Showing posts with label INTERNET. Show all posts
Showing posts with label INTERNET. Show all posts

Chrome licence appended after objections

Friday, September 5, 2008 |

Google says that it will dump one section of the end-user licensing agreement that gave the company "a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive licence to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any content which you submit, post or display on or through" the new browser.
Several Web users raised copyright and privacy concerns about portions of the licensing agreement shortly after Google launched Chrome. Some critics suggested the language would allow Google to use any Web content displayed in Chrome without getting copyright permission.
Google said it borrowed language from other products, "in order to keep things simple for our users," when it inserted the copyright provision in the Chrome licence. Read

Chrome on day one

Thursday, September 4, 2008 |

I downloaded Chrome yesterday and despite all attempts by my hectic schedule and MBA preperation, I have finally managed some time to write a small post on Chrome fairs on day one. Back home from work, tired and exhausted I checked out my percentile of the mock MBA entrance test I gave last sunday. Although I just managed a 81 percentile, quite less from what I expected, there was something more in what i was viewing. The small bar on top of the browser made it possible for me to see the whole page without scrolling down, something which was good. It was just like watching a movie on your big screen TV. It is far better than the small cramped screen. The same was felt here. Chrome won the battle on day one as my Mozilla almost chocked my 512Mb RAM notebook. It would be still too early to stay that the success of Chrome is inexorable, I'd still say, it is very much on the cards.


Related Posts

Comcast limits internet usage

Saturday, August 30, 2008 |

Digg - 250 GB Challenge & 5 Tools To Monitor Your Bandwidth [Giga Om]

[nytimes]
Comcast, one of the country’s largest Internet providers, said this week that it would place limits on customers’ broadband usage.Beginning Oct. 1, Comcast will put a 250 gigabyte-a-month cap on residential users. The limit will not affect most users, at least not in the short-term, but is certain to create tension as some technologies gain traction.

A Comcast spokeswoman, Jennifer Khoury, said 250 gigabytes was about 100 times the typical usage; the average customer uses two to three gigabytes a month. Less than 1 percent of customers exceed the cap, she said.

Many Internet providers reserve the right to cancel the service of the most excessive users. The 250-gigabyte cap is Comcast’s way of specifying a longstanding policy of placing a limit on Internet consumption, and it comes after customer pushed for a definition of excessive use.

High bandwidth : The evil side

Sunday, June 1, 2008 |

Scientists across the world are devising new techniques and are exploring other protocols to serve one purpose, a high bandwidth. Internet service providers are competing with each other to provide higher bandwidths to customers at competitive prices. The world is on the internet highway, where the speed limit is continuously increasing. We live, talk and socialize on the internet. Some of us met their life partners on the internet. Wow! what a life changing experience. Amidst all this positivity and development, there have been many people who have been affected. Some positively and a few negatively. The most affected people have been the movie producers. Their movies have been stolen, ripped and are available for download on forums across the world. For the internet user with a high bandwidth and a less price, it would take a few minutes to download the DVD rip of a movie. A movie once downloaded, will surely be circulated across and once his friends see the movie, they wouldn't actually spend money to go to the theater to watch them. If you are more patient, a week or two (maximum) after the movies release, pirated copies are available for less than $1. With high bandwidth comes the risk of huge file transfers (illegal). Recently some chinese suckers (hackers), hacked Indian defense websites, stealing vital information. I feel hacking is an achievement (of evil) in itself and hackers being the lord voldermort (the evil guy) of harry potter. Some times this evil is used by us, when we use and watch pirated stuff. It will take some hard work and smart effort by the antivirus and web security companies to curb the ill effect of high bandwidth

Wiredness on web with images

Saturday, May 31, 2008 |

Wiredness.com is an image manipulation website that allows you to manipulate images. It is currently in its beta phase but the features it offers can help it make a popular website in future. It is more for photo enthusiasts who want to experiment with their images and don't want to use a software like the adobe photoshop. The interface it gives is much like your file explorer interface make it intuitive and easy.

