<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Computers 4 you!</title><description>A collection of Computer seminars, notes, e books, tips on computers and computer related technologies such as Networking, SQL, RDBMS, Unix, Linux, Web technology, HTML, Basic Computer, Database, Computer Hardware, Installation, Maintenance, Utilities,  Accessories, Microsoft Products, Operating Systems, Every thing about computers.</description><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><pubDate>Mon, 29 Sep 2025 12:58:26 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">979</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://computers4you.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:summary>A collection of Computer seminars, notes, e books, tips on computers and computer related technologies such as Networking, SQL, RDBMS, Unix, Linux, Web technology, HTML, Basic Computer, Database, Computer Hardware, Installation, Maintenance, Utilities, Accessories, Microsoft Products, Operating Systems, Every thing about computers.</itunes:summary><itunes:subtitle>A collection of Computer seminars, notes, e books, tips on computers and computer related technologies such as Networking, SQL, RDBMS, Unix, Linux, Web technology, HTML, Basic Computer, Database, Computer Hardware, Installation, Maintenance, Utilities, Ac</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>Android Basic Terminologies</title><link>http://computers4you.blogspot.com/2011/10/android-basic-terminologies.html</link><category>Articles</category><category>Mobiles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 12 Oct 2011 13:58:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-7799385725402396114</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:180%;" &gt;Android Basic Terminologies&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;What is Android?&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;In a layman’s term, Android is operating system that runs on primarily on mobile platform (Cellphone/tablets). It certainly is not the hardware that you get when you purchase a phone.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;Architecture of Android&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Before I go in depth about ROM and Super User, let me tell you a little about the architecture of android. For any computational device to work there needs to be certain element which interacts with the hardware. Hardware alone can’t do a thing unless it is directed to. This direction/interaction with the hardware is done through the innermost layer of the operating system known as kernel. The Kernel inside android is a fork of present day Linux Kernel.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The layer above kernel is what gives the kernel instruction to perform specific tasks. For instance if your click on the browser icon on the launcher, the input is interpreted by kernel (as it interacts with hardware) but what to do with this input is understood by the next layer, which is application. In this case the launcher. So the question is how does launcher work? It doesn’t directly work with kernel, instead there is an intermediate called Dalvik Virtual Machine which runs these applications. If you are familiar with Java you will understand this quite easily, but if you don’t get it don’t bother.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;In short, hardware interacts with kernel which interacts with Dalvik virtual machine which interacts with applications, and all these together combined is called ROM.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;ROM, RAM and Firmware&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;ROM stands for Read Only Memory, there are many kinds of ROM, some which can be erased, some that can be programmed. ROMs are used to store the entire stack that I mentioned above. Whole Kernel, DVM and Applications are stored in these ROM, hence the name.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;There is quite a difference between ROM and RAM so don’t get confused. On one hand ROM is like a permanent storage, RAM is the temporary storage. It stores the run time data that is generated during processing.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;And, if you hear someone say something about ‘firmware’ don’t get confused because ROM and Firmware are almost the same.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;What is Rooting? Who is a Super User?&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;If you are an avid ‘Linux/Unix’ user then I don’t need to answer these, but for others let me put it this way. If you have read till now you would realize that Linux Kernel is in the heart of this device. So all the inherent features of operating system would be same as Linux. Therefore which is the one user which can do anything/everything on a Linux system?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The answer is Root aka super user, and hence the term rooting.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Rooting gives you the rights/permission to do certain tasks on android which has inherently been blocked by the handset makers for both simplicity and security of the device. You might have noticed that when you install any application from android market, it asks for certain permissions. Similarly there are some applications which require system level permissions for them rooting is required.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;There are different ways to root android (depending on the version), but we will not deal with them here.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;Flashing the ROM&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;As you might know, Android is an open source initiative and anyone can go ahead and build his/her own custom operating system for their handset. There are numerous developers working on building their own versions of Android. One of them that we mentioned previously is known as Cyanogenmod. There are many such ROMs built for many different devices, and process of installing these on the handset is commonly knows as flashing. The process of flashing varies from handset to handset and ROM to ROM. It isn’t a difficult task, but certainly requires lots of research.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;I think this should be enough for the basics, though you should know about some common terms used in relation to android.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    Deodexed – If you are new to flashing and modding, don’t bother with this one. It is for those who venture a little deep into it. And if you are really interested in knowing what exactly it is you read about it in this excellent article at addictivetips.com.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    Partitions – Don’t get confused when someone says ‘ROM partitions should be ext4 or Reiserfs’. Partitioning is dividing the internal memory of the handset, and ext4/reiserfs are the file systems. Like in case of Windows, fat32 and ntfs.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    Bootloader – Again, if you are linux user I don’t need to explain you this, but for the ignorant ones, bootloader is what loads the kernel into the main memory so that it can interact with hardware. I won’t go deep into how it works, but would point out that the moment your device starts the first thing that comes up after powering on is Bootloader, which loads the modules of kernel in memory.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Ok enough of complex stuffs, let me tell you about the applications you might need if you think of flashing.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    Odin – Its a Windows application which interacts with the device at hardware level and can write on ROM (Read only memory) of the handset.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    CWM – Clockwork Mod is an application installed on android device that manages the ROM(the stack) installed in the system. It can be used to install or backup the roms.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;This is more than enough information for one read. If you wish to know more about your handset post your queries here and I will guide you to right place. Also for most of HTC/Samsung/Motorola phones the best place to venture is XDA Forum.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Facebook tracks what you do online even when you're logged out</title><link>http://computers4you.blogspot.com/2011/09/facebook-tracks-what-you-do-online-even.html</link><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 27 Sep 2011 01:27:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-3958727560737536171</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;&lt;span style="font-family: arial;"&gt;Facebook tracks what you do online even when you're logged out&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;An Australian technologist has claimed that Facebook can track the web pages you visit, even when you are logged out of the social networking giant.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;According to Wollongong-based Nik Cubrilovic, when the user is logged out of Facebook, rather than deleting its tracking cookies, the site merely modifies them, maintaining account information and other unique tokens that can be used to identify its users.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;This simply means that any time you visit a web page with a Facebook button or widget, your browser is still sending personally identifiable information back to Facebook.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;"Even if you are logged out, Facebook still knows and can track every page you visit," Cubrilovic wrote in a blog post.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;"The only solution is to delete every Facebook cookie in your browser, or to use a separate browser for Facebook interactions," he added.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;Cubrilovic said he tried to contact Facebook to inform it of his discovery but did not get a reply, the Sydney Morning Herald reports.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;He said there were significant risks to the privacy of users, particularly those using public terminals to access Facebook.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;"Facebook are front-and-centre in the new privacy debate just as Microsoft were with security issues a decade ago," Cubrilovic said.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-family: arial;"&gt;"The question is what it will take for Facebook to address privacy issues and to give their users the tools required to manage their privacy and to implement clear policies - not pages and pages of confusing legal documentation, and 'logout' not really meaning 'logout'," he added. (ANI)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>HTTP Status codes explained</title><link>http://computers4you.blogspot.com/2011/08/http-status-codes-explained.html</link><category>Articles</category><category>General Information on Computers</category><category>j</category><category>Little Tips</category><category>Troubleshoot</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 15 Aug 2011 15:23:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-7643698034453371342</guid><description>&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-weight: bold; color: rgb(153, 0, 0);font-size:130%;" &gt;Different Types of HTTP Status Codes&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;What is an HTTP status code and why should you care about them, if you have a website or a blog?
&lt;br /&gt;
&lt;br /&gt;Whenever you enter the address of a webpage in your browser’s address bar, the browser requests data from the server where the page is originally hosted. The web server returns the data but before the browser receives and renders the data at the clients end, an HTTP header is returned by the web server that has the status code of the given page.
&lt;br /&gt;
&lt;br /&gt;In general, HTTP status codes are not meant for human visitors but both desktop and mobile browsers use this information to know more about the present condition of the webpage in question. If the page is in a healthy state, the HTTP status code returned should be a 200 OK. If the page has been moved to a new address, the HTTP status code should be 301 and so on.
