вторник, 31 января 2012 г.

Iran has arrested the organizers of the beauty contest on Facebook


Iran has blocked access to social network Facebook, but many people manage with the help of special software to circumvent the ban.
A few days ago the police, who are responsible for security on the Internet, managed to arrest a group of four administrators of social networks. They announced a Facebook virtual beauty contest.

Among those arrested were two men and two women. Up to the moment of arrest by police officers in the group managed to enter 25 of both sexes. The organizers invited participants to send their photos.

Now all members of the beauty contest would be at risk of persecution. According to the head of the police, the group has spread "corruption and shamelessness."

Steve Jobs has demanded that Google stop the recruitment of specialists Apple


The relationship between Apple and Google can never be described as simple and friendly. Fault to a number of objective and subjective reasons, and last week it became known about a conflict between the two companies, which was quickly resolved.

Reuters has published a letter from CEO Steve Jobs' Apple, sent in March 2007, Eric Schmidt, who was then a board member of Google, to stop the recruitment of one of the engineers, whose name was not specified, as well as put an end to active poaching of employees Apple.

"I would be very happy if your department recruitment would stop doing it" - says Jobs Schmidt.

It should be noted that the response to a message from Eric Schmidt was instantaneous. He immediately sent the appropriate instructions in this regard a number of top managers of Google, including personnel director, who in reply said that the officer who tried to entice the worker Apple, will be fired within an hour. An unnamed human resources manager, in turn, asked that his apologies were given to Jobs.

About this correspondence became known due to held in 2009 the U.S. Justice Department investigation over the practice of employees pereverbovki Google, Apple, Adobe Systems, Intel, Intuit Inc. and Pixar. It was then revealed that between Google and Apple acted on the tacit agreement to avoid such actions.

понедельник, 30 января 2012 г.

Mozilla releases Firefox 10 on Tuesday


It is expected that on Tuesday, January 31, will release the final version of Firefox 10. This is consistent with the schedule adopted by Mozilla a while back - produce a stable build of the program every six weeks. One of the major innovations in Firefox will be the presence of 10 integrated function "silent updates": the browser will automatically disable incompatible add-ons, marking the rest as being compatible.

"Compatibility of mods has always been a significant barrier to offering new releases often. The new system will bypass the restrictions and give developers time to update add-ons "- the head of Mozilla Addon Team Justin Scott. According to him, thanks to innovation and will benefit users who upgrade process easier.

Tuesday will also be issued an update to Firefox 3.6.26, which fixes a security bug. Recall support this version of the browser will end in April 2012. A little later, on June 5, scheduled for release 13th versions of Firefox, reports ComputerWorld.

How to get around censorship Twitter


Recently introduced by blocking the content of individual countries can be easily bypassed.

The user has the legal ability to circumvent a ban on the content, imposed microblogging service: it is sufficient to choose the country in which this prohibition does not apply, according to Haim Anna (Anna Haim) from The Next Web.

Locked tweet says Gray in the news

To delete messages that violate the laws of a country, microblogging service must first determine in which country the user is located. Twitter can do this only after analyzing your IP-address. In order to avoid errors in determining the country of Twitter allows users to specify its own. To do this, just go to account settings and select any country from the list.

It must be remembered that the need to make changes not in «location» (location profiles), and in the «country»

суббота, 28 января 2012 г.

Soon Android-smartphone completely lose their keys


Information collected from community Android-developers, said that smartphones will eventually have no physical buttons, and all control will be carried out using the touch screen, like in Samsung Galaxy Nexus or Nokia N9.

The Internet already appeared on the assumption that the new iPhone will not be a physical button. But it seems that Google will do it first with their smartphones - will deprive them of any controls on the front panel, except for the touch screen.

The assumption that over time will lose their Android-Smartphone navigation buttons, first appeared after the announcement of the latest operating system - Android 4.0 (Ice Cream Sandwich) - and launch the first smartphone based on it - Samsung Galaxy Nexus.

The new smartphone was devoid of physical buttons on the front panel, which "moved" to the bottom of the touch screen. In addition, the buttons became three instead of four, who were present in the reference handy previous generation - Nexus S. Appropriately updated and graphical user interface platform.

Published in the official community site Android-developers Tim Bray record (Tim Bray), the lead author of this resource, confirms the supposition. In particular, his office looks at how to get rid of the button context menu, which was present exclusively on all Android-smartphone up to version 3.0 (Honeycomb).

"The Honeycomb need for physical buttons disappeared, and was presented to the class ActionBar, which became the standard solution to perform actions in a variety of applications," - writes Bray.

"In order to interact with the device was for the user nabolee simple and intuitive you have to exclude from the construction of a mobile device menu button and replace it with ActionBar». In other words, click the context menu offered to move the element ActionBar, which is the active window title of the open application.

Bray has published detailed instructions on how developers can in their applications to take into account the absence of the menu button on mobile devices that will be released in the future. He explained that if an application written for Android 2.3 or earlier, is suddenly running on a device with no buttons, the system automatically adds a context menu icon in the bottom of the screen to the right of common buttons, Ice Cream Sandwich - «back», «home "and" open applications ".

Note that the concept of device control via a touch screen, with no additional mechanical buttons have been implemented quite successfully in the smartphone Nokia N9 platform MeeGo. The interface of this system is designed so that all the actions that users are accustomed to do with the extra navigation buttons, gesture on the screen.

True, I might add that to abandon the physical keys on the case of mobile vendors do not yet fully ready (and it is unlikely to be appropriate). In all cases, require at least one button - Power button, which also serves to activate the standby mode.

The new strategy of HTC - less is better


With the curious revelations in a recent interview with Mobile Magazine gave the British division director Phil Roberson HTC (Phil Roberson). Referring to the company's plans for the coming year, he said that HTC is going to return to the strategy, which brought her into the front ranks of manufacturers of mobile devices - not to produce so many models, but of excellent quality and rich functionality.

With the curious revelations in a recent interview with Mobile Magazine gave the British division director Phil Roberson HTC (Phil Roberson). Referring to the company's plans for the coming year, he said that HTC is going to return to the strategy, which brought her into the front ranks of manufacturers of mobile devices - not to produce so many models, but of excellent quality and rich functionality.

In other words, the Taiwanese manufacturer plans to release in 2012, less than smart phones, but to make them truly high-end devices attractive to consumers. Recall that in the past year, supplemented with numerous portfolio HTC smartphones (mostly based on OS Android), some of which differ from each other only 1-2 options, for example, support for LTE-networks.

Make changes in its strategy forced the Taiwan-based, including the results of the fourth quarter, were unexpectedly weak. In addition, stand as an example of Apple, in fact, has only three models of the iPhone on the market, including two old, but it has no problems with sales growth. As for the segment plates, HTC is going to follow here mainly expectant management, focusing on the issue of smart phones.

пятница, 27 января 2012 г.

Jailbreak may be outlawed


July 26, 2010, the U.S. government has recognized the jailbreak mobile electronic legal under federal law. This is largely untied the hands of hackers and forced the alarmed opponents jailbreak.