The scoial bookmarking available helps you to bookmark your images easily.

It includes support for multiple languages which for now only includes a German, Portuguese and Turkish version but French and Chinese versions will be added soon.

It has been integrated with picasa and flickr. The integration is not bug free but there are plans to smoothen it in future.

As a developer you can use the API provided by wiredness.

So wire yourself to the website and check it out at www.wiredness.com

Teens are struggling on google

|

You have read it right. Teens are struggling on google (not literally) and so was I. I've been bad with my spellings and so when I was posting my previous blog entry on "How to make popular a struggling blog" I decided to type my version of the spelling on google.com to check whether it was correct or not, because if it is not correct then above the search results you get a red colored sentence "DID YOU MEAN". You can see it in the picture below. I wrote the wrong spelling just to show you the result. So as I finished writing my spelling, what I saw amazed me.
Click on this image below to enlarge it and see the search results. 292,000 search results for struggling teens. Woah! that's not a good sign at all for the teens, or maybe the parents. I'm out of my teens so I don't need to worry and actually nobody needs to worry. Its just that 292,000 or less websites(people) thought about writing on struggling teens and this simply shows that it is searched more and read more. The idea of this post is not to scare or discourage anybody or even google. It is just an observation I made while checking my spelling. Small things lead you big observations and that means another blogpost. Mine is a Tech-No-Logy blog and although being from a technical background, I like looking at the other side of technology, the side which few of is look at.
If you have noticed some freaky results on google or any damn thing, make sure you comment about it.
As a safety measure
Please note : I have no intention of defaming or abusing any organization. It is just an observation.

How to make popular a struggling blog

|

There are millions of bloggers in the world today. Some blog about technology (like me), some about travel and most of them do nothing. The some I mentioned are the popular bloggers whom we like to read. I don't come under the umbrella of struggling bloggers who want more people to read their story and view point. But it is not easy. It is tough and yes to put more stress on this I'd say this is "damn-damn" tough. The struggling bloggers mostly struggle because of google. Yes! You might find that strange but google gives preference to a blog with a higher page rank and yours ( or mine) being a struggling blog, we never stand a chance. So what do we do next. Promote ourselves. Promote through digg,del.icio.us and other social bookmarking websites. Some go the extent of spamming. In this post I will not go into those things. I'll give more preference to the blog post content this time. Every time search engine optimization is talked about, experts say , "focus on content". But how can a person write a wikipedia content single handedly. It is not practical. It is possible of course! Just spend one day per article or probably more and you'll reach you target of the wikipedia standard and still it wouldn't meet the standards required for an article that is featured on wiki. So what's next. I'd say write short articles, but write more. Atleast 5 articles a day if you plan to be a professional blogger. I met a few at a blogcamp recently. There is an easy way where you connect your blogging platform with a microblogging platform. But whats microblogging. In case this term is new, it is blogging within 140 characters according to www.twitter.com , a microblogging service. To get more information on microblogging, after reading my blog make an account on twitter (but after reading, cos there is more to tell). Now once you've finished up with your account on twitter, log on to twitter feed [ http://twitterfeed.com/ ]. The twitterfeed service is in sync with twitter. It uses the RSS of your blog and updates itself after regular intervals (say 1 hour) and puts your post link on your twitter account. Wow! isn't it. So connect with like minded people on twitter and don't worry about bookmarking your page and trying to become a power digger(digg.com). Next time I'll compare dogg with the tiny twitter, but be careful, twitter.com has got a annoyingly high downtime.
So blogger, get your twitter account and start tweeting. Don't forget to follow me on twitter.
Check out my twitter profile below
http://twitter.com/sushantkumar

But for the struggling blogger this isn't it. It still won't give you a wikipedia post. I'd suggest stop wasting your time building up articulate posts. Just be objective and tweet, digg and sleep. Sleep is meant for sleeping, its not a website.