&lt;br /&gt;
&lt;br /&gt;There are lots of different HTTP status codes in place and the following table should explain what are the different types of HTTP header responses and their purpose in brief detail:
&lt;br /&gt;
&lt;br /&gt;&lt;/span&gt;  &lt;table border="1" cellpadding="0" cellspacing="0" width="729"&gt;&lt;colgroup&gt;&lt;col style="mso-width-source:userset;mso-width-alt:4315;width:89pt" width="118"&gt;  &lt;col style="mso-width-source:userset;mso-width-alt:5522;width:113pt" width="151"&gt;  &lt;col style="mso-width-source:userset;mso-width-alt:14518;width:298pt" width="397"&gt;  &lt;col style="mso-width-source:userset;mso-width-alt:2304;width:47pt" width="63"&gt;  &lt;/colgroup&gt;&lt;tbody&gt;&lt;tr style="height:26.25pt" height="35"&gt;   &lt;td class="xl23" style="height:26.25pt;width:89pt" height="35" width="118"&gt;HTTP   Status code&lt;/td&gt;   &lt;td class="xl24" style="border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Type&lt;/td&gt;   &lt;td class="xl24" style="border-left:none;width:298pt" width="397"&gt;Description&lt;/td&gt;   &lt;td class="xl25" style="border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Link Juice&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:13.5pt" height="18"&gt;   &lt;td class="xl31" style="height:13.5pt;width:89pt" height="18" width="118"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl32" style="border-left:none;width:113pt" width="151"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl32" style="border-left:none;width:298pt" width="397"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl33" style="border-left:none;width:47pt" width="63"&gt;
&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:12.75pt" height="17"&gt;   &lt;td colspan="4" class="xl34" style="border-right:1.0pt solid black;   height:12.75pt;width:547pt" height="17" width="729"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Redirected&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;300&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Redirection&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is waiting for an action from the user so that it can fetch a new   resource&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Depends&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:12.75pt" height="17"&gt;   &lt;td class="xl26" style="height:12.75pt;border-top:none;   width:89pt" height="17" width="118"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;301*&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Redirected&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   old page has permanently moved to a new web address&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;302&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Redirected&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   old page has temporary moved to a new location but the user should continue   using the old URL later&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:38.25pt" height="51"&gt;   &lt;td class="xl26" style="height:38.25pt;border-top:none;   width:89pt" height="51" width="118"&gt;303&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Conditional   redirection&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   user is requested to do some action (GET request) so that the current page   may redirect to another resource. The GET request&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;
&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:12.75pt" height="17"&gt;   &lt;td class="xl26" style="height:12.75pt;border-top:none;   width:89pt" height="17" width="118"&gt;is conditional.&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;
&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;304&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Conditional   redirection&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   user has performed some action (conditional GET request) but the current page   was not modified.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;305&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Redirected&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   user can only access the requested page using a proxy.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:39.0pt" height="52"&gt;   &lt;td class="xl28" style="height:39.0pt;border-top:none;   width:89pt" height="52" width="118"&gt;306&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Redirected&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is fetching the page from another location but it will soon fetch the   page from its older source. This status code is rarely used over a 302.&lt;/td&gt;   &lt;td class="xl30" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:13.5pt" height="18"&gt;   &lt;td colspan="4" class="xl37" style="border-right:1.0pt solid black;   height:13.5pt;width:547pt" height="18" width="729"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Successful&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:12.75pt" height="17"&gt;   &lt;td class="xl43" style="height:12.75pt;width:89pt" height="17" width="118"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;200 **&lt;/td&gt;   &lt;td class="xl44" style="border-left:none;width:113pt" width="151"&gt;Success&lt;/td&gt;   &lt;td class="xl44" style="border-left:none;width:298pt" width="397"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;The server has processed the webpage   correctly.&lt;/td&gt;   &lt;td class="xl45" style="border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;201&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Success&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server has processed the requested page and created a new page or resource   during the request.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Depends&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;202&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Partial success&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server has received the request for the webpage and is currently processing   it.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;203&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Partial success&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server has received the request for the webpage and it is waiting for a   resource from another page.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;204&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Partial success&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server processed the request for the webpage but no content has been returned   due to an error.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;205&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Partial success&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;Same   as 204 but this time the server is waiting for the user to complete a   specific action.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:13.5pt" height="18"&gt;   &lt;td class="xl28" style="height:13.5pt;border-top:none;   width:89pt" height="18" width="118"&gt;206&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;partial Success&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server received a partial GET request from the user.&lt;/td&gt;   &lt;td class="xl30" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:12.75pt" height="17"&gt;   &lt;td class="xl40" style="height:12.75pt;width:89pt" height="17" width="118"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl41" style="border-left:none;width:113pt" width="151"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl41" style="border-left:none;width:298pt" width="397"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl42" style="border-left:none;width:47pt" width="63"&gt;
&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:13.5pt" height="18"&gt;   &lt;td colspan="4" class="xl46" style="border-right:1.0pt solid black;   height:13.5pt;width:547pt" height="18" width="729"&gt;Request Errors&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl43" style="height:25.5pt;width:89pt" height="34" width="118"&gt;400&lt;/td&gt;   &lt;td class="xl44" style="border-left:none;width:113pt" width="151"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Fail&lt;/td&gt;   &lt;td class="xl44" style="border-left:none;width:298pt" width="397"&gt;Wrong syntax   sent by the user&lt;/td&gt;   &lt;td class="xl45" style="border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;401&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Authentication   required&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   page is behind a login and/or requires an authentication from the user.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;403 ***&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Forbidden&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server denied the request.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;404&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Page   does not exist&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   requested page is not found on the server.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;405&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Not   allowed&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is not allowing any request to the page for this user.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;406&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Not   allowed&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server can’t respond to the request at this time.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;407&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Proxy   required&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   resource must be requested via a proxy.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;408&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Timed   out&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server timed out performing the request.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;409&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Conflict&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   user’s action has given rise to a conflict of resource.&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:26.25pt" height="35"&gt;   &lt;td class="xl28" style="height:26.25pt;border-top:none;   width:89pt" height="35" width="118"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;410 #&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Permanently   removed&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   page has been permanently removed from the server.&lt;/td&gt;   &lt;td class="xl30" style="border-top:none;border-left:none;width:47pt" width="63"&gt;&lt;span style="mso-spacerun:yes"&gt; &lt;/span&gt;Not carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:13.5pt" height="18"&gt;   &lt;td class="xl49" style="height:13.5pt;width:89pt" height="18" width="118"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl50" style="border-left:none;width:113pt" width="151"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl50" style="border-left:none;width:298pt" width="397"&gt;
&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl51" style="border-left:none;width:47pt" width="63"&gt;
&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:12.75pt" height="17"&gt;   &lt;td colspan="4" class="xl52" style="border-right:1.0pt solid black;   height:12.75pt;width:547pt" height="17" width="729"&gt;Server Errors&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;500&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Internal   Server error&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is facing issues with some internal configuration and thus unable to   fulfill the request at this time&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;Not   carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;501&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Not   recognized&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is not equipped to understand the type of request sent&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;Not   carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;502&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Bad   gateway&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;While   fulfilling the current request, the server received an incorrect response   from its upstream server&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;Not   carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;503&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Server   not available&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is facing downtime or is currently unavailable&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;Not   carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:25.5pt" height="34"&gt;   &lt;td class="xl26" style="height:25.5pt;border-top:none;   width:89pt" height="34" width="118"&gt;504&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Gateway   timeout&lt;/td&gt;   &lt;td class="xl22" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is acting as a gateway or a proxy server to another resource and didnt   received a timely request from the user&lt;/td&gt;   &lt;td class="xl27" style="border-top:none;border-left:none;width:47pt" width="63"&gt;Not   carried&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height:26.25pt" height="35"&gt;   &lt;td class="xl28" style="height:26.25pt;border-top:none;   width:89pt" height="35" width="118"&gt;505&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:113pt" width="151"&gt;Server   does not support protocol&lt;/td&gt;   &lt;td class="xl29" style="border-top:none;border-left:none;width:298pt" width="397"&gt;The   server is not configured to support the HTTP protocol version that is used in   the request&lt;/td&gt;   &lt;td class="xl30" style="border-top:none;border-left:none;width:47pt" width="63"&gt;Not   carried&lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;
&lt;br /&gt;* This is the only way to tell search engines that your old page has moved to a new location and the newer URL should be re-crawled and re-indexed. Only this server header preserves link juice and Google Pagerank but remember that if the page is part of a redirect chain, a considerable portion of the PR may be lost overtime.
&lt;br /&gt;
&lt;br /&gt;** This should be normally the HTTP status code returned by a webpage if it’s static in nature and needs no GET request from the user.
&lt;br /&gt;
&lt;br /&gt;*** If any of your pages return a 403 HTTP status code, it means that your web server denied the request of the page to Googlebot and human visitors. A possible case is when your web host is facing downtimes or it is blocking spiders and search bots from accessing some parts of your website, so you should be careful about it.
&lt;br /&gt;
