Your Ad Here

Microsoft planning for Virtual Earth

Thursday, March 29, 2007

Microsoft's John Curlander on Thursday demonstrated his company's Virtual Earth application for modeling cities in 3D. Microsoft flies over metropolises to get aerial imagery and captures video from the ground to create a real-world experience of places like Manhattan in a virtual space.

Here at ETech, a four-day conference on emerging tech, Curlander said Microsoft has launched the application for several virtual cities, but it will introduce another 20 cities in the next couple of weeks. Upcoming cities include New York and Chicago (where it had to fly higher than in other cities because of local government concerns about privacy). To protect people's privacy, Curlander said Microsoft uses face-blurring technology on its street-side images.

Microsoft executives are also holding regular discussions on where to take Virtual Earth in the realms of entertainment, gaming and commerce, according to Curlander. For example, Microsoft might open up the software so developers can create games for the Xbox 360 out of Virtual Earth.

Also, Curlander said the company currently has 370 million users of instant messaging, and MSN is considering merging those users with Virtual Earth so they can chat in the virtual setting. But, he said, Virtual Earth developers want to blot out the real cars depicted in the application so people can drive virtual cars in the 3D world.

"First we have to erase cars that are there and put in virtual cars that could be part of IM," Curlander said.He added: "We're having lots of discussions about how we're going to start merging online games out of Virtual Earth...and taking commerce into 3D."

Read more...

Your face can be your password

Wednesday, March 28, 2007

Toronto-based Bioscrypt claims an industry first with its 3D DeskCam. The 3-inch tall, half-inch wide camera uses infrared along with a lens to scan a face in three dimensions and authenticate users accessing computers, the company said.

The camera uses about 40,000 identification points, looking primarily at a person's forehead, eye sockets and nose bridge, said Ryan Zlockie, director of product management at Bioscrypt. The facial-recognition system has passed tests with identical twins and professional face molds, Zlockie said. A person registered with facial hair who subsequently shaves doesn't have to be reregistered, but somebody who undergoes plastic surgery does, he said.

The 3D DeskCam can remove the need for passwords, tokens or smart cards to log on to a computer or online services, according to Bioscrypt.

For consumers, the 3D feature can also help create avatars that look like an individual for use in gaming and instant-message applications, Zlockie said.

Bioscrypt pitches facial scanning as a user-friendly alternative to other biometric security systems that scan a finger or an iris.

"3D face recognition is much quicker and you don't have to be as close as with iris scanning," Zlockie said. Also, people don't have to touch anything or worry about greasy fingers, he said.
The camera, priced at $350, is slated to be available in the second half of this year. Initially, Bioscrypt is targeting business users, but the device could be available to consumers by the end of the year or early next year, Zlockie said. When produced in higher volume, the price should come down to around $200, he said.

Read more...

20 Million Vista Copies Sold : Says Microsoft Corp.

Tuesday, March 27, 2007

Windows Vista, the latest version of the world's most popular operating system, is selling at twice the rate of its predecessor, according to Microsoft Corp.

Windows Vista sold "more than 20 million copies" during the month after its debut Jan. 30, Kevin Kutz, Windows client director, said Monday, declining to provide an exact number.
That compares with sales of 17 million during the first two months after the debut of Windows XP, the version preceding Windows Vista, Kutz said.

"It's a really strong debut, and we're really pleased with the initial uptake, which shows Windows Vista is on track to become the fastest-adopted OS ever."

Operating systems are the most basic software in a computer, allowing it to do useful work with programs such as word processors and spreadsheets.

Given that the personal-computer market has nearly doubled since Windows XP launched, Windows Vista sales "probably should be more," said Michael Silver, vice president of research at Gartner, a technology research group. The analyst said 51 million PCs were sold to consumers worldwide in 2002. This year, the research group predicts 96 million consumers will buy a computer.

Starting in late October, PC makers included coupons for free or low-cost Vista upgrades that could be used once the software became available at the end of January. Microsoft's February sales total includes those promised upgrades, in addition to licenses ordered by PC makers to install on new computers, shrink-wrapped copies sold in retail stores and downloads from the Windows Marketplace Web store.

Silver estimates PC makers sold between 12 million and 15 million PCs with Windows XP Home Edition with the coupons to upgrade to Vista over the holidays -- a significant chunk of the 20 million total, depending on how many included Vista coupons.

Sales of the premium versions of Windows Vista -- Home Premium and Ultimate -- have been "really strong," Kutz said, declining to provide further detail. Sales of the basic versions -- Home Basic and Business -- have been "good," he said.

Microsoft hasn't released sales figures for the Enterprise version of Windows Vista.

A "really high proportion, the vast majority" of Windows Vista sales are being made through the purchase of a PC rather than as packaged software, Kutz said.

That's a change from Windows XP, which "far more people" bought in the box than on a new PC, he said.

"Customers' initial experience with Vista has been quite positive," said Bob Kaufman, a spokesman for computer seller Dell Inc. of Round Rock, Texas.

Read more...

20 Million Vista Copies Sold : Says Microsoft Corp.

Windows Vista, the latest version of the world's most popular operating system, is selling at twice the rate of its predecessor, according to Microsoft Corp.

Windows Vista sold "more than 20 million copies" during the month after its debut Jan. 30, Kevin Kutz, Windows client director, said Monday, declining to provide an exact number.
That compares with sales of 17 million during the first two months after the debut of Windows XP, the version preceding Windows Vista, Kutz said.

"It's a really strong debut, and we're really pleased with the initial uptake, which shows Windows Vista is on track to become the fastest-adopted OS ever."

Operating systems are the most basic software in a computer, allowing it to do useful work with programs such as word processors and spreadsheets.

Given that the personal-computer market has nearly doubled since Windows XP launched, Windows Vista sales "probably should be more," said Michael Silver, vice president of research at Gartner, a technology research group. The analyst said 51 million PCs were sold to consumers worldwide in 2002. This year, the research group predicts 96 million consumers will buy a computer.

Starting in late October, PC makers included coupons for free or low-cost Vista upgrades that could be used once the software became available at the end of January. Microsoft's February sales total includes those promised upgrades, in addition to licenses ordered by PC makers to install on new computers, shrink-wrapped copies sold in retail stores and downloads from the Windows Marketplace Web store.

Silver estimates PC makers sold between 12 million and 15 million PCs with Windows XP Home Edition with the coupons to upgrade to Vista over the holidays -- a significant chunk of the 20 million total, depending on how many included Vista coupons.

Sales of the premium versions of Windows Vista -- Home Premium and Ultimate -- have been "really strong," Kutz said, declining to provide further detail. Sales of the basic versions -- Home Basic and Business -- have been "good," he said.

Microsoft hasn't released sales figures for the Enterprise version of Windows Vista.

A "really high proportion, the vast majority" of Windows Vista sales are being made through the purchase of a PC rather than as packaged software, Kutz said.

That's a change from Windows XP, which "far more people" bought in the box than on a new PC, he said.

"Customers' initial experience with Vista has been quite positive," said Bob Kaufman, a spokesman for computer seller Dell Inc. of Round Rock, Texas.

Read more...

Windows has fewer Security holes, but more critical flaws

Friday, March 23, 2007

Despite having the fewest security holes, Windows was hit by more critical flaws than either Red Hat Linux or Mac OS X, Symantec found.