Orkut and Open Social API : The beginning of a trend

|

Orkut is the most famous social networking websites in India. As the developers of orkut are facing problem in converting the popularity of the website into big bucks, the website is riding high on its powerful networking feature and easy interface. Recently (Nov last year ) Google introduced the opensocial application programming interface (API) following the trend started by Facebook.

I recently met two developers at the Delhi Bar camp 4 where they demonstrated how they had developed an application on Facebook last year and how it brought their server down within few months because of the enormous amount of traffic (million page views daily). Finally they decided to sell their application in January this year. Not a bad start for two students.

According to the CHIP magazine, 8 out of 19 applications on Orkut have been developed in India. A game Teen Patti is attracting a lot of people and is all set to become a rage in future. Teen patti which is a cards game played by people on festive occasions can be players between people and the players can chat with each other. It also has a ranking system that tells you who is the best player.

The successful social networking website Orkut is still proving to be a fat elephant to push in terms of revenue it is generating. Manu Rekhi, the product general manager of Google says that it is just a matter of time. It took three years to get the search revenue model right.

AJAX star rating bar

Friday, March 21, 2008 |

Here is a rating bar that you can add on your website or blog, using ajax.

Let me tell you first that this is not for beginner. You need to have a goo knowledge of php, css, before going out for this.

Click here
to visit the page

This is how it looks, when it is implemented

It was tough for me to implement it on blogger and hence I decided to leave it there only.
If you want to implement it, you can visit this link

Antivirus companies are failing to keep up with the growing virus population

Thursday, March 20, 2008 |

The sheer volume and complexity of computer viruses being released on the Internet today has the anti-virus industry on the defensive, experts say, underscoring the need for consumers to avoid relying on anti-virus software alone to keep their home computers safe and secure.

Approximately 5.5 million malicious software programs were unleashed on the Web last year, according to AV Test Labs, a German company that measures how quickly and accurately anti-virus products detect the latest malicious software, also known as "malware." That volume, AV said, forced anti-virus firms to analyze between 15,000 and 20,000 new specimens each day -- more than four times the daily average they found in 2006, and at least 15 times as many the company recorded in 2005. In the first two months of 2008 alone, AV Test found more than one million samples of malware spreading online.

View source

Dell is developing windows based mobile

|

A recent report from Digitimes suggests that Dell is working with Foxconn Group to develop Windows Mobile-based handheld devices. Neither Dell nor Foxconn responded to requests for comment.


The development of smartphones, however, seems like a logical step for Dell to expand its presence in the mobile market, said Neil Mawston, director of wireless device strategies at analysis firm Strategy Analytics.

However, Dell ; will need an iPhone killer to really make a dent in the market, analysts said.


Dell competitors Apple, HP and Toshiba are already present in mobile computing with smartphones and PDAs (personal digital assistants), and the market is just too big for Dell to ignore, Mawston said.

view source

byAgam Shah, IDG News Service

PC World


Empressr.com

Wednesday, March 12, 2008 |

Empressr.com is a website which can be used to make free presentations on the internet without buying an expensive presentation maker(Empressr composer). It is free to use and an account gives you 5Mb of space to upload your images,audio clips and other media .These have been termed as assets on the Empressr presentation maker tool. The tool is mostly intuitive and you should not have any problem using it. Apart from that, the presentation maker offers you a wide array of powerful tools to enhance your presentation and add animations to it. The rotation button is available on almost any component you put in the presentation which helps you rotate it to the best suited format.The chart option is also very impressive and helps you build customized charts.Overall to make a presentation on the internet,which can also be rated is a very good concept.Yes your presentation can be rated by other empress users(the empressrs). It can be used by bloggers and the web developers to add presentations, just as videos to their web pages. you just need a good internet connection to begin with and go on to have a lot of fun while creating presentations.

More on Empressr from Empressr.com

Empressr is developed by the people at Fusebox, an award winning Creative and Technology firm that designs custom web based integrated marketing and business solutions for clients like JPMorgan Chase, Goldman Sachs, Time Warner and MTV Networks.