&lt;br /&gt;# This is similar to a 404 error but the standard practice is to 301 redirect the missing page to it’s newer location. If the page has no new location, it is recommended to return a 410. If you have temporarily removed the page from the server, use a 503 instead.
&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>4G wait till early next year</title><link>http://computers4you.blogspot.com/2011/07/4g-wait-till-early-next-year.html</link><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 26 Jul 2011 19:37:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-5114996641976653475</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;4G wait till early next year&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;High-speed mobile and Internet services, using fourth-generation (4G) technology, will be rolled out only by early next year as operators are still in talks with equipment vendors.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Operators are expected to finalise contracts by the third quarter of 2011 (October-December) and start rolling out services by early 2012, "when consumer demand and operator ecosystem will be in place".&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"By the end of this year, the entire ecosystem for effective rollout of 4G in India will be in place, including handsets, data cards and networks," said Ying Weimin, president of GSM, UMT and LTE network at Huawei.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Long-term evolution (LTE) technology, or 4G, allows data downloads at higher speeds. Essentially, a four-minute song can be downloaded in four seconds.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Beginning with metros and high revenue earning circles, 4G is expected to spread to other towns and cities and attain pan-India coverage over a period of two years.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"The business model that is emerging is that operators will sign up 2-3 equipment vendors and give rollout contracts for different telecom circles," said an operator gearing up to launch 4G. The potential deal size is expected to range between $250 million and $4 billion for a single contract.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;According to industry experts, Mukesh Ambani's Reliance Industries-owned Infotel, being the only pan-India 4G player, is expected to set the trend in service rollout and tariffs.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"All operators are waiting to see how Infotel forges alliances with vendors and deploys the new technology," experts said.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Infotel has won licences in 22 circles. Others to bag licences are Aircel (8), Bharti Airtel and Qualcomm (4), Delhi-based Tikona (5) and UK-based Augere (1).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Mukesh Ambani is likely to align Infotel's rollout with the global 4G road map, under which countries such as the US, South Africa and Latin America will go live between 2011-end and mid-2012, experts said.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Though the migration of millions of mobile users to the 4G network will initially be slow because of the lack of affordable LTE-enabled handsets and devices, industry players are optimistic about a fast uptake.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"Prices will gradually decrease as more subscribers opt for LTE. We experienced a surge in 2G and 3G mobile telephony with reduction in handset prices. The same can be expected of LTE in a shorter period because of the rapidly maturing ecosystem," said Mark Atkinson, head of global LTE sales at Nokia Siemens Network.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>India starts blocking file storage websites in a move against piracy</title><link>http://computers4you.blogspot.com/2011/07/india-starts-blocking-file-storage.html</link><category>communication</category><category>Network and Computer Security</category><category>Networking</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 23 Jul 2011 11:57:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-5021837876263674185</guid><description>&lt;div style="text-align: justify; font-weight: bold; color: rgb(0, 0, 0);"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-size:130%;"&gt;&lt;span style="color: rgb(153, 0, 0);"&gt;India starts blocking file storage websites in a move against piracy&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;File storage websites such as Megaupload, Putlocker, Rapidshare are being blocked in India.&lt;br /&gt;&lt;br /&gt;A thread started on a popular online forum focused on developments in Indian broadband has furious and surprised users sharing a list of websites blocked by their Internet service providers. Going through the thread and my Twitter interactions, India’s Department of Telecommunication is behind the block.&lt;br /&gt;&lt;br /&gt;Some users say they are not able to browse the file uploading websites, others say they can access and download content. A screenshot shared by Sunny Chahal on Twitter confirms that the block is in effect. Some other users are seeing the same notice. The error message:&lt;br /&gt;&lt;br /&gt;Users of popular Internet Service Providers MTNL, BSNL and Airtel have confirmed seeing the same error while visiting some or all of the following websites:&lt;br /&gt;&lt;br /&gt;Megaupload.com&lt;br /&gt;Mediafire.com&lt;br /&gt;Megavideo.com&lt;br /&gt;VideoBB.com&lt;br /&gt;Novamov.com&lt;br /&gt;Movshare.net&lt;br /&gt;Rapidshare.com&lt;br /&gt;Putlocker.com&lt;br /&gt;Hotfile.com&lt;br /&gt;Fileserve.com&lt;br /&gt;Filesonic.com&lt;br /&gt;Filesonic.in&lt;br /&gt;Depositfiles.com&lt;br /&gt;Wupload.com&lt;br /&gt;&lt;br /&gt;The decision behind banning the websites looks like piracy. Most of these websites are widely used to  share content production houses and record labels would want users to pay for. Users are comparing the ban to Internet rules in China. The Department of Homeland Security in the US also made definitive moves against piracy by seizing domains of websites hosting pirated content.&lt;br /&gt;&lt;br /&gt;As of now there is no official word from the DoT, the story will be updated as we get more information.&lt;br /&gt;&lt;br /&gt;Update: Reliance BIG Pictures obtained a court order to get the sites banned. Users are reporting that most of these websites are now working.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Multi-billion-dollar military computer system suffers bugs</title><link>http://computers4you.blogspot.com/2011/07/multi-billion-dollar-military-computer.html</link><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 20 Jul 2011 20:52:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-8639947800037050724</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Multi-billion-dollar military computer system suffers bugs&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The Army’s $2.7 billion computing system designed to share real-time intelligence with troops fighting in Afghanistan and Iraq reportedly doesn’t work and efforts to fix it haven’t been successful, according to recent published reports.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;In fact, the system has hurt, rather than helped, efforts to fight insurgents because it doesn’t work properly, POLITICO reported last month.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Recent comments from analysts came after the top military intelligence officer in Afghanistan and members of Congress tried for the past two years to get the Army to consider alternatives to the system, according to documents obtained by POLITICO.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Analysts and former officers reportedly have said the computer system is unable to perform simple analytical tasks, prone to crashes and frequently goes off-line.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"There’s a lot of bugs in the workflow," one of the officers said.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The Army computer system is a cloud-based network designed to collect information from multiple sources for real-time analysis by battlefield commanders, according to POLITICO. For example, a commander searching for an insurgent leader would benefit from being able to collect reports of that leader's locations and plot them on a map to make tracking easier. However, the search tool made finding the reports difficult and the mapping software was not compatible.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;After seeing a memo from the top military intelligence officer in Afghanistan regarding the faulty system, lawmakers sought urgent funding in fiscal 2011 for an alternative system. According to Extreme Tech, the Army refused, and instead rolled out a software update that was meant to fix any issues. Unfortunately, according to the former intelligence officers, the system is still unusable.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;While it’s not likely to solve the Army's computer woes, certain specialized computer tools can make a world of difference in average PC users' lives.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Several tools are available that automatically maintain your computer and help it retain peak performance.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Boost Weak Cell Service at Home: Your Options</title><link>http://computers4you.blogspot.com/2011/07/boost-weak-cell-service-at-home-your.html</link><category>Articles</category><category>communication</category><category>Connectivity Technology</category><category>General Information on Computers</category><category>Hardware</category><category>Network and Computer Security</category><category>Networking</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 18 Jul 2011 23:47:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-3111139445152340607</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:180%;" &gt;Boost Weak Cell Service at Home: Your Options&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;Even the best wireless networks often can't deliver a consistent signal inside your house. Femtocells and repeaters will usually help, but they'll cost you. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The problem is familiar to many cell phone users: When you're indoors, even within your carrier's coverage area, the network's signal sometimes simply isn't strong enough to support voice calls or data services. With so many consumers ditching their landlines for cell phones, poor reception at home is no longer acceptable. Fortunately, a slew of products now address the problem, though they don't come cheap.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Ssignal-boosting products generally fall into one of two categories: femtocells or signal repeaters. Both types of equipment can deliver strong signals within buildings, but they work in fundamentally different ways.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Femtocells act as miniature cell phone towers that connect to a home network router and use your wired broadband connection to move voice calls and data services to and from your carrier's network. Femtocells don't rely on the carrier's towers at all, but because they use technology that can direct data and calls back to the carrier networks over the Internet, most of them are sold by the carriers themselves.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Repeaters and boosters, on the other hand, amplify and rebroadcast cell tower signals. Since they don't require carrier support, they tend to be manufactured and sold by third parties such as Wi-Ex (under the brand name ZBoost) and Wilson Electronics.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Understanding Femtocells&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;While repeaters have been around for several years, femtocells are relative newcomers to the mobile scene. Of the four major U.S. carriers, two--Sprint and Verizon--have been selling femtocells (under the brand names Airave and Network Extender, respectively) for the past few years; AT&amp;amp;T introduced its 3G MicroCell femtocell last year. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The first Sprint and Verizon Wireless femtocells supported only voice calls, but current models support high-speed data as well as voice. Sprint charges $130 for its Airave access point (with a two-year service plan); there's no additional charge for using Airave to enhance coverage with an existing plan, but Sprint does offer a $25-a-month unlimited calling plan for Airave calls--which might appeal to anyone who is considering dropping landline voice service. Current Airave access points support EvDO Rev. A 3G data speeds and up to six simultaneous calls.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Verizon Wireless charges $250 for its Network Extender, which also supports 3G data, and the carrier imposes no monthly service fee. AT&amp;amp;T sells the MicroCell for $150, also with no mandatory service fee; it also offer an optional $20-a-month unlimited calling plan, plus price breaks for customers who sign up for the company's DSL service.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;The Beauty of the Femtocell&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/-GxWQcCzg0LY/TiR44WKx1gI/AAAAAAAADcA/nBDPp7BFl00/s1600/AT%2526T%2527s%2B3G%2BMicroCell%252C%2Bmade%2Bby%2BCisco.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 180px; height: 270px;" src="http://1.bp.blogspot.com/-GxWQcCzg0LY/TiR44WKx1gI/AAAAAAAADcA/nBDPp7BFl00/s400/AT%2526T%2527s%2B3G%2BMicroCell%252C%2Bmade%2Bby%2BCisco.jpg" alt="" id="BLOGGER_PHOTO_ID_5630758343538759170" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="image ltsm"&gt;&lt;span class="artCaption"&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style="text-align: center;"&gt;&lt;span class="image ltsm"&gt;&lt;span class="artCaption"&gt;&lt;blockquote&gt;AT&amp;amp;T's 3G MicroCell, made by Cisco.&lt;/blockquote&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class="image ltsm"&gt;&lt;span class="artCaption"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Femtocells appeal to consumers and carriers on several levels. Consumers like them because they provide immediate five-bar coverage across an area of up to 2500 square feet, regardless of how far you are from a cell phone tower. A strong signal typically means better voice quality, fewer dropped calls, and faster data speeds. Good signals also improve a phone's battery life, since its radios don't have to work as hard. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/-Ixg95hIvGTk/TiR44OipixI/AAAAAAAADb4/2sokduodkmM/s1600/Femtocells%2Bare%2Blow-power%2Bwireless%2Baccess%2Bpoints%2Bthat%2Boperate%2Bwithin%2Ba%2Blicensed%2Bspectrum%2Bto%2Bconnect%2Bstandard%2Bmobile%2Bdevices%2Bto%2Ba%2Bmobile%2Boperator%25E2%2580%2599s%2Bnetwork%2Bvia%2Bresidential%2BDSL%2Bor%2Bcable%2Bbroadband%2Bconnections..jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 350px; height: 150px;" src="http://4.bp.blogspot.com/-Ixg95hIvGTk/TiR44OipixI/AAAAAAAADb4/2sokduodkmM/s400/Femtocells%2Bare%2Blow-power%2Bwireless%2Baccess%2Bpoints%2Bthat%2Boperate%2Bwithin%2Ba%2Blicensed%2Bspectrum%2Bto%2Bconnect%2Bstandard%2Bmobile%2Bdevices%2Bto%2Ba%2Bmobile%2Boperator%25E2%2580%2599s%2Bnetwork%2Bvia%2Bresidential%2BDSL%2Bor%2Bcable%2Bbroadband%2Bconnections..jpg" alt="" id="BLOGGER_PHOTO_ID_5630758341491395346" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="image large"&gt;&lt;span class="artCaption"&gt;&lt;/span&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span class="image large"&gt;&lt;span class="artCaption"&gt;Femtocells are  low-power wireless access points that operate within a licensed spectrum  to connect standard mobile devices to a mobile operator’s network via  residential DSL or cable broadband connections. &lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="font-weight: bold;"&gt;Another benefit:&lt;/span&gt; You can configure the femtocell to recognize and prioritize the phones you authorize, so neighbors can't mooch off your service at your expense. Interestingly, Verizon Wireless's FAQ for its Network Extender says that, though you can prioritize up to 50 Verizon Wireless numbers, the device will remain available to all Verizon Wireless subscribers within range when priority numbers aren't using it.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;This brings us to a big reason why wireless providers like femtocells: They offload some of the expense that the carriers might otherwise incur in order to expand network capacity and/or coverage. Femtocells also help retain customers in locations where carriers can't significantly improve reception on their own (such as basements, suburbs that don't want new cell towers, locales with difficult topography such as steep hills and valleys, and skyscrapers with thick walls). In fact, forum posts indicate that Sprint has occasionally given customers Airave units to keep them from switching to another carrier. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;Femtocell Weaknesses&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Price aside, femtocells have some limitations. For one thing, you can use a femtocell only at the address where it is registered. To enforce that restriction, the FCC stipulates that all femtocells must be equipped with GPS receivers, and that they either must be placed close enough to a window to receive GPS signals directly or must be connected to a GPS antenna that can pick up the signals.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;David Nowicki, marketing vice president for femtocell vendor Airvana and for the Femto Forum trade association, says that the FCC imposed the location restriction to enable carriers to track the femtocell's position and disable its operation in areas where the carrier doesn't own the frequencies that the femtocell supports and where, consequently, using the femtocell might interfere with another carrier's network. Even so, forum posts suggest that femtocells sometimes hurt neighbors' regular network reception when deployed in close proximity.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Then again, it’s not necessarily a bad thing that femtocells are aware of their location. That, coupled with the device's ability to recognize when an authorized phone is nearby, could enable carriers to offer customers additional services that go beyond improving reception, including 911 services.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Network handoff issues are another concern. You can start a call on femtocell service and then hand it off to the regular network as you leave the femtocell's coverage area (assuming that the nearest cell tower is close enough). But calls initiated on the regular network can't be handed off to a femtocell.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;And finally, critics complain about having to pay for a service that essentially deliver what the wireless network is supposed to have provided all along. "It's a fair point," Nowicki concedes. But carrier spokespeople say that no carrier can provide coverage in all locations of its service area. Verizon Wireless spokesperson Thomas Pica describes the Network Extender as a "niche product," given that the vast majority of Verizon customers don't need one because of the carrier's robust network.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;What about the broadband ISP that now gets to carry the wireless carrier's traffic? Nowicki says that the bandwidth consumption of mobile devices is tiny compared to that of most home and office networks. For that reason, femtocells don't impose a significant burden on the ISP, which in some cases is run by the same company as the mobile carrier anyway.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;T-Mobile’s Approach&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;T-Mobile has taken a different approach to improving weak cell signals. Phones that support Wi-Fi Calling use UMA (Unified Mobile Access) technology to route calls over Wi-Fi hotspots. T-Mobile notes that this helps with calls made through any hotspot that its phones can access, and not just at a single location (which is the case with femtocells). However, T-Mobile's Android phones can't hand off calls made using Wi-Fi hotspots to T-Mobile's cellular network; other phones that support Wi-Fi Calling can. T-Mobile has no announced plans to introduce femtocells, but a spokesperson says that the carrier continues to review customer equipment options for improving coverage.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:100%;" &gt;Repeaters and Boosters&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Repeaters (also called "boosters")--the other class of products designed to improve poor cell reception--depend on at least a weak cell tower signal to amplify and rebroadcast. They work with specific frequencies, independent of carrier; some support more than one frequency. On the frequencies they support, repeaters improve both voice calls and data speeds. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Many repeaters have multiple parts, starting with an antenna that you place as close as possible to the strongest cell tower signal--typically, near a window or even outdoors. The antenna transmits signals over a cable connected to an amplifier, which boosts the signal and retransmits it indoors. In some cases, the amplifier and indoor antenna are integrated; in others, the amplifier hooks up to a separate, centrally located indoor antenna in the home or office. The area of coverage depends on the strength of the amplifier and of the signal being amplified.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Unlike femtocells, repeaters can't be configured to recognize specific phones. Consequently, the amplified signals benefit any mobile device within range that operates on the supported frequencies--though obviously the owner's devices are more likely to benefit than a neighbor's devices located farther away from the indoor antenna. It's up to you (with the help of your reseller) to ensure that your repeater kit amplifies the frequency or frequencies that your carrier uses in your area. You can get help in choosing the right repeater kit from specialty retailers such as wpsantennas.com or RepeaterStore.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Repeaters Don’t Come Cheap&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Repeater kits can be more expensive than femtocells. Pricing depends on how large an area you want to cover. Wi-Ex's ZBoost line includes SoHo products that range in price from $169 to $399, and you can spend up to $600 for kits that cover areas larger than 2500 feet--the maximum handled by femtocells. On the other hand, Wi-Ex marketing vice president Sharon Cupett notes, there are no monthly fees for repeaters--and of course, no broadband service is involved.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Though repeaters rebroadcast over carrier-owned frequencies, they are legal if they don't interfere with cell tower signals (which is why repeater signals have limited strength). One way to avoid problems is to look for FCC-certified repeaters; some are still awaiting approval, however. Check with the reseller.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Repeater vs. Femtocell&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Should you get a repeater or a femtocell? Generally, femtocells are a good match for cell phone customers with broadband service who don't want to pay $300 or more for equivalent repeater coverage and who want to avoid many of the antenna-positioning hassles that repeaters entail. You do need a GPS signal, but those are available pretty much everywhere. Cell tower sites with signals that repeaters can work with are probably less common. But if your carrier doesn't offer a femtocell, a repeater may be the only way to improve your indoor coverage. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/-GxWQcCzg0LY/TiR44WKx1gI/AAAAAAAADcA/nBDPp7BFl00/s72-c/AT%2526T%2527s%2B3G%2BMicroCell%252C%2Bmade%2Bby%2BCisco.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>iPhone 5 Rumor Review</title><link>http://computers4you.blogspot.com/2011/07/iphone-5-rumor-review.html</link><category>News</category><category>Reviews</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 18 Jul 2011 22:59:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-2605999549352204365</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:180%;" &gt;iPhone 5 Rumor Review&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;July is half over and still no sign of The Next iPhone.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The iOSsphere has been seething over conflicting rumors about when It will be announced, and released, about unbuttoning, panning, and the masses who still long for whatever it is Apple will be announcing soon or not so soon but, whenever, not soon enough.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;span style="color: rgb(153, 0, 0);font-size:100%;" &gt;&lt;span style="font-weight: bold;"&gt;First an award: &lt;/span&gt;&lt;/span&gt;This week's "Most Creative Use of Pure Puffery in Advancement of Rumormongery" goes to the TFTS website. The site ran a "story" about the fact that an iPhone 5, or iPhone5/4S, or a prop or a fake (it used all these terms) appeared in the hands of a fictional CIA spy in the USA Network show "Covert Affairs."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0);font-size:130%;" &gt;SLIDESHOW: Inside iOS 5&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"Of course we wouldn't necessarily call a poor TV prop a source, especially one that's featured in a TV show that has nothing to do with reality," writes Chris Smith.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Of course we wouldn't necessarily let that stand in the way of writing a story about it, especially one that has nothing to do with reality. We're dealing with rumors, after all. TFTS even posted an image captured from the TV screen of this fake marvel.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;So even though it has nothing to do with reality, it is at least a real fake.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"It's pretty clear that we're looking at an iPhone," Smith notes, missing his own point that it's a TV show prop. "We also have what appears to be an edge-to-edge display, a feature that's expected [i.e., rumored] to be part of the next-gen iPhone."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;As he says, "That's definitely an odd choice for a product placement" and "one has to wonder whether Apple has approved this message in any way." One does indeed. Smith seems concerned, even outraged, that Apple would let this happen. "So how can Apple sit by and allow such a monstrosity to be shown on TV, especially since the next iPhone may very well have certain similar features to the one presented on 'Covert Affairs.'"&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;It says something about something that Smith or anyone else would notice a smartphone when the show's lead character, a novice CIA spy named Annie Walker, is played by Piper Perabo.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;iPhone 5 is arriving: in fact, on August 16.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Gekko, a British firm that specializes in retail sales optimization, posted an ad this week on behalf of its client Apple for "full-time iPhone Sales Staff for an exciting project to work 5 days a week (Tuesday-Saturday) for the period 16th August - 29th October within key retail stores."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;And that can only mean one thing, according to CNET UK, which was sent a link to the job posting by a tipster: "It sounds as if Apple is looking to bolster its sales staff, and the only reason we can think is that there's a big product launch on the horizon."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;And that, in turn, can only mean one thing: the launch of the iPhone 5. What could be bigger than that?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;iPhone 5 is not arriving soon.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;That's because the Magical A5 dual-core, Apple-designed CPU is overheating.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;9to5Mac reports this rumor while encouraging readers to ignore it: "We're taking this one with a healthy dose of skepticism (and so should you) ..."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;But "purely for the sake of the discussion" or page views, it reports, "Straight from Chinese-language site Sohu.com comes a story of an iPhone 5 delay blamed on the A5 chip overheating."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;There's an "if" here: "If machine translation [i.e., the use of Google Translate] is to be believed, that's why Apple pushed back the next iPhone launch from the usual June-July timeframe into the late August-early September timeframe. The story has it that Apple's silicon team is facing difficulties keeping the dual-core A5 chip cool in the iPhone's tiny enclosure where space and battery are at premium."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Worriedly, 9to5Mac wonders, "If there's any substance to this story, what then (if anything) will Apple release come this Fall?"&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;That would be the mythical iPhone 4S, a "modest upgrade" to the current iPhone 4, designed to keep customers happy until the Apple chip boffins figure out how to make the cool chip actually ... cool.