Symantec's latest "Internet Security Threat Report" (PDF) reveals 39 security holes were discovered in Windows during the second half of 2006, with an average patch development turnaround time of 21 days, up from the 22 Windows holes found in the first six months of the year.

Red Hat Linux had 208 vulnerabilities for the same period with an average patch time of 58 days, a huge increase on the 42 patched vulnerabilities for the first half of the year.
Apple's Mac OS X had 43 vulnerabilities--more than double the number for the first half of 2006--and an average patch time of 66 days.

But almost one third of the 39 Windows holes were high severity, and 20 were medium severity. Just two of the 208 Red Hat Linux security holes discovered were high severity, with 130 medium severity and 70 low severity. Only one of the Mac OS X holes was considered high severity, with 31 classed as medium and 11 as low severity.

The report found that Windows also had the most vulnerabilities with exploit code and exploit activity, which Symantec claims may be one explanation why Microsoft has been pressured to develop and issue patches more quickly than other vendors.

Mozilla Web browsers, such as Firefox, are also more secure than Microsoft's Internet Explorer, according to the report.

It found 54 holes in IE during the second half of 2006, with one of these being of high severity, compared with 40 holes in Mozilla browsers, which had no high-severity vulnerabilities. Only four holes were found in the Safari and Opera browsers over the same period.

Read more...

H1 B visas increase legislation bill passed

Legislation seeking to hike the federal government's annual cap on H-1B visas from the current limit of 65,000 to as many as 180,000 was introduced in the U.S. House today, in what likely will be the start of another push in Congress to allow more technology workers into the U.S.

The H-1B proposal, which is part of a wider immigration reform bill , also would do more than raise the visa cap. The measure seeks to remove all limits on issuing visas to foreign nationals who have advanced degrees in science, technology, engineering or math from U.S. universities.

Advanced degree holders can already be issued visas on top of the regular H-1B cap, but the number of extra visas made available for them is limited to 20,000 in a single government fiscal year.

In addition, the legislation would exempt foreign workers with "extraordinary ability" in certain areas, including science and business, from some of the requirements for obtaining green cards that give them permanent residency status in the U.S. That provision is aimed at making it easier for such workers to obtain the cards.

The Gutierrez-Flake bill is called the STRIVE Act of 2007, for Security Through Regularized Immigration and a Vibrant Economy. If approved, it would increase the H-1B visa cap to 115,000 per fiscal year. And if that limit was reached, the bill would allow for automatic increases to as much as 180,000 visas based on market demand.

High-tech companies and trade groups have been pushing Congress to increase the H-1B cap for the past two years. Earlier this month, Microsoft Corp. Chairman Bill Gates testified before the Senate Committee on Health, Education, Labor and Pensions, as the sole witness at a hearing on U.S. competitiveness, and called for an increase in the H-1B cap and an expedited green card process for highly skilled workers.

Compete America, a Washington-based group that includes IT vendors, trade associations and universities and is lobbying for an H-1B cap increase, today praised the visa-related provisions in the legislation.

Robert Hoffman, vice president of government and public affairs at Oracle Corp. and co-chairman of Compete America, said in a statement that the H-1B cap for fiscal 2008, which doesn't start until October, is likely to be reached next month. In light of that, "and with multiyear backlogs in all employment-based visa categories growing, it is imperative that meaningful reform occur this year," Hoffman said.

But opponents argue that the H-1B program is loosely regulated and that the visas are being used to push down the wages of U.S. workers and help facilitate the offshore outsourcing of tech jobs. However, some H-1B opponents may support efforts to make it easier for foreign workers to get green cards.

The H-1B provisions are very similar to the ones that were included in last year's so-called SKIL Bill, which was formally known as the Securing Knowledge, Innovation and Leadership Act. That measure also proposed raising the cap to 115,000 visas, and it included an automatic 20% increase if the cap was reached.

But the bill drew a lot of criticism from H-1B opponents because, in addition to increasing the cap, it wouldn't have done anything to reform the visa program. It became entangled in the wider immigration debate and wasn't adopted.

Read more...

Cyber attacks more in US

Wednesday, March 21, 2007

The U.S. remains both a center and target of cybercrime. Eighty-six percent of the credit and debit cards advertised for sale on the digital underground were issued by banks in the U.S.
Symantec recorded an average of 5,213 denial-of-service (DoS) attacks per day, down from 6,110 in the first half of the year. Systems in the U.S. were the target of most DoS attacks, accounting for more than half (52 percent) of the worldwide total.

Ollie Whitehouse, Symantec research scientist and one of the authors of the report, said that hackers are becoming increasingly sophisticated in the tactics they use to gain control of vulnerable systems. He said the increased use of unpatched (zero-day) vulnerabilities, which occurred regularly during the second half of 2006, provided evidence of this trend.

During the second half of 2006, 23 percent of the 1,318 documented malicious code samples exploited vulnerabilities. Many of these attacks targeted web browser security bugs.

Symantec documented 54 vulnerabilities in Microsoft Internet Explorer, 40 in the Mozilla browsers, and four each in Apple Safari and Opera over the report period. Mozilla did the best job of the browser suppliers in fixing flaws, taking an average of two days to develop an update. Internet Explorer was targeted by 77 percent of attacks specifically targeting Web browsers.

Spam, spam, spam....Spam and in particular phishing attacks that attempt to trick users into handing over account credentials remained a problem during the reporting period. Symantec blocked over 1.5 billion phishing messages in the second half of 2006, an increase of 19 percent over the first half of 2006.

Forty-six percent of all known phishing sites were located in the U.S., a much higher proportion than in any other country. The U.K. had the second highest number of phishing Web sites in and third highest in the world, beyond the U.S. and Germany. Karlsruhe in Germany was the city which hosted the highest number of phishing Web sites.

During the last six months of 2006, 44 percent of all spam detected worldwide originated in the U.S.

Looking ahead, Symantec expects to see more threats begin to appear on Windows Vista, with a focus on vulnerabilities, malware and attacks against the Teredo platform. Symantec also expects that attackers will focus on third-party applications that run on Vista.

The net security giant expects phishing fraudsters to expand beyond the regular targets of online banks and eBay to new industry sectors, such as multiplayer online games. It also reckons that spam and phishing will increasingly target SMS and MMS on mobile platforms.

Read more...

Century old math puzzle is solved

Tuesday, March 20, 2007

It took 18 people four years to work out a math problem.

But they're not going to be punished for turning in a late assignment.

After all, the Palo Alto-based math institute that handed out the assignment knew that the problem had gone unsolved for more than a century -- and that the answer would probably be billions of digits long.

Explaining the problem and solution to non-mathematicians could take nearly as long. So suffice it to say that the team of mathematicians and computer scientists mapped the inner workings of a complicated, 248-dimensional object known as the ``Lie group E8.'' Scientists had been befuddled by the object for 120 years.

``To say what precisely it is is something even many mathematicians can't understand,'' said Jeffrey Adams, the project's leader and a math professor at the University of Maryland.

And the answer is not your average math proof or calculation. If written out in the tiniest of print, it would cover an area the size of Manhattan. It's so big -- made up of more than 205 billion entries, each of which is a polynomial -- that it takes up 60 gigabytes of space in highly compressed form. The calculation, announced Monday, isn't even on the Internet yet because it would take days for the public to download, math experts explained.