Tag line

The First Online Application That Lets You Create, Manage and Share Rich Media Presentations Online



Go to Empressr.com

View the techreef's presentation on Empressr




Screen shot of the pagemaker


MetaGlossary.com

|


Web review

MetaGlossary.com is a search website which searches for 2,000,000 key words and phrases and gives you the answer. It is currently in the beta phase.
In short the website is a search engine and in case you don't find any result it shows you the other options you could have looked for and also allows you to add an answer.You can get add a firefox add on of MetaGlossary

Metaglossary is a glossary of a huge number of key words and terms that you may not always need and secondly the results you get are in such a form that you will seldom read them.The main point is that we already have services of google,wikipedia and answers at our disposal and they are in fact very good and give you what you want.It is just a waste of time to search on the meta glossary.But to leave my imprint I have added the meaning of techreef om the blog.


Visit Metaglossary.com

Windows Internet Explorer 8 Beta : The Blogger review

Friday, March 7, 2008 |

Windows Internet Explorer 8 Beta: Overview

T
his beta is aimed at web developers and designers to help them take advantage of new features in Internet Explorer 8 that will enhance their websites.


Features

Activities
Activities are contextual services that provide quick access to external services from any webpage. Activities typically involve one of two types of actions:
* "Look up" information related to data in the current webpage
* "Send" content from the current webpage to another application
WebSlices
Web sites can expose portions of their page as a WebSlice that users can subscribe to and bring that content with them on their links bar wherever they are on the web. Users receive update notifications when the content changes.
Internet Explorer Developer Center
For everything a developer needs to know including technical documentation, white papers, tutorial videos, and sample code.

Opera's antitrust complaint with the EU

The complaint describes how Microsoft is abusing its dominant position by tying its browser, Internet Explorer, to the Windows operating system and by hindering interoperability by not following accepted Web standards. Opera has requested the Commission to take the necessary actions to compel Microsoft to give consumers a real choice and to support open Web standards in Internet Explorer.

More on the Microsoft, opera's history of problems

Modern browsers (including IE, Firefox, Safari, and Opera) sport multiple content-rendering modes – including ones supporting strict interpretation of certain web standards as well as quirks modes needed to offer compatibility with pages that pre-date modern standards.

MS is now going to use IE8 standard as default. Developers who want their pages shown using IE8’s “IE7 Standards mode” will need to request that using a meta tag. This mode switching approach has been criticised by rival developers, such as Opera.

Microsoft's legacy of not sticking to web standards as closely as, for example, Opera, in the past has left it with more problems than other developers in sticking to standards.

Tech story: The Trojan horse

Sunday, February 24, 2008 |


In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus in most cases. Unlike such malware, it does not propagate by self-replication but relies heavily on the exploitation of an end-user (see Social engineering). It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse.

Story of the Trojan horse

In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus in most cases. Unlike such malware, it does not propagate by self-replication but relies heavily on the exploitation of an end-user (see Social engineering). It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse.

The end of the Trojan war came with one final plan. Odysseus devised a new ruse—a giant hollow wooden horse, an animal that was sacred to the Trojans. It was built by Epeius and guided by Athena, from the wood of a cornel tree grove sacred to Apollo, with the inscription:

The Greeks dedicate this thank-offering to Athena for their return home.

The hollow horse was filled with soldiers led by Odysseus. The rest of the army burned the camp and sailed for Tenedos.

When the Trojans discovered that the Greeks were gone, believing the war was over, they "joyfully dragged the horse inside the city", while they debated what to do with it. Some thought they ought to hurl it down from the rocks, others thought they should burn it, while others said they ought to dedicate it to Athena.

