and hope that someone shares the riches with you so you can spread them further.

alternative_whatsappWaht we can expect from competition?

Standard
Uncategorized

Half of all Android users vulnerable to year-old security flaw

android-evil

Half of all Android users are still vulnerable to a security flaw uncovered in the most-popular mobile operating system early last year, according to a new report from security firm Palo Alto Networks. The vulnerability in question allows an attacker to modify or replace Android apps with malware without the user’s knowledge.

Google was informed of the vulnerability in February 2014, a month after its discovery, and has since come up with a patch, which it has included in later revisions of Android 4.3 Jelly Bean and newer distributions. According to the latest data from Google, that still leaves 49.9 percent of all Android users unprotected.

The vulnerability lies in Android’s PackageInstaller, which handles the installation of apps, and, according to Palo Alto Networks, is restricted to apps downloaded — either through third-party app-stores or manually by users — in insecure locations, where they can be easily modified by attackers.

It basically affects just about every Android app store out there with the exception of Google Play, and other sources — like Amazon’s AppStore — which have been patched against the vulnerability. That said, sideloading APKs is still risky, as there’s no protection for apps that users manually download.

The vulnerability can be exploited through an app downloaded “from any normal app store”, according to Palo Alto Networks, which means that users do not have to necessarily be looking for trouble to be affected. The app in question can appear to be legitimate, and may only reveal its role while PackageInstaller is triggered.

In order for fewer users to be vulnerable Android vendors would have to release software updates for older devices, which, as we all know, is unlikely to happen. However, there are other ways to stay safe.

Other than buying a new handset, that is still supported by its manufacturer for a reasonable period of time, users can use the latest-available versions of their favorite third-party app stores, steer clear of shady sources, and pay more attention to which apps they install on their devices.

[http://betanews.com/2015/03/25/half-of-all-android-users-vulnerable-to-year-old-security-flaw]

Standard
Uncategorized

THE IMITATION GAME (Alan Turing defeat ENIGMA machine in World War II)

Yesterday finally I watched THE IMITATION GAME (Alan Turing defeat ENIGMA machine in World War II)

Alan Turing create the Turing test, that’s a test of a machine’s ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human. In the original illustrative example, a human judge engages in natural language conversations with a human and a machine designed to generate performance indistinguishable from that of a human being. The conversation is limited to a text-only channel such as a computer keyboard and screen so that the result is not dependent on the machine’s ability to render words into audio. All participants are separated from one another. If the judge cannot reliably tell the machine from the human, the machine is said to have passed the test. The test does not check the ability to give the correct answer to questions; it checks how closely each answer resembles the answer a human would give.

But the movie focusses about defeating ENIGMA machines.

A-Three-Rotor-Enigma-Cipher-Machine

Enigma machine was any of several electro-mechanical rotor cipher machines used in the twentieth century for enciphering and deciphering secret messages. Enigma was invented by the German engineer Arthur Scherbius at the end of World War I. Early models were used commercially from the early 1920s, and adopted by military and government services of several countries, most notably Nazi Germany before and during World War II.

In a resume Alan team that from 6:00 am to 11:59 pm to try decrypted that day code and exist more than 159.000.000.000.000.000.000 possible combinations, and in my humble option the first right decision has been is necessary a machine to break a machine.

turing_bombe

CHRISTOPHER is the name Alan giving to is machine and we can say is that’s an approach to IA we see today in project has WASTON from IBM.

Frist tries has been a frustrating, because no one know who much time CHRISTOPHER going to been to decipher a code and after week don’t show any positive result.

Now can a several isolated and lucky circumstances that Alan Turing merge and idealize a new approach, why don’t teach CHRISTOPHER to understand a sequence that happen all day and they already know part of the message.

Again the weakness has been a German soldier that forgets to change encryption and always use the same, maybe if this weakness isn’t exploited, CHRISTOPHER going to never a lot more time…

Seeing the movie I don’t stop thinking that Alan Turing (the hero of World War II) has need a hacker and exploited a weakness of the system (in this case the human)

Kevin Mitnick in is particular way, perform social engineering to exploit the weakness of human.

Today phishing attacks have more success that exploiting systems.

 

Now came the question, is simply defeat the system of the weakness of the humans?

Standard
Uncategorized

RAID Terms Explained in Water Cooler

Reading technology terms, meanings is boring, very boring, isn’t it? There must be a fun and easier way to read and understand them. For example, it’s not easy to know and understand these storage terminologies, Standalone, Cluster, Hot Swap, RAID 0, 1, 5, 0+1, etc..

But it’s much easier if it’s explained with a few water bottles and cooler machine.

Raid Water CoolerIsn’t it?

Standard
Uncategorized

Google, Intel & Tag Heuer to take on Apple with luxury smartwatch

Swiss luxury watchmaker Tag Heuer is to launch an Android-powered smartwatch in partnership with Google and Intel.

The device, which was announced at watch fair Baselworld on Thursday, will be unveiled at the “end of the year”, Jean-Claude Biver, CEO of Tag Heuer said, but would not give details about pricing or what the watch would look like.

Media reports suggest the device could be based on the iconic flagship Carrera model. Any device from the LVMH-owned Tag Heuer would pit it against Apple’s $10,000 Edition version of its smartwatch.

But Biver looked to distance comparisons between Tag Heuer and the U.S. technology giant: “The difference between the Apple Watch and the Tag Heuer watch is very important. One is called Apple and one is called Tag Heuer,” the CEO said at a press conference.

Global smartwatch shipments are set to explode this year, growing 511 percent from 4.6 million units in 2014 to 28.1 million units in 2015, with Apple expected to have 55 percent of the worldwide market share, according to Strategy Analytics.

Source: TAG Heuer

Biver told CNBC at Baselworld earlier in the week that the $10,000 Apple Watch Edition cannot be compared to similarly priced Swiss timepieces. But analysts said the Tag Heuer move highlights that traditional luxury watchmakers can’t ignore the hype.

“I think with Apple Watch hitting the markets, the Swiss watchmakers can’t bury their head in the sand anymore,” Ben Wood, chief of research at CCS Insight, told CNBC.

“Tag’s decision to partner with a tech company will be the first of many deals to come.”

A number of Swiss watchmakers have jumped into the smartwatch market. Swatch and Breitling are among those battling to be the hottest wrist wearable. And several other fashion brands are jumping in too. Earlier this year retailer Guess unveiled a smartwatch in partnership with Martian Watches, and at Baselworld, pop megastar Will.I.Am announced a smartband with Gucci.

Not ‘Swiss made’

“Swiss made” is normally engraved into Swiss Watches, but Biver revealed that the smartwatch would not legally be allowed to display this. To have the label, the watch’s inner movement or “engine” must be produced in Switzerland. But the Tag Heuer watch would be powered by Google’s Android and Intel parts.

Biver said 80 percent of the new watch would be made in Switzerland, but the lack of the “Swiss made” label would not put consumers off. He said that the watch would have “Made in Switzerland” on it and “everybody understands what it means”.

“We know how to produce movements…but the microchips and the software is not really our specialty and because of that we should be associate with the two strongest giants in technology,”

[http://www.cnbc.com/id/102519477#.]

Standard