Monday, December 31, 2007

Enjoy with GPS Enabler: Sony Ericsson K530

Sony ericsson K530 is a compact less weight of 92g, the Sony Ericsson K530 packs a 2.0-megapixel camera, M2 card slot, secondary video call camera, 2.0-inch LCD screen, 3G connectivity, and Bluetooth 2.0 with A2DP.The Sony Ericsson K530 is a slim 3G phone that gives full and fast access to the Web, plus performance imaging with a 2 megapixel camera and a variety of news, weather and entertainment features

The Sony ericsson K530 is the perfect partner for the GPS Enabler HGE-100. The K530 as a phone and accessory combination, the two can record speed and distance, and also provide visual post-training analysis on the good-sized 2" screen. The 2 megapixel camera on the Sony Ericsson K530 boasts a x2.5 digital zoom and video recording capabilities.

The most affordable 3G phone from Sony Ericsson , the K530 will keep you in-touch Screen. Its slim, pocket-sized so can take it with you anywhere and enjoy the full 3G experience . The Sony Ericsson K530 is a UMTS 2100 and GSM/GPRS 900/1800/1900 phone and is available in Warm Silver. Sony Ericsson K530 is just a standard candybar, tri-band GSM with UMTS 2100. Still it features 2-megapixel camera with video recorder, 176x220 display, stereo Bluetooth and Radio. Please Purchase online

About Author
Representing Sony Ericsson K530 in the website

Friday, December 7, 2007

Music Videos for Iphone-How To Get Them

Iphone's are proving to be tremendously popular, and one of the most popular things to go with it is to download some music videos for it. The Ipod beforehand has proved to be a very popular device, and it's now likely for the Iphone to repeat that success.

In order to download the music videos for the Iphone, the first thing you need to do is to make sure the videos you are downloading are in the MP4 format, as this is the only video format the Iphone can currently support. Luckily you'll find that most sites are primarily based around this format anyway.

The toughest thing about downloading the music videos for the Iphone is actually finding them. It's pretty tough to find the best download sites unless you know where they are. There are several different kinds of site, some of which may well prove to be a lot more trouble than they are worth. Probably the biggest danger is to use a peer to peer site for your downloads. Whilst these sites have been popular in the past, it's best to avoid them as they are breaking the law, and so will you be if you download anything from there. Another major danger is the software itself-you can seriously damage your computer and Iphone by using these sites, as there is no regulation of what is uploaded by the users. This means hackers and spammers use sites like this as a method of introducing new viruses to the internet, putting you at direct risk.

The good news about this is that you can now find a few sites which can offer you all the positive sides of the peer to peer sites, but very few of the negatives. The way it works is that you pay a one off fee to join the site, and in turn they give you unlimited downloads. Because you pay the sites a fee to join, they use the income to keep their downloads clean and regularly add new downloads to their stocks. You'll also find that these kinds of sites keep a lot more in their database than music videos-you'll also find movies and games as well as TV shows. This gives these kinds of sites a tremendous amount of value for money.

If you are looking to download some music videos for your Iphone, this article will hopefully let you know anything you need.

Iphone Games

Downloads For Iphone

Wednesday, December 5, 2007


What is Spyware?

Spyware is malicious software that has been surreptitiously installed on a computer typically from a source such as the Internet.

What does it do?

Spyware in its present form started out as a means of surreptitiously gathering information about a person and relaying it over a medium such as the Internet. It has somewhat evolved and can now be used to steal information such as someone's bank details or to harm your computer.

It can harm your computer in many ways from making you computer behave in an unexpected manor to causing regular system crashes. Spyware can be installed by means of using free programs downloaded from the internet and also by doing such things as installing Internet browser toolbars.

My computer works fine, so it's Spy-ware free?

If your lucky then you don't, but unlike a virus not all spyware will show itself by trying to harm your system. It may just quietly sit there gathering information and sharing it with some unscrupulous person. Which could potentially be more harmful than any computer virus could ever be you.

Can spyware take control of my computer?

Spyware has the capacity to take limited control over your computer and the ability to make your computer unusable. The control it can take can come in the form of taking control of your Internet browser and redirecting you to another website. This could be done in order to further compromise your computer by having harmful viruses installed on it or in an attempt to generate revenue for third parties.

Is Spyware a Virus?

By definition spyware is not a virus; although it may be mistaken for one by a user as it can have the same malicious effect.

What can be done about it?

The best way to fight spyware is to make sure you are protected from the word "go". So, before you even start to use the Internet make sure you have some form of anti-spyware software along with anti-virus and a firewall.

