|
Today’s Latest News
|
Apple interested in swappable iPhone camera lenses
A new concept for an improved iPhone camera system would allow users to reconfigure or even replace the lens for optimal pictures.
|
Facebook to pay $10 million to settle lawsuit
SAN FRANCISCO: Facebook has agreed to pay $10 million to charity to settle a lawsuit that accused the site of violating users' rights to control the use of their own names, photographs and likenesses, according to court documents made public over the weekend.
|
|
Android smartphones vulnerable to malware attack: Symantec
NEW DELHI: With their numbers increasing rapidly, smartphones are becoming more vulnerable to attacks by cybercriminals looking for prey beyond the PC and targetting mobiles, especially those using Android operating system, say experts.
|
Cyber attacks force companies to fight back
Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action.
|
Google refuses to delete YouTube videos 'mocking' Pakistan's army: Report
Expectations were riding high for Renault to roll out a manual version of the petrol Fluence. Instead, the French car maker has decided to hand out a surprise in the form of an upgraded E4 diesel trim that launches on Wednesday, April 3, i.e. tomorrow.
|
|
|
|
|
|
|
|
Apple interested in swappable iPhone camera lenses
|
|
A new concept for an improved iPhone camera system would allow users to reconfigure or even replace the lens for optimal pictures.
The details of Apple's proposed invention were revealed in a new patent filing discovered by AppleInsider and published by the U.S. Patent and Trademark Office on Thursday. The application, entitled "Back Panel for a Portable Electronic Device with Different Camera Lens Options," includes illustrations of an iPhone-like device with the camera located in the same top-left-corner location.
The filing notes that as the quality of digital images taken with highly compact devices increases, users seek even more sophisticated features typically only found with high-end digital cameras, such as digital single reflex (DSLR) cameras. Features such as supplementary lenses and filters, optical zoom, and optical image stabilization are not typically found in multifunction devices that include a camera.
Devices like the iPhone currently come with a pre-assembled digital imaging subsystem that allows them to be highly compact, but does not allow for replaceable lenses. In addition, they do not include a mount for filters or additional lenses.
"It would be desirable to provide a structure for a compact device that allows the end user to reconfigure the optical arrangement of the device while retaining the benefits of assembling the device using a pre-assembled digital imaging subsystem," the filing reads.
Apple's solution is a portable device, like an iPhone, that includes a digital imaging subsystem with a lens that has an optical axis. The device would feature a removable back panel that, when removed, would expose the digital imaging subsystem.
Both the digital imaging subsystem and the removable panel would be held in precise alignment by the iPhone case, which would negate the need for a direct connection between the camera's optical component and the subsystem. This would allow the user to reconfigure the optics of the camera on a highly compact portable device.
Normally, an iPhone camera system would include a near-infrared cut filter to prevent infrared light from reaching the image sensor and distorting the colors of a picture. Apple's system would include the IR-cut filter on the removable panel, which would allow photographers to remove it and capture black-and-white images at very low light levels.
|
|
|
Featured Technology Talk
|
Samsung to focus more on software: CEO
SEOUL: The new chief executive of South Korean giant Samsung Electronics stressed Monday the need for more investment on software to maintain the company's lead in the fast-changing technology industry.
Kwon Oh-Hyun said Samsung, which beat arch-rival Apple in the first quarter to become the world's top smartphone maker by sales, would work harder to build "unique platforms and ecosystems" to secure an "absolute lead" in the market.
"A particular focus must be given to serving new customer experience and value by strengthening soft capabilities in software, user experience, design and solutions," he said in an inaugural speech.
Kwon took the helm at the world's largest technology firm earlier this month after his predecessor Choi Gee-Sung was appointed to head the strategy office for the Samsung group, of which the electronics firm is the flagship.
Samsung Electronics -- also the world's biggest producer of flat-screen TVs and memory chips -- has tried to strengthen its mobile software business which is relatively weaker than its mighty device-making operations.
Its popular smartphones and tablet PCs -- the Galaxy S and Galaxy Tab series -- run on Google's Android operating system.
The Bada software developed by Samsung has not garnered much popularity among consumers and device makers so far, prompting the firm to set out to hire more workers in software development.