In the past two years, users iOS-devices have enjoyed this "e-free" - hacker groups have created jailbreak utility for all devices, including iPhone 4S and iPad 2 on-chip A5.

However, as reported in the Fund electronic frontier (Electronic Frontier Foundation - EFF), this year's jailbreak in the United States may be deemed illegal action.

The fact that the time order of the Federal Office for the Supervision of copyright, which is recognized legally jailbreak action expires this year. The Foundation hopes to persuade the electronic frontier supervisory authority to extend its validity, however, a decision on this matter will be taken, it is difficult to predict.

"Smart phones, tablets, and game consoles - in fact, powerful hand held computers with huge untapped potential. Many of these devices are to be used only to software products built by the manufacturer or approved by them. Making changes to your user base software, open to third-party applications and its development - an important aspect for many users, programmers, and enthusiasts. But the jailbreak creates some legal uncertainty. Some manufacturers, for example, argues that the act of jailbreaking violates paragraph number 1201 of Digital Millennium Copyright Act (DMCA), the violation of which entails severe punishment "- said in a statement EFF.

A hearing on the revision of the relevant provisions of the "Law on Copyright in the Digital Age," is scheduled for summer 2012.

Meanwhile, at the present time although jailbreak "apple" smartphones and does not constitute a violation of law, Apple still has a way to influence the owners of compromised devaysov excluding them from the program and the warranty of the company. For jailbroken iPhone to liability you do not draw, but Apple has the right to deny you support.

Glass with widgets: the window turned into a technological device


Company Samsung, regularly representing advanced televisions, unexpectedly left the scope of this role, being able to offer something totally new. Its Transparent Smart Window - a window with the function display, which will probably soon start to finish harmonious appearance of modern offices and residences.

It is quite clear glass at the request of the owner will be displayed, for example, application icons: in this case natural "wallpaper" screen will be the view from the window. In place of an ordinary thermometer comes with a widget effective comprehensive information about current and upcoming weather conditions directly on the background of most of the weather.

In addition, a technological window is a function of the virtual shutter: it is enough to make the displayed on the screen lace vertical movement of the finger, and they will open or close. Superokno able to successfully replace him and the TV.

In terms of technical characteristics of the Transparent Smart Window - a full-touch computer screen with a resolution of 1366 x 768, equipped with HDMI and USB-interface with a diagonal of 117 cm thickness of its scope - 9 mm, the thickness of the transparent screen - only 2 mm. With these dimensions of the device weighs only 4.5 kg.

The first test sale of windows displays Samsung to begin this year in Singapore.

четверг, 26 января 2012 г.

Apple strongly criticized for poor working conditions in the factories of its partners


The New York Times produced a reasoned report sharply criticized Apple for unfair and unsafe working conditions in factories of its suppliers in China. Referring to former executives of the company kupertinskoy, NYT said that Apple is poorly controlled their partners or simply turned a blind eye to their actions. The essence of the problem stems from a fundamental conflict between the demand for low-margin parts of Cupertino and 'fast' relationships with suppliers who are forced to make compromises to meet the internal requirements of these - often, thus compromising the safety of their employees.

For example, after an explosion due to ignition of aluminum dust in May last year at the factory Foxconn, Apple did not require consistent application of standards for ventilation in all partner factories, which can lead to such violations in the future and, consequently, a new human life. Security expert in an interview with NYT described the policy of "gross negligence", adding: "We have solved this problem (ventilation of industrial premises) for over a century ago."

Although reports of poor conditions at work, busy Apple, came before, now joined in the criticism of the company, however, anonymously, even people who once held her in high positions. Based on their words and data rights organizations, despite the fact that strict control of production largely comes from the CEO Tim Cook (Tim Cook), requiring flawless components with low margins, the company did not pay much attention to working conditions, as it seemed would be. Referring to this issue, one of the former executives said that it exists, "because the system is working for us. Suppliers would change tomorrow, if Apple had told them they would simply had no choice. "

Apple says that works to improve and control the working conditions, but recent audits found among its suppliers, the practice of using underage workers and forced labor. While Apple regularly carries out inspections and audits, the question will determine whether to her to prove such facts sufficiently good reason for a serious investigation with suppliers - especially Foxconn - is still open. A former representative of the top management of Cupertino said: "Failure tolerant, while suppliers promise to try next time. If we had had in mind the business, major violations would disappear. " Informants reported that Apple since 2007 because of the appearance of various claims, severed relations with fifteen suppliers, and it talks about the company's ability in the case of our teeth.

Foxconn denies having problems in their working conditions. While the effectiveness of policies Apple in this regard, at least according to recent events, leaving much to be desired, it asserts that the audit revealed a gradual improvement. It is worth noting that, by participating in the supply chain companies, Apple is working a lot of business people who face the same problems, but, as stated in the article, NYT, their business more transparent and, more importantly, they do not have on production partners is under pressure to minimize the cost of components.

Apple just recently completed the most successful quarter in its history and the history of any high-tech companies in the world. And if at least some of the charges, given New York Times, is justified, then the huge profits paid not less loss of life, which the company unable to prevent. Fault lies with the consumers of its products, blindly buying new gadgets and do not require compliance with laws and regulations related to their production. An anonymous former head of Apple rightly notes: "... right now customers are more concerned about the new iPhone, what about working conditions in China."

Announced first e-reader from Toshiba


Toshiba today announced its first e-reader sales will start in Japan in February. Simultaneously with the launch of the Toshiba will also launch an online store and books, in which there will be about 100 000 books.
toshiba

In Toshiba say that they can begin selling the reader and outside Japan, but has specific plans on this score.

Toshiba previously preferred to concentrate on internet tablets top price segment, such as released in January, a 10-inch Excite. But now the company state their desire to get to market more cost and niche e-solutions, as well as plans to launch its own online Bookstore BookPlace.

Tadahiro Nagashima, manager of business in the Tablet Toshiba Japan, said that by March 2016 the company intends to make your bookstore a standard place to buy books for 1.5 million customers. In addition to directly book, it also will be sold and specialized programs for reading the Android and Windows.

In Japan, the new reader will be called BookPlace and will sell for 22,000 yen or $ 280. The device is equipped with 8 gigabytes of internal memory, weigh 330 grams and work on the basis of its distribution Linux. The device will be equipped with a 7-inch color touch screen, and use WiFi to get new books.

среда, 25 января 2012 г.

Google Android - a priority for mobile developers


European IT consultancy Ovum today presented a report on trends in the development of mobile software, according to which in the past 12 months, Android operating system became the foundation platform for developing mobile software. First surveyed its top priority called Apple iOS.

Ovum surveyed over hundreds of individual software developers and small software companies, asking them some questions about the preferred media and trends in the development of mobile software.

At the same time iOS estimated by a majority of independent programmers as the most important system in terms of the presence of mobile software market. "It is now almost impossible to find a programmer or a software company that would specialize in only one system. I am sure that the fact that multi-vector orientation of the developers said about the importance of this area as a whole and conscious direction of significant resources in this sphere", - said Tony Cripps, an analyst at Ovum .