Saying that, it is usually only when we have encountered a problem that we then go and look for the solution. Meaning, if you are reading this then there is a good chance you already have some form of spyware on your system and are looking for ways to combat this threat.

If you are already infected then there are some anti-spyware software packages that will find and destroy the spyware in most cases, but as you may be aware some work better than others. Some spyware packages will not find new or certain types of spyware and it usually those certain types of spyware which will be harming your computer.

There are many sites that can offer Spyware protection as well as a wealth of information about Spyware and how to protect yourself from it.

Saturday, November 24, 2007

Features Of Your MP4 Player

When MP3s came into the market, they were a huge hit. They were small and portable, and owners could listen to all their favorite music while on the move. Now you have the MP4 player, such as iPod, with even more advanced, attractive features!

With the MP4 player (iPod), you can not only listen to your favorite songs, you can also watch your favorite movies, music videos, and TV shows, along with all your MP3 songs. It can do other things as well - you can listen to FM radio stations, you can record voice notes, and on some devices, you can even read your favorite ebooks.

Since 1993, when the MP3 technology was first introduced in to the market, it had been the most important music format. The recent introduction of the MP4 with its more compressed audio format has again changed the way digital sound is perceived. Most people might not be aware of how the MP4 differs from the MP3 and think that MP4s are more compressed and hence smaller than the audio files in the MP3 format; others assume that these two represent different technologies.

There are both common features as well as distinctions between MP3 and MP4 players. The most important point that comes to the mind when you compare the two, is that the MP4 format has properties that make up for all the shortfalls of the MP3, and the quality of perception of the files in the MP4 format is much better when compared to the MP3.

Basically, MP4 is a container. So it has the capability to carry video as well as audio files. So the basic difference is that the MP4 contains the audio and video at the same time while the MP3 format can support only the audio files. The MP4 player (iPod) allows you to realize something bigger and better than anything you can imagine. It is a new concept known as Structured Audio, and it is a mode of describing sound in the most ultra-modern way.

The MP4 technology supports a quality of sound that represents the future standard for a variety of multimedia application , including computer music and gaming audio; hence one can think of the MP4 as the next step in the evolution of the file format that started with the MP3.

There are many types of MP4 players in the market. They are very light and have small screens of 1.2 inch, however some of them may have screens of up to 2 inches. The speakers are built inside the players and there are earphone sockets as well. It is not unusual to find OLED display characteristics. OLED produces brighter and sharper images as compared to LCD images.

A great characteristic of MP4 players (iPod) is that there are not innumerable buttons for the various commands. Only a few buttons are sufficient for the purpose. The memory is quite large at 8 GB for flash based and 100 GB in case of micro based hard drive .

The latest MP4 players (iPod) even support third party, flash memory cards, which are external... they even have USB support. Earphones and other accessories are also available with the MP4, but at times the quality may not be up to the mark.

Because of it capability of delivering both video and audio at the same time, MP4 devices (iPod) can offer an even greater range of features such as email, web browsing, instant messaging , music and video download, digital cameraPsychology Articles, bluetooth wireless technology and many more. Multiple language options and gaming capability add to its versatility. Features such as voice recording enable MP4 devices to be used not only for entertainment but also for professional purposes.

This article is under GNU FDL license and can be distributed without any previous authorization from the author. However the author's name and all the URLs (links) mentioned in the article and biography must be kept.

This article can be accessed in portuguese language from the Article section of page ,

Roberto Sedycias works as IT consultant for Polomercantil

Wednesday, November 21, 2007

Your Guide To A Notebook

A notebook or laptop is nothing but a small portable computer that weighs 2.2 to 18 pounds (1 to 8 kg), that depends on its brand, style, size, material it is made of, and many other factors. Notebooks generally operate on a single main battery or through an external adapter that can both charge the battery and also supply power to the notebook.

Notebooks are adept at performing the same jobs like a personal desktop; the only difference is that they are generally less powerful for the same cost. They consist of similar components like desktop computers and execute the same functions, except that they are miniature in size and suitable for transportable use and effective power consumption. Notebooks usually have LCD and different memory modules. They have a built-in keyboard; input is done through a touchpad or a pointing stick, though an external mouse can also be attached.

There are different categories of notebooks. UMPCs are Ultra-Mobile PCs and are very portable. Since they are of a small size they can fit in a small touch screen while some other models have a minute physical keyboard along with a mouse interface. The other type is Ultraportables which are notebooks and have screens less than eleven inches and have less than 3.7 pounds (1.7 kg) of weight. They are generally used by business travelers, as they are small and light though very expensive. They have an extended battery life and integrated graphics. The other type of notebook is the Sony VAIO FJ76, and Dell XPS M1330 and XPS M1210. Then we have the mainstream notebooks that are more of budget desktops. And if you want desktop power, then you can opt for desktop replacement which can accommodate many performance components.

