-->
Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu
Showing posts with label IT Application. Show all posts
Showing posts with label IT Application. Show all posts

Thursday, September 13, 2012

Secure Your Mobile Media

It is the human nature that likes to use something new and sophisticated but perhaps this is not true for gadget users in a remote telecommunications, disaster areas and war areas.

Not long ago, a nonprofit group MobileActive released a program called SaferMobile intended for activists and journalists who were in the area with a repressive regime. Through the program, the agency provides a guide on how to use encryption techniques and the use of handheld mobile devices that are not tracked.

The agency warned of the risks of using a communication device for activists and journalists working in conflict-prone areas. Many now prefer the international media news sources of the local population in conflict-prone areas, to reduce the risk of security for journalists working in the region.

But it was also create new problems. Rami al-Sayed, for example, video bloggers who are sending video material from the conflict in Syria, was killed after the download of video clips on the internet, used by Al Jazeera, the BBC and Sky News.

Through the agency SafferMobile program provides guidance on how the use of a number of communication tools can be dangerous device users. Through safermobile.org site, the agency released a Twitter user, YouTube service, e-mail, and downloading of pictures taken from a camera mobile phone. The Institute also provides satellite phone user is often so turned improve security risks in its operation.

The site invites users device communication tools to realize the risks of using communication tools to protect themselves.

Who does not know the sophistication of satellite phone, which is able to provide communication access in almost all locations in this hemisphere. Satellite phone, despite high operating costs, often a choice available when it comes to device communication tools in one location are minimal telecommunications infrastructure, from natural disasters to war conflict situations.

The agency expose a number of security-related risks users. Among other things, relatively easily intercepted satellite telephone, data sent via satellite could hardly be encrypted, and the device is also often sends the user's location in the form of data the GPS satellite coordinates.

In areas of conflict, particularly the war zone, the use of satellite phone can be dangerous. Frequently humanitarian activists and journalists became targets of the regime who feel aggrieved by their activity. The agency provides a number of tips that can be used to reduce risk. *** [AHMAD F | MOBILEACTIVE | PIKIRAN RAKYAT 13092012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Friday, August 31, 2012

The Unique Application on iPhone

Has not this blog does not display info about the gadget. On this occasion I try to display info derived from uniknya.com site.

Now iPhone is more familiar to the world community, especially the young people and businessesman. Young people who love the world of multimedia, iPhone will feature a complete delight. Businessman optimize the features of his office. But, besides all that, there are several iPhone apps that are unique and strange, here's an example:

1. Fart Mobile (Farting Sound Application)
This unique application for you who like to joke with friends. This application turn your iPhone into a virtual fart machine. Thus, it can be adjusted in the menu by simply moving the iPhone alone, it would be a real fart sound.

Also included is a variety of "types" farting noise. Can be used as a tool to joke around with comrades.

2. Baby Shaker (Lull Baby Application)
Baby Shaker application is a strange and controversial because it makes the baby as a toy object. How, you have a duty to lull baby with shaking the iPhone. If fine, the baby will fall asleep. If rough, the baby will cry and appear cross sign in his eyes.

Now, Baby Shaker apps was removed just a few days after its release.

3. iResus (Virtual Medical Applications)
iResus actually not so strange, but many people are worried because of the medical process is hung entirely on the iPhone. Dr Daniel Low at Hospital Seattle, simulating the operation with a view all the instructions step by step on iResus.

Although not a doctor, you can act as a medical expert.

4. Dog Whistler (Dogs Training Application)
Dog Whistler next unique applications. It's quite popular among iPhone users who have a dog in their home.

The application is easy to operate, you simply press a whistle symbol on the phone screen so that later appeared low frequency whistle that only dogs can hear at once will train them.

5. Hold On (Challenging How Long Grasping iPhone Application)
The latter is called Hold On. The application is to test how long you can press the button right in the middle of the screen. However, on second thought, this application eliminates boredom or create boredom?

It's good you play against other people to be more exciting. *** [MUHAMMAD SUFYAN | PIKIRAN RAKYAT 30082012]
This blog can be accessed via your smart phone.Enhanced by Zemanta

Thursday, July 12, 2012

Taking Lessons From Internet Doomsday

Earlier this week, July 9, 2012, internet citizen aka netizen to be wary of Internet doomsday. Although not fully proven, we can always take lessons from any incident that occurs.

It all began with the act of six Estonians and one Russian citizen last year. The group is led by Vladimir Tsastsin (31), a computer specialist malware (malicious software) maker.