According to him, the vast majority of respondents started with the expansion of mobile iOS, but then switched most of the resources on Android. "Typically, developers are paying attention in proportion to their common platform user base," - he said.

The third most popular operating system called the BlackBerry OS, but now under this system is not created too much software as developers await the release of new BlackBerryOS 10. Closes four mobile operating systems by the interest among programmers system Windows Phone.

HP Envy 15 users complain of poor color screen


Owners of HP Envy 15, issued in 2011, filled the thematic forums with complaints about problems with color laptops that refuse to display the red color, replacing it with orange. As can be seen from the comments of the users did not notice the problem until yet read about it online.

If you believe a vote, the owners of problematic HP Envy 15 more than the holders of fully serviceable laptops. True, it is necessary to take into account that the forum is dedicated to a particular issue, and this affects the results of the survey.

Also, owners of HP Envy 15, which was positioned by some publications as a "designer", complaining about the dangling keyboard and mashed connectors USB, reports The Verge. However, apart from the competition is a problem with color. It may be critical for those involved, such as photo processing. In the HP reported that work on possible solutions.

Information about the problem with the screens surfaced shortly after HP agreed to pay 425 thousand dollars of the Commission on U.S. Consumer Product Safety (CPSC) in settlement of the case on the supply of laptops with faulty batteries automatically.

By September 2007, HP has received 22 complaints about the battery problem, in two cases, the owners of laptops were injured. However, the company quickly not notified the CPSC, as required by law, and made it 10 months later. Later, she nevertheless started a program of withdrawal devices with defective batteries, but recently agreed to pay a court settlement of the case.

вторник, 24 января 2012 г.

Why do people need iPad


The tablet became a full working tool in various fields. This is evidenced by a report research company IDG Connect, which explored how and where people use this in life, writes cnews.ru.

For almost two years of existence on the market from Apple Tablet PCs have become an indispensable tool for every two employees (51%) of 60 million users. However, only one in four of the iPad was bought by the employer. IPad home use 54% of its owners, and 79% - for korotaniya time on the road. 12% of people working in IT, have replaced "aypedom" laptop, and the majority of respondents said they were less likely to listen to the player, use the telephone and watch TV after the appearance of the tablet.

iPad has also changed consumer habits. About 75% admitted that they have the appearance of the tablet, they are less likely to buy newspapers and books, and every second person - that it became less interested in movies on DVD.

At the same habits in different regions have changed is not the same. For example, if in South America 27% of IT professionals and businessmen who bought the iPad, could do without the laptop, then in Europe - only 23%. European users often prefer to use the tablet at home, not at work:

The most commonly used for the tablet:


Web surfing (79%);
Reading the literature (76%);
Newsreader (73%);
communication with colleagues (54%);
access to social networks (44%);
Connect with friends and relatives (42%);
entertainment (31%).

How long will live in the social network your links?


Specialists service Bit.ly Short links found, how many takes of "life" references placed in social networks and services, writes portal Cossa.ru. The study showed that the ability to reference to hold the attention of users affects not only its content but also a place where it was posted.

The study of life expectancy short bit.ly links began with a comparison of two entirely different in content sources. The first link leading to photographs of young otters, making friends with kittens, was published by the magazine Stylist Magazine on Facebook in 7 hours and 12 minutes in the morning. The following chart shows the half-life references, ie, the amount of time for which the reference gets half of all the possible clicks after reaching its highest point. In the first case it was 70 minutes.

The second selected to study the link was published in the Washington Post's Twitter and informs about the earthquake on the east coast of the United States.

If you compare the graphs drawn for two references, it becomes evident that the users have shown much greater interest to the last link, but it was fading noticeably faster, and its half-life is only 5 minutes.

Studies show that breaking news lose their relevance faster than pictures with seals. However, not only the content determines the dynamics of referrals. Plays an important role and the place where they were placed. In order to confirm this theory, the team compared the Bit.ly over 1000 popular links placed in various social media world.


Thus, according to the schedule, the average life expectancy links on Facebook is 3.2 hours on Twitter - 2,8 hours, and to the source - 3.4 hours.

Thus, if you put a link on Facebook, you can count on an additional 24 minutes the audience's attention. True, if the dynamics of transitions on the links on Facebook and Twitter almost identical, the results differ significantly YouTube - "Life" link to the video service lasts more than 7 hours, and half-length ranges from 2 to 6 hours.

Of course, some links are no longer popular 2 hours after its placement, others vice versa attract users' attention for more than 11 hours. The statistics shows that in most cases, interest in the link is determined by how its content corresponds to the social service, where it was posted.

понедельник, 23 января 2012 г.

How to turn on the scanner iPad


New stationary device for the iPad appear so often that it does not have time to keep track of them.

Tablet PC - a mobile device, but it has a wall mount, keyboard, fixing the base and other appliances which are generally not relevant to the "mobility". So now from the "apple" tablet can make a real desktop scanner.

Brookstone Company decided to surprise participants at CES 2012 and users of iPad, creating a compact scanner for the tablet. Called it iConvert. This device is similar to a docking station that contains a scanner and listoprotyazhny connector for iPad at the top. If you collect the installation, you get an interesting and neat gadget, helpful office staff at any time. iConvert has the ability to scan color documents, even of A4. And, of course, the device work, you must install the tablet specific software from Brookstone.

Forget about the various support programs, for example, TextGrabber, and banal camera iPad, because the quality of the document will be terrible. Also keep the tablet shed exactly the format of the sheet is very difficult. And thanks iConvert rather "fed" into a narrow slit absolutely any literary paper to see it the iPad. The first time you see the whole process, just can not believe that this is really happening - the animation is simply amazing. If another sheet size and dimensions of the tablet to coincide, it would be even steeper.

This is a remarkable device can be ordered at the end of February. Approximate cost - $ 100.

Google will penalize a lot of advertising on the site


Indexing algorithm search engines Google now estimates the number of advertisements and quality of page layout. Depending on this, will increase or decrease the search issuance site.

Google software engineer Matt Cutts said that users often complain about the abundance of ads at the top of the web resource, which prevents them to estimate how much is relevant to the content of pages found. In order to meet the developers have improved the indexing mechanism: now if the site has too many ads at the top of the page (above-the-fold), its rating may be lowered. Representatives of the search giant stresses that this new provision will not affect those web-sites, where the amount of advertising does not go beyond certain limits, or at least not difficult to read the content.

At Google, argue that the new algorithm, "punish" not more than 1% of the total number of sites. However, developers are advised not to rely "at random", but in every case to evaluate the appearance of your site in different screen resolutions with a tool Browser Size tool. If a Web resource is saturated with advertising blocks, it is recommended to optimize its design. Google was take into account all the changes during the next crawl the site.

Company representatives report that this is just one of the 500 improvements that Google intends to implement this year. For example, while Google will not penalize sites for pop-up ads and overlapping, but in the future, perhaps, the sanctions will be applied to such projects.

суббота, 21 января 2012 г.