As far as the processors are concerned you should go for the fastest that your budget will allow. You can opt for Intel's Centrino that has great speed and also good battery life. Or else you can also go for the economic AMD's mobile processors whose performance still lags behind Intel. If you intend to watch DVDs on your notebook then go for wide screen ones that offer sharper, larger and great images. The only consideration is that they are not meant for carrying around a lot.

For great system performance it is vital to have enough memory (RAM) that will allow you to run many applications together. Adequate RAM is also essential for image and video editing, graphics work, and 3D gaming. Generally notebooks have a terrible sound quality so it is recommended to use speakers or headphones. These are some of the factors that you need to consider before buying a notebook.

Also keep in mind that like any electronic device, your notebook is vulnerable to accidents as well as system failures. It is recommended to get at least a three year warranty and also some additional insurance.

Health hazards related to using a laptop has been a controversial topic for quite some time. Researches have proved that heat generated from notebooks can raise temperature of scrotum, leading to reduced sperm count. A solution can be using it on a table or keeping it apart from the lap that will enable better cooling of the notebook and also prevent your lap from excessive electromagnetic radiation and heat.

Some of the famous brands that have notebook are Acer that have TravelMate, Ferrari and Aspire models; BenQ; Compaq with its Armada, LTE, EVO and Presario models. Other famous brands are Gateway, HCL, Lenovo, LG, Micro-Star International, Panasonic, Samsung, Toshiba and others.

This article can also be accessed from page Notebook_Guide

Wednesday, April 18, 2007

Important feature of Nokia 6120 classic mobile phone

  • Now a days more and more using their mobile set for downloading music, streaming video, browsing the Internet or receiving emails with attachments, Nokia 6120 phone can help you to perform those tasks faster and easier by utilizing HSDPA.
  • The new phone have two cameras first, a 2-megapixel camera with 4-times digital zoom, flash and panorama mode for taking high-quality photographs and the second camera is in the front which can take your picture while you are gong to use the video call feature.
  • Consumers can transfer their email, messages and other personal files from their old Nokia mobile phone to Nokia 6120 very easily. The Data Transfer application allows consumers to transfer contacts, calendars, photos, videos and files from their previous Nokia to their new Nokia 6120 classic, even when the SIM card is removed.
  • Also you don't have to sit infront of your office computer to check your calendar. You can easily synchronize your calendar from your office computer with the calendar featured in the Nokia 6120 classic phone.
  • With Nokia 6120 and 3G technology you can experience with faster browsing, streaming, music downloads and email and Internet access. The new Nokia HSDPA technology makes these applications, and many others, more accessible.
  • The Nokia 6210 classic is based on S60 software that lets users download and use additional applications in addition to the ones already found on the device. Users can personalize the phone with a wide variety of add-on applications, enhancements, content and service. S60 also allows users to run several applications at the same time enabling them to browse the Web while listening to their favourite music.

Saturday, April 7, 2007

Security features of Symantec Mobile Security Suite 5.0

Symantec Mobile Security Suite 5.0 will provide several integrated security technologies for mobile devices, including:

  • Antivirus – Whenever mobile user trying to access any file, Mobile Security Suite 5.0 checks any possible threats and prevents users from accessing an infected file. Also administrators can schedule regular virus scans and download any updates of Antivirus via Symantec LiveUpdate;
  • Firewall – Just like computer firewall, this controls both inbound and outbound network traffic on the mobile device;
  • Anti-SMS Spam – Anti-SMS spam is to detect spam message. After detecting spam message, it automatically filters and deletes spam messages, or places them in a separate spam folder;
  • Loss mitigation technologies – This is to protect your confidential data on the device and memory cards in case it is lost or stolen. In case some unauthorized user attempts to access confidential data and enter wrong password, after certain number of unsuccessfull attempt data wipe tool erases all data .
  • Phone Feature Control –Using this feature administrators can enable and disable certain device features like Bluetooth, WiFi, and device synching. This limits security vulnerabilities and potential attack by only providing access to those features which are required for business;
  • Symantec Mobile VPN – This optional can help you to corporate networks through secure IPSec VPN tunnels.
  • Network Access Control – When used with the Symantec Mobile VPN, this technology enables IT administrators to ensure only secure, policy-compliant devices can access the corporate network;
  • Tamper Protection – Verifies that the device’s image and security applications have not been tampered with or altered prior to allowing network access;
  • Enterprise Management – This provides a management console . With this IT administrator can customize the security policies.