Vladimir is the owner of several internet companies that have been attachment to the malware community. Other suspects are Timur Gerassimenko (31), Dmitri Jegorov (33), Valeri Aleksejev (31), Konstantin Poltev (28), and Anton Ivanvov (26).

The majority of them have captured the United States federal agents (FBI), yet one person still at large. They've been making since 2007. Because of the knowledge-based, virus threats that are made are still threatened even though their bodies are locked up in jail.

Malicious actions of DNS Changer virus allegedly infecting four million computers in the world, 50 thousand in Indonesia. DNS (Domain Name Server), is a means to address the human translator in the form of internet protocol number.

As an illustration, we are certainly easier to remember www.facebook.com than an actual computer system identifies the address of a computer with internet protocol numbers and addresses.

Through a number of engineering programming, Tsastsin group can control the victim computer's DNS server and redirect to a fraudulent DNS server that has been prepared in advance. More crazy, antivirus programs can disable them.

With all these threats, the Minister of Communications and Informatics of Indonesia Mr. Tifatul Sembiring said in various interviews, internet doomsday discourse quite exaggerated, but all parties should be aware of internet security.

Similar delivered Rolly Awangga, founder of Saung IT (information technology dissemination organizations from Bandung). According to him, the internet doomsday are increasingly confirming the Indonesian Community to improving computer security.

"We can take the lesson is always update your anti virus. Or if you want to be more fundamental, use a proven antivirus operating system such as Linux-based. Or UNIX base operating system," said the man from Bojongsari, Indramayu.

On the other hand, institutions that serve the public such as banks should always be aware and the public interest. He exemplifies the core banking services in the United States is willing to turn itself off when the internet doomsday. "That is not turned off because the malware has infected. However, rather than one client visit a site that has transferred control of his, they would prefer safe to turn off the first service. This should be followed," he said.

As a result, we can learn a lot from the July 9 Internet Doomsday. Even if we look at pattern threats of internet attacks on the public before, we can study the patterns of threat:

1. Melissa Virus (March 26, 1999)
Created by David L Smith, Melissa virus was first known on March 26, 1999. The virus is crippling client e-mail that can not be used, because the full electronic mail sent and received double the infected computer. Although it is marred not too big, but the giant companies like Microsoft when it shut down its e-mail while.

2. Y2K (Desember 31, 1999)
The second is the Y2K disaster, this is a calculation error caused by a computer storage system on which only provides two digits for the year, assuming that the first two digits are "19".

This is done in the 60's when the first computer designed to save on storage media. But when the new year 2000 arrives, the computer may indicate that the date change from December 31, 1999 to January 1, 1900.

This error will cause a major disaster is feared because the computer is also used to manage critical facilities such as nuclear power plants and aircraft. As a result, many companies around the world held a renewal in the field of computers, both software and hardware.

3. 'I Love U' Virus (May 4, 2000)
With the name of 'I Love U', this attack made netizens headache in 2000. Why not. This 'Romantic' virus has infected 55 million computers and causing losses of billions of dollars.

According to security software firm Symantec, the incident made the CIA and the British Parliament was forced to shut down their e-mail system in order to anticipate the threat. Its name is derived from the subject of e-mails that users receive.

Peak of the damage occurred on May 4, 2000. E-mail containing this virus consists of an attachment that says "LOVE-LETTER-FOR-YOU.TXT.vbs". When activated, the computer worm overwrites all files on the host as well as attacking a copy of itself to every file.

4. April Fool's Day (April 1, 2009)
There's also April Fool's Day conficket virus that spreads from April 1, 2009. This attack could infect up to 9 to 15 million computers at that time.

April Fool Conficker Virus is exploiting vulnerability the RPC DCOM MS 08-067, thus significantly succeeded in creating fear in the world of computer users.

5. 'Here You Have' Virus (September 9, 2010)
It became one of the darkest day for Internet users, especially in shipment proximity to the memorial of Black September. Because the users get e-mail subject 'Here You Have', which apparently contains a virus in it.

E-mail spread around the world at the time and managed to 'beat' network of major organizations such as Disney, NASA, Comcast, AIG, and Proctor & Gamble.

The virus is relatively harmless, is actually just a form of spam in the inbox, which in turn makes the user can not send e-mail anymore. But look at anyone who is a victim, obviously this is not a virus at random. *** [MUHAMMAD SUFYAN | ILHAM SANTOSO | TIM CERKAS | PIKIRAN RAKYAT 12072012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Wednesday, July 11, 2012

Google Chrome Finally Appeared on the iPhone and iPad

Just a few days after launch, the Google Chrome browser for iOS directly skyrocketed and became the most downloaded applications on Apple's iTunes Application Store. This browser is available free of charge and can be run on the iPhone and iPad.