Intel patents new way to connect Wi-Fi devices


Wishing to further simplify the lives of users who actively use the wireless network, Intel has patented a new way to connect Wi-Fi-device to the router without entering a password and a suitable mainly for home use. However, there is a clause - plug the device and the router - should have audiovozmozhnostyami.

Proposal is as follows: for the first time connected to the wireless network device should generate some kind of unique - within the network - a sequence of sounds that is recognized by the router, and a new device is stored in its database as legitimate. Later the user can simply repeat the same procedure without having to enter passwords or any PIN-codes. The authors are fully aware of the patent, that it is not about laptops or smart phones, which are capable to connect to the network as many times, having to authenticate only once: it is primarily about connecting to a wireless network television, wireless speakers, and (or) headphones When the router must enter 8-digit PIN-code of the device recorded somewhere on his back.

Described in this patent US 2011/0277023 pozitsiniruetsya technology as potential replacement protocol WPS (Wi-Fi Protected Setup), which allows the user to simply connect to wireless networks by entering a short PIN-codes. At the same time, most recently, WPS has been found dangerous vulnerability allows an attacker in a reasonable time to access the network using "brute force".

How to choose a stick


USB Flash Drive - a convenient and indispensable storage media. When choosing a stick is necessary to consider a few points to work with it enjoyable. The main indicator of the stick is its volume. Today, there are sizes from 1 to 32 gigabytes. "And what do you choose me?" - You ask. Most people are guided by the principle "The more gigabytes, the better." This approach is justified in the event that you need to accumulate a lot of different information. If you need a USB flash drive to store songs on it, or text documents, you need only 1 GB on it put a few documents and about 300 songs. If you belong to moviegoers, and want to constantly replenish your collection, then buy the stick at 8-16 GB. Volume depends on the number of movies you want to copy. 16 GB - is 10/12 films. 32GB gives the ability to store text documents, photos, tens of thousands of different files, songs and a few films. USB flash drive to 32GB provides great opportunities, but not everyone can afford such an expensive thing. The most popular flash drive kingston 4 to 16 GB.

The second indicator stick - its speed. In some USB flash drives are two speeds - one for writing, another - to read. Best of all, when both the speed of this match or exceed it. Speed ​​of 10 Mbps in the most optimal.

If we talk about the size of the stick, it should not be overall as their awkward to use. Take a small-sized USB flash drive without caps, as it is easy to lose, and benefit from it a little. Buy a flash drive to a metal or rubberized case, that it was protected from impact and moisture.

For convenience, stop your choice on a flash drive with a signal beacon. You can always see a record is copied or not, and to determine the time when you need to get the drive. If you need a USB flash drive for watching movies and listening to music, the beacon is likely to annoy you when it is constantly flashing out of the TV or DVD player.

If you need a USB flash drive for a gift, you should pay attention to the silver or wooden box with a beautiful frame, such as precious stones. You will only need to put a flash drive on an exclusive signature.

пятница, 20 января 2012 г.

Price license of Windows Phone 7 only $ 20


According to Trusted Reviews, $ 20-30 - the price of one license of Windows Phone 7.

The publication says that the information came from ZTE's mobile phone manufacturer. No official data from Microsoft has not happened.

Santiago Sierra (UK branch officer ZTE) said that one reason for high prices on the platform ZTE Smartphone Microsoft Windows Phone 7 is the cost of the license.

Value, uttered by Sierra, the above assumptions, the independent experts. In May, they were told that, apparently, the manufacturers pay Microsoft $ 15 royalty on every smartphone released. For comparison, Android manages vendors in zero cents (although for the integration of branded Google services they pay).

Microsoft reports a record earnings


Following Google and Intel, Microsoft reported the results of its financial activities in the fourth quarter of 2011, which for her is the second quarter of fiscal 2012. It is noted that in this period, Microsoft has received a record amount of revenue of $ 20.9 billion dollars, up 5% more than was received in the same period last year.

With revenue departments Microsoft Business Division was $ 6.28 billion (an increase of 3% over the same period last year). Most of the revenue could be gained by license sales of Office 2010, which has sold over 200 million over 18 months since the release of this package.

In addition, a 10% increased revenue from sales of Exchange and SharePoint, and increase revenue from the sale of Lync, and Dynamics CRM has made more than 30%. Server & Tools division was in the second quarter of fiscal 2012 revenue of $ 4.77 billion dollars, which is 11% higher than the same period last year.

Sales of products such as Windows Server and SQL Server has more than 10%, while revenue from System Center has more than 20%. Subdivision Windows and Windows Live Division during the reporting period was 4.74 billion dollars in revenue, up 6% less than in the corresponding period last year. It is noted that for the time it was already sold more than 525 million copies of Windows 7. Revenues from Online Services Division in the second quarter of fiscal 2012 totaled 784 million, revenue growth over the same period last year was 10%.

The market share of Bing search service in the U.S. rose to 15.1%, which was one of the main reasons for the growth of income.

The value of the net profit was 6.62 billion dollars (6.63 billion during the same period last year).

четверг, 19 января 2012 г.

Young people share online passwords as a sign of confidence in each other


As a sign of confidence in each other young people share their passwords to personal email accounts and on various resources.

Access to foreign communications or profile, with the consent of the owner has become a symbol of the digital age. Lovers sometimes even set the same password, getting the opportunity to read the private letters and texts.

According to psychologists, so friends and young couples demonstrate the reliability and openness to each other. But there is a downside - the former lovers at parting may make other people's secrets public.

An easy way to block access to their personal lives online - password exchange. However, as noted by parents, teachers and young people themselves, the injured party recalls that after the leak sensitive information.

Students have one more reason for the original share passwords with friends - to get rid of the temptation to sit on your favorite online resources, instead of preparing for exams. Trusted friend or a friend not just tell your password access, but allow it to change. The present owner of the account receives a new password only after the session.

As the results of a telephone survey conducted by the project Pew Internet and American Life Project, 30% of adolescents and young adults regularly share their online passwords with friends, girlfriends and young people. At the same time trusting women more susceptible than boys.

Already 2 billion people in the world knows what the Internet


The Royal Pingdom released data on the development of the Internet as of early 2012. According to this resource at the beginning of the year, there were 2.1 MAWP. Internet users, of which 922.2 million are in Asia. In Europe, the number of Internet users is about half of the Asian figure (476.2 million), about the same number of fans web - in North and Latin America combined.

The last thing stuck on the Web inhabitants of Africa, the Middle East and Australia and Oceania - totally in these regions recorded slightly more than 200 million Internet users.

As follows from the report of The Royal Pingdom, the most popular social network in the world at the beginning of 2012. Facebook was the total number of users 800 million people. Social network Twitter had 225 million accounts.

среда, 18 января 2012 г.

Named a possible future head of Apple


The most likely successor to the current executive president of Apple Tim Cook (Tim Cook) is a 43-year-old Scott Forstoll (Scott Forstall), Apple's vice president of software development

Such an assumption is made edition of Fortune, referring to the author of the book «Apple Inside: As the most respected and secret American company actually works," Adam Lashinski (Adam Lashinsky).