Tuesday, April 3, 2007

Deepfish : New Mobile Web Browser introduced by Microsoft

Microsoft introduced a new mobile technology, called Deepfish, designed to offer mobile users quick and convenient Web browsing that more closely resembles the experience of browsing the Web on desktop computers.

It is claimed that Deepfish provides users with a full "as-designed" view of virtually any Web site on their mobile device and looks as you would expect it to on your desktop, allowing much more of the Web to be easily viewed on a mobile device than is possible today. The interface lets users zoom in and out on the parts of a Web page that interest them in an intuitive way, making it easy to use these large-screen formatted pages on a mobile device. On current mobile browsers, it can typically take up to a minute or more for a Web page to render, however the Deepfish architecture only loads the user-specified portion of the page, providing much quicker page-load times, as detailed information is only retrieved as needed or in the background.

To download the Deepfish technology preview and get updates from the Deepfish team blog go to, Microsoft is providing limited access to the preview on a first-come, first-serve basis.

Thursday, March 29, 2007

Penryn processor Technical Features to Improve Performance

New Penryn processor from Intel Going to introduce several feature which will help to improve performace.

Microarchitecture Optimizations -- Increases the overall performance and energy efficiency of the already leading Intel Core microarchitecture to deliver more instruction executions per clock cycle, which results in more performance and quicker PC responsiveness.

Enhanced Intel® Virtualization Technology -- Penryn speeds up virtual machine transition (entry/exit) times by an average of 25 to 75 percent. This is all done through microarchitecture improvements and requires no virtual machine software changes. Virtualization partitions or compartmentalizes a single computer so that it can run separate operating systems and software, which can better leverage multicore processing power, increase efficiency and cut costs by letting a single machine act as many virtual "mini" computers.

Higher Frequencies -- Penryn family of products will deliver higher overall clock frequencies within existing power and thermal envelopes to further increase performance. Desktop and server products will introduce speeds at greater than 3GHz.

Fast Division of Numbers – Penryn-based processors provide fast divider performance, roughly doubling the divider speed over previous generations for computations used in nearly all applications through the inclusion of a new, faster divide technique called Radix 16. The ability to divide instructions and commands faster increases a computer's performance.

Larger Caches -- Penryn processors include up to a 50 percent larger L2 cache with a higher degree of associativity to further improve the hit rate and maximize its utilization. Dual-core Penryn processors will feature up to a 6MB L2 cache and quad-core processors up to a 12MB L2 cache. Cache is a memory reservoir where frequently accessed data can be stored for more rapid access. Larger and faster cache sizes speed a computer's performance and response time.

Unique Super Shuffle Engine -- By implementing a full-width, single-pass shuffle unit that is 128-bits wide, Penryn processors can perform full-width shuffles in a single cycle. This significantly improves performance for SSE2, SSE3 and SSE4 instructions that have shuffle-like operations such as pack, unpack and wider packed shifts. This feature will increase performance for content creation, imaging, video and high-performance computing.

Source:Intel Press release.

Thursday, March 15, 2007

Windows Vista feature to avoid power misuse

One of the significant features Microsoft introduced in Vista is new power saving mode. Windows XP has two power saving mode, Standby and Hibernate. Windows Vista replaced them by Sleep mode. Hibernate is still available as an advanced power setting, but the Sleep mode is the default one and has more advanced features.

While in sleep, computer uses very less power for internal use. In notebooks, with the minimum power used during sleep mode, system goes to stand by mode and the state of the system is saved in the memory. If battery power goes down to critically low level, the system wakes for a very short time to save the needed information onto the hard drive, and immediately goes to hibernate state.

In Desktop systems, the process is little different. Here Microsoft Vista uses "hybrid sleep". In hybrid sleep, the state of the system is stored both in RAM and on disk, so that system can recover it’s state in case the power is lost. After saving the state of the system, it goes to sleep mode from where computer can easily bring back to working state.

Top goal of introducing this mode is enabling easy and first ‘on’ and ‘off’ of the computer. While making sure computer can save all data when the system is turned off, and brings in same state while you turn back on. In order to ensure that "off" worked effectively with this new model, instead of waiting for green signal from each application in the computer, Windows Vista sending notice to each application, services and devices about the power saving state and wait for maximum 2 seconds for them to finish up their current job and put themselves into a state from where they can continue when the system wakes up. Similarly Windows vista is very fast to come back from the sleep state. When you open the lid of your laptop, you will find your system becomes instantly on, sometime you may wonder if it was on whole time.