Google Chrome iOS application was officially introduced at the Google I/O, that followed by the application developers on June 25, 2012. The presence of Google Chrome iOS makes the experience of surfing gadget lovers iDevices more faster.

Emergence of Chrome iOS in the event coincided with the introduction of the Google Android 4.1 Jelly Bean operating system and the Google's first tablet, Nexus 7.

Chrome logo.
Safari logo.
Google Chrome iOS becomes a threat to Apple's iOS platform default browser, Safari. Therefore, Google Chrome iOS offers a number of advantages, such as Google Maps, Google Earth, and Google+ social media.

Even so, Apple's Safari browser will continue to ensure that worn by the user's iPhone or iPad. Third-party applications, like Google Chrome, not allowed to be in the default program to open a document or link in the iOS.

Google Chrome has been competing with Microsoft Internet Explorer to become the most widely used browser. The Chrome for iOS has some uniqueness, of which the user can perform sync tabs, bookmarks, and passwords of their PC browsers. *** [T3 | TECHRADAR | FIRMAN | KORAN TEMPO 3927]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Wednesday, June 27, 2012

Google's Ambitious Digital Map

Search engine giant Google Inc is currently deploying a fleet of small aircraft have been equipped with cameras for a flight in some cities as a means of information technology company based in Mountain View, California, United States is to realize their ambitious projects and sometimes controversial, about their plan to create a digital map of the world.

Google plans to release the first three-dimensional maps for several cities by the end of this year, Google said in a press conference in one of their office in San Francisco. Google declined to name the cities that currently they worked in the manufacturing of three-dimensional maps, but show demonstrations a way of creating a 3D map of San Francisco, where the user can navigate around an aerial view of the city.
Google shows off the 3D feature on San Francisco. (Picture from: http://naption.com/)
"We're trying to create the illusion as if you are flying over the city, almost as if you are on your own private helicopter," said Peter Birch, a Google Earth product manager, told Reuters.

Brian McClendon, VP of 
Engineering,Google Maps.  
(Picture from: http://www.theverge.com/)
Head of engineering for Google maps, Brian McClendon, said the company was using a fleet of aircraft owned and operated by contractors and fly exclusively to Google. Then, when asked about the potential implications regarding privacy, McClendon said privacy issues similar to aerial imagery and all that kind of 45-degree angle taken from the plane has been used for a long time.

Google has used aircraft to collect aerial photographs in the past, such as the events of 2010 and of the natural gas pipeline explosion in San Bruno, California, but recent efforts have been marked for the first time the company will deploy aircraft systemically to build a standard feature in any of the products.

At the end of the year, Google hopes to soon have a 3D map that includes metropolitan area with a combined population of 300 million people. The first 3D cityscape will be available within a few weeks.

Google has many years of operating a fleet of camera cars that swept the world for shooting panoramic roads to popular mapping service. The cars had been feared by some state because it is considered to be violating privacy.

In 2010, Google admitted that the so-called Car Street View car that was intentionally collect e-mail, password and other personal data from wireless home network. WiFi is not related to collecting data through Google Maps project, so that Google can collect data on WiFi hotspots that can be used to provide separate location-based services.

3D city maps to come be a part of the Google Earth software, applications will be available also for mobile devices such as smart-phone based on Google's Android and iOS. Google, founded on 4 September 1998 in Menlo Park, California, United States, it also announced a version of Google Maps for Android smartphones that allows users to access specific maps without connecting to the Internet network alias Google Maps offline version.

Competing with Apple
Google's announcement comes a week before Apple Inc. held a conference for developers WWDC (Apple's Worldwide Developers Conference) in San Francisco, since rivalry between the two technology giants continue to heat up, especially in the mobile market is booming.

Apple Inc., manufacturer of technology based in the City of Cupertino, California, United States is planning to replace Google Mapss as built-in mapping services on the iPhone and the iPad at the end of this year with the technology of the company's automotive navigation systems from Amsterdam, the Netherlands, namely TomTom NV which was acquired by Apple Inc. It is said that Apple has showcased a new mapping software in front of invited guests who attended the WWDC event.

Head of engineering for Google maps, Brian McClendon said the company will continue to make Google Maps available as widely as possible and so it can run on almost any platform.

As alluded to Apple's veiled punches through the mapping service which has been supported by the technology of the TomTom which had already been playing in the business of mapping systems, he said was not worried that the integration with Google search engine will provide a mapping of a much more useful than just products using a "geocoder" - technology that uses geographic coordinates to create a digital map. Apple began using its own technology-based geocoder technology in Google Maps on your smartphone at the end of last year.