"Our company is at an inflection point in our bid to be a genuine global number one...complacency will put us on the same path as the countless other companies that have faded into the mist," said Kwon.
|
|
|
|
|
|
Facebook to pay $10 million to settle lawsuit
|
|

SAN FRANCISCO: Facebook has agreed to pay $10 million to charity to settle a lawsuit that accused the site of violating users' rights to control the use of their own names, photographs and likenesses, according to court documents made public over the weekend.
The lawsuit, brought by five Facebook members, alleged the social networking site violated California law by publicizing users' "likes" of certain advertisers on its "Sponsored Stories" feature without paying them or giving them a way to opt out, the documents said.
A " Sponsored Story" is an advertisement that appears on a member's Facebook page and generally consists of another friend's name, profile picture and an assertion that the person "likes" the advertiser.
The settlement was reached last month but made public this weekend. Facebook declined to comment on Saturday.
The proposed class-action lawsuit, filed in federal court in San Jose, California, could have included nearly one of every three Americans, with billions of dollars in damages, according to previous court documents.
In the lawsuit, Facebook Chief Executive Mark Zuckerberg was quoted as saying that a trusted referral was the "Holy Grail" of advertising.
In addition, the lawsuit cited comments from Facebook chief operating officer Sheryl Sandberg, saying that the value of a "Sponsored Story" advertisement was at least twice and up to three times the value of a standard Facebook.com ad without a friend endorsement.
US District Judge Lucy Koh said the plaintiffs had shown economic injury could occur through Facebook's use of their names, photographs and likenesses.
"California has long recognized a right to protect one's name and likeness against appropriation by others for their advantage," Koh wrote.
The settlement arrangement is known as a cy-pres settlement, meaning the settlement funds can go to charity.
The case in US District Court, Northern District of California is Angel Fraley et al., individually and on behalf of all others similarly situated vs Facebook, 11-cv-1726.
|
|
Android smartphones vulnerable to malware attack: Symantec
|
|
NEW DELHI: With their numbers increasing rapidly, smartphones are becoming more vulnerable to attacks by cybercriminals looking for prey beyond the PC and targetting mobiles, especially those using Android operating system, say experts.
"The major mobile platforms have finally become ubiquitous enough to garner the attention of attackers, and as such, Symantec expects attacks on these platforms to increase," Symantec Managing Director, Sales, India and SAARC, Anand Naik said.
Expressing similar views, McAfee Labs Product Manger Vinoo Thomas said, "With smartphones becoming more powerful and popular, we have seen a lot threat moving to them from PCs."
Although the risks to computers have not totally subsided, malicious software authors are now creating mobile- specific malware.
"The number of vulnerabilities in the mobile space are rising and malware authors not only reinventing existing malware for mobile devices, but creating mobile-specific malware geared to the unique mobile opportunities," Naik said.
Threats that mobile malware pose include, sending premium-rate SMSes, collecting device data, spying on the users, tracking location of the device, modifying the settings, sending spam, monitoring the device for banking transactions and so on.
As tablets and smartphones continue to outsell PCs, and workers bringing in their own devices into the corporate environment, attacks on these platforms will keep increasing at a very fast pace.
According to Symantec's Internet Security Threat Report XVII, attackers are exploring a shift in focus toward mobile devices and mobile vulnerabilities increased by 93 per cent last year.
Majority for these threats are targetted at Google's Android operating system.
"In our Global Threats Report for the first quarter of 2012, we saw a large increase in mobile malware. The jump was targeted almost solely at the Android platform.
"Hundreds of Android threats in the middle of 2011 have moved into the thousands this year. Android threats now reach almost 7,000, with more than 8,000 total mobile malware samples in our database," Thomas said.
|
|
|
TECHNOLOGY
"First learn computer science and all the theory. Next develop a programming style. Then forget all that and just hack."
|
Indian IT companies halt lateral hiring
BANGALORE: In the surest sign of a slowing economy, the technology sector, which is the largest employer of skilled workforce in the country, is putting off hiring people with experience.
While campus recruitment for entry-level jobs is still on, lateral tech hiring seems to have come to a near halt with many IT firms giving fresh instructions to third party hirers to put hiring on "slow" , "mute" or "halt" mode.