Lashinski Forstolla called «CEO in waiting." He believes that the top manager of the best team in Apple for the role of its head, as it possesses all the necessary qualities: he is smart, attentive to detail, reasonable, is comfortable on stage and is a talented engineer - a "complete package".

Forstoll joined Apple in 1995 and is one of the founders of the operating system Mac OS X and its proprietary GUI Aqua. The group, which he heads, forming about 70% of revenue.

Note that in 2008, Fortune magazine has addressed Forstolla as one of the possible successors to Steve Jobs (Steve Jobs). Jobs died on 5 October, after the August transferred his powers to Cook.

Released their first album, recorded entirely on an iPhone


Little-known rock band from Alabama One Like Son decided to challenge herself

Having conceived a third album after a decade hiatus, January 1, 2010 frontman Stephen Poff team vowed to burn the whole year a new collection of songs exclusively from the iPhone-using applications.

Poff (vocals, guitar, bass, organ) and his colleague Bill Rester, Perry Brown and Brian Segreyvz just recorded their party at any time convenient to them, and then combined tracks. The album, which includes 11 tracks, was completed before the New Year.

Musicians point to some obvious advantages to this approach. First, do not have to collect all members of the band in the studio, painfully choosing the time that would suit all at once. Second, to what teamwork and rehearsals. Third, it is much cheaper than renting a studio.

On the other hand, messing with the paths on the "iPhone" is more difficult than on professional equipment.

The group took advantage of applications such as FourTrack, MultiTrack DAW, AmpKit and ThumbJam. And the program has allowed musicians to connect GuitarJack to your phone instruments and microphones.

The album, entitled Start the Show sold on iTunes, Bandcamp. This is the first album in history, recorded entirely on an iPhone. Previous experiments have been modest. For example, a pop group from Los Angeles, "88" recorded the hit Love is the Thing with the application FourTrack, and Gorillaz took the iPad to create a kind of musical diary during a tour of the United States.

вторник, 17 января 2012 г.

Production begins impressive transparent displays.


At CES 2012, Samsung showed a clear 46 "display-window. Novelty is really used as a virtual window with blinds - the touch of your hands, you can reduce the intensity of light coming through the screen.

According to Samsung Hub, the Koreans have already begun mass production of such matrices.

Resolution is 1366x768 pixels novelty, contrast - 4500:1. The power supply may partially screen to use solar energy.

As noted in the Samsung, the novelty will be used in the advertising industry, a transparent screen can be installed in refrigerators, as well as use as a bulletin board and electronic signage.

In the United States appeared to receive the terminals of old gadgets


In the U.S., appeared the first machines for the recycling of portable electronics. The device estimates the cost of a device by several parameters, and then issues his former boss money. It is reported by Tech Week.

New Portable Electronic Waste devaysov resemble ATMs at the same time, automatic reception of bottles and electronic terminals for payment of services of mobile operators.

Vending machines can be found on the inscriptions ecoATM. The word "eco" in the title of waste heat is not accidental. Once the machine "swallows" a particular gadget, it is processed as an environmentally friendly way.
"Eaters" gadgets analyze devices that fall into their mouths, according to several parameters. Among them: the state apparatus, its performance, as well as average market price. Last checked on the Internet, which connects recovery on their own.

This handset has a system of artificial intelligence and machine diagnostics, which almost immediately "punch" device on the basis of data from the 4000 models of mobile phones and MP3-players.

Recovery techniques are not only act as intermediaries between users of a kind gadgets that want to get rid of them, and companies involved in recycling of electronics. The devices can help those who want to immediately sell a particular device, rather than wait for the unit will buy an ad on the web or via online auction. In addition, the "eaters" give money to anyone, even a broken gadget, encouraging people to pass it and not throw in the trash.

At this point, the devices ecoATM take only mobile phones and portable media players, but the end of January will also work with tablet PCs and e-books.

Recovery is now gadgets only in California, but by the end of the year should be available across America.

понедельник, 16 января 2012 г.

France Telecom sells all of its assets in Austria


The European telecommunications operator France Telecom completes negotiations to sell 35% stake in the company of Orange Austria Hong Kong holding company Hutchison Whampoa.
telecommunications

Sale of shares in the Austrian mobile operator is part of the France Telecom to reduce its presence in the stagnant European telecommunications market.

Sources close to the negotiations say that finally all the terms of the transaction will be agreed within the next two to three weeks. Pre-selling price of the package is around 1.4 billion euros. At present, the remaining 65% of Orange Austria owned by the private management company Mid Europa Partners, which so far do not provide comments on a possible change of ownership 35% stake in Orange Austria.

At the same time, sources say that Hutchison is the most likely, but not the only bidder. The remaining contenders were not disclosed.

Now on the Austrian mobile telephony market company Hutchinson Whampoa already has some presence through mobile operator 3, part of which belongs to the Hong Kong conglomerate. If the company becomes the owner of Asian companies 3 and Orange Austria, it will become the third largest operator in Austria after the Telekom Austria and T-Mobile Austria. Now Orange Austria on 65% owned by Mid Europa Partners, 35% France Telecom, but the actual management of the company France Telecom carries in agreement with the main investor.

Orange Austria's third largest Austrian mobile phone operator with shares of around 20%. In 2010, revenues were 578 million euro net loss - 9 million euros.

Recall that last year, France Telecom announced a desire to withdraw from the Portuguese mobile market, but at the end of 2011 the company got rid of their assets in Switzerland, sold its Orange Swiss investment fund Apax Partners for 1.6 billion euros. Sources familiar with the situation say that the purchase of Orange Swiss also claimed funds EQT Partners, Providence Equity Partners and French billionaire Xavier Niel, but preference was given to London's Apax.

Now the second largest European telecom operator France Telecom reduces the size of their assets in Europe, where the business is deteriorating economy against the background is no longer so profitable, and the cost of maintaining it remain at a stable level. Instead, the major European telecoms such as Deutsche Telekom, France Telecom and Spanish Telefonica, prefer to move in the direction of the emerging markets of Africa, the Middle East, Asia and other areas.

The Japanese have created a machine for drying wet cell phone


wned cell phone - perhaps one of the most common ills that comprehend phones. It is difficult to find a person of a man who at least once in their lives drowned phone.

In this case, no matter where - in the kitchen sink, the toilet, in the river, in a pool ... but once - that's nonsense. There are people who do it with enviable regularity. Obviously, it is for them to come up with the Japanese device called the Dryer Box.

The device is a device for drying damp, phone (and any other gadgets) that the Japanese offer to put in all the stores with electronics. Wet phone - come and the land. The process will take half an hour and it will have to pay for $ 12.



If the phone after that and will not work, paid the money you will not be returned.

воскресенье, 15 января 2012 г.

Android - brighter, easier, more beautiful


Hosted the launch site called Android Design - reported by the creators of the mobile operating system Android.


The website published tips for application developers on the appearance of the program.