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0); font-weight: bold;font-size:100%;" &gt;Internally, AT&amp;amp;T confirms release date for iPhone 5. Kind of.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Here's the quoted portion of the purported AT&amp;amp;T memo: "All customers enrolling in MI must be advised of the pending MRC increase from $4.99 to $6.99 [...] This occurs on October 4, 2011, in conjunction with a new tier, Device Tier 3, that is $199. iPhone and other devices will move to this tier on October 4, 2011."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;This is something most of us would just blankly pass over, but the keen minds at Uberphones plumbed the depths to read the tea leaves.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;MI stands for "mobile insurance" and MRC stands for "mobile recurring charge." Admittedly, knowing that doesn't help much, either. But Uberphones says the memo "may have accidentally leaked the date" of iPhone 5, since it's widely expected to be announced in September (unless you believe other rumors; see above).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"This seems like quite a coincidence," according to Uberphones.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;But we all know, we just know, that when it comes to Apple, there are no coincidences.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;iPhone 5 may be almost completely unbuttoned.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Or at least you won't have to use them, buttons being so unvirtual.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The newest release of the iOS 5 beta release has an upgraded "AssistiveTouch" capability, as part of the platforms "accessibility" feature, according to 9to5Mac. But this has Big Implications.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"The feature takes the previously available custom gesture support to the next level and brings a new control panel," the website says. "This control panel is an accessibility feature -- but also has applications as a replacement for the iPad and iPhone's hardware buttons."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;A swipe activates the control panel, causing what the story calls a "heads-up-display type of menu" to appear. With that menu, a "user can rotate the screen orientation, control the device's volume, 'shake' the device (is an API for developers in applications), lock the display and more.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"We realize that this is an accessibility-feature, but this is something that can come in handy for just about anybody. Apple has started to wean off the need for home button usage for iPad users, and this accessibility-feature can technically turn into a replacement for all of the iPad's (and iPhone/iPod touch's) hardware buttons."&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(153, 0, 0);font-size:130%;" &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;iPhone 5 panoramic camera will require manual intervention!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Gadget site T3.com says it dug up more details in the iOS 5 beta code that show how the phone's expected panoramic camera will work. The panoramic feature was first noted after Apple unveiled iOS 5 in June.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The latest beta code reveals that to use this photo enhancement, "users will need to pan their device from left to right, 'tap the Camera button to begin' and 'keep the arrow on the center line.'"&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Next: detailed instructions on how to pan from left to right.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0); font-weight: bold;font-size:100%;" &gt;Spreading the magic: iPhone 5 for Sprint and T-Mobile users.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Having deigned to released iPhone 4 on Verizon this year, Apple might be equally gracious to the remaining NotQuiteAsBig Two mobile networks.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"While we remain uncertain regarding the next-generation iPhone's specs and features, we believe the most noteworthy change could be the device's ability to run on more networks, specifically Sprint and T-Mobile in the U.S," said Piper Jaffray stock analyst Chris Larsen, in a research note reported on by CNET.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"A move to all four national carriers would greatly expand Apple's ability to reach the masses, critical at a time when smartphones running on Google's Android software have overrun the market," according to CNET. "Adding Sprint and T-Mobile would increase Apple's addressable market by 30 percent, Larsen said."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0); font-weight: bold;font-size:100%;" &gt;Speaking of the masses, Apple plans to sell 25 million iPhone 5 units in 2011.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;So that would be in the three- to five-month period that the phone actually is on sale, depending on which availability date you like (see above).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;This estimate comes from a Wall Street Journal story via iPhone5Released.com. The Journal cited "unnamed sources at Apple's suppliers," one of whom said "Apple's sales estimates of the new iPhone is quite aggressive. It told us to prepare to help the company meet its goal of 25 million units by the end of the year. The initial production volume will be a few million units ... we were told to ship the components to [Taiwanese] assembler Hon Hai [technically, its Foxconn subsidiary] in August."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The website says Apple sold 3 million iPhone 4 units in the first three weeks of its release last year and in the most recent quarter, sold 18.65 million iPhones, including some number of older 3GS models.&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>IE Wins Malware-Blocking Tests</title><link>http://computers4you.blogspot.com/2011/07/ie-wins-malware-blocking-tests.html</link><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 18 Jul 2011 22:57:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-7598196060030184158</guid><description>&lt;div style="text-align: justify; color: rgb(0, 0, 0);"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-weight: bold; color: rgb(153, 0, 0);font-size:130%;" &gt;IE Wins Malware-Blocking Tests&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The in-house reputation system used in Internet Explorer 8 and 9 is markedly superior at blocking social-engineering attacks than the Google equivalent used by Chrome, Firefox, Apple's Safari, an independent test by NSS Labs has found.&lt;br /&gt;&lt;br /&gt;Rating the browsers against a sample set of European malware URLs over 19 days in April, IE 8 achieved a mean block rate of 90 percent, leaving Chrome 10, Firefox 4 and Safari 5 in the dust on 13 percent each. Opera, which uses technology from antivirus company AVG, came in last on 5 percent.&lt;br /&gt;&lt;br /&gt;When assessing IE 9 with application filtering turned on, the results were even more dramatic, taking that version to a mean blocking rate of 100 percent.&lt;br /&gt;&lt;br /&gt;Internet Explorer's positive showing appears to be thanks to two embedded technologies; Smartscreen URL Filter, a cloud-based system that checks URLs against a master database. This is present in both IE 8 and 9 and seems to work more or less identically in both.&lt;br /&gt;&lt;br /&gt;In addition, IE 9 has added a second system, SmartScreen Application Reputation which on the basis of this test offers browser users a remarkably effective level of download block protection. Chrome, Firefox and Safari all use a rival URL checking system, Google's Safe Browser Feed, which as previous NSS Labs tests have suggested, is now falling some ways behind.&lt;br /&gt;&lt;br /&gt;"The significance of Microsoft's new application reputation technology cannot be overstated. Application Reputation is the first attempt by any vendor to create a definitive list of every application on the Internet," the authors conclude.&lt;br /&gt;&lt;br /&gt;"Browsers provide a layer of protection against socially-engineered malware, in addition to endpoint protection products; as this report shows, not all are created equal. The overall lower protection offered by Firefox, Safari, and Chrome is concerning."&lt;br /&gt;&lt;br /&gt;An extra but important dimension also tested was the 'average response time to block malware', basically the time it took each browser to add a problem site to the block list once it had been fed in to the test by NSS Labs.&lt;br /&gt;&lt;br /&gt;Again, IE 9 with Application Reputation enabled gained a perfect score, adding a site without any delay, the only browser to manage such a feat. Interestingly, however, without the Application layer, IE 8 and 9 sank down the table, taking nearly 14 and 16 hours respectively, behind Safari's five hours, Chrome's nearly seven hours, and Firefox's 8 hours.&lt;br /&gt;&lt;br /&gt;Block time is worth paying attention to because the longer protection takes to be activated, the longer the window of possible exposure.&lt;br /&gt;&lt;br /&gt;The limitation of the report is that it is only measuring one dimension of the threat users face when using browsers, that of attacks where the user can be tricked - 'socially-engineered' in security parlance - into downloading malware. This compares with what are called 'drive-by' attacks that seek to exploit specific vulnerabilities in software and which require no user intervention.&lt;br /&gt;&lt;br /&gt;Which is more dangerous is a matter of debate although NSS Labs references a separate study by AVG that found socially-engineered attacks to be the most likely way for malware to find its way on to a user's PC.&lt;br /&gt;&lt;br /&gt;A social engineering attack has the advantage that it recruits the user to agree to a download event thereby potentially bypassing Windows controls such as User Access Control (UAC) and even the warnings of antivirus software. A drive-by attack, especially one manipulating a zero-day flaw, can sneak on to the PC without any of these defences being aware but requires more engineering effort to work.&lt;br /&gt;&lt;br /&gt;The claim that socially-engineered attacks are the more significant doesn't entirely accord with the admittedly patchy evidence that exists on the subject.&lt;br /&gt;&lt;br /&gt;A recent and revealing assessment by Qualys using its Browsercheck tool found that large numbers of browser users routinely run out-of-date plug-ins for interfaces such as Flash Adobe Reader and especially Java. Many of these have significant flaws that can be attacked by drive-by exploits.&lt;br /&gt;&lt;br /&gt;It could be that both sides of this coin -- social-engineering attacks and drive-by attacks - are equally perilous but in different ways.&lt;br /&gt;&lt;br /&gt;A final qualification is that the test was conducted on Firefox 4, since supplanted by the rapid-development replacement, version 5.0, likewise Google Chrome, which has reached version 13. The URL-filtering systems used by these are, however the same as in the previous versions so would be unlikely to make a difference to their blocking performance.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Flash Player 11, Adobe AIR 3 Betas Released</title><link>http://computers4you.blogspot.com/2011/07/flash-player-11-adobe-air-3-betas.html</link><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 18 Jul 2011 22:46:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-1646489317356746649</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Flash Player 11, Adobe AIR 3 Betas Released&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Adobe has released public beta versions of Flash Player 11 and AIR 3. The desktop beta of Flash Player 11 offers new features for cross-platform browser-based viewing of expressive rich Internet applications, content, and videos across devices. Some of the features from the Flash Player Incubator, such as Stage 3D (codenamed Molehill) and 64-bit support, have been moved into this beta release.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Key benefits of the Flash Player 11 desktop beta include Stage3D APIs, which support highly interactive visuals to improve collaboration on 3-dimensional models; 64-bit support for Mac OS X, as well as Windows and Linux; and there's also the ability to integrate voice/telephony into business apps using the G.711 audio compression codec and encode higher quality video locally using H.264 /AVC SW Encoding. (See also Adobe Flash Update Puts Users in Charge of Privacy&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;In addition socket progress events allow developers to build advanced file sharing apps like FTP clients to send large amounts of data, while the addition of HD surround sound enables delivery of full HD videos with 7.1 channel surround sound directly to AIR powered TVs.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The beta of Adobe AIR 3 introduces enhanced features that provide developers a consistent and flexible development environment for the delivery of out-of-browser applications across devices and platforms.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;AIR 3 delivers innovation for rich engaging applications with performance improvements that deliver advanced graphics rendering, high-definition video, and consistent reach across operating systems and devices. AIR 3 has a special focus for those interested in developing console quality games, delivering high quality video, or scalable enterprise applications.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The AIR 3 desktop runtime beta is provided to ensure current AIR 2.7 and AIR apps targeting older version of AIR are compatible with this upcoming release of AIR 3. At this time the AIR 3 SDK will not be available in a public beta.&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google vs. Facebook: Which Can You Trust?</title><link>http://computers4you.blogspot.com/2011/07/google-vs-facebook-which-can-you-trust.html</link><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 18 Jul 2011 21:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-3681526026880528175</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:180%;" &gt;Google vs. Facebook: Which Can You Trust?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0);font-size:130%;" &gt;Analysis: Are people flocking to Google+ to escape Facebook's evil clutches? And if so, is that really such a good idea? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;A couple of weeks ago I wrote a blog post about how MySpace's assets -- including some 50 million-odd personal profiles -- were purchased by Specific Media, an online ad firm, and the privacy implications of that.