A huge bench ( employees without work due to lack of new projects) is mainly responsible for this state of affairs. Other factors that are directly contributing to the scenario are: a stressed pipeline (lack of new orders), distance between projects, continuing troubles in the banking and financial services (BFSI) space and the antioutsourcing sentiments in the US accentuated by it being the election year.
The trend is likely to continue till the US elections are over later in the year, though there could be a mild recovery expected in the job market by September. C Mahalingam, HR head, Symphony says, companies want to ensure that contracts and customer commitments are in place before any further hiring. So they are extremely cautious about hiring .
"Depending on the nature of talent, the status of hiring varies. For instance most of the hiring in the lateral space is almost brought to a halt, while specialized talent like IT architect, functional specialists , tech leaders, network specialists are still being hired, though the status is considerably slowed down or muted," said Mahalingham.
However, tech firms like HCL, Infosys, Wipro, TCS etc are actively hiring in the US market. "Companies are under pressure to hire in the customer markets, due to business and strategic reasons ," say country head of a leading MNC.
|
Famous Scientist

Enrico Fermi
Enrico Fermi (Italian pronunciation: [enˈriko ˈfermi]; 29 September 1901 – 28 November 1954) was an Italian-born, naturalized American physicist particularly known for his work on the development of the first nuclear reactor, Chicago Pile-1, and for his contributions to the development of quantum theory, nuclear and particle physics, and statistical mechanics. He was awarded the 1938 Nobel Prize in Physics for his work on induced radioactivity.
Fermi is widely regarded as one of the leading scientists of the 20th century, highly accomplished in both theory and experiment. Along with J. Robert Oppenheimer, he is frequently referred to as "the father of the atomic bomb". He also held several patents related to the use of nuclear power.
Several awards, concepts, and institutions are named after Fermi, such as the Enrico Fermi Award, the Enrico Fermi Institute, the Fermi National Accelerator Laboratory, the Fermi Gamma-ray Space Telescope, the Enrico Fermi Nuclear Generating Station, a class of particles called fermions, the synthetic element fermium, and many more.
In 1938, Fermi received the Nobel Prize in Physics at the age of 37 for his "demonstrations of the existence of new radioactive elements produced by neutron irradiation, and for his related discovery of nuclear reactions brought about by slow neutrons". After Fermi received the Nobel Prize in Stockholm, he, his wife Laura, and their children emigrated to New York. This was mainly because of the Manifesto of Race promulgated by the fascist regime of Benito Mussolini in order to bring Italian Fascism ideologically closer to German Nazism.
The new laws threatened Laura, who was Jewish. Also, the new laws put most of Fermi's research assistants out of work. Soon after his arrival in New York, Fermi began working at Columbia University, where he had already given summer lectures in 1936 (preface to Thermodinamics, Dover Publications, Inc. NY).
Enrico Fermi had been the first to use a neutron to produce the radioactive change of one element to another. On 2 December 1942 he initiated the atomic age with the first self-sustaining chain reaction, after which he became known as "father of the atomic bomb". Michael H. Hart ranked him No. 76 in his list of the most influential figures in history.
|
|
|
|
|
|
|
|
|
| |
Cyber attacks force companies to fight back
|
|

Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action.
Known in the cyber security industry as “active defense” or “strike-back” technology, the reprisals range from modest steps to distract and delay a hacker to more controversial measures. Security experts say they even know of some cases where companies have taken action that could violate laws in the United States or other countries, such as hiring contractors to hack the assailant’s own systems.
In the past, companies that have been attacked have mostly focused on repairing the damage to their computer networks and shoring them up to prevent future breaches.
But as prevention is increasingly difficult in an era when malicious software is widely available on the Internet for anyone wanting to cause mischief, security experts say companies are growing more aggressive in going after cyber criminals.
“Not only do we put out the fire, but we also look for the arsonist,” said Shawn Henry, the former head of cybercrime investigations at the FBI who in April joined new cyber security company CrowdStrike, which aims to provide clients with a menu of active responses.
