Posts

Showing posts from November, 2010

Android Phone Solves Rubik's Cube In 12.5 Seconds

Image
A Lego Mindstorms robotics kit controlled by an HTC Nexus One smartphone successfully untangled a Rubik's Cube puzzle in 12.5 seconds at this weeks ARM technical conference in Silicon Valley. The current 3x3x3 cube-solvers's 15-second average represents a substantial improvement over the 25-second solutions of an earlier version, which was powered by a circa-2006 Nokia N95 smartphone, thanks to a faster (1GHz) CPU, more RAM, and revamped cube-solving algorithms. ARM Engineer David Gilday, who created the robotic cube-solver, claims the current version's algorithms can handle cube complexities up to 100x100x100, assuming he build the mechanics. In terms of racing humans, Gilday says the Lego robotics kits can only manage around 1.5 moves per second, whereas human players can make between 5 and 6 moves per second, amazingly enough.




Motorola Sues Microsoft over 16 patents...

Image
As if there weren't already enough patent suits related to smartphone technologies, Motorola just announced its widely anticipated countersuit against Microsoft. Its subsidiary Motorola Mobility filed complaints with two US District Courts (Southern District of Florida and Western District of Wisconsin). Motorola already litigates with Apple in those and other courts. According to Motorola, the patents relate to technologies in the fields of operating systems, video codecs, email, instant messaging, object-oriented software architectures, WiFi, and graphical passwords. Motorola claims Windows, the Live messenger, Windows Phone, Outlook and other Microsoft products infringe. Motorola's action is no surprise given that all of the companies sued over patent infringement by Android — with the exception of Google — have already countersued.

Microsoft patents Foot Computing

Image
Microsoft Research has made it possible for a mother to surf the web while nursing her newborn, thanks to its newly-patented 'foot-based user interface' (FUI?). 'In addition to causing health problems,' explains Microsoft in the patent, 'the traditional keyboard and mouse interface can be simply inconvenient in certain situations as well. In one instance, a mother with a baby in her arms is unable to easily perform simple tasks, such as checking email, on a computer.' Users of the 'Foot-Based Interface for Interacting With a Computer,' however, will be able to move their feet and step on the floor a la DDR to execute various commands, such as deleting email or scrolling down the screen. Due to the usual foot-dragging on the part of the USPTO, the patent — filed for in 2006 — was essentially obsolete by the time it was issued on Tuesday, a week after Microsoft's Kinect launch.

Red Hat releases RHEL 6

Image
Red Hat on Wednesday released version 6 of its Red Hat Enterprise Linux (RHEL) distribution. 'RHEL 6 is the culmination of 10 years of learning and partnering,' said Paul Cormier, Red Hat's president of products and technologies, in a webcast announcing the launch. Cormier positioned the OS both as a foundation for cloud deployments and a potential replacement for Windows Server. 'We want to drive Linux deeper into every single IT organization. It is a great product to erode the Microsoft Server ecosystem,' he said. Overall, RHEL 6 has more than 2,000 packages, and an 85 percent increase in the amount of code from the previous version, said Jim Totton, vice president of Red Hat's platform business unit. The company has added 1,800 features to the OS and resolved more than 14,000 bug issues.

Read More>>

AOL + Yahoo

Image
last month's news that AOL (American Online) and various private equity firms were exploring the possiblity of buying Yahoo. While talks between the companies have not officially gone much deeper, AOL has now hired financial advisers to analyze their options. Still, Kara Swisher writes at All Things Digital that the complexity of a deal between the two companieswill be the biggest obstacle they have to overcome.

Search Engine Optimization Poisoning Way Up In '10

Image
Cybercrooks continue to abuse the Web, boosting their ability to produce what's called search engine optimization poisoning so that individuals making use of search engines such as Google's increasingly are ending up with choices that are dangerous malware-laden URL links. Some 22.4% of Google searches done since June produced malicious URLs, typically leading to fake antivirus sites or malware-laden downloads as part of the top 100 search results, according to the Websense 2010 Threat Report published Tuesday. That's in comparison to 13.7% of Google searches having that outcome in the latter half of 2009, says Patrik Runald, Websense senior manager of security research.

Read More>>

Google Vs Facebook...contact export issue..

Image
A kind of war has been going on recently between Facebook and Google over a contact export issue. First, Google blocked Facebook access to the Gmail contacts API. To this, Facebook responded back with a new method to get Gmail contacts of a user (the download contacts option). And now Google has slapped back again at Facebook and asks users indirectly to file a data protectionism complaint against Facebook. When a Facebook user clicks on the Download Your Contacts button on the 'Facebook import contact via Gmail' page, the user is then redirected to a new page on Google's server, which looks something like this...

Lamebook Sues Facebook....

Image
Here’s a head scratcher, at first glance at least: Lamebook, a hilarious advertising-supported site that lets Facebook users submit funny status updates, pictures and “other gems” originating from the social network, is apparently suing Facebook over trademark infringement.


Read More>>

Oracle leads to monetize JVM...going to make two tiers..