The achievement is considered significant for advancing our basic knowledge of math -- and could be useful in other areas, including string theory and geometry. It also marks a successful marriage between mathematics and computer science, with the scientists using large-scale computing to solve the complicated problem. Once the experts figured out how to figure out the problem, it took a supercomputer about 77 hours to come up with the calculation.

``It's like a Mount Everest of mathematical structures they've climbed now,'' said Brian Conrey, director of the American Institute of Mathematics in Palo Alto, which funded much of the research. ``Now they know their way up it and are able to make use of what they found.''

The scientists -- located in Maryland, Utah, Michigan, Massachusetts and even France -- get little more than bragging rights for their achievement.

They were brought together four years ago by the Palo Alto institute to solve important math problems. The institute was founded by John Fry -- think Fry's Electronics -- to bring a team approach to mathematics.

Scientists are optimistic that the knowledge gleaned from the experience will one day spur advances in math, science or technology -- somehow.


For their part, the scientists were always optimistic they would solve the problem. They say that working four years off and on to complete it wasn't all that bad.

Read more...

Life : Cheap on Internet

Monday, March 19, 2007

Identity thieves are offering a person's credit-card number, date of birth and other sensitive information for as little as $14 over the Internet, said a new report on online threats released Monday.

The data is sold on so-called "underground economy servers," used by criminal organizations to hawk information they've captured through hacking. The information can then be used for identity scams such as opening a bank account in a false name.

U.S.-based credit cards with a card verification number were available for between $1 to $6, while an identity -- including a U.S. bank account, credit card, date of birth and government-issued identification number -- was available for between $14 to $18. Some 51 percent of the servers hosting the information were in the U.S., in part because the growth in broadband Internet access in the U.S. has created new opportunities for criminals, Symantec said. About 86 percent of the credit and debit card numbers available on those servers were issued by U.S. banks.

One way that criminals have gained access to computers is by exploiting zero-day vulnerabilities, or software flaws that are being exploited as soon as they are revealed and before a patch has been released.

Hackers have exploited some of those vulnerabilities by creating malicious documents in Microsoft Office and other software, said Ollie Whitehouse, a security architect at Symantec.
A malicious Word or Excel document, when attached to a spam e-mail, has a greater chance of being opened by someone since it may appear legitimate and be targeted at an employee of a specific company.

While security software programs will often block executable programs attached to e-mail, common Office documents are allowed to go through, Whitehouse said.

"A business isn't going to say 'We will no longer accept Office documents received via email,'" Whitehouse said. "I think productivity would go through the floor at that point. Unfortunately, this is where the security requirement and the business requirement do really clash."

A video posted on Symantec's blog shows a sophisticated attack where a malicious document is opened that puts a harmful executable onto the system and then opens a regular Word document. The attack is almost invisible to the user, apart from a flicker on the screen before the Word document opens.

"Office documents -- PowerPoint presentations, Excel spreadsheets -- and graphics like JPEGs aren't necessarily considered malicious file formats, so the user is more inclined to open them," Whitehouse said.

Read more...

1 TB drive PCs from Dell

Saturday, March 17, 2007

Dell is the first computer system supplier to ship 1 terabyte (1,000 gigabytes) hard drives targeted at users needing to store large amounts of digital media. The higher capacity is particularly needed for storing video content, such as high-definition video. This will affect consumers first but then business, particularly media-related businesses and applications. It is a reversal of normal practice where business received higher-capacity disk drives first.

Dell vice president, Neil Hand said: "This type of capability used to be available only to the largest corporations. With the spectacular advancement in hard drives and the engineering in our systems, we're now able to bring it to consumers."

The first Dell PCs to use the drives will be its own Alienware-branded gaming PCs. XPS systems will then follow suit.

Dell will use Hitachi GST's 1TB Deskstar 7K1000 drive spinning at 7,200rpm with a 3GBit/s serial ATA interface. The drive uses perpendicular recording, has five platters, a read access time of 8.5msecs and a write time of 9.2msecs. It has a cache of 32MB and an 8.7ms average seek time.

Dell is also launching a 'video time capsule service'; users can upload videos to (www.studiodell.com) where Dell will store them, initially on the 1TB drives, for a claimed 50 years.

It is also to be expected that external USB-connected drives used for backup by manufacturers like La Cie will offer products with twice the capacity of current 500GB-drive ones.


Read more...

Internet Censorship

Thursday, March 15, 2007

Internet censorship is spreading rapidly, being practised by about two dozen countries and applied to a far wider range of online information and applications, according to research by a transatlantic group of academics.

The warning comes a week after a Turkish court ordered the blocking of YouTube to silence offensive comments about Mustafa Kemal Ataturk, the founder of modern Turkey, marking the most visible attack yet on a website that has been widely adopted around the world.

OpenNet Initiative, a project by Harvard Law School and the universities of Toronto, Cambridge and Oxford, repeatedly tried to call up specific websites from 1,000 international news and other sites in the countries concerned, and a selection of local-language sites.

The research found a trend towards censorship or, as John Palfrey, executive director of Harvard Law School’s Berkman Center for Internet and Society, said, “a big trend in the reverse direction”, with many countries recently starting to adopt forms of online censorship.

Ronald Deibert, associate professor of political science at the University of Toronto, said 10 countries had become “pervasive blockers”, regularly preventing their citizens seeing a range of online material. These included China, Iran, Saudi Arabia, Tunisia, Burma and Uzbekistan.

New censorship techniques include the periodic barring of complete applications, such as China’s block on Wikipedia or Pakistan’s ban on Google’s blogging service, and the use of more advanced technologies such as “keyword filtering”, which is used to track down material by identifying sensitive words.

Methods such as these are being copied as countries new to censorship learn from those with more experience. “There’s a growing awareness of best practice – or rather, worst practice,” Mr Deibert said.

Ken Berman, head of technology for the US state department arm that broadcasts Voice of America, said some countries were learning from China, which has the most experience in internet censorship, with Zimbabwe appearing to use the same technology.
While internet censors are learning to apply new technologies to expand their efforts, activists wanting to circumvent the controls are using the latest internet methods to advantage.

Read more...

Joint MBA : US, INDIA AND CHINA

The Smith school of business at the University of Maryland is setting up a Global Consortium MBA programme intended to bring together students from the US, China and India. The Smith school’s partners in the project will be the Management Development Institute (MDI) in India and the University of International Business and Economics in China.

The two-year, full-time programme will begin in the autumn of 2008 and will focus on global entrepreneurship in three of the world’s key markets. Students will complete the first year of the programme at their respective home institutions and then will come together in the second year to study three modules in the United States, China and India.

“As the world’s most significant emerging economies, China and India will have a major impact on 21st century global business,” according to Howard Frank, dean of the Smith school. “The creation of programmes that support opportunities for our faculty, students and staff to actively engage internationally represents a vital element of the Smith School’s globalisation strategy.”

Read more...

How Google Finds Page Rank

Wednesday, March 14, 2007

Imagine a library containing 25 billion documents but with no centralized organization and no librarians. In addition, anyone may add a document at any time without telling anyone. You may feel sure that one of the documents contained in the collection has a piece of information that is vitally important to you, and, being impatient like most of us, you'd like to find it in a matter of seconds. How would you go about doing it?