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Since then, some smart folks have pointed out to me that -- hey, looky -- Google is also an advertising company. And when you come right down to it, so is Facebook. That's certainly what has produced the vast majority of FB's revenues so far.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    * 4 things Facebook doesn't tell you about privacy, security&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    * So, Why Do We Trust Google with Our Data?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;So can any of them be trusted?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Former TV newsman Issac "Ike" Pigott asked a similar question this morning on his Posterous audio blog:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;    Am I wrong for continuing to think that there's humor in the fact that so many people are flocking to Google+ because they just don't trust Facebook with all their private information? These are the same people who've had gmail accounts for six or seven years, have racked up about five or six gigabytes of data that they leave on Google servers, [including] emails they would not want the rest of the world to know about. And [they] trust Google with all that but [they] won't trust Facebook with it."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;An interesting thought. First, though, let's examine the premise of this question. I'm not convinced people are abandoning Facebook for Google+. I think they're just adding Google+ to their ever growing list of social media sites.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;In fact, based on my short experience with G+ and the friend/follower notifications that have come pouring into my inbox, the people who are flocking to G+ are the same ones who flocked to Facebook, Twitter, FriendFeed, Buzz, Foursquare, Groupon, blah blah blah -- I mean the same friggin people. It's the Social Media Mafia; Robert Scoble and the Scoblettes. They're all over G+ they way they were all over all of those other services.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Remember in high school, when you tried to start a club for all the cool kids but the dorks kept showing up instead? It's like that.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Anyway, I digress. The question really is, should you trust Google more than Facebook? Stupidly, in my heart of hearts (if not my brain of brains) I do trust Google more than Facebook. And I think there are a few reasons why.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;1. "Don't be evil." Yeah, I know. But it was a ballsy thing to put out there, and people are constantly holding Google's feet to the fire over it. It's also the fact that when Google screws up, especially in the area of privacy, it apologizes almost immediately and tries to correct it. Unlike (ahem) certain social media companies, they don't sit there defiantly telling us we're all wrong or hide in their rooms waiting for people to stop complaining.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;2. The ever-changing moods of Facebook's privacy policies. It's hard to trust somebody when you sign a contract with them, only to have them continually using Wite-Out TM to erase the bits they don't like and rewriting them to their advantage. Google doesn't generally do that.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;3. Mark Zuckerberg. He looks like the kid who left a flaming bag of dog doo on your front stoop and now just denies, denies, denies it. The history of how Facebook came to be, and Zucky's other adventures borrowing other people's ideas, don't help. Uncle Eric, while just a teensy bit creepy, always felt more credible to me.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;I'm not saying you should trust Google more -- in many ways, Google is a bigger threat to your privacy than Facebook, because it has access to far more than just the information you've shared with it. I'm just saying I do.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Iomega launches Four-Drive NAS Appliance</title><link>http://computers4you.blogspot.com/2011/03/iomega-launches-four-drive-nas.html</link><category>Articles</category><category>News</category><category>Reviews</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:58:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-3661580052438877275</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="font-weight: bold; color: rgb(153, 0, 0);font-size:130%;" &gt;Iomega launches Four-Drive NAS Appliance&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;The StorCenter ix4-200d, the latest four drive NAS  appliance announced by Iomega is available in 2TB, 4TB and 8TB capacities. It utilizes the acclaimed EMC LifeLine software, a fully-developed Linux operating environment and suite of applications that protects your data and performs valuable business tasks above and beyond simple storage, all designed to make it easy to securely store, protect and serve up data when you need it and where you want it.  EMC LifeLine software is designed for cross-platform support with PC, Mac and Linux computers. It can be configured with different levels of RAID support: RAID 5 (pre-configured) and RAID 10 (both with automatic RAID rebuild), as well as JBOD.  The four drives in the ix4 are user replaceable SATA II hard drives that minimize downtime. With dual Gigabit Ethernet connectivity and a high-performance embedded architecture, the ix4-200d boosts small business productivity by making data readily accessible and secure over a local network.  The ix4-200d also has three USB 2.0 ports for adding printers or additional storage capacity with external USB drives. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/-vEZJZ3DfenY/TYhr3sfaXoI/AAAAAAAADaU/066bbvFYyl0/s1600/Iomega%2Blaunches%2BFour-Drive%2BNAS%2BAppliance-storcentre.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 179px; height: 127px;" src="http://3.bp.blogspot.com/-vEZJZ3DfenY/TYhr3sfaXoI/AAAAAAAADaU/066bbvFYyl0/s400/Iomega%2Blaunches%2BFour-Drive%2BNAS%2BAppliance-storcentre.jpg" alt="" id="BLOGGER_PHOTO_ID_5586833942332989058" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;Its features also include Device-to-Device Replication (D2D), VMware Ready Certification, Remote Access, Multiple Network Protocols,Time Machine Support, UPS Support, Video Surveillance, Print Server, Bluetooth capability and Picture Transfer Protocol. Iomega says the StorCenter ix4-200d is the ideal NAS appliance for small businesses, distributed offices and home office networks that require advanced data storage and protection features without the need for a dedicated IT staff.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-vEZJZ3DfenY/TYhr3sfaXoI/AAAAAAAADaU/066bbvFYyl0/s72-c/Iomega%2Blaunches%2BFour-Drive%2BNAS%2BAppliance-storcentre.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>New Twitter scam "Your Online Timer" spreading rapidly</title><link>http://computers4you.blogspot.com/2011/03/new-twitter-scam-your-online-timer.html</link><category>Articles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:56:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-7559161272072137468</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;New Twitter scam "Your Online Timer" spreading rapidly&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Twitter users, beware of an online scam doing the rounds across the popular microblogging / social networking website. Your Online Timer, a rogue application designed to help scammers by spreading links pointing to online surveys is spreading fast across Twitter, IT security firm Sophos warned. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The Your Online Timer application claims to count how long Twitter users have been members of the social networking site. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Sophos reports a variant of the following message appearing on various Twitter profiles within the past day, allegedly displaying the affected Twitter user's time spent on the site:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The message appears on Twitter profiles after users authorise "Your Online Timer" application to access and update their Twitter accounts.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Sophos says once you authorize the application to post to your Twitter profile, users are redirected to a website which claims to indicate their time spent on Twitter. After this a page pops up in the browser displaying a survey which earns the scammers money for each questionnaire completed.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>WD Scorpio Black 750 GB Available, is 2.5-inch 7200rpm HDD</title><link>http://computers4you.blogspot.com/2011/03/wd-scorpio-black-750-gb-available-is-25.html</link><category>Articles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:53:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-617668017967077667</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;WD Scorpio Black 750 GB Available, is 2.5-inch 7200rpm HDD&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Western Digital has announced that it has begun shipping its new WD Scorpio Black 750 GB hard drive (model number WD7500BPKT). This 2.5-inch laptop hard drive is meant to provide high-performance, with a rotation speed of 7200 RPM. The new model offers a 16 MB cache, uses Advanced Format (AF) technology, and is claimed to incorporate data-protection features to actively monitor and protect valuable data.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The WD Scorpio Black is one of the few 2.5-inch laptop compatible hard drives to spin at 7200rpm, yet offer data storage capacity of as much as 750GB. Western Digital offers a five-year limited warranty on this product, and it is expected to sell at Rs. 5,275 (excluding tax).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/-P0hzFNFmzlg/TYhqv9ajSZI/AAAAAAAADaM/eHGz_ABFPrg/s1600/WD-Scorpio-Black-750-GB-HDD-laptop-performance.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 179px; height: 127px;" src="http://1.bp.blogspot.com/-P0hzFNFmzlg/TYhqv9ajSZI/AAAAAAAADaM/eHGz_ABFPrg/s400/WD-Scorpio-Black-750-GB-HDD-laptop-performance.jpg" alt="" id="BLOGGER_PHOTO_ID_5586832709925423506" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"Our most demanding customers have come to expect "no compromises" from our all of our Black series products," explained Sushil Bandi, Country Manager for the Indian sub-continent, Western Digital.  "The new WD Scorpio Black drive does not disappoint, providing users of portable devices the necessary speed, significant storage and efficient power management needed to enjoy their favorite HD content, high resolution images, powerful office applications or gaming at home, in the office or on the road."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/-P0hzFNFmzlg/TYhqv9ajSZI/AAAAAAAADaM/eHGz_ABFPrg/s72-c/WD-Scorpio-Black-750-GB-HDD-laptop-performance.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Internet Explorer 9 Chalks up 2.3 Million Downloads</title><link>http://computers4you.blogspot.com/2011/03/internet-explorer-9-chalks-up-23.html</link><category>Articles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:51:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-4994091478263269006</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="font-weight: bold; color: rgb(153, 0, 0);font-size:130%;" &gt;Internet Explorer 9 Chalks up 2.3 Million Downloads&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;Microsoft has claimed that their newly released Internet Explorer 9 Web browser was downloaded 2.35 million times in the first 24 hours of its release. In a post on Windows Team Blog, Ryan Gavin, Senior Director, Internet Explorer claims that the browser was downloaded 27 times per second in the first 24 hours.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;While these numbers may look impressive, a story by The Register helps put these numbers in context. The first 24 hours of the Opera 11 Web browser launch was said to have seen 6.7 million downloads while Mozilla came up with even bigger numbers for their Firefox 3.0 launch- eight million downloads in 24 hours. So, while IE9’s download count beats IE8, it still lags behind Firefox and Opera.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;Internet Explorer 9 was launched on Monday and has generally received positive response from critics and users (along with some brickbats).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>RIM to use Microsoft's Cloud Services on its Playbook</title><link>http://computers4you.blogspot.com/2011/03/rim-to-use-microsofts-cloud-services-on.html</link><category>Articles</category><category>News</category><category>Reviews</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:49:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-8345801917490948287</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;RIM to use Microsoft's Cloud Services on its Playbook&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;RIM has announced its plan to partner with Microsoft to integrate cloud services to RIM's Blackberry devices including the upcoming Playbook tablet. The cloud-based service from Microsoft called the Office 365 is a service that has communications and collaboration products with Microsoft's latest version of desktop suite for businesses. The Office 365 includes Microsoft Office Professional Plus, Microsoft Exchange Online, Microsoft SharePoint Online and Microsoft Lync Online. RIM's Blackberry devices will carry the Office 365 and the RIM's Blackberry Enterprise Servers will connect to Microsoft data centers, so that Blackberry users will have up to date information on their devices all the time.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/-r8-diTaKoUk/TYhpw-ubG5I/AAAAAAAADaE/BzHTqV-53UE/s1600/RIM%2Bto%2Buse%2BMicrosoft%2527s%2BCloud%2BServices%2Bon%2Bits%2BPlaybook.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 387px;" src="http://1.bp.blogspot.com/-r8-diTaKoUk/TYhpw-ubG5I/AAAAAAAADaE/BzHTqV-53UE/s400/RIM%2Bto%2Buse%2BMicrosoft%2527s%2BCloud%2BServices%2Bon%2Bits%2BPlaybook.jpg" alt="" id="BLOGGER_PHOTO_ID_5586831627945450386" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;With the Blackberry Office 365 service, companies who have been maintaining one or more Blackberry Enterprise Servers on their private servers will now have off-site data centers which will enable them to control and manage their data remotely. According to Jim Tobin, senior vice president of RIM's software and business service unit, RIM and Microsoft won't jointly manage off-site date centers, but Microsoft centers will connect "cloud-to-cloud" to RIM centers that house Blackberry Enterprise Servers. The cloud-based Blackberry Exchange Server (BES) will also support RIM's upcoming Blackberry Balance service which will allow IT departments’ access to the enterprise and BES part of the Blackberry while providing users freedom to access web or social networking sites like Facebook etc. The Blackberry Playbook will also include the Blackberry Balance service but the announcement date for this tablet is still not yet disclosed.