Once a company detects a network breach, rather than expel the intruder immediately, it can waste the hacker’s time and resources by appearing to grant access to tempting material that proves impossible to extract. Companies can also allow intruders to make off with bogus files or “beacons” that reveal information about the thieves’ own machines, experts say.
Henry and CrowdStrike co-founder Dmitri Alperovich do not recommend that companies try to breach their opponent’s computers, but they say the private sector does need to fight back more boldly against cyber espionage.
It is commonplace for law firms to have their emails read during negotiations for ventures in China, Alperovich told the Reuters Global Media and Technology Summit. That has given the other side tremendous leverage because they know the Western client company’s strategy, including the most they would be willing to pay for a certain stake.
|
|
|
|
Google refuses to delete YouTube videos 'mocking' Pakistan's army: Report
|
|

LONDON: Google has revealed that it took down 640 videos from YouTube that allegedly promoted terrorism, in the second half of 2011 after complaints from the UK police.
The internet search giant said it terminated five accounts linked to the suspect videos following complaints from the UK's Association of Police Officers.
The firm, however, said it had rejected many other state's requests for action.
According to The BBC, Google also refused to delete six YouTube videos that satirised Pakistan's army and senior politicians.
The order had come from the government of Pakistan's Ministry of Information Technology.
Overall, Google said it had received 461 court orders covering a total of 6,989 items between July and December 2011.
It added that it had received a further 546 informal requests covering 4,925 items, of which it had agreed to 43 percent of the cases.
The report quoted Google's senior policy analyst, Dorothy Chou, as saying that the firm was concerned by the amount of requests that had been linked to political speech.
"It's alarming not only because free expression is at risk, but because some of these requests come from countries you might not suspect - Western democracies not typically associated with censorship," Chou said.
According to the report, the revelations come in its latest Transparency Report, which discloses requests by international authorities to remove or hand over material.
|
|
|
|
|
Tips to make your browser secure
|
|

MUNICH: Web browsers are the key to the internet. Without them the internet is an impenetrable black box.
Browsers may be among the most commonly used applications, but they also offer the greatest number of attack options for dangerous content on the net.To keep viruses, worms and other malware away from your computer when surfing,it's crucial to configure your browser for security.
The firewall on a DSL router is a good first step for protecting the computer during surfing, says Marco Rinne from the computer portal chip.de. But that doesn't hold true if your browser is out of date: “Internet Explorer 6 and 7 or Firefox 2 no longer satisfy current security standards,” he says. For optimal protection, he therefore urgesusers to keep theirbrowsers updated.
Firefox offers additional configurationoptions underthe Settings item in the Security tab of the Options dialog box: thisincludes the ability to block risky or forgedwebsites.It's also a good idea to prohibit websites from installing add-ons on their own. Similar settings are possible under Internet Explorer in the Security tab of the Internet Options dialog box, accessible from the Tools menu.
Computer owners should also activate all options for warning against attacks, advises Markus Linnemann, managing director of the Institute for Internet Security (ifis) at the Polytechnic University of Gelsenkirchen in Germany. This applies in particular to warnings about suspicious content to be displayed using ActiveX, Flash, or JavaScript.
Yet the warning mechanism on most browsers alone isn't usually enough, Linnemann says. Those who wish to be especially careful can, for example, use the Firefox add-on 'No Script,' which blocks all active content of a website by default and allows the user to decide which should be permitted. The problem is that most users are unable to determine which content represents a threat to their computer, Rinne msays.
|
|
|
|
|
|
|
the word denim comes from 'de Nimes' or from Nimes which is a town in France
|
|
Cartoon of Technology
|
|
|
Enterprise Mobility: The Indian CIO’s perspective
|
|
When put together with a sound IT infrastructure and management strategy, the use of personal devices in corporates has given rise to the Bring Your Own Device (BYOD) trend that is here to stay. CIOs, although apprehensive, are trying to facilitate rather than hinder the process. The primary reason for this is the strong upside associated with this phenomenon.
A recent survey by Accenture among Singapore workers revealed that two-thirds of those surveyed enjoyed greater job satisfaction when allowed to bring their own devices owing to increased flexibility and freedom.
|
|
|
|
|
|
|
|
“The mind is like a clock that is constantly running down. It has to be wound up daily with good thoughts."
|
|