The resource is designed both for professional creators of user interface applications, and simple to developers. On the site a lot of information about patterns, the principles of building the interface.

The official Android Developers blog reports that the upcoming version of Android 4.0 Ice Cream Sandwich inherent in new techniques for building user interface applications that allow you to create applications that are "more beautiful and easier than ever before."

OS Android 4.0 Ice Cream Sandwich was introduced in October 2011.

Italian authorities are using the internet to deal with tax evaders


Italian authorities intend to use the Internet to combat tax evasion, reports France 24

Ordinary Italians call not miss the opportunity to communicate and in blogs, social networks and mobile applications on them unnoticed corruption, bribery and tax evasion.

Many Italians support the initiative of the authorities themselves are included in the fight against fraud, creating a site where anyone can report the offending companies.

Tax evasion is one of the most pressing problems of the Italian economy, which caused the country's budget annually loses up to 150 million euros.

Public discontent against tax evaders increases as the debt crisis calls from ordinary Italians are more victims. Thus, residents of Italy had to accept the new package of measures to reduce the budget deficit, approved by the government, Mario Monti in December 2011. Anti-crisis program aims to reduce the budget deficit by 20 billion euros and the allocation of an additional 10 billion euros to stimulate economic growth.

Proposed by the government austerity measures include an unprecedented Italian pension reforms, according to which the retirement age in Italy will be increased to 62 years for women and to 66 for men. In addition, the government intends to abandon the annual adjustment for inflation in the calculation of pensions, as well as in 2018. raise the retirement age for women to 66 years. Also among the proposed measures - raising VAT by 2%, re-introduction of property tax, as well as reducing the cost of cumbersome state apparatus Italy.

суббота, 14 января 2012 г.

Smartphones will simulate the engine shudder and recoil from the shot


Modern phones are capable of reproducing the engine roar of a powerful motorcycle, the sound of shots from a pistol or knock the human heart.

Users can not only hear it, but also to feel, holding cell phone in hand. Their development in this area predstavlenyi International Fair of Consumer Electronics Show in Las Vegas.

The idea is to extend the frequency range of quality standard features vibrating alert, which is in any cell phone. The lack of this feature is that the device to vibrate only at a given frequency, ITAR-TASS reported.

The company "artificial muscle", owned by the German pharmaceutical concern "Bayer", has developed a technology that forces plastic function like muscle tissue.

The base model technology chosen IPhon American smartphone from Apple.

Inside the set "motor" under the name Vivitouch (Live touch) - the user is on your phone in a virtual game, whose purpose - to spend a few balls through a complicated maze.

The technology mimics the shaking, which causes the ball, collided with a barrier maze. The user feels even palm a tiny vibrating ball rolling on a flat surface.

In the same way in the operation of other devices from the user the feeling of breaking the human heart, trembling from the working engine of a powerful Harley Davidson and the return on a shot from a pistol.

The company has not yet disclose retail prices on their goods.

The Finnish company also introduced Senseg OY in Las Vegas technology to make slippery or sticky display tablet rough to the touch. In this case it is again, not about stuff, but about the simulation experience.

Its source is a weak electric field, which on the surface of the display creates resistance to movement of the user's fingers. As explained Vice President David Rice, of course the invention is a microchip and an additional coating display. Products with this technology will go on sale in 2012.

Now you can hear the smell of the Internet


The U.S. company has found a way to convey to the user, the World Wide Web, the smell. Imagine reading Twitter, you'll feel the perfume of the author, whether boy or girl. Or while watching a video on the social network Facebook, your room will be filled with pleasant aromas of popcorn or fresh fruit. The new device Olly opens unprecedented opportunities to create a new sense to the user.

The device was developed by «Mint Foundry», it can make all your online alerts a certain smell.

On the face of Olly, is a small, compact, white device. Behind him is the free space that can be filled in certain flavored cartridges. You can adjust, at its discretion. Especially since the company offers a wide range of scents: essential oils, perfumes, fruit and even alcohol. You can also install multiple odors, each of them can match a specific action on the Internet.

While the device is not Olly went on sale at the moment, developers are looking for sponsors for the further development of this project.

пятница, 13 января 2012 г.

Created by super-expensive watch with a liquid instead of arrows



This is not the clock Montana, polpular here in the 1990s. Hours HYT H1 Hydro Mechanical complication with an innovative liquid - not just an interesting toy. The liquid does not some minor and not very necessary role, and keeping time! And most importantly time - with the help of the arc with the green fluorescent liquid HYT H1 Hydro Mechanical display watches. A minute is considered traditional needle on a small dial in the "12 o'clock". A second counts rotoroobraznoe wheel, which is set to "9:30." Hours HYT H1 Hydro Mechanical will be presented at the exhibition BaselWorld 2012 is not just a prototype, but as a finished product, in three versions: in the case of titanium, 18K red gold and titanium in a black DLC-coating. The diameter of the shell is a solid 48.8 mm and 17.9 mm thickness. Dial closed convex sapphire crystal. Position "2:00" is screw-down crown with logo in the form of letters H, is protected by a special flange housing. Through the transparent back cover of the clock mechanism is seen exclusive HYT H1 Hydro Mechanical with manual winding. Its power reserve is 65 hours. Power reserve indicator with red scales close to the small minute dial in the direction of "3:00." The mechanism has 35 stones, the carrying frequency of 28 800 pc / hr. The movement of fluorescent liquid in a circular tube, the envelope of the dial is under the influence of a pair of "fur", installed at the bottom of the dial. Bridges gauge beveled by hand and decorated with a pattern Cotes de Geneve, and the fur indicate liquid rhodium. Delivered watch HYT H1 Hydro Mechanical with combined gray strap of canvas and leather. At the moment, know the price of titanium model - 45 000 dollars.

Created handle that learns the written text into electronic form.


The design team proposed a high-tech version of the pen, called Recorder, writes Yanko Design. It allows the wearer to not only take notes on paper, but also to keep writing, and transmit data via Bluetooth to a computer. Built-in text even check for errors (you can assume that this feature is only available for English).

To write information to a memory card uses a laser, which tracks the movement of the pen. Data can be transferred to a computer (or other device with Bluetooth). At the moment there Recorder is likely only as a concept. If the handle will be on sale, to find her use of the cellar. Notes, for example, we may make to any smooth surface - grip "remember" the text.

четверг, 12 января 2012 г.

Smartphones can cause the owner of the phantom vibration - study


Smartphone users, such as the Blackberry or iPhone, may have obsessive feelings of phantom vibrations from the constant stress caused by the devices.

According to the Telegraph, with reference to results of research conducted by British scientists, the owners of smart phones experience greater stress than usual because of the need to constantly check his e-mail accounts and social networks.

As a result, they begin to feel the "phantom" vibrations - wrongly users think that the phone starts vibrating in their pocket, allegedly accepting a message.

According to the author of the study, the number of people using smartphones is growing very quickly, so "we are inclined to believe that the increase in the number experiencing stress due to the virtual social activity" - says researcher Richard Balding from the University of Worcester.