Image
According to the Register, Oracle is going to make two tiers of Java Virtual Machine — a free one and a premium paid one.'Adam Messinger, Oracle vice president of development, told QCon that Oracle plans to offer a "premium" edition of the JDK in addition to the open-source JDK. Both, it seems, will be based on a converged JRockit VM and the Hotspot JVM from Sun Microsystems. The converged JVM will be released under the OpenJDK project. ... Messinger didn't explain how the premium JVM would differ to the free version, but the premium edition will likely see performance tuning and tie-ins to Oracle's middleware.

Chrome OS Notebook

Image
According to recent reports, a Google-branded Chrome OS notebook will be launched by Inventec later this month. Acer and HP will be launching theirs a month later, in December. This report is also backed by a source close to Google stating that the company is still on track to launch its Chrome OS by the end of the year, as well as its Chrome app store.

IE9 the most compatible HTML5 Web Browser as W3C says...

Image
The W3C posted results for their latest HTML5 compatibility tests and have found that, so far, IE 9 has the best overall results. 'The tests cover seven aspects of the spec: "attributes," "audio," "video," "canvas," "getElementsByClassName," "foreigncontent," and "xhtml5." The tests do not yet cover web workers, the file API, local storage, or other aspects of the spec. Not do they cover CSS or other standards that have nothing to do with HTML5 but are somehow lumped under HTML5 by the likes of Apple, Google, and Microsoft

Microsoft Open Source F# Don Syme...

Image
Don Syme has announced the release of the F# compiler source code as a code drop under Apache 2.0. He wrote, 'The F# PowerPack now includes libraries, tools and the compiler/library source code drops. I'd like to take a moment to explain the F# team's approach to this. Firstly, the source for the F# compiler in our MSI/CTP releases has been available for some time, in the releases themselves, so in that sense there's not much new in this release. Secondly, we've always made sure we have a free download binary release of F# available, and will continue to do that, and that should still be the main way you "get" a release of F#. However, we've long discussed making compiler+library source available in a different way. After some discussion, we've decided to do this via a "code drop" model, where we make available versions of the compiler+library code logically matching each release of the F# language itself.

Links:
http://www.i…

Cryptography or Cryptology + Encryption + Decryption

Cryptography is the study of hiding information. Cryptology is kind of synonym for encryption i.e. the conversion of certain information from readable state to a nonsense state. The information encrypted can be decrypted with (i.e. changing the nonsense information into a sensible information) a key which is set by the person during time of encryption.

Basic terms of cryptography:

Plain-text and Cipher-text
The plaintext is a input data to the encryption algorithm and encrypted using cipher. The text after processing than gets converted to a ciphertext which can be decrypted using cipher (or cypher are the pair of algorithms which help in encryption and decryption)  for it. The ciphertext cananot be read by a human or computer unless the the cipher is available with them to decrypt it.

Decryption
It is a process by which the ciphertext is made to covert to a plaintext.

Cryptanalysis
It is the method of studying the encrypted nonsense data such that the cipher which was applied on it to e…

Cloud Computing??...need an answer read below..

Image
In this modern world of technology we keep hearing frequently the word CLOUD COMPUTING which is difficult for a layman to understand...so next time you can refer the layman about this article on CLOUD COMPUTING....
>1. What is Cloud Computing? -A. Let’s take a simple example to understand it in a practical manner. We access various email services on the internet such as Yahoo mail, Gmail, Hotmail for sending or receiving mails. For using all these services we don't require any software (except the browser) and nor a server. The only thing we require is an internet connection. Now the cloud in this is the Server which is at the company's place providing the service and the email management software is installed at that server only. So we are enjoying all the services and benefits with a click of a button. So this is how we can phrase the above example as "If you only need milk, would you buy a cow?” Therefore, the Cloud Computing can be explained as the user only needs to …

Clash Back from Apple, sues Motorola...

Image
Earlier this month, there was a news that Motorola had sued Apple, alleging infringement of 18 patents involving the iPhone, iPad, and other Apple devices. In response, Apple has now launched a pair of lawsuits alleging that Motorola is the infringing party, pointing to a number of patents involving touchscreen displays and multi-touch technology, and also methods for interacting with settings and data on a device. Apple wants the court to award them damages and prevent Motorola from continuing to sell the offending devices, which include the Droid, Droid 2, Droid X, BackFlip, Devour i1, Devour A555, Cliq, and Cliq XT.


Read More>>

Is it possible to access 3G service on peak of Mount Everest? Yeah.......

Image
It's what every mountaineer wants when they reach the summit of Mount Everest: a 3G high-speed communication. Those who have trekked to the top will soon able to call their mates, go on Facebook or Twitter, and boast that they got there thanks to TeliaSonera and its subsidiary in Nepal, Ncell, which have brought 3G to the Mount Everest area. Climbers who reached Everest's 8,848-meter-high peak previously depended on expensive and erratic satellite phone coverage and a voice-only network set up by China Mobile in 2007 on the Chinese side of the mountain.


Read More>>