Another goal is to reduce the power consumption when the system is idle. Normally we want to avoid long boot process of the computer, so we prefer to keep the system up 24X7. This may be nice to keep your system always ready to work but in this way we are wasting huge amount of power. Windows Vista’s sleep mode made dramatic change to reduce computer’s idle power consumption. While a typical Pentium 4 system uses 102.6 watts of power, same PC while in sleep consumes only 5.6 watts. Vista provides API for the application developers so that application can get notifications about the power scheme being used on the system and then adapt their behavior for the power scheme.

Using Microsoft group policy IT administrator of a Business organization can decide that all machines will go to sleep after specified time of inactivity. Normally in large organization tons of computers sitting idle and because of that huge power gets wasted. This feature must help them to reduce power wastage.

Wednesday, February 28, 2007

High-performance computing environments by IBM

IBM on Wednesday unveiled a technology, marketing, and sales initiative to widen adoption of networked x86-based computers in high-performance computing (HPC) environments.

Normally HPC is used in large organizations, but in new initiative, IBM going to make this techology available for smaller businesses and departments of larger enterprises.

HPC initiative based on IBM hardware; third-party applications pre-architected for the life sciences; computer-aided engineering software; and middleware for finance sectors. Initially they are going to make the product for Linux and Microsoft WindowsComputer Cluster Server 2003 operations systems, and would feature networking technology from Cisco Systems.


Tuesday, February 20, 2007

Protect your Computer with Windows Vista

There are number of security features in Windows Vista. Most of which are newly introduced in this version. Along with them old security features also available with some advanced protection mechanism.

UAC (User Account Control) is the most significant security update in Vista. With this feature, all users, including users with administrative privileges, run in a standard user mode by default. When any action require Administration privilege such as software installation or changing system setting, Windows prompts for Administrator authentication. This security implemented in Vista to protect your computer from malware software. If any of those malware softwares tries to change any setting or install any software in your system, they will be prompted for consent first. System administrators also have the option to configure the system to require an administrator password for such elevations.

Microsoft added another layer of security ‘Windows Defender’. Windows defender going to scan the system periodically to detect spyware, addition to that it includes Real Time Security Agents which is going to monitor the important settings of the systems if there any system configuration changes caused by spyware.

Windows vista introduced several parental controls. As an administrator it is possible to locking web content and limit web browsing to only Kids website. As well as controlling based on categories such as “Pornography” or “Chatting” and so on. Administrator can restrict other users from executing certain programs. Also there is option to restrict certain hours of the day when gaming or other activities are permitted.

It also introduced BitLocker Drive Encryption to protect data from a lost or stolen computer. There is a big threat of data theft or exposure from lost or stolen computer. Data on lost or stolen machines can often be viewed by installing a different operating system. BitLocker Drive Encryption is a hardware-enabled data protection feature that helps protect data on a PC when the machine is in unauthorized hands. By encrypting the entire Windows volume, it prevents unauthorized users from accessing Windows file and attempting the offline viewing of information on the secured drive.

The Encryption File System (EFS) is a powerful tool for encrypting information on client computers and remote file server to protect them from unauthorized users. EFS support storing user keys as well as administrative recovery keys on smart cards. If smart cards are used for logon, EFS operates in a Single Sign On mode, where it uses the logon smart card for file encryption without further prompting for the PIN. The Client Side Cache, which stores offline copies of files from remote servers, can also be encrypted with EFS.

Another way that malicious software makes its way onto a user’s machine is by taking advantage of buffer overruns. Address Space Layout Randomization (ASLR) is a defense capability in Windows Vista that makes it harder for malicious code to exploit a system function. Whenever a Windows Vista computer is rebooted, ASLR randomly assigns executable images such as DLLs and EXEs to one of 256 possible locations in memory. This makes it harder for exploit code to locate and therefore take advantage of functionality inside the executables.

It is very common in office environment that somehow malware got into one of the systems and from there malware spread into other systems in the local network. To avoid those circumstances vista introduced Network Access Protection(NAP) that performs computer health policy validation. Independent hardware and software vendors can plug their security solutions into NAP, so IT administrators can choose the security solutions that meet their unique needs — and NAP helps ensure that every machine on the network makes full use of those solutions.

Vista also includes the much improved Internet Explorer 7, which includes more than a dozen new security enhancements.

Wednesday, February 14, 2007

Nokia Music manager in Nokia 5300

Music Manger in Nokia 5300 is very good application to manage music.

You can import music from your CDs to computer, and then transfer all your best songs from your computer straight to your Nokia phone. Nokia music manager can help you to copy music from CDs to Computer. It can also act as your desktop music player so you can sample and play your music files on your PC.