Posed in this way, the problem seems impossible. Yet this description is not too different from the World Wide Web, a huge, highly-disorganized collection of documents in many different formats. Of course, we're all familiar with search engines so we know that there is a solution.

Most search engines, including Google, continually run an army of computer programs that retrieve pages from the web, index the words in each document, and store this information in an efficient format. Each time a user asks for a web search using a search phrase, such as "search engine," the search engine determines all the pages on the web that contains the words in the search phrase. (Perhaps additional information such as the distance between the words "search" and "engine" will be noted as well.)

Here is the problem: Google now claims to index 25 billion pages. Roughly 95% of the text in web pages is composed from a mere 10,000 words. This means that, for most searches, there will be a huge number of pages containing the words in the search phrase. What is needed is a means of ranking the importance of the pages that fit the search criteria so that the pages can be sorted with the most important pages at the top of the list.

One way to determine the importance of pages is to use a human-generated ranking. For instance, you may have seen pages that consist mainly of a large number of links to other resources in a particular area of interest. Assuming the person maintaining this page is reliable, the pages referenced are likely to be useful. Of course, the list may quickly fall out of date, and the person maintaining the list may miss some important pages, either unintentionally or as a result of an unstated bias.

Google's PageRank algorithm assesses the importance of web pages without human evaluation of the content. In fact, Google feels that the value of its service is largely in its ability to provide unbiased results to search queries; Google claims, "the heart of our software is PageRank." As we'll see, the trick is to ask the web itself to rank the importance of pages.

Toknow how Google calculates Page Rank click on the following link:-
http://www.ams.org/featurecolumn/archive/pagerank.html

Read more...

Digital Copiers : Identification Theft

Tuesday, March 13, 2007

Consumers are bombarded with warnings about identity theft. Publicized threats range from mailbox thieves and lost laptops to the higher-tech methods of e-mail scams and corporate data invasions.

Now, experts are warning that photocopiers could be a culprit as well.

That's because most digital copiers manufactured in the past five years have disk drives -- the same kind of data-storage mechanism found in computers -- to reproduce documents. As a result, the seemingly innocuous machines that are commonly used to spit out copies of tax returns for millions of Americans can retain the data being scanned.

If the data on the copier's disk aren't protected with encryption or an overwrite mechanism, and if someone with malicious motives gets access to the machine, industry experts say sensitive information from original documents could get into the wrong hands.

Some copier makers are now adding security features, but many of the digital machines already found in public venues or business offices are likely still open targets, said Ed McLaughlin, president of Sharp Document Solutions Company of America.

Sharp plans to issue a warning about photocopier vulnerabilities Wednesday -- just ahead of tax time.The company, one of the leading makers of photocopiers, commissioned a consumer survey that indicated more than half of Americans did not know copiers carried this data security risk. The telephone survey of 1,005 adults, conducted in January, also showed that 55 percent of Americans plan to make photocopies and printouts of their tax returns and related documents.
Of that segment, half planned to make the copies outside their homes -- at offices, libraries and copy shops. An additional 13 percent said they plan to have their tax preparers make copies.
Although industry and security experts were unable to point to any known incidents of identity thieves using copiers to steal information, they said the potential was very real.

``It is a valid concern and most people don't know about it,'' said Keith Kmetz, analyst at market researcher IDC. ``Copying wasn't like this before.''

Added Paul DeMatteis, a security consultant and teacher at the John Jay College of Criminal Justice at the City University of New York: ``We know there are bad people out there. Just because this is difficult to detect doesn't mean it isn't being exploited.''

Daniel Katz-Braunschweig, a chief consultant at DataIXL, a business consulting firm, includes digital copiers among his list of data holes corporations should try to protect. He couldn't specify names but said a few of his company clients did learn about the vulnerability after their copiers were resold and the new owners -- in good faith -- notified them of the data residing on the disks.
Sharp was among the first to begin offering, a few years ago, a security kit for its machines to encrypt and overwrite the images being scanned, so that data aren't stored on the hard disks indefinitely. Xerox Corp. said in October it would start making a similar security feature standard across all of its digital copiers.

Randy Cusick, a technical marketing manager at Xerox, said many entities dealing with sensitive information, such as government agencies, financial institutions, and defense contractors, already have policies to make sure copier disks themselves or the data stored on them are secured or not unwittingly passed along in a machine resale.

Smaller businesses and everyday consumers are less likely to know about the risk, but should, he said.

Sharp recommends that consumers take precautions, such as asking their tax preparers or the copy shops they are using about whether their copier machines have data security installed.

Read more...

Safe wireless surfing

Security experts offer these tips when using wireless Internet access:
-- Use a suite of security software, including a firewall, like those available from McAfee, Symantec and Trend Micro. Make sure your software is up to date. Some companies, such as Webroot of Boulder, Colo., offer free scans of your system from their Web sites.

-- When logging on in a cafe or hotel, make sure you find out from an employee what the name of the network is, so you don't fall for a phony network set up by a hacker.

-- Change the password when you set up your router at home.
-- Try using OpenDNS, a free service at www.opendns.com, which will change the router's settings and, among other things, prevent pharming attacks (in which you think you're entering data at, say, your bank's Web site, but really you're at a fake site).

-- When on a secure financial site, make sure the address bar reads https (the "s" at the end stands for "secure") and that a picture of a lock shows up next to the address.

-- To get particularly tricky, when setting up your laptop, Robert Graham of Atlanta's Errata Security suggests giving yourself a gender-bending sign-in. If your name is Bob, make your sign-in Mary. Most hackers wouldn't suspect people of lying to their own computer, and it will throw them off the trail of your data.

-- If you get confused, call tech support for the router or the security software. You can also pay for a service like Best Buy's Geek Squad to fix the problem.

Read more...

IBM tool 'reads' Web video for blind

Monday, March 12, 2007

IBM has made a tool for Web browsers that will help the blind and visually impaired access streaming multimedia on the Web.

The tool, which works with Microsoft's Internet Explorer or Mozilla's Firefox Web browser, is designed to handle any file that is embedded in a Web site, including Adobe Flash or Windows Media files.

"Just because someone is blind, it doesn't mean they shouldn't be enjoying YouTube or MySpace or anything else like that," said Frances West, director of the Worldwide Accessibility Center for IBM.

The prevalence of audio on the Web seems like it would be an ideal addition for those with visual impairments, but it's not. Screen readers and talking Web browsers were designed mainly for translating text to voice and have yet to adjust function to fully support multimedia, according to West.

When streaming audio or video requires users to click a Play button using their mouse, there is usually no keystroke alternative, and the controls are randomly placed on the screen, said West. If they can't press Play, they can't experience the multimedia.

In cases where the audio or video streams automatically once a page loads, the Web page's audio often interferes with a user's audio aids.

The multimedia browsing accessibility tool from IBM's Tokyo Research Laboratory will provide predefined shortcut keys to control multimedia on any given Web site. In addition to functions like Play and Rewind, users can control the volume and replay speed.

The tool will also read metadata, if the video creator includes it, that plays a screen narrative to describe what's going on in a given video. The function offers the same control as movies for the visually impaired. A person can select to listen to the original audio only or turn on the screen narration, according to West.

