Archive for the ‘ Technology ’ Category

Features of Google ‘Nexus One phone’

Google announced last week on its official blog that it is testing a new mobile device. The handset is being tested by Google’s 20,000 employees, who reportedly received the device just before the weekend.

Here’s over to the gossip mill for all that Google’s Nexus One phone may offer.

Bearing strong resemblance to Apple iPhone, the handset is likely to have a slightly larger display than iPhone and will lack a physical keyboard. Unlike iPhone’s LCD display, Nexus one is likely to have an OLED display. Reports also suggest that Google phone will come with a trackball.

The phone will have a 5 megapixel camera with LED and auto-focus. For gamers, the phone will offer OpenGL ES 2.0 support.
Google phone will run on Android 2.1 operating system. Speculations are rife that the phone will come with MicroSD, Wi-Fi and Bluetooth.

The handset will be powered by Qualcomm Snapdragon 1GHz processor.

Unlike Apple’s popular iPhone, the Google handset will have an exchangeable battery and the ability for users to add a memory card to the device.



Taiwan unveils super-tiny microchip

Taiwan has developed tiny microchips that could lead to lighter and cheaper laptops or mobile phones, researchers and observers said on Wednesday.

State-backed National Nano Device Laboratories in northern Hsinchu city said it had succeeded in packing more transistors into smaller chip space than anyone else so far.

“Electronic gadgets like cell-phones and laptops could become smaller, lighter and cheaper with this technology,” Yang Fu-liang, the lab’s chief, told AFP.


Infosys launches Flypp mobile application platform

Infosys Technologies Ltd today announced the launch of Flypp, an application platform, which it said, would empower mobile service providers to “delight” digital consumers through a host of ready-to-use experiential applications across the universe of devices.

According to Subhash Dhar, Member Executive Council and Group Head, Sales & Marketing at Infosys, “Smart applications are now making it possible to deliver a personalised and interactive user experience. Mobile service providers are seeing a steady shift in value from providing connectivity to monetising digital demand. Flypp enables this capability for mobile operators through a plug and play model”.

Flypp is a “Ready to Launch” Application platform for mobile operators, the Bangalore-headquartered, NASDAQ-listed firm said in a statement. This “operator centric” platform enables mobile operators to offer a bouquet of applications, including third party ones to its subscribers.

Flypp also provides independent software vendors a “viable and attractive” channel to showcase and monetise their proprietary applications across multiple geographies and service providers, Infosys added.

7 most hacked software in 2009

Forbes recently released 2009’s `Most-Hacked Software’ list. The list names the software and applications that were biggest targets of hacker attacks in 2009. The software used most by hackers and other cyber criminals to sneak into your system and cause havoc.

Here’s over to the 7 Most Hacked Software of 2009.

1. Adobe Reader: This year’s Most hacked software belongs to (no not Microsoft) Adobe. Adobe Inc’s popular software Adobe Reader is the most hacked software of the year. Security firm iDefense reportedly tracked as many as 45 bugs in the Adobe Reader programme this year. The number is up from 14 in 2008 and seven in 2007.

Security experts feel that Reader being a universally used programme makes it highly vulnerable. Also, its complex code base offers a high risk of flaws.

2. Internet Explorer: At No. 2 on the Most Hacked Software list is Microsoft’s Internet Explorer. Little surprising that the browser with majority marketshare (almost 65%) is hot on hackers and scammers target list. According to the news report, IE’s complex code base with no shortage of bugs helps hackers.

Security researchers found 30 bugs in IE this year, almost the same number as last year and way down from 49 found in 2007.

3. Mozilla Firefox: The open source browser Mozilla Firefox is the year 2009’s third Most Hacked Software. Closest rival to Internet Explorer with approximately 25% marketshare, recorded an increase in vulnerabilities this year.

Researchers and cybercriminals found as many as 102 bugs in Firefox this year, an increase of 12 bugs vi-a-vis last year’s 90 bugs. Wondering what makes its more vulnerable than IE which showed 30 bugs? Remember, the two cannot be compared directly as Firefox is an open-source programme and Mozilla publicly reveals all its bug finds.

4. Adobe Flash: At No. 4 on the Most Hacked Software list is Adobe’s popular design software Flash, commonly used for viewing animations and movies. The report found 11 vulnerabilities in the programme this year, down 8 from 19 last year.

According to the report, the vulnerabilities pose a potential danger as the software used for viewing videos and animation requires no interaction with the user to infect the machine with malicious software.

5. Apple Quicktime: Next on the hit-list of hackers is Apple Quicktime, a multimedia framework used for handling various formats of digital video, media clips, sound, text, animation and music. Though Apple talks about immunity from bugs in its machines, however, security experts feel that relative security comes from its low marketshare and not careful coding.

According to the report, 26 bugs were found in Quicktime in 2009, down 10 from 36 found in 2008. The number looks high compared to mere 3 found in Windows Media Player.

6. Microsoft Office: At No. 6 is another Microsoft software, Microsoft Office. IDefense tracked 41 bugs in Microsoft’s popular suite of apps in 2009, down from 44 in 2008. According to the report, hackers many a times use Microsoft Office applications like PowerPoint, Excel or Word document to plant malicious code.

7. Windows: Another Microsoft software on Most Hacked Software list is at no. 7. The company’s Windows-based operating system continue to be top on hackers radar. Experts believe that the fact that Windows vulnerabilities can be exploited without a user actually doing anything makes the software hacker-prone.

For example the Conficker worm spread to over 7 million PCs last year without requiring a user to visit a website, or open an attachment or actually do anything else, other than just leave their computers running.

Now, a TV that streams websites direct to the screen

Imagine a television set that allows you to search video clips from YouTube or BBC iPlayer — now you can bring this cutting-edge TV home this Christmas.

The advanced LCD set manufactured by British manufacturer Cello called the iViewer, which is to be sold through Marks & Spencer, links into the home’s wireless Internet service through a dongle, the sort of device used to connect laptops to the web.

full story here

Samsung launches H1 social networking phone with Vodafone

Samsung has launched its H1 social networking phone exclusively with Vodafone. The H1 is an HSDPA 3G phone with Wi-Fi, Bluetooth and GPS, so it meets all the fast data access requirements of a modern Smartphone.

Samsung H1 comes with 3.5″, 800 x 400 OLED screen. Buttons and connectors run to an on/off switch and 3.5mm headphone socket on the top, a volume/zoom rocker and micro USB mains power port on the left side, and camera and search buttons on the right edge. The search button opens up a generic search screen which lets you hunt through the phone and memory card storage, Vodafone 360’s list of members, Vodafone’s online store, and Google.


The Origin of the Computer Mouse

A little more than 40 years ago Douglas Engelbart introduced his “X–Y position indicator for a display system”—more commonly known today as the computer mouse—during a 90-minute presentation on a “computer-based, interactive, multiconsole display system” at the Stanford Research Institute (SRI) in Menlo Park, Calif. This event—attended by some 1,000 computer professionals—would later be called by many the “mother of all demos” and would introduce a number of computing capabilities largely taken for granted today: the mouse, hypertext, object addressing and dynamic file linking.

read full story