Once you copied your music to your PC, next step is to copy music to your mobile. To transfer music you need to connect the mobile phone with Computer. Connection can be done using USB cable or blue tooth. But USB connection is preferable since it is faster. Once it is connected, you can see your phone name on the Nokia Music manager Display.

Next step is to select the songs in the Music manager, which you want to transfer to your mobile. Select your phone name that will start transferring songs. After transfer, select your mobile in the Music manager to see the files available in the mobile. There it is possible to organize the files based on title, artist or Album. Also you can create new playlists, add or remove files from existing play list.

Thursday, February 1, 2007

High-Speed Wireless connection from Verizon

  • Verizon Wireless announced that it's rolling out a next-generation network in scattered locations across the country.
  • Specifically, Verizon said it's deploying CDMA 1x Evolution-Data Optimized (EV-DO) Revision A (Rev. A) in metropolitan Boston, metropolitan Richmond and Hampton Roads, Va., metropolitan Chicago, Utah cities including Salt Lake City, and areas of Florida.
  • The key breakthrough for Verizon, according to one wireless spectrum expert, is the more robust uplink offered by Rev.
  • The new service will be available for some customers of Verizon's BroadbandAccess, which is available to more than 200 million Americans in major metropolitan areas.
  • EV-DO Rev. A represents an important step in wireless network evolution because the improved up and down link speeds will allow for many new services like VoIP and better push-to-talk service
Source :

Wednesday, January 31, 2007

GPS tracking chip for mobile

  • A new chip designed for portable wireless devices combines the coverage of two satellite-based navigation services to offer a location tracking time of less than one second.
  • The u-blox 5 chip, which Switzerland's U-blox plans to unveil at the 3GSM World Congress event in Barcelona next month.
  • The technology has a tracking sensitivity of -160 dBm, which enables indoor coverage.
  • With a power consumption of less than 50 mW, the u-blox 5 chip allows GPS-enabled mobile phones and other wireless devices to operate in difficult indoor environments, such as shopping malls and train stations.
  • In addition to its satellite-based navigation chip, U-blox will use the 3GSM event to show several other new products, including AssistNow Offline, which stores data in the GPS receiver for up to two weeks.
  • The technology allows the receiver to compute a position instantly without having to connect to a mobile network at startup to download the data, as is the case with typical GPS services
Source :

Tuesday, January 30, 2007

Microsoft Launches Windows Vista and Microsoft Office 2007

  • Today Microsoft going to release Windows Vista™ operating system and Microsoft® Office 2007.
  • These two flagship products will be available in more than 70 countries, in 19 languages (with 99 languages anticipated by the end of the year), and at more than 39,000 retail stores and online.
  • With Windows Vista, consumers will be able to experience all kinds of entertainment — from television to video games to music and movies — how and when they want.
  • The new versions of Windows and Microsoft Office also deliver advances in family safety by empowering parents to better manage and monitor their children’s PC and Internet activities. With a few simple clicks in the new Windows Vista Parental Controls center, parents can manage and monitor PC and Internet access, and decide what kinds of TV, music and games are appropriate for their children.
  • Security is also more robust in the new releases. Features such as Windows Defender help protect consumers against attacks from spyware and malicious Web sites, while other enhancements help safeguard personal information.

Monday, January 29, 2007

Adobe released Photoshop Lightroom 1.0

  • Adobe Systems Incorporated today announced that Adobe Photoshop Lightroom 1.0 software is now available for pre-order and is expected to ship in mid-February 2007.
  • Photoshop Lightroom enables professional photographers to import, manage and present large volumes of digital photographs, helping photographers spend more time behind the lens and less time at the computer.
  • Adobe is offering Photoshop Lightroom at a special introductory price of US $199 through April 30, 2007 at the Adobe Store. Photoshop Lightroom will later sell for an estimated street price of US $299.
  • Photoshop Lightroom includes new functionality added since beta 4.1, with significant changes to the Library and Develop modules complementing improvements to the Slideshow, Print and Web components.
  • While in the Library module, new advanced keywording tools help photographers filter through large collections, and an improved import dialogue with more flexible file handling allows more choice when determining file location.

Sunday, January 28, 2007

Updates available for Palm mobile

  • Smartphone maker palm improved two Treo devices that run the Palm operating system by adding business-friendly features such as push e-mail for Microsoft Exchange users.
  • Palm's adding the kind of features business users want to the Palm OS-based Treo 680 and 700p. They'll now provide automatic wireless delivery of e-mail, calendar, and contact information directly from Microsoft Exchange Server 2003 SP2 or Exchange 2007.
  • Palm in the past provided the "push" service, the main attribute of Research In Motion's BlackBerry, only through third-party providers, and it required middleware.