The tool, which IBM plans to make open source, will be showcased at next week's 2007 Technology & Persons with Disabilities Conference.
The company's strategy is that software for the visually or hearing impaired--populations who have historically been neglected in terms of tech products--should be developed as a societal effort, according to West.

"I think that this is just one of many research innovations that you are going to see in this space...and not just for people with disabilities. With aging baby boomers in the U.S. at about 76 million, who will have vision or hearing deterioration, we think applications of the future need to take these users into consideration," said West.

Read more...

Outsourcing : a destination not a strategy

The word offshoring still causes some IT professionals to break out in a cold sweat and others to reach a low boil. Debates continue to rage on the merits and morality of getting technology work done by non-Americans for wages lower than those of their U.S. counterparts. But meanwhile, the practice of offshoring has not only become more prevalent, it has also begun to mature.

Call it Offshoring 2.0. The corporate view of this practice is evolving from the relatively simple idea of moving commodity work from the U.S. to (usually) India with the hope of reaping cost savings, to much more complex, multishore arrangements with more nuanced and strategic goals. These include achieving variable staffing capacity, freeing internal resources, finding the best talent, increasing speed to market and enabling follow-the-sun support.

In effect, offshoring has grown up. In its infancy, just a handful of adventurous companies sent highly codified work overseas. During its rebellious adolescence, it stirred a furious national debate, and the practice’s previously unrecognized management challenges and hidden costs came to light. Now it’s poised to enter a less tumultuous young-adulthood. At this stage, there is less mystery, and the benefits and pain points are better known. This enables companies with some experience to approach offshoring as part of a broader strategic sourcing strategy rather than in a tactical, one-off way.

“The ‘not built here’ mentality has really dissipated,” says Danny Siegel, director of data warehousing and business intelligence technologies at New York-based Pfizer Inc., which uses several outsourcing providers. “With budgets shrinking and requirements growing to improve quality and timeliness, there’s a lot of pressure on IT management to really rethink how they source for technology projects.”

It’s reached the point, Siegel says, “that I couldn’t care less if the people come from Chennai, Shanghai, Poland or the Ukraine — that’s irrelevant. As long as it’s a high-performance work team that gets the job done at a competitive price, great.”

Siegel considers it the job of the service provider — whether based in the U.S. or India — to provide him with the best and the brightest, whether onshore or offshore, “and that means global sourcing,” he says.

Read more...

Women likely to remain rare in boardrooms

Sunday, March 11, 2007


It's no surprise there's a dearth of women in America's corporate boardrooms, especially so in Silicon Valley. What is surprising is that it may well take a generation to solve the problem, experts in the field are now saying.

``Let's put it this way,'' said Ann Peckenpaugh, president of Larkspur's Board Search Partners, whose clients are primarily valley companies. ``Global warming is happening faster.''

Recent research illustrates the scope of the challenge. A study by the Graduate School of Management at the University of California-Davis found that slightly more than half of California's 400 biggest publicly traded companies have no women on their boards, including Apple and Yahoo.

And the valley is slightly worse than the state as a whole; while women make up 8.8 percent of directors in California, they hold only 6.5 percent of board seats at the 103 largest Silicon Valley public companies, according to the Davis research.

That's not likely to improve soon, despite the efforts of organizations such as the Forum for Women Entrepreneurs and Executives of Palo Alto, which helps corporate boards identify qualified female director candidates, and the national InterOrganization Network (ION), which advocates for women's advancement in business.

Silicon Valley's culture, focused on innovating at breakneck speed, may be largely responsible for the sluggish embrace of female directors, according to some observers.

``It's an issue of maturation,'' said Ellen Hancock, a longtime technology executive who served as both chief technology officer of Apple and chief executive of Exodus Communications before more recently co-founding Acquicor, an umbrella company that buys other technology businesses.

``Many public companies in the valley are very young and remain much more focused on growth than on diversity,'' Hancock said.

`People wear blinders'

It's not Machiavellian, said ION president Toni Wolfman. People just aren't terribly imaginative. ``People wear blinders,'' she said. ``They think about who they talk with all the time, who they play golf with.''

Change is happening, albeit slowly, thanks to growing awareness of the issue. The forum for women entrepreneurs, for example, recently introduced a program called BoardMatch that Chris Melching, the forum's president, likens to a dating service. ``We pair a company with an ideal target with our extensive membership base'' of female Silicon Valley executives.

Since BoardMatch's launch in November, the organization has worked to fill six seats and successfully helped place one woman on a board.

It's a slow start, but a start, said Professor Katrina Ellis of UC-Davis, one of the authors of the study. She points out that of the board seats that have opened up in Silicon Valley over the past year, roughly one-fifth were filled by women. ``Companies need a bit more prodding, but it's a slight, encouraging shift.''

Ultimately, women helping women may make the biggest difference.

``Women can be very supportive of bringing others onto a board,'' said Hancock, who invited two women onto her board while at Exodus and continues to regularly recommend women to key board appointments.

Such steps make a difference, according to Peckenpaugh, who says the biggest handicap for female executives today is -- no surprise -- their lack of board experience.

That will change -- someday. ``It's hard to be optimistic,'' she said, ``but we'll have a broader array of really well-qualified candidates as time goes by.''

Read more...

Bill gates urges for more H1 B's

Saturday, March 10, 2007

In his latest speech addressing Congress Bill Gates asked congress to increase the number of H1 visas issued to improve the technology standards and encourage innovations throughout the world.

This is the part of the speech regarding H1B's :-

To remain competitive in the global economy, we must build on the success of such schools and commit to an ambitious national agenda for education. Government and businesses can both play a role. Companies must advocate for strong education policies and work with schools to foster interest in science and mathematics and to provide an education that is relevant to the needs of business. Government must work with educators to reform schools and improve educational excellence.

American competitiveness also requires immigration reforms that reflect the importance of highly skilled foreign-born employees. Demand for specialized technical skills has long exceeded the supply of native-born workers with advanced degrees, and scientists and engineers from other countries fill this gap.

This issue has reached a crisis point. Computer science employment is growing by nearly 100,000 jobs annually. But at the same time studies show that there is a dramatic decline in the number of students graduating with computer science degrees.

The United States provides 65,000 temporary H-1B visas each year to make up this shortfall -- not nearly enough to fill open technical positions.

Permanent residency regulations compound this problem. Temporary employees wait five years or longer for a ``green card.'' During that time they can't change jobs, which limits their opportunities to contribute to their employer's success and overall economic growth.

Last year, reform on this issue stalled as Congress struggled to address border security and undocumented immigration. As lawmakers grapple with those important issues once again, I urge them to support changes to the H-1B visa program that allow American businesses to hire foreign-born scientists and engineers when they can't find the homegrown talent they need. Reforming the green card program to make it easier to retain highly skilled professionals is also necessary.

We should also encourage foreign students to stay here after they graduate. Half of this country's doctoral candidates in computer science come from abroad. It's not in our national interest to educate them here but then send them home.

During the past 30 years, U.S. innovation has been the catalyst for the digital information revolution. If the United States is to remain a global economic leader, we must foster an environment that enables a new generation to dream up innovations, regardless of where they were born. Talent in this country is not the problem -- the issue is political will.

Read more...

Search Google from your cell phone

Right before your eyes, your cell phone has morphed into a portable computer. Whether you're searching Google via text messages, using Short Message Service (SMS) to make international calls, or e-mailing a voice message, these tips will help jump-start your cell phone's inner PC--and make your life easier to boot.