The results of a scientific experiment will be presented at the Conference on Organizational Psychology in Chester. At the same time in a scientific experiment was attended by 100 volunteers - students and employees of various companies, from public sector organizations to retailers. Study participants filled out questionnaires and were specific psychometric tests to stress.

From these results, researchers concluded that the use of smart phones is associated with different levels of stress identified by the respondents, and this stress is not related to their work. But in this case it is directly linked to the number of checks received messages on smartphones: the people with the highest level of stress felt "phantom" vibrations - they thought that the device has SMS.

Scientists believe that in most cases people use modern mobile devices, to be aware of what is happening at work. However, regular use of these gadgets and close monitoring of the updates-mail, receive messages and stay in social networks creates more pressure on the user.

Author of the study believe that employers should be encouraged to temporarily disable mobile workers as well as under constant stress, employees are unlikely to thrive.

Internet economy in the American


Anthem Consulting Agency carried out a comparative analysis of prices of identical goods in the offline and online U.S. stores. The study examined prices for products from different product categories ranging from personal care to electronics.

The analysis showed that not all products is more profitable to buy online. In the price range up to $ 7 online stores offer goods on average 15% cheaper than the average price in 75% of the investigated products. In the price range from $ 7 to $ 20 win online stores. The average price of them is less than 9% for more than 80% participated in the study products. To objective conclusions on goods worth between $ 20 and $ 100 was collected enough data, according to Anthem.

In the report the agency noted that no significant difference in the prices of electronics and commodities worth more than $ 100 online and offline stores was not found. In general, the reported off-line retail outlets have become more competitive in these segments, which has resulted in more rapid response to changes in prices sellers on the web. Ultimately, this trend might change the perception of online shopping as a way to save significant, the researchers said.

среда, 11 января 2012 г.

Google once again caught in an illegal advertising


Search engine Google was again at the center of controversy because of suspicion of placing illegal advertising. This time, the placement of advertising sites speculators and swindlers Google has accused the company "B-BBC."

Last argues that among the search advertising issued by an automatic Google AdWords, and suggestions were speculators who sold tickets for the 2012 Olympics.

In addition, according to the "Bi-bi-si", there can also be seen for sale of drugs. After treatment of "Bi-bi-si" to the police, the ad was removed.

But on this fact the investigation began.

Apple to sue for copyright infringement in the App Store


A group of Chinese writers need from Apple for improper placement of books in the App Store 11,9 million yuan (about 1.9 million dollars). According to Reuters, over several months 9 authors from the Middle Kingdom unsuccessfully attempted to have them remove the service books from Apple, but their attempts were unsuccessful.

Writers are supported by the Chinese Society of copyright protection are suing the corporation for violation of intellectual property rights to 37 works. Over the past few years the organization has filed similar lawsuits against Baidu Inc. and Google for their online publication of books.

Apple has so far not commented on the situation.

вторник, 10 января 2012 г.

How to move the site in Google: 13 of the rules


Google rating is critical to business success in this age of information technology. Experienced entrepreneurs know that search engine optimization is a necessary part of marketing and it's not hard.

Listen to this advice from a group of young and successful entrepreneurs and your SEO rating will go up the hill.

1. Create "evergreen" content

Do you want to fill your life with high quality and authoritative content to the first places to your keywords were always yours. The best way to ensure that your resource meets the specified requirements, is the creation of content that is not disposable and fashionable, and always helpful. Create content that people will read for 10 years and you'll get links to ratings for a decade.

2. Keep track of your accounts on the Internet

Take a few minutes on each account your company online. Does the biography of reality? Set whether your company's URL in all your profiles? Traffic resulting from those links, does not affect the work of a mysterious algorithm Google, but you'll be pleasantly surprised by the effect, if you have multiple accounts on social networks.

3. Think like your customers

Think about what your potential clients or customers can type in the search Google, and then look for similar words in a free program from Google Keyword Tool. Keep in mind that 25% of keywords have never been used before, but you should be aiming for popular keywords with less competition. Then write articles based on selected keywords and learn how to optimize the resulting text.

4. Hire professionals

Hire a company specializing in search engine optimization, or take on freelance work to develop effective strategies to optimize your search engine rankings. Updates Google Panda made SEO optimization even more challenging, so better to give this task to outsourcing, where she will be engaged in by professionals. Pay attention to the professionals and companies with a proven track record and carefully analyze their reports every two weeks.

5. Guest Post

Start to leave a message in the guest on relevant blogs. Blogs like fresh content, and you thereby become a way to build relationships that will increase your rankings in Google.

6. Content - the king, links - the queen.

Creating good content is very important for the growth of your rankings in Google, but the links are even more important. Google loves links, especially with other relevant and reputable sites. Join the Community industry, leave a guest blog posts with links to your site and submit your site to relevant directories for the development of your luggage options and increase attendance.

7. Use the camera

Video - a great resource for promoting your business. Video gives your company's personality and also available on the network and acts as a link to your site. Create high-quality video, full of information, and your video gets going on the Internet. Now the video can be distributed across multiple platforms with just one, paying more attention to Google.

8. Colleges and universities

The biggest SEO secret lies in the fact that the placing on the. Edu sites link to your site greatly increases its popularity in Google. Contact with colleges and universities, as well as looking for the reason for posting on their Web sites links to your resources by running a program such as internships.

9. Frequently update your site

The more often you update your site, the more important it considers Google. If you every day to publish new entries to your blog, Google will consider it an excellent source of information for any keywords. With each blog you increase your chances of improving ranking in a new area, thereby increasing the chance for your site to be found.

10. Use the right keywords

Two effective ways to increase rankings Google - keyword analysis and tagging articles. Make sure that the titles of your articles really describe its contents, and select those keywords which people are likely to be to seek the information they need. To do this, just imagine yourself to be the user.

11. Refuse Flash

Many small businesses, especially restaurants and bars, use Flash for their websites because it is simple to run, looks good and cheap. However, sites in Flash, that look good without using special tricks occupy low places on Google. Change your site in Flash on another platform such as WordPress, and you blast-off in the search rankings.

12. Take advantage of local search

You are doing a local business? You filled out their profiles in Google, Yahoo! and Bing? If not, stop reading this article and immediately do it! After a simple fill in all fields in the local profiles are huge jumps in traffic. The Future of Search - custom local results, but the value of local profiles are often overlooked.

13. Exactly know what words people use to search for

The biggest mistake people make in their attempts to occupy high positions in the ranking of Google is that they do not have a clue about what people actually type into the search when trying to find them. A simple way to figure this out is to move to the Google homepage and slow input your keywords. You'll notice that Google will offer you search phrase. Use these phrases in your title, it's just that people want to see on your site.

The new Chrome for user decides which files to download, and which block


In the Chrome browser from Google technology first appeared, blocking the download potentially malicious files. Blocking is based on the "black list" of domains that are considered harmful.

Google has announced that a new version of its Google Chrome browser has received a barring the user to download malicious executables. This feature is in test mode for the past nine months.