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/-r8-diTaKoUk/TYhpw-ubG5I/AAAAAAAADaE/BzHTqV-53UE/s72-c/RIM%2Bto%2Buse%2BMicrosoft%2527s%2BCloud%2BServices%2Bon%2Bits%2BPlaybook.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Lava KKT 35 with Color Matcher App Launched in India for Rs.3,950</title><link>http://computers4you.blogspot.com/2011/03/lava-kkt-35-with-color-matcher-app.html</link><category>Articles</category><category>Mobiles</category><category>News</category><category>Reviews</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:47:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-4260301134788794799</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0);font-size:130%;" &gt;&lt;span style="font-weight: bold;"&gt;Lava KKT 35 with Color Matcher App Launched in India for Rs.3,950&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Lava has launched a budget handset KKT 35 with what it's called an innovative feature - a Color Matcher application on the occasion of Holi. The Lava KKT 35 is a dual-SIM handset with bar-form factor. It comes with a Color Matcher application to pick up any color as background and let users to use it as a home screen. The new phone comes in a slim metallic body and it features like 1400mAH battery that has a promising talk time of up to 8-9 hours. Apart from the Color Matcher application, the Lava KKT 35 includes useful features like conversation recording, answering machine, web camera and chat-style SMS.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/-CCTSYXwZF40/TYhpUctoUjI/AAAAAAAADZ8/GrljhA05Lwc/s1600/Lava%2BKKT%2B35%2Bwith%2BColor%2BMatcher%2BApp%2BLaunched%2Bin%2BIndia%2Bfor%2BRs.3%252C950.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 387px;" src="http://4.bp.blogspot.com/-CCTSYXwZF40/TYhpUctoUjI/AAAAAAAADZ8/GrljhA05Lwc/s400/Lava%2BKKT%2B35%2Bwith%2BColor%2BMatcher%2BApp%2BLaunched%2Bin%2BIndia%2Bfor%2BRs.3%252C950.jpg" alt="" id="BLOGGER_PHOTO_ID_5586831137778979378" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The budget phone has a 2.4-inch QVGA TFT LCD screen supporting up to 260k colors, a camera ( supposedly VGA) with digital zoom, upto 8GB microSD support, audio (MP3, AAC, WAV, AMR, MIDI) and video (3GP, MP4 and AVI) players, Stereo FM, 3.5mm stereo jack, torch function, WAP browser, Mobile Tracker application and Flight Mode. The phone is priced at Rs.3, 950 and based on the official Lava site; the package includes a 2GB microSD card. “Color Matcher” is another example of our commitment. We understand that colors are a way of expressing ones personality and attitude. Normally consumer has a limited choice of selecting colors in a phone .With “Color Matcher” now you can pick up any color which excites you,” said Mr. Sunil Raina, Chief Marketing Officer, LAVA International.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://4.bp.blogspot.com/-CCTSYXwZF40/TYhpUctoUjI/AAAAAAAADZ8/GrljhA05Lwc/s72-c/Lava%2BKKT%2B35%2Bwith%2BColor%2BMatcher%2BApp%2BLaunched%2Bin%2BIndia%2Bfor%2BRs.3%252C950.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Spice Introduces Projector Phone, M-9000 Popkorn: Also Features Analog TV</title><link>http://computers4you.blogspot.com/2011/03/spice-introduces-projector-phone-m-9000.html</link><category>Articles</category><category>Mobiles</category><category>Reviews</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:45:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-9686588777022876</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Spice Introduces Projector Phone, M-9000 Popkorn: Also Features Analog TV &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Spice has launched Spice M-9000 Popkorn mobile phone, first projector phone in India. The M-9000 Popkorn is a dual-SIM phone that comes with a Projector to let you project and view the phone's contents on a large screen. The phone plays MP4, FLV, AVI, 3GP, RM and RMVB videos. Using its Analog TV feature, it will also let you watch free TV channels ( if available) in your city. The Spice M-9000 Popkorn is priced at Rs.6, 990.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/-Uf-sP-3IxlI/TYhoxK57GRI/AAAAAAAADZ0/G0-rqIaSvMk/s1600/spice_m_9000_popkorn_bd1.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 387px;" src="http://2.bp.blogspot.com/-Uf-sP-3IxlI/TYhoxK57GRI/AAAAAAAADZ0/G0-rqIaSvMk/s400/spice_m_9000_popkorn_bd1.jpg" alt="" id="BLOGGER_PHOTO_ID_5586830531703281938" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;As a phone, the Spice M-9000 Popkorn is a bar-phone that has some standard features for a budget phone. It features a 2.36-inch QVGA screen with 262k colors support, a 3.2 megapixel camera, FM with recording, video recording, MP3 playback, Documents Viewer, Stereo Bluetooth (2.1), Java support and WAP/GPRS/EDGE connectivity. There is 87MB of internal memory and up to 16GB of microSD card is supported. The phone's document viewer support will make the phone an ideal choice for viewing and projecting your slideshow during presentation. The document viewer supports MS Word, Excel, Power point and also PDF documents.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/-DvkD3ulnFCk/TYhowxrP2VI/AAAAAAAADZs/srfsOw9-6ko/s1600/Spice%2BIntroduces%2BProjector%2BPhone%252C%2BM-9000%2BPopkorn%2BAlso%2BFeatures%2BAnalog%2BTV.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 331px; height: 400px;" src="http://1.bp.blogspot.com/-DvkD3ulnFCk/TYhowxrP2VI/AAAAAAAADZs/srfsOw9-6ko/s400/Spice%2BIntroduces%2BProjector%2BPhone%252C%2BM-9000%2BPopkorn%2BAlso%2BFeatures%2BAnalog%2BTV.jpg" alt="" id="BLOGGER_PHOTO_ID_5586830524930840914" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Spice also included some features like Incoming Call Guard, Scheduled FM recording, Wireless FM and some built-in organizers like To-Do-list, Calendar, Currency/Unit Converter, Alarm, Calculator and many more. There is also a Tripod included to make The phone comes with a 1200mAh battery which has a rated talk time of 3.5 hours and stand-by time of 300 hours.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/-Uf-sP-3IxlI/TYhoxK57GRI/AAAAAAAADZ0/G0-rqIaSvMk/s72-c/spice_m_9000_popkorn_bd1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>AT&amp;T's takeover of T-Mobile creates largest U.S. carrier</title><link>http://computers4you.blogspot.com/2011/03/at-takeover-of-t-mobile-creates-largest.html</link><category>Articles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:43:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-5920426604634433898</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;AT&amp;amp;T's takeover of T-Mobile creates largest U.S. carrier&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;AT&amp;amp;T will buy T-Mobile USA for $39 billion in cash and stock, easily making AT&amp;amp;T the nation's largest wireless carrier, ahead of top-ranked competitor Verizon Wireless and reducing the number of major national wireless carriers from four to three.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Consumer groups are sure to object because of concerns over market consolidation and less competition, but some analysts said the deal makes sense and won't lead to higher prices. Rumors circulated last year that T-Mobile was expected to be sold, possibly to third-place Sprint, so AT&amp;amp;T's emergence was somewhat of a surprise.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The deal, announced on Sunday by both AT&amp;amp;T and T-Mobile's parent Deutsche Telekom, has been approved by the boards of both companies. Under the deal, Deutsche Telekom would receive an 8% equity stake in AT&amp;amp;T and a board seat.The transaction is expected to close in 12 months, the companies said. It is subject to federal regulatory approval, where it will undoubtedly receive close scrutiny, given its size and impact on the competitive landscape. A conference call on the agreement is set for 8 a.m. EDT Monday.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;AT&amp;amp;T said the deal will add T-Mobile's 34 million customers to AT&amp;amp;T's 95.5 million total subscriber base (at the end of 2010), enabling a quicker expansion of 4G LTE wireless networks to the entire subscriber group of about 130 million. By comparison, Verizon had 94.1 million subscribers at at the end of 2010 , although Verizon and AT&amp;amp;T count them somewhat differently.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Some analysts lauded the deal, even though consumer groups are expected to question having more subscribers under the control of a single carrier. "Bigger is better in a commodity game," said Phillip Redman, an analyst at Gartner who follows the wireless carriers. "Four providers were too many. This may help [third-place] Sprint as it becomes the standalone low-cost provider, and it makes more sense than a Sprint-T-Mobile deal."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Redman said the Federal Trade Commission and Federal Communications Commission will both "take a hard, long look at it, but in the end it will be approved." With three major providers -- Verizon, AT&amp;amp;T and Sprint --Redman added, "I think there is plenty of competition...This is the last of the big mergers" in the wireless industry.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The companies sought to deflect concerns about reduced competition with the combination of two large carriers, noting in a statement: "The U.S. wireless industry is one of the most fiercely competitive markets in the world and will remain so after this deal. The U.S. is one of the few countries in the world where a large majority of consumers can choose from five or more wireless proviers in their local market ...The competitiveness of the market has directly benefited consumers."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Shortly after the takeover was announced, consumer rights group Free Press issued a statement condemning it. "Don't believe the hype: There is nothing about having less competition that will benefit wireless consumers," said Free Press research director S. Derek Turner. "And if regulators approve this deal, they will further cement duopoly control over the wireless market by AT&amp;amp;T and Verizon."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Turner noted that the top four companies already control 90% of the wireless business. If two of the four merge, that means "nothing but higher prices and fewer choices, as the newly engorged AT&amp;amp;T and Verizon exert even more control over the wireless Internet."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Jeffrey Kagan, an independent analyst, said he didn't think the AT&amp;amp;T takeover would have a negative effect on pricing, since there will still be three major players in the market. "Ultimately, [the merger] will be approved," he said. Because AT&amp;amp;T will invest more in network expansion because of the takeover, Kagan said both customers and investors will be "happier."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;He noted continued problems in keeping up with data demands of the iPhone when AT&amp;amp;T was the device's exclusive wireless carrier, creating an image that AT&amp;amp;T didn't want. Jack Gold, an analyst at J. Gold Associates, said he was unsure whether regulators will automatically go along with the merger because it significantly limits competition.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;"It is highly likely that data rates ... will increase," he said. "The bottom line is that this is probably good for current customers of AT&amp;amp;T and T-Mobile as it will ultimately result in better network coverage, but in limiting the competition, it will also probably result in higher prices."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;AT&amp;amp;T Chairman Randall Stephenson said the transaction represents "a major commitment to strengthen and expand critical infrastructure for our nation's future." AT&amp;amp;T will increase its infrastructure investment by more than $8 billion over seven years, he said, and will be able to extend its plan for LTE coverage to an added 46.5 million Americans across 95% of the U.S.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;With the acquisition, AT&amp;amp;T will immediately gain cell sites that would have taken on average five years to build without the transaction, the carrier said. It said its mobile data traffic grew by 8,000% over the past four years, and will be eight to 10 times greater in 2015 than it was in 2010.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Both companies use a GSM-based HSPA network, although T-Mobile announced HSPA+ speeds in January that would technically make it faster than AT&amp;amp;T. AT&amp;amp;T is moving its subscribers to LTE in the next two years, expecting the first rollouts later in 2011.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Xbox 360 successor to surface by 2015</title><link>http://computers4you.blogspot.com/2011/03/xbox-360-successor-to-surface-by-2015.html</link><category>Articles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-1566908089187450300</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Xbox 360 successor to surface by 2015&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Microsoft's Xbox 360 gaming console is headed towards a refresh by 2015, if leaked images of a confidential project part of WGX (Windows Gaming eXperience) and Microsoft's IEB (Interactive Entertainment Business) are to be believed. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;This Xbox scoop comes courtesy of ZDNet, who managed to get their hands on the confidential image in question. It shows a tantalizing hint of what arguably looks like the successor of the Xbox 360 as we know it. Take a look (image courtesy ZDNet).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The cryptic note at the top of the image reads "collaboration with Microsoft's IEB Design group investigating future user experiences and hardware for 2015." The image was posted on the website of one Ben Patterson -- a recent addition to the Xbox team, reports suggest.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Right now, the details are hazy at best and all in the realm of speculation, because it looks like Microsoft has just started working on the Xbox 360 gaming console's successor. But the 2015 release date means the current Xbox 360 console is on its way to complete a decade as Microsoft's premier gaming console. Ten years, who would've thought?