Text Your Google Search

For the price of sending a text message, you can unleash the power of Google without having to open a Web browser. Just text GOOGL (46645) to get access to much of the search giant's most useful information, including addresses and phone numbers, word definitions, numeric and other conversions, weather, and even sports scores.

For example, if you want to look up the phone number of a pizza joint to place a take-out order, text-message the name of the business and its city and state to GOOGL, such as zachary's oakland, ca. A minute or so later, Google will send you a text message similar to this: 'Local Listings: Zachary's Chicago Pizza 5801 College Ave Oakland, 94618 510-655-6385'. To save time, enter the zip code instead of the city and state.

To look for more-general information, text something like pizza 94618 to receive the names, addresses, and phone numbers of all the pizzerias in that area. This is especially handy when you're in a city or neighborhood you're unfamiliar with.

Google's ability to text you word definitions helps you compose just the right message to send with that bouquet of flowers you're ordering, and it also can adjudicate tense games of Scrabble. To get a definition, text GOOGL with the command define: followed by the word (with no space between), such as define:qindarka. How else will you ever find out that there are precisely 100 qindarkas in a single Albanian lek (which, oddly enough, is also the name of that country's national vegetable).

You can text Google for all sorts of conversions, too. For example, if you want to convert pounds to kilograms, or liters to quarts, or even find out the number of miles in a light-year, text GOOGL and enter 2 liters in quarts. You'll receive a text back with the answer faster than you can say '2.1133764188651876'. To convert foreign currency at the current exchange rate, text: $100 in euros (the three-letter abbreviation for different currencies also works, such as 100 usd in eur).

Google has many other options for fast lookups from your phone. To find out the forecast for a region, text weather and the city name, such as weather Peoria, IL. To find out how your team is doing, simply text its name, such as Dodgers to see how things are going in Chavez Ravine.

Depending on your cell-phone plan, sending a lot of text messages to Google may launch your monthly bill into the stratosphere. Check to see if your service provider offers any special deals for high-volume texting before you start punching those buttons.


Read more...

Worldwide Internet Audience has Grown 10 Percent in Last Year

Friday, March 9, 2007

comScore Networks, a leader in measuring the digital age, today announced that 747 million people, age 15+, used the Internet worldwide in January 2007, a 10-percent increase versus January 2006. Among the top 15 countries (ranked by penetration), Internet audiences in India, the Russian Federation and China increased the most in 2006, growing 33, 21 and 20 percent, respectively. China now represents the second-largest Internet population in the world, with 86.8 million users, after the U.S., which rose 2 percent year-over-year to 153.4 million users age 15 or older in January 2007.

Canada, Israel, and South Korea Lead the World in Online Engagement
As a measure of engagement, comScore also analyzed the top 10 countries ranked by average hours online per visitor for January 2007. Canada led the list, with the average user spending 39.6 hours (and 41.3 hours/ month among broadband users) online during the month. Rounding out the top 5 were Israel, South Korea, the U.S. and the U.K. – all countries with high broadband penetration. In fact, in each of the top 10 countries, the time spent online by users with a broadband connection was substantially greater than the time spent by users with a narrowband connection.

Top Global Properties
comScore also reported the top worldwide Web properties for January, ranked by unique visitors. Microsoft Sites topped the list with 510.3 million worldwide visitors, followed by Google Sites with 502.5 million worldwide visitors, and Yahoo! Sites with 467.8 million worldwide visitors.

Read more...

India or China : which one is destined to rule the 21st century

Thursday, March 8, 2007

Clearly, China's post-Mao transformation is the story of post-war economic history. The nation's economy has grown more than 7 percent annually for the last couple of decades. China's emergence as a manufacturer of high-tech goods is equally impressive with a roster of companies featuring the likes of Lenovo, Baidu.com and Huawei Technologies. But China's hyper-growth has disguised several increasingly pronounced blemishes.

"The multitudes of people, the size of their building projects, and the sheer audacity of their vision to transform this country into a mega-powerhouse,". "What do you do with an infrastructure that is developing so rapidly, that there are more than 160 cities with populations over 1 million each and no fewer than 10 cities with populations over 10 million?"
Talk about an understatement. That mind-numbing question is as big as all of China.
Almost 15 million people in China each year move from the countryside to the cities. With so vast a population in transition, the absence of a safety net carries with it the ever-present potential for social unrest.

So far, things have worked out. After Deng Xiaoping came to power following Mao's death in 1976, the government made a covenant with the rising entrepreneurial class. To put it simply, it went like this: "We'll let you get rich, but leave the politics to us." Of course, the state has had to deal with occasional turbulence, such as the rebellion at Tiananmen or the northwestern province of Xinjiang.

But these rate as momentary detours on an otherwise unimpeded march toward superpower status. Meanwhile, India has had its own issues. The state doesn't invest enough in vital infrastructure while it spends too much money subsidizing agriculture.

"China's invested more in infrastructure than India, which is in a big catch-up situation," said Michael Spence of Stanford University, who won the Nobel Prize for Economics in 2001. "If they don't do that, they won't grow at the rates being projected."

For all the mess that is India, it's still one heck of a productive mess. In its latest five-year plan, the country forecast average growth accelerating from 9 percent to more than 10 percent. That's a breathtaking climb. And consider the following: In 2002, the country's annual GDP growth was lower than that of China, Vietnam, Sudan, Tanzania, Uganda and Bangladesh. Within a year, India had closed to No. 2 behind China, largely on the strength of its emerging IT and business process outsourcing sectors.

India also reaps benefits from an excellent educational system that's generated thousands of graduates who work for overseas American corporations.

Above all, India's political power doesn't emanate from the barrel of a gun. On Tuesday, the U.S. statement included China with the likes of Iran, Zimbabwe, Cuba, North Korea and Myanmar as a country where human rights protections routinely get violated. Compare that with India.
The system may sometimes be raucous and inefficient, but it remains the world's largest functioning democracy. That counts for a lot and helps feed into a touchy-feely attribute that can't be measured like a dry economic input.

Spence summed it up this way: It has a lot to do with a sense of optimism and momentum, a feeling that today will be better than yesterday and tomorrow will be better than today. It's a very American way to explain India's phenomenal growth, but I think it helps fill in some of the gaps. In China, you can dream of being rich, but it then behooves you to keep your opinions to yourself. The average Indian can also dream about making her fortune--and then figure out how to apply those lessons to building a better society.

What could be more Indian? What could be more American?

Read more...

Almost 160 billion GB of data were generated in 2006

Wednesday, March 7, 2007

When tech analyst John Gantz at researcher IDC began tallying up all the digital information generated annually, he first looked in the obvious places.
He counted e-mail, spreadsheets and the other data collected by most corporate computer systems. Then there was the new digital data created by consumers. (Take digital cameras: More than 32 million are expected to be sold this year, says the Consumer Electronics Association trade group.)
But then Gantz realized that he had to look deeper. Digital photos aren't just snapped by traditional cameras — they're also taken by millions of security cameras and camera cellphones, for example.
Gantz ultimately calculated that 161 exabytes of digital data — or about 161 billion GB — were generated in 2006. And the amount is expected to rise fast.

Read more...