Both Cassandra and Laocoön warned against keeping the horse. While Cassandra had been given the gift of prophecy by Apollo, she was also cursed by Apollo to never be believed. Serpents then came out of the sea and devoured either Laocoön and one of his two sons, Laocoön and both his sons, or only his sons, a portent which so alarmed the followers of Aeneas that they withdrew to Ida.The Trojans decided to keep the horse and turned to a night of mad revelry and celebration. Sinon, an Achaean spy, signaled the fleet stationed at Tenedos when "it was midnight and the clear moon was rising" and the soldiers from inside the horse emerged and killed the guards and finally TROY was ruined by the GREEKS.

This story clearly shows how the TROJAN virus affects your system.


Source: Wikipedia


Gmail was on the verge of collapse

|

If a genie granted you a wish, would "The ability to access other people's Gmail accounts" be it? Abdulaziz Al-Shalabi from Kuwait wasn't visited by a genie, but he was granted access to Gmail accounts that were not his -- for a considerable period of time at that!

The goof-up began last weekend and only stopped on Wednesday. As it happened, Al-Shalabi was incessantly trying to access his Gmail, and he just wasn't able to. It's not clear whether entering his own username and password -- or random ones -- allowed him access to other Gmail accounts. But as he reported to News.com, he got a peek into the private information of over 30 Gmail users.
The problem apparently occurred only over Al-Shalabi's ISP and with Gmail accounts; it didn't work with Hotmail accounts, for example. Having heard the news, a Gmail user in Sri Lanka reported a similar experience.

Acknowledging the problem, a Google spokesman said the goof-up had occurred in Kuwait because of a server caching problem the ISP was facing. He said Google was in contact with the ISP in question in order to find a solution. It's not known whether other Google sites were also affected by the ISP's problem, and if so, to what extent.

This is certainly a one-off incident, and we're certainly not trying to say you should switch away from Gmail. What's to be learnt is that the system isn't foolproof, and that it's possible for your mail to become accessible to others -- which, we bet, most of you would have thought impossible (unless your password is "abc123" and someone guessed it, in which case you deserve it).

If you're the really paranoid kind, and this bit of news has shaken you more than a bit, you might consider encrypting sensitive mails (such as those in which you call your boss an unfortunate accident of evolution) using a free service such as Hushmail.

Source:techtree.com

What makes NOD32 one of the best antivirus

Saturday, February 23, 2008 |

Posted on February 23, 2008.

NOD32 eyeWhat is NOD32 ?

  • NOD32 is an antivirus package made by the Slovak company Eset.
  • Versions are available for Microsoft Windows, Linux, FreeBSD, and other platforms.
  • A NOD32 Enterprise Edition is available that consists of NOD32 AntiVirus and NOD32 Remote Administrator.
  • The NOD32 Remote Administrator program allows a network administrator to monitor anti-virus functions, push installations and upgrades to unprotected PCs on the network, and update configuration files from a central location.

NOD32 was born in the early 1990s when computer viruses were becoming increasingly prevalent.

NOD32 screenshotWhat does it provide ?

  • AMON (Antivirus MONitor) - scans files as they are accessed by the system, preventing a virus from executing on the system.
  • DMON (Document MONitor) - scans Microsoft Office documents and files for macro viruses as they are opened and saved by Office applications.
  • IMON (Internet MONitor) - intercepts traffic on common protocols such as POP3 and HTTP to detect and intercept viruses before they are saved to discs.
  • EMON (E-mail MONitor) - An auxiliary module for scanning incoming/outgoing e-mails via the MAPI interface, such as Microsoft Outlook and Microsoft Exchange Client.
  • XMON (MS eXchange MONitor) - scans incoming and outgoing mail when NOD32 is running and licensed for Microsoft Exchange Server - ie, running on a server environment. This module is not present on workstations at all.

What makes it the best ?