As the developers, the opportunity was in the "waiting list" for implementation in Google Chrome since April 2011, and was recently added to the beta version of Google Chrome 17. New functionality is working on technology-based Safe Browsing API, blocking the download of any files from sites that are included in the list of malware.

Safe Browsing - it's fairly well-known service Google, through which third-party applications can check the web domains on the "black list" of phishing and malicious websites, protecting its users. The technology allows the Safe Browsing API to warn users about potentially dangerous links and files. Safe Browsing, in addition to Google Chrome, is widely used in Mozilla Firefox.

To date, the technology supports only block files with the extensions. Exe and. Msi, but during 2012 it is planned to expand into other formats malicious files. However, the developers of Chrome recognize that the new feature will not be able to fully protect users. "Remember, no one technology will never be able to fully protect you against malicious files. You should always treat with great care as to which files you download to your computer, taking into account the reputation of its source, "- said Dominique Hemon (Dominic Hamon), developer of Google.

Third-party experts also note that despite the integration of this technology in Chrome, the browser is Internet giant still can not compare with its competitors in features filtering of malicious content. The effectiveness of this possibility will always depend on the ability of the system Safe Browsing quickly find and add to their list of malicious sites.

To date, the "black list" of domains, download files with which it is prohibited in the Chrome browser by default, is comparatively small, but the developers promise to significantly expand its time to release the final version of Chrome 17.

The company recently published the results of Accuvant his research, sponsored by Google, which said that the SmartScreen Filter technology from Microsoft and Google's Safe Browsing can detect less than 15% of malicious sites. The researchers suggested that companies share their blacklists of domains to improve the level of protection.

In addition to improving security in the beta version of Chrome 17 also appeared a number of other improvements. So, was updated your browser, which now can automatically complete the text address of the website by a user and upload it even before you press enter.

"If the algorithm determines which site you want is likely to fall, the browser will pre-load this page before you've finished entering the address", - said Hemon.

понедельник, 9 января 2012 г.

How to test your site on copyright?


Imagine that you are creating an interesting web site with relevant and useful content.

By adding an article by article, the roller for a roller and a photo for a photo, you notice that, despite all efforts, the site remains virtually unattended, although references to it, you and your friends have placed a lot. What is happening with your favorite site?

One of the main reasons for the "inappropriate behavior" of the website - available in the network duplicates of your texts. In other words, your article simply stolen (in whole or in part) and placed on other network resources.

The thing is that search engines "hate" duplicates. "But why is the problem with my site? I also do not steal (steal) content! "- You ask. Of course, the validity of search engines would have to apply sanctions to malicious sites, and not to your offspring, but, unfortunately, high quality algorithm for determining the copyright at the moment they do not. That is why the theft of content, as a rule, suffer together and malicious sites, and sites of the victims.

What can you do in this situation? The first step is to determine what your pages are stolen. To determine the duplication of the text on the web, there are several useful services, but some of them barely cope with the task, but the ones that make it more or less well, are partly paid and let you check a few pages.

Thank God, we are with you - and for free - we can use the services themselves search engines. To check on the copyright page of the site, you need to copy part of the proposal (first from the first paragraph of the article) and paste it into the search box, for example, Google. Note that the piece is inserted proposal must include at least one keyword. Why? The fact is that search engines are commensurate with the request to the main theme of the site. If the theme of your site - shipping, and you ask for the phrase "give us a call," the first thing a search engine sites will give about phone calls, and not about transportation. So you can not find the malicious user's site, if the latter topic is the same as you: cargo.

What to do when you find the offending sites? The simplest and correct solution to the first stage - send them a stern warning. You can write a message to them that if they do not remove your article, then you go to court. On most of the violators of this would really work. Usually people copying your articles, not very versed in the problems of the Internet. They believe that they will not find, and copy someone else's article only because it is not able to write their own. Such people tend to remove the stolen articles upon request.

But there is another type of attacks. These people are your direct competitors, and deliberately placing your articles on free anonymous services. They want the search engines used their sanction to your site, and he lost his position in the SERP. If you can not find contacts the attacker, or if the latter refused to correct the situation might have articles on your site will have to be rewritten.

Are there ways to protect content from software theft? Today, there are technical ways that impede attackers copy your content. But to protect the article, intended for public viewing, while the copy is completely not possible. It suffices to take a screen shot, and every article goes to any Internet user in graphical form. Further, it is treated simply to OCR. That's all.

You may ask, do no legal protection against theft of content? Protection, of course, there is. Copyright law has not been canceled. But to prove the theft of the site content is not so easy. In any case, to solve this situation, you just need a professional lawyer.

Video Kim Jong-il on YouTube used to spread malware


In the death of North Korean dictator Kim Jong Il have seen an opportunity for attackers to spread malware. The researchers from Latin America have found piece of malware that spreads via video on YouTube.

In contrast to the fake video malware is a real scenario, however, it displays only a few photos. Next, the viewer is invited to go to the URL-address with which posted a blog with movies and TV shows in order to continue viewing. But almost immediately, users are faced with a pop up window advising ClickPotato install on your computer, which should appear on the toolbar.

According to the source, ESET Antivirus, for example, easily detects the application and prevent its installation. It also reported that after the death of Kim Jong Il's Network was launched by the malicious file PDF, which was attached to an e-mail and sent by mail.

воскресенье, 8 января 2012 г.

Search engine optimization.Evolution



When we waching different sites, each of us faced with the phrases, which are overloaded with 'key' words.
"Armored doors ... Doors armored ..." Information about the product or service, so filed, causes irritation in humans and the natural rejection.
Yes, the earlier texts, full of specific combinations of words, given a chance to increase traffic to the site. The situation is changing - now adequate and unique lyrics again acquire its value.
Surely you remember that earlier search engines attached great importance to the frequency of occurrence of keywords on the home page. In this regard, and formed "network popularity" of the site, because it implies the "rich content" of the designated topics.
These days are far behind. Now search engines have made progress thanks to the rapid development of technology. And at their disposal a greater number of factors that define popularity. "Of keywords" are no longer essential. Moreover, for gross seoshnye-texts that are overly zarguzheny keywords, sites, shall be punished by overlaying a discount factor. Seo-crap contained in the texts found by the search engines is very simple-scanning robots that analyze the text content of the site. (Content)
In 2011, the search engine «Google» was defined trend assessment site by the way he interacts with the user, and not according to the form in which it appears in the search engine. Evaluation forms in accordance with the actual quality of the site on which the following factors:
- Attendance
- The range
- Easy choice (eg, goods or services)
- The confidence of visitors (how long people are on the site)
- Conversion (visitors turning into buyers)
- Availability of contact information, addresses, driving directions, etc.
Now it attempts to assess the usability of the site and its design.
And all these changes - the natural process of development of search engines and their mechanisms.
The fact is that now the term "website promotion" in its former meaning is not entirely correct. Today to speak about the development of a resource or even a project on the development of business in general. As for the Internet project development methods, their range is wide - media advertising, banners, and the context coupon services, affiliate programs, marketing, social media (SMM), working with blogs, viral marketing.