Scaling Problem in Semiconductor Industry

Atoms don't scale, and this is the ultimate barrier to the continuation of Moore's Law, Bernie Meyerson, VP and chief technologist, IBM’s Systems and Technology Group, told the Globalpress Summit Conference in Monterey Tuesday.

"Whether that barrier happens in 2016, or 2020, or 2024 is under debate," said Meyerson, who was of the opinion that scaling would deliver 6nm processing in 2020.

While scaling is not the immediate problem, improving performance is. "I could make a 20GHz core so long as it was used to do absolutely nothing," joked Meyerson.

The constraint put on IC development by skyrocketing standby power meant that performance improvements can only be delivered by innovations such as strained silicon, design for manufacture, new dielectric materials, massively parallel architectures and many other factors.

The need for innovation has produced a huge increase in complexity in designing products. Meyerson gave an example of the problems faced when designing at very small geometries.
"Random fluctuations in the number of atoms in the dopant can affect the behavior of the device. You have to allow for that, or the circuits won't work," explained Meyerson.

Meyerson said that IBM would continue to develop the PowerPC core as well as the Cell processor because Cell is a chip architecture at the center of which is the PowerPC core. Cell surrounds that core with eight processing elements.

The next generation, Power6 will have a frequency between 4GHz and 5GHz and will be out in systems next year, said Meyerson.

(Thanks to Poorvaja kamalapuri for sending me the article)

Read more...

100 Things You can Do When You're Bored

Tuesday, March 6, 2007

1. Turn on your favorite music and dance.
2. Get a pet.
3. Rent and watch a funny movie.
4. Go to the store and read all of the humorous greeting cards.
5. Write in your journal.
6. Read.
7. Go to the library.
8. Surf the Internet.
9. Take a bubble bath with candles and music.
10. Become a big brother or big sister.
11. Clean the house.
12. Do laundry.
13. Rearrange the furniture.
14. Change the lighting.
15. Make a list of 100 random things about yourself. (Books you like, clothes you wear)
16. Write outdoors.
17. Video games.
18. Watch T.V.
19. Download music.
20. Find things to donate to Goodwill.
21. Make hemp jewelery.
22. Make greeting cards.
23. Write a letter.
24. Write a poem.
25. Visit a friend.
26. Do a good deed.
27. Take a walk.
28. Go for a drive.
29. Bake cupcakes.
30. Bake and decorate a cake.
31. Rent a movie - your choice.
32. Do yoga.
33. Meditate.
34. Read the newspaper.
35. Watch the news.
36. Read the phone book.
37. Try on all the clothes in your closet.
38. Write down 25 things that make you happy.
39. Write: 10 Minutes of Contemplation. Write all of your thoughts and associations as they occur for 10 minutes.
40. Plant a plant.
41. Mend damaged clothing.
42. Paint.
43. Draw.
44. Work on a puzzle.
45. Go swimming.
46. Make a things to do list.
47. Write down some goals.
48. Listen to music.
49. Clean the mirrors and windows.
50. Tend to the potted plants.
51. Go to the park and swing.
52. Talk on the phone.
53. Go somewhere busy and people-watch.
54. Prepare a budget.
55. Write down some things you would like to save money for.
56. Play an instrument.
57. Crossword puzzles.
58. Word Searches.
59. Reflect on how something works.
60. Write a short-story.
61. Write about your dream home.
62. Write about your dream man/woman.
63. I-AM-BORED.com
64. Find things to sell on e-Bay.
65. Google your name.
66. Work on a web site.
67. Do the MySpace thing.
68. Read the dictionary.
69. Visit: http://1lilgrl.livejournal.com/
70. Answers.Yahoo.Com
7 1. Make a list of things to google.
72. Play solitaire.
73. Cook.
74. Use a telescope to find planets.
75. Bored.com
76. Write all of those letters you've been meaning to write.
77. Read Instant Karma
78. Detail your car.
79. Get a job.
80. If you already have a job, get a second part-time job.
81. Blog!
82. Write for Associated Content.
83. Exercise.
84. Rearrange your closet.
85. Google your favorite subject.
86. Chat on-line.
87. Go shopping.
88. Have a yard sale.
89. Babysit.
90. Work overtime.
91. Sleep.
92. Visit someone you have not seen in a while.
93. Go to the mall and see how many free samples you can get.
94. Go out to a movie.
95. Take some on-line courses.
96. Read a magazine.
97. Vacuum.
98. Find clothes to consign.
99. Post a classified ad.
100. Pick a room in your house and write about it. Be as descriptive as possible.

Read more...

The Most Important People on the Web

Monday, March 5, 2007

PC world did a very good survey on web. With millions of computers, billions of users, websites, servers, bloggers, intellectuals on web, it's very difficult to figure out the most important people on the web.
PC World Magazine's Website http://pcworld.com gives the details of all the top people on the web. They have a list of top 50 most important people on the web. Here you will see the top 5 in the list.

1) Eric Schmidt, Larry Page, and Sergey BrinExecutives, Google

When your stock price can top $500 a share, you're collectively worth $33 billion in cash, and you run the most trafficked search engine on the Internet, you can afford to do, well, pretty much whatever you want. Sergey Brin and Larry Page's little project from Stanford has grown into the Web's most talked-about powerhouse, and one of the few names on this list to have morphed into a verb. Schmidt left Novell to join the board of directors at Google in 2001 and soon became the company's CEO. Having conquered the online advertising world, Google seems to be gearing up for an acquisition spree, its headline-grabbing purchase of YouTube marking a big step toward complete domination of the Web.

2) Steve JobsCEO, Apple

No doubt you're sick of the media bonanza surrounding the every move of Apple's CEO, but when one man's appeal for DRM-free music reverberates around the world, it's hard to ignore the power he wields. Jobs popularized legal music downloads and legal TV and movie downloads. And though the iPhone won't be released for five months, its demonstration at MacWorld Expo suggested that this product might finally popularize Internet browsing on a mobile device.

3) Bram CohenCofounder, BitTorrent

P2P systems like KaZaA and eDonkey are so last year. The future is all about BitTorrent, the brainchild of math wizard and programming wunderkind Bram Cohen. BitTorrent, developed in 2001, has gained in popularity as a way to download large files (like movies) by sharing the burden across hardware and bandwidth. The technology's adeptness at handling large files got Cohen in trouble with the Motion Picture Association of America, which ordered BitTorrent to remove copyrighted content from its network. But that setback hasn't slowed it down. Reportedly, more than a third of all Web traffic now comes from BitTorrent clients. BitTorrent and the entertainment heavyweights have since joined forces. The newly released BitTorrent Entertainment Network launched recently with thousands of industry-approved movies, television shows, games, and songs for sale and rental.

4) Mike MorhaimePresident, Blizzard Entertainment

In the world of online gaming, there is World of Warcraft and there is everything else. With 8 million players worldwide, Blizzard earns about $1.5 billion a year on WoW. And each player is breathlessly beholden to Mike Morhaime for the chance--if it ever comes--to obtain that Blade of Eternal Justice. As with Second Life , entire real-world businesses are based around the game. Unlike Second Life, though, these businesses--which exploit the WoW economy and gameplay--are not entirely welcome.