  • NOD32 is written largely in assembly code, which contributes to its low use of system resources and high scanning speed.
  • NOD32 can process more than 23MB per second while scanning on a Pentium 4 based PC.
    It uses less than 20MB of memory in total.The physical RAM used is often just a third of that.
  • According to a 2005 Virus Bulletin test, NOD32 performs scans two to five times faster than other antivirus competitors.
  • In a networked environment NOD32 clients can update from a central “mirror server” on the network, reducing bandwidth usage since new definitions need only be downloaded once by the mirror server as opposed to once for each client.
  • In addition to signature files, NOD32’s scan engine uses heuristic detection (called “ThreatSense” by Eset) to provide better protection against newly released viruses.

Also Visit: ESET website

Quick Heal becomes Microsoft Certified Partner

Monday, February 4, 2008 |

Website: http://www.quickheal.co.in
Quick Heal India’s leading antivirus software walked another step ahead with Microsoft. Microsoft certified Quick Heal Technologies (P) Ltd. (previously known as Cat Computer Services Pvt. Ltd.) as its Independent Software Vendor (ISV) for providing antivirus solution for Microsoft operating systems and generic mail protection service.

Mojopac: giving some mojo to your storage device

Sunday, February 3, 2008 |

Website http://www.mojopac.com/

it is offering a software that can help you virtually carry your desktop anywhere loaded with applications.

It is available for free on the website

What the website says

Your experience using Mojopac is exactly as if you are using an ultra portable PC (your MojoPac device) and docking it to a computer (the Host PC you are plugged into).

Your MojoPac PC is running from your portable device, but it is borrowing the resources (screen, processor, CD/DVD drives, internet connection, printers, etc.) of the Host PC. In other words, MojoPac is your real PC (your applications, settings, data), and any computer it is connected to is being used as a utility to run MojoPac.

Creating a MojoPac PC: Creating a brand new MojoPac PC takes less than 3 minutes.

  • Plug your portable storage device (such as an iPod or a USB Flash or Hard Drive) into any Windows XP PC. Download MojoPac from our website and install it onto the device.
  • Once you have installed MojoPac, you can log into this MojoPac PC you created (which is running from your portable device), and bring up your newly created MojoPac desktop (MojoView). What you see is similar to a brand new Windows XP PC, and behaves exactly the same.
  • You can now install your applications from MojoView. The applications installed in the MojoView will be available for you on any PC you would connect and run MojoPac

Using a MojojPac PC: You can plug your MojoPac enabled device to any Windows XP computer (Host PC), and you will immediately be presented with your personal applications, files and environment - and it looks exactly like a standard PC experience. In your MojoPac PC view (MojoView), installing applications is similar to installing applications on any PC - simply load the application installer CD/DVD, or download the application installer from the web and proceed as you would on any normal PC. In fact, in your MojoView, your "C" drive represents your MojoPac device, NOT the Host PC. So applications install in the right place automatically, no extra steps required.

MojoPac lives side-by-side with the Host PC: When you bring up your MojoPac PC after plugging your device into a Host PC, the Host PC will keep running as it was before the connection. You don't need to change the Host PC's settings, install anything on it, or close any of the applications that were running on it. Even more importantly, you can go back and forth between your MojoPac PC view and your Host PC view - you can work on both PCs at the same time, and operate both environments simultaneously. Using your MojoPac toolbar (MojoBar) you can easily toggle back and forth between the host PC view and your MojoPac view. Each presents you with whatever personal preferences and environments you have chosen for that system and MojoPac will never alter the settings or status of the host PC.

currently: only XP compatible, also sounds a bit confusing, but yes it has got great potential.

source:www.mojopac.com

5 essential features of a website

Friday, February 1, 2008 |

The internet revolution is on and a lot of people are cashing in on it.The basic thing you need to follow the same trend is a website.But what kind of website?
A website can increase traffic and it can also turn away traffic. I have seen quite a lot of websites and depending on the nature of my work, I used a particular one. I liked a few websites and also disliked a few.So I decided to list 5 important features that could make a website successful

  1. Genuine(unique) content/concept
  2. Focussed area
  3. Simplicity
  4. Ease of access
  5. Relevance