Source :

Saturday, January 27, 2007

Open Source Software For Mobile Devices

  • A collaborative effort by mobile device manufacturers and service providers to create a Linux-based software platform .
  • The goal of the non-profit LiMo Foundation is to trim development costs and speed the spread of the open source software technology for use with handsets and other mobile devices.
  • The firms participating in the launch are: Motorola, NEC, NTT DoCoMo, Panasonic Mobile Communications, Samsung Electronics, and Vodafone.
Source :

Friday, January 26, 2007

Microsoft released Photo Info 1.0

  • Microsoft launched this week a new Windows Explorer tool for viewing metadata on photos on the web.
  • The free Microsoft Photo Info Tool software allows users to change metadata attached to photos within Explorer, saving the user from having to open a separate photo editing program.
  • The new Microsoft Photo Info displays file type, image size, ISO, white balance information, among other properties.
Source :

Wednesday, January 24, 2007

Apple released security patch for QuickTime

  • Apple Inc. has patched a vulnerability in its QuickTime media player that could give a hacker control over a computer.
  • The problem concerns a buffer overflow that can occur when QuickTime processes a RTSP URL (Real Time Streaming Protocol Uniform Resource Locator), which directs the player to a streaming file and allows a user to play and pause it.
  • A hacker could create a malicious RTSP URL embedded in a Web page that would could open a door for other harmful code to run on a machine, Apple said. The patch comes more than three weeks after researchers who are part of the Month of Apple Bugs (MOAB) project published exploit code.
  • The patch is available through Apple's download page, or it can be delivered through Apple's Software Update service.

Tuesday, January 23, 2007

IBM will introduce MySpace rivalry

  • IBM's Lotus unit will introduce Monday a set of social networking services that functions like a MySpace for office workers and which analysts say marks a renewed challenge to Microsoft.
  • Lotus is going back to its roots as a pioneer of business collaboration software with a service called Connections that features the latest ways for users to share information via the Web, while giving businesses controls over who sees what data.
  • Lotus Connections offers the business equivalent of Web meeting places like or Facebook, Yahoo's bookmark sharing site and blog search tools like — stitched together in one package.
Source :

Thursday, January 18, 2007

Downloadable Versions of Windows Vista, Office

  • Microsoft said it plans for the first time to make its new Windows Vista operating system and Office 2007 productivity suite available for downloading by PC users over the Internet.
  • Microsoft has for years sold downloadable copies of its home finance software, games, and other apps online, and software vendors including Intuit, Symantec, and others offer many of their products for downloading.
  • The company plans to offer Windows and Office for sale on the Web using technology called digital locker, which can safely store the alphanumeric license "keys" that provide customers with rights to use its products, and resume interrupted downloads.
Source :

Tuesday, January 16, 2007

LDoms; partitioning feature in Sun Solaris

  • Sun Microsystems has updated its Solaris operating system with a feature that lets its newest Sparc-based servers run multiple copies of the Unix variant in separate partitions.
  • The feature, called Logical Domains, or LDoms, is in Solaris 11/06.
  • the feature catches Sun partway up with Unix server rivals Hewlett-Packard and IBM.
  • In addition, Sun plans to announce it will incorporate a feature comparable to LDoms, the open-source Xen hypervisor, in its "Galaxy" line of x86 servers in 2007.
Source :

Monday, January 15, 2007

BalancePoint : To manage apps, severs, storage

  • Software start-up Akorri officially launched of both the company and a new infrastructure management and monitoring tool aimed at tying applications, server, and storage management together for better control of IT environments.
  • The tool named as BalancePoint, is an optimization tool that monitors and provides visibility into performance, availability, and utilization problems that cut across multiple domains.
  • BalancePoint can garner information from other tools and from hardware devices, including applications, servers, storage, and the network itself without using software agents.
  • The software compiles performance data from these sources to build models for monitoring and predicting how changes in the infrastructure might impact application performance, thereby aiding in capacity-planning decisions and troubleshooting.
Source :

Sunday, January 14, 2007

New Fixes from Oracle

  • Thursday Oracle Inc. issued its first-ever advanced warning that spells out the number and severity of the patches it plans to release to fix flaws in its flagship database and other software.
  • According to the advance notification posted on Oracle's Web site, the quarterly Critical Patch Update, scheduled to roll out Jan. 16, will include 55 patches, including 24 for bugs that can be exploited remotely by attackers.
Source :

Saturday, January 13, 2007

'Uncrackable' Secure Gigabit Quantum-Encryption Scheme

  • A quantum cyptography developer has teamed with an Australian cyptography company to create what the partners claim is the world's first 1- to 10-Gbps secure network that combines uncrackable quantum keys with classical encryption.
  • Typical bit rates used in today's high-speed networks forming corporate backbones are in the range of 1 to 10 gigabits'per second, but until today id Quantique was not in a position to offer quantum cryptography solutions working at such high bit rates.
  • With this new development, quantum cryptography is now compatible with these high-speed data networks.