5)Jimmy WalesFounder, Wikipedia

Many onliners treat Internet encyclopedia Wikipedia as their first and last stop in researching a topic; and its user generated content has become so reliable that Nature magazine declared it "close to [Encyclopaedia] Britannica" in accuracy. The site has been cited as a source of information in more than 100 U.S. court decisions since 2004. But its popularity has also made Wikipedia a target for spammers--so much so that Wikipedia temporarily blocked the entire country of Qatar from making edits. To thwart spammers, Wales decided to slap "nofollow" tags on external links, telling search engines to ignore the links in order to avoid artificially inflating the search engine ranking of the link targets. This strategy ensures that Wikipedia's prominence in search results will continue to grow. But Wikipedia may just be the beginning for Wales. He recently launched his own search engine, WikiSeek, which searches only sites mentioned in Wikipedia.

The full list of the important people on the web can be seen by clicking the following link
http://www.pcworld.com/article/id,129301-page,2-c,techindustrytrends/article.html

Read more...

Write down your passwords - Apple says

Sunday, March 4, 2007

Apple advises Mac users to write down their passwords, just in case they have forgotten them when they are needed.

On its Mac 101 Web site, Apple offers a document called "My Mac Cheat Sheet" (PDF). The document has spaces for Mac users to not just record their Mac OS X related usernames and passwords, but also log-in credentials for e-mail accounts, Internet access accounts and routers.

"To make your Mac life a little easier, we created this little form for you--or your Mac-savvy family member or friend--to enter all that easy-to-forget information once, and then stow it safely away should you ever need it," Apple states on its Web site.

Now, you might think that Apple has gone bonkers. Actually, it has not. Writing down your password on a sticky note and attaching that to your computer monitor or the bottom of a keyboard isn't smart, but jotting down the information and storing it in a safe place can be helpful.

In fact, Sun Microsystems security guru Whitfield Diffie and Microsoft's Jesper Johansson have said the same. (Although Microsoft's Bill Gates has also repeatedly said that passwords are the weakest link in the security chain and that they should be replaced by stronger security systems such as smart cards.)

So, even if you're not a Mac user, Apple's document may come in handy. Just scratch out some of the Mac specific entries and replace them with Windows entries. Good luck finding all those passwords! (And remember, store that sheet in a safe place!)

Read more...

49 Things You Can Do When You Turn 18!

Saturday, March 3, 2007

49 Things You Can Do When You Turn 18!
1. Buy tobacco
2. Change your name
3. Get a tattoo
4. Get a piercing
5. File a lawsuit
6. Be sued
7. Pawn something
8. Get married
9. Adopt a child
10. Gamble
11. Call a "900" number
12. Get into a night club
13. Donate Blood
14. Enlist in the military
15. Work full-time
16. Become a flight attendant
17. Visit a porn site
18. Start a 401k plan
19. Make your own decisions
20. Open a PayPal Account
21. Pay Taxes
22. Sign legal documents
23. Start earning credit
24. Go to a strip club
25. Get a loan
26. Apply for benefits at work
27. Lease an apartment
28. Get a bar tending license
29. Rent a post office box
30. Breaks at Work are no longer required
31. Sign a legal contract
32. Smoke a cigarette
33. Chew tobacco
34. Move out
35. Vote
36. Carry a weapon (w/ a license)
37. Open a checking account
38. Open a savings account
39. Rent a port-a-potty
40. Open an eBay account
41. Purchase Nicorette gum
42. Purchase "the patch"
43. Drive any time of day
44. Cash a savings bond
45. Visit a porn store
46. Become a stripper
47. Work in an alcohol serving establishment
48. Receive more responsibility/stress/advantages
49. Have the freedom and independence you didn't have before


This is just for entertainment, and no offences please.

Read more...

Memoring the digits of Pi

Friday, March 2, 2007

Even long before computers have calculated π, memorizing a record number of digits became an obsession for some people.

  • The current world record is 100,000 decimal places, set on October 3, 2006 by Akira Haraguchi.
  • The previous record (83,431) was set by the same person on July 2, 2005 , and the record previous to that (43,000) was held by Krishan Chahal.

There are many ways to memorize π, including the use of piems, which are poems that represent π in a way such that the length of each word (in letters) represents a digit. Here is an example of a piem: How I need a drink, alcoholic in nature (or: of course), after the heavy lectures involving quantum mechanics. Notice how the first word has 3 letters, the second word has 1, the third has 4, the fourth has 1, the fifth has 5, and so on.

The Cadaeic Cadenza contains the first 3834 digits of π in this manner. Piems are related to the entire field of humorous yet serious study that involves the use of mnemonic techniques to remember the digits of π, known as piphilology. See Pi mnemonics for examples. In other languages there are similar methods of memorization. However, this method proves inefficient for large memorizations of pi. Other methods include remembering patterns in the numbers (for instance, the year 1971 appears in the first fifty digits of pi).

Read more...

Vista Used Less than 1 percent of PCs

Windows Vista may yet prove to be an unstoppable juggernaut, but statistics released Thursday by a market research firm show that the new operating system hasn't even licked its nine-year old ancestor.
Vista was being used on less than 1 percent of PCs tracked in February by Aliso Viejo-based Net Applications Inc., making it the sixth most-popular operating system. That puts it behind Windows 98, which is still used on 1.5 percent of computers.
Vista's exact share was 0.93 percent. Windows XP continued to lead, with 84.3 percent, followed by Windows 2000, with 4.8 percent. Mac OS X on PowerPC machines had 4.3 percent, while newer Intel-based PCs running OS X had 2.1 percent.
Net Applications collects its data from the browsers of visitors to its network of more than 40,000 Web sites.
Vista's February share of PCs connected to the Internet -- a month after its consumer release and three months after its release to businesses -- represents a big leap over January, when it was used by just 0.2 percent of PCs. At the time, it lagged behind Windows ME, the 13-year-old Windows NT and various flavors of Linux.
While Microsoft was late to market with Vista, Apple's taken advantage and is now up to a combined 6.38 percent market share. It looks like the market is buying Vista on new PC purchases, but there isn't a significant percentage of people upgrading existing PCs.
Some analysts have predicted that despite Microsoft's intention to spend half a billion dollars marketing Vista, conversions from XP won't be the norm until 2009.
Statistics for the first week of February -- Vista officially launched Jan. 30 -- were mixed. Current Analysis found sales of PCs -- with Vista preinstalled -- were up 173 percent from the week before. PC sales were also up 67 percent from the same time frame in 2006. But Current Analysis itself pointed out that the sales leaps were exaggerated partly by slowing sales as retailers and OEMs wound down their XP-based inventory.
By comparison, NPD Group Inc. found that first-week sales of boxed copies of Vista were down 60 percent compared with first-week boxed copies of Windows XP five years earlier.
Neither group has released statistics of Vista sales in subsequent weeks, though NPD analyst Chris Swenson is expected to release first-month retail sales of the new OS soon.

Read more...

Add-ons for browsers

Thursday, March 1, 2007

Today's browsers are sophisticated and highly functional programs--but they can become so much more. There are lots of add-ons for Internet Explorer 7 and Firefox 2 that offer safer browsing, easier site sharing, improved searching, faster news gathering, and more. To download any extension visit
Add-Ons for Internet Explorer or
Firefox Add-ons.

Read more...

  © Free Blogger Templates Columnus by Ourblogtemplates.com 2008

Back to TOP