Google gives a little glimpse of the number of users who actively use Internet-based digital mapping is said to have exceeded 1 billion users to monthly active users in the Google Maps and Street View car has to travel more than 5 million miles (8 million kms) to do the shooting streets around the world.

Then when asked about the use of unmanned aircraft to pass up a photo shoot in the air above the city (3D cityscape), McClendon said that the plane is still a subject of evaluation by the Federal Aviation Administration (FAA). *** [TONI IRAWAN | PIKIRAN RAKYAT 21062012 | FROM VARIOUS SOURCE]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Thursday, April 26, 2012

Four Faces of Windows 8

Windows, Windows, Windows. That's the magic word of Microsoft boss, Steve Ballmer, in welcoming the technology of war this year. Yells that he made in the Consumer Electronics Show 2012 in Las Vegas, Nevada, United States. "With Windows 8, Windows we rebuild," he said. The operating system was first introduced on June 1, 2011 it is now can be used in the beta.

Windows 8 is a new strategy in constructing identity in the personal computer or a tablet PC at the same time. Such as Apple and Google, this platform also opens the way for Microsoft to build its ecosystem through market applications, Windows Store.

Because a reliable platform, Microsoft is straightforwardly made four versions of Windows 8. The reason, the software giant from Redmond, Washington, United States, it wants to make "reasonable" is used in all situations.
Windows 8 desktop preview. (Picture from: http://chromespot.com/)
The fourth model is Windows 8, Windows 8 Pro, Windows RT, and the Windows Enterprise. "This platform provides the flexibility you need," said Brandon LeBlanc, Windows Communications Manager Microsoft.

Nomura analyst, Rick Sherlund, said that Windows 8 will bring a new phase of innovation in the PC market, notebook, and tablet. "Over the last few years, the development of technology on notebooks is very low," he said.

As for Abhey Lamba, an analyst at Mizuho Securities judge, Microsoft too long to dwell in the world of software regardless of platform devices that will use Windows 8. "The time is too long. Though it took a strong consolidation, particularly in market dominance iPad tablet to beat," he said.

WINDOWS 8
This platform can be applied to a touch screen device or a computer, complete with keyboard and mouse. According to LeBlanc, Windows 8 is intended for home users.

In it, Microsoft Internet Explorer 9 browser install to the engine, which is the latest version, Task Manager, and be able to send images to multiple monitors.

This operating system also can change the language used in your device automatically. Previously, these features will only exist on the Windows platform for Enterprise or Ultimate editions. LeBlanc added that there are local language options. Unfortunately, at present only available in Chinese.

WINDOWS 8 PRO
This model is designed to accommodate the needs of technology enthusiasts or those who dwell in the world of technology and informatics. In short, this is a notch above Windows version 8.

"All of the features in Windows 8 is available here," said LeBlanc. "Plus encryption services, virtualization, computing management, and domain connectivity."

WINDOWS RT
LeBlanc would like to welcome Windows RT as a new member in the family of Windows that uses the ARM processor.

"This is the only platform that is intended for Windows 8 and tablet computers are supported ARM processor made," said LeBlanc. Previously, Windows has always been faithful with a chip made by Intel.

Previously, Windows RT known as Windows on ARM or WOA. Some of the differences between Windows and RT with an ARM processor with an Intel Windows 8 is in the form of devices that are thinner and lighter. "Certainly the use of battery energy becomes more efficient," said LeBlanc.

On this issue, Microsoft also offers a different touch to use the program Microsoft Word, Excel, PowerPoint, and OneNote.

WINDOWS 8 ENTERPRISE
This one is specifically for large enterprises which must be accompanied with a Software Assurance agreement.

Just like its predecessor, Windows 8 Enterprise edition also provides management services and distribution of computing, virtualization, security, and several options for organizing the IT system. *** [CNET | PC WORLD | RINI KUSTIANI | KORAN TEMPO 3862]
Note: This blog can be accessed via your smart phoneEnhanced by Zemanta

Monday, April 16, 2012

Operating System From Google

Google seems to not waste the opportunity to introduce the operating system for personal computers. While Microsoft was concentrating on developing a platform Windows 8, which has the look of Metro, utilizing Google as if it changes the look of the new version of the Chrome OS. 

Chrome's latest operating system actually has a user interface (UI) such as generation of Windows prior to Windows 8. Just like Windows XP and Windows 7, for example, on the main page of Chrome OS, lay rows of icons are available in a variety of applications in this platform. 