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;There you have it then, Sony's PS3 and Nintendo's Wii have been warned. What needs to be seen is if the Xbox 360 successor will be anything as groundbreaking or record-breaking as its Kinect motion controller. Four years is a lot of time for Microsoft to cook something spectacular, don't you think? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google Blames China for Blocking Gmail</title><link>http://computers4you.blogspot.com/2011/03/google-blames-china-for-blocking-gmail.html</link><category>Articles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:40:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-8011713597813218884</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:180%;" &gt;Google Blames China for Blocking Gmail&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;After a lull, the conflict between Google and the Chinese government seems to have flared up again. A Google spokesperson leveled accusations against the Chinese government blaming them for interrupting the Gmail service for almost an entire month.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;According to Google, Chinese Gmail users regularly complained of disruptions in service during this period, which coincided with political trouble in Middle Eastern countries such as Tunisia and Egypt (also known as the “Jasmine Revolution”). During this same period, there were also cases of Chinese people living overseas who were calling for similar protests in China.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The Google spokesperson also claimed that there was no technical issue on Google’s side with reference to the service disruptions and that the blockage was “carefully designed to look like the problem is with Gmail.”&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Problems between China and Google had reached a peak in January of last year when Google had declared that they would no longer be willing to censor search results leading to a war of words with the Chinese government.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Twitter allows secure HTTPS access to website</title><link>http://computers4you.blogspot.com/2011/03/twitter-allows-secure-https-access-to.html</link><category>Articles</category><category>News</category><category>Troubleshoot</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-3899904733148522145</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0);font-size:130%;" &gt;&lt;span style="font-weight: bold;"&gt;Twitter allows secure HTTPS access to website&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Facebook did it earlier this January, it was only a matter of time before Twitter followed suit. Yup, users of the popular microblogging website, now have the option to secure their connection to Twitter over the Internet via HTTPS.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Once you enable HTTPS access through your Twitter user settings, it allows you to connect to the website over a secure encrypted connection, keeping your user data secure from unfriendly eyes.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/-oWGR8DGWKwA/TYhnJ4eKGSI/AAAAAAAADZk/uoP1aEGVkLc/s1600/twitter-https-access.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 307px;" src="http://4.bp.blogspot.com/-oWGR8DGWKwA/TYhnJ4eKGSI/AAAAAAAADZk/uoP1aEGVkLc/s400/twitter-https-access.JPG" alt="" id="BLOGGER_PHOTO_ID_5586828757228460322" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Just go to Settings &gt; Account, scroll down to tick the Always use HTTPS radio box. In the past Facebook and Gmail have enabled HTTPS access to user accounts to secure connections.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://4.bp.blogspot.com/-oWGR8DGWKwA/TYhnJ4eKGSI/AAAAAAAADZk/uoP1aEGVkLc/s72-c/twitter-https-access.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google Circles: Social networking isn't over for Google</title><link>http://computers4you.blogspot.com/2011/03/google-circles-social-networking-isnt.html</link><category>Articles</category><category>News</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:36:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-598113451374134218</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Google Circles: Social networking isn't over for Google&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Facebook, Twitter, take note; seemingly Google hasn't had its last word on social networking. Details about Google Circles, a new social networking-based product, have emerged at the ongoing SXSW (South By Southwest) Festival at Austin, Texas, an annual event themed primarily around film and music.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Not much is known about Google Circles right now, but there are strong indications that Google isn't stopping at Buzz as far as its social networking aspirations go.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;ReadWriteWeb jumped the gun on Sunday claiming Google would showcase a "preview" of its "major new social network" called Circles at the ongoing SXSW event. That prompted a Google response on Twitter to RWW's report by stating it isn't launching any product at SXSW. So no previews of Google Circles any time soon, or not until the Google I/O event in May later this year.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;What is Google Circles?&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;But what exactly is Google Circles and how is it any different from Google Buzz? According to ReadWriteWeb, Google Circles will allow people to have different social circles, thereby sharing photos, videos, and status messages with people in a specific social circle.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;This approach of Google Circles -- if indeed true -- claims to be unique by differentiating and respecting the different social circles we share with our online friends (family, work colleagues, club mates, etc.), and decide the amount of content we share with them -- just like offline, real-world social networking works.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Evidence of Google moving beyond Buzz and contemplating about social networking deeply has been there to see for a while now. We all know Google has been working on introducing elements (or social layers) in its search engine to serve results depending on our social lives, most notably Google's Social Search experiment. Google also has something called Social Circle which determines your social connections for Social Search.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;And even though Google isn't launching Circles at SXSW, it hasn't denied rumors that it's working on a new social networking product or Google Circles.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Here's what we would like Google's next social networking endeavor to focus on. Other than that, keep your fingers crossed till May.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Nokia E7 Launched in India for Rs. 29,999</title><link>http://computers4you.blogspot.com/2011/03/nokia-e7-launched-in-india-for-rs-29999.html</link><category>Mobiles</category><category>News</category><category>Reviews</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:32:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-6706739264342143057</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Nokia E7 Launched in India for Rs. 29,999&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Nokia launched the E7 smartphone today at a press conference in Bangalore. The press conference was attended by the media, bloggers and was addressed by Viral Oza, Head- Activation, Media &amp;amp; Online Marketing for Nokia.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;At the conference, there was extra focus put on the E7’s productivity and business features such as support for Mail for Exchange, Microsoft Communicator Mobile and Share Point Server. Nokia also reiterated their support for Symbian as a platform in spite of opting for Windows Phone 7 as their platform of choice for all smartphones in the future including those belonging to the E-series and assured that the E7 would continue to receive software support.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/-cq41bGcewWg/TYhmFN_DeDI/AAAAAAAADZc/1h3srVkvBVQ/s1600/nokia_e7_in_India.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 400px;" src="http://2.bp.blogspot.com/-cq41bGcewWg/TYhmFN_DeDI/AAAAAAAADZc/1h3srVkvBVQ/s400/nokia_e7_in_India.jpg" alt="" id="BLOGGER_PHOTO_ID_5586827577592608818" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The Nokia E7 is a Symbian^3 smartphone with a 4-inch AMOLED display and a slide-out QWERTY keyboard. The display has a resolution of 640x360 and boasts of ClearBlack technology. The E7 has 16GB of internal memory and 256MB of RAM. Imaging is taken care of by an 8MP full-focus camera that can also record 720p HD videos. The E7 provides a miniHDMI port and also offers USB On-the-Go support.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;The best price for the Nokia E7 is currently Rs. 29,999- a drop of more than Rs. 5,000 over the pre-order price revealed only last week. Expect a review of the Nokia smartphone very soon.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/-cq41bGcewWg/TYhmFN_DeDI/AAAAAAAADZc/1h3srVkvBVQ/s72-c/nokia_e7_in_India.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Sony Unveils New SDHC Class 10 Memory Card: Offers Up to 22MBps Read Speed</title><link>http://computers4you.blogspot.com/2011/03/sony-unveils-new-sdhc-class-10-memory.html</link><category>Reviews</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Mar 2011 14:26:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3446985431141922327.post-8110747077954953325</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;font-size:130%;" &gt;Sony Unveils New SDHC Class 10 Memory Card: Offers Up to 22MBps Read Speed&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Sony India has announced the new Class 10 SDHC memory card which theoretically supports up to 10MBps data write speed. The card is compatible with a file recovery software called Memory Card File Rescue Ver.3.0 which is supposedly the world’s first AVCHD supporting file rescue software. The new Class 10 SDHC memory card offers data transfer speed of up to 22MB/s which makes it an ideal choice for burst-shooting with your camera or while shooting high resolution pictures (for faster writing speed). The fast transfer speed will not only enable faster writing speed but also reading speed - while transfering files from the card to a PC.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/-7vPc_CO8Jfk/TYhkunGYMNI/AAAAAAAADZU/MGQTAQeP-k0/s1600/Sony%2BUnveils%2BNew%2BSDHC%2BClass%2B10%2BMemory%2BCard_Offers%2BUp%2Bto%2B22MBps%2BRead%2BSpeed.jpg"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 317px; height: 400px;" src="http://1.bp.blogspot.com/-7vPc_CO8Jfk/TYhkunGYMNI/AAAAAAAADZU/MGQTAQeP-k0/s400/Sony%2BUnveils%2BNew%2BSDHC%2BClass%2B10%2BMemory%2BCard_Offers%2BUp%2Bto%2B22MBps%2BRead%2BSpeed.jpg" alt="" id="BLOGGER_PHOTO_ID_5586826089685594322" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-size:100%;" &gt;Featuring storage capacities of 8GB, 16GB and 32GB, the new Class 10 SDHC memory card will be avaialble in Indian market from March 2011.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;table style="color: rgb(0, 0, 0); text-align: left; margin-left: 0px; margin-right: 0px;" border="0" cellpadding="0" cellspacing="0" width="533"&gt;&lt;col style="width: 76pt;" width="101"&gt;  &lt;col style="width: 95pt;" width="127"&gt;  &lt;col style="width: 136pt;" width="181"&gt;  &lt;col style="width: 49pt;" width="65"&gt;  &lt;col style="width: 44pt;" width="59"&gt;  &lt;tbody&gt;&lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td class="xl22" style="height: 12.75pt; width: 76pt; font-weight: bold;" width="101" height="17"&gt;&lt;span style="font-size:100%;"&gt;Model   Number&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl22" style="border-left: medium none; width: 95pt; font-weight: bold;" width="127"&gt;&lt;span style="font-size:100%;"&gt;Media Type&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl22" style="border-left: medium none; width: 136pt; font-weight: bold;" width="181"&gt;&lt;span style="font-size:100%;"&gt;Operating Class&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl22" style="border-left: medium none; width: 49pt; font-weight: bold;" width="65"&gt;&lt;span style="font-size:100%;"&gt;Warranty&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl22" style="border-left: medium none; width: 44pt; font-weight: bold;" width="59"&gt;&lt;span style="font-size:100%;"&gt;Price&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td class="xl23" style="height: 12.75pt; border-top: medium none;" height="17"&gt;&lt;span style="font-size:100%;"&gt;SF-8NX&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;SDHC Memory Card&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;Class 10 (read up to   22MB/s)&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;5 years&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;Rs. 1750&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td class="xl23" style="height: 12.75pt; border-top: medium none;" height="17"&gt;&lt;span style="font-size:100%;"&gt;SF-16NX&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;SDHC Memory Card&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;Class 10 (read up to   22MB/s)&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;5 years&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;Rs. 3400&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td class="xl23" style="height: 12.75pt; border-top: medium none;" height="17"&gt;&lt;span style="font-size:100%;"&gt;SF-32NX&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;SDHC Memory Card&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;Class 10 (read up to   22MB/s)&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;5 years&lt;/span&gt;&lt;/td&gt;   &lt;td class="xl24" style="border-top: medium none; border-left: medium none;"&gt;&lt;span style="font-size:100%;"&gt;Rs 6700&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;&lt;div class="blogger-post-footer"&gt;&lt;a href="http://secure.bidvertiser.com/performance/bdv_rss_rd.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;click=1&amp;rsrc=3" target="_blank"&gt;&lt;img src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=147445&amp;bid=575126&amp;PHS=147445575126&amp;rssimage=1&amp;rsrc=3" border="0"/&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/-7vPc_CO8Jfk/TYhkunGYMNI/AAAAAAAADZU/MGQTAQeP-k0/s72-c/Sony%2BUnveils%2BNew%2BSDHC%2BClass%2B10%2BMemory%2BCard_Offers%2BUp%2Bto%2B22MBps%2BRead%2BSpeed.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>