Friday, January 12, 2007

Microsoft Patches 10 Bugs

  • Microsoft on Tuesday released four security updates to patch 10 vulnerabilities, seven of them judged "critical." But the company failed to fix multiple flaws in its popular word processor that have been exploited by attackers for more than a month.
  • Of the updates, three involve Microsoft's Office suite, while the fourth affects Internet Explorer, the developer's oft-patched Web browser.
  • MS07-003, which affects Microsoft Outlook, the e-mail client packaged with Office. The update fixes three flaws, one tagged critical.
  • MS07-004 fixes another bug in VML -- Vector Markup Language -- that is an extension of XML that defines Web images in vector graphics format.


Thursday, January 11, 2007

iPhone: How good with current data transfer rate.

  • Cingular's Edge network provides nationwide coverage at average data speeds between 75 Kbps and 135 Kbps, according to Cingular's Web site.
  • iPhone's unique Visual Voice Mail was co-developed by Apple and Cingular, This requires hihg data speed to operate.
  • Similarly the Wi-Fi capability, which can deliver high-speed data access requires high speed data transfer.
  • Cingular and other GSM-based service providers are working on technologies such as High-Speed Downlink Access (HSDPA) to boost their network data speeds , although they aren't expected to be available in time for the iPhone rollout.
So In the begenning it may not be possible to use all the features of iPhone in low data speed.

Wednesday, January 10, 2007

iPhone Poses Problems for IT

  • The sustained applause following its announcement Tuesday and the ubiquitous buzz thereafter gave immediate credibility to Apple's iPhone. But all are not green if we see this in IT perspective.
  • The iPhone's drawbacks might outnumber the draws for business IT. First and foremost, it's yet one more device and another platform -- the iPhone runs on a slimmer version of Mac OS X.
  • One of the main corporate qualms with the iPhone will be its lack of software flexibility. Apple is locking down the device, meaning that only applications Apple approves can be installed.
  • Even if Apple opens up, some applications like Siebel don't even run on the Macintosh platform. "The iPhone's ability to penetrate the corporate world is going to be limited because IT is not going to be able to support it and the applications that they're going to need are not going to be available on it.
Source :

Tuesday, January 9, 2007

TV to Vista, Palm and HP notebooks

  • Users of Sling Media Inc.'s "placeshifting" system, Slingbox, will soon be able to watch their home TVs on Palm Inc. smart phones running Palm OS, consumer laptops from Hewlett-Packard Co. or any PC running Microsoft Corp's Windows Vista operating System.
  • Sling Media released a new version of its SlingPlayer software for Palm Inc.'s Treo 700p smartphone.
  • Also announced a deal with PC maker HP to distribute the player software on HP notebook computers for consumers.
  • Sling announced plans for a Vista version of SlingPlayer, due for release in the second quarter.


Monday, January 8, 2007

Windows Home Server

  • Microsoft's long-anticipated home server software will first appear on a Hewlett-Packard box sometime in the second half of 2007.
  • On Sunday, Bill Gates, Microsoft's chairman announced Windows Home Server during a presentation at CES, the massive trade show in Las Vegas this week. "This is for homes where you've got either multiple PCs or Xboxes, the case where you want to have your storage available at all times to the different devices," said Gates.
  • HP will brand it as the HP MediaSmart Server, and it's the Windows Home Server software with their enhancements that will run on top of that.
  • HP's MediaSmart Server is to be powered by a 1.8-GHz 64 bit Sempron processor from Advanced Micro Devices, includes four hard drive bays and four USB ports for printer or external storage connections, and comes in a box about 10 inches high by 5.5 wide by 9 deep.
Source :

Sunday, January 7, 2007

Adobe Flaw May Be 'Worst' Bug Of 2007

  • The security threat which was unearthed recently, some researchers say has the potential to be the worst of all 2007.
  • Late Thursday Adobe posted a security advisory where they mentioned the detail of the bug "A cross-site scripting (XSS) vulnerability in versions 7.0.8 and earlier of Adobe Reader and Acrobat 7.0.8 could allow remote attackers to inject arbitrary JavaScript into a browser session".
  • In the security advisory Adobe suggested to update Adobe reader to version 8.

You may want to visit for complete news.