Before launch a new user interface, Chrome OS that was released in late 2010 has a simple display or perfunctory. For example, the layout of the application icons are lined up at the top of the machine and the browser window is always displayed in the center of the screen. 

Now the Chrome OS is not yet popular. However, with this interface, will open up opportunities for computer users who are familiar with older Windows platforms to switch to Chrome OS. 
 
 
 
Now that simply tells us that 20 years of operating system design wasn’t flawed at all. Checkout these amazing pictures from the Chrome OS. (Picture from: http://thetechnologycafe.com/)
 The plan Google Chrome OS latest look will launch at the  I/O conference that takes place in San Francisco, the end of June. On occasion, Google also will introduce a new feature called the Aura. Functions such as the Windows Manager. *** [TELEGRAPH | RINI K | KORAN TEMPO 3849]
Note: This blog can be accessed via your smart phoneEnhanced by Zemanta

Wednesday, April 11, 2012

Apple Has an 3D Avatar Building Application

Apple has recently patented a new application for the iPad that lets users create avatars in a version of three-dimensional (3D).

In the list of patents that was revealed to the media, how to use the specified application. For example, consumers can choose a specific color for their avatar.

"Three-dimensional models can be constructed through a combination of several forms, such as body, head, eyes, ears, nose, hair, glasses, hats and other accessories," wrote Apple patent filed.

Apple also provides an added touch of the application. One of them, the user can select and move a certain accessory to their avatar look unique and attractive. "It can add to the experience of using these applications," Apple wrote.
New Application Shown on an iPad. (Picture from: http://www.patentlyapple.com/)
With the presence of 3D Avatar-App, there is speculation that Apple is currently developing a video game services or applications that are intended for children. Besides being able to run on the iPad, the software is predicted to be part of the next phase of Apple TV.

So far the company has ever implemented an avatar in their products are Nintendo Wii. In an application called Miis, the user can identify himself and his account through an avatar that they design themselves. *** [TELEGRAPH | RINI K | KORAN TEMPO 3941]
Note: This blog can be accessed via your smart phoneEnhanced by Zemanta

Monday, March 19, 2012

Apple iWork Will Close

For those of you who store data on service iWork, quickly copy it to another place. The reason, Apple iWork will close from 31 July.

Closure is delivered through the Apple official site. Tim Cook led the company is planning to replace the function of iWork.com with the iCloud. Therefore, suggested that Apple's iWork users move their data to iCloud. Anyway, after the last deadline, Apple will erase all documents stored in iWork.

In addition to announcing through the site, Apple sent out emails to all users of iWork. "Last year, we launched iCloud, a service that can store music, photos, documents, and can connect to any wireless device," Apple wrote in an e-mail.

Now, there are more than 40 million documents stored in iCloud by millions of users.
iWork.com service launched in beta in early 2009. At that time, Apple says the service enables users to collaborate with Mac computers personal computer (PC) with Windows platform. Since then, applications available in iWork can be used in iOS, the operating system for Apple devices, and became the most downloaded software.

As a result, service users iWork and iOS-based devices 5 can be connected via iCloud which was released in October. iWork users can access their data through the site iCloud.com. *** [APPLEINSIDE | RINI K | KORAN TEMPO 3824]
Note: This blog can be accessed via your smart phoneEnhanced by Zemanta

Wednesday, January 11, 2012

Apple Will Use Hydrogen Battery

Computer company based in the U.S. Califorma, Apple, make a new breakthrough by using a hydrogen-powered batteries.

The plan, these batteries can be used in all Apple products output either the iPhone, iPad, or MacBook. In addition, a new type of battery is also capable of improving image quality.

Hydrogen battery cells can make computers and mobile phones last longer than conventional lithium batteries. At least such electronic devices capable of burning for weeks. The application of hydrogen batteries also make the weight the device becomes much lighter.

America patent institute recently issued two patents for Apple. From these two patents, one for electric fuel cell technology for smart-phones, laptops, and tablets of the future.

Reported by The Telegraph, hydrogen battery is composed of water in which there are elements of hydrogen and oxygen to generate electrical energy. This study has been tested in cars and military purposes.
Fuel Cell System to Power a Portable Computing Device. (Picture from: http://hitechanalogy.com/) 
Plan the use of hydrogen fuel will not only remove the batteries that are large and heavy, but also will be helpful for environmental sustainability.

By switching from a standard battery that uses toxic chemicals to hydrogen, the waste generated new technologies are only water and electric energy. This breakthrough is actually not something that is surprising for Apple lovers because earlier these companies also have been throwing the issue to the manufacture of hydrogen-based batteries. *** [ID | PIKIRAN RAKYAT 05012012]
Enhanced by Zemanta