• Try Browser, Can Direct Voucher Rp 50,000!

    Comments Off on Try Browser, Can Direct Voucher Rp 50,000!

    Although less popular among netizens, the browser application (browser) Internet Explorer apparently still prevail as the most widely used browser.

    Based on the results of research from Net Applications, between December 2012 and January 2013, the number of Internet Explorer users scored 55.14 percent in January.

    While Firefox and Google Chrome remained in a two and three, which stood at 19.94 per cent and 17.48 per cent.

    In detail, IE10 get 1.29 percent of the market, while IE9 was 20.93 percent and IE 8 is still the best value for Microsoft with 23.54 percent.

    Although the youngest position, IE10 recently earned the most secure browser (Read: Adu Safe, IE10 Defeat Firefox and Chrome).

    However, it is not know it was love? Therefore, Microsoft Indonesia Kompas.com invites readers to try out the most secure browser.

    Not only could give it a try, you will also receive a voucher directly from the online shopping site Lazada of Rp 50,000 (these terms and conditions) as soon as you download this browser.

    How easy really. You live register and download IE10 on the following link, and also provide a unique commentary. The three most interesting comments will get a voucher worth Rp 200,000.

    Tags: , , , ,

  • Apple Developer Website Online Again Following Cyberattack

    Comments Off on Apple Developer Website Online Again Following Cyberattack

    Apple’s developer website was back online Friday, more than a week after it was targeted by a hacker who reportedly attempted to steal personal information, various media outlets have reported.

    According to Bloomberg’s Jordan Robertson, the website used by engineers who write Mac and iOS device applications was said to be active as of 5pm Pacific time on July 26. The attack had forced it offline for a total of eight days.

    “Developers use the site for software downloads, documentation and engineering information,” Robertson said. “The maker of iPhones and iPads said this week that it’s ‘completely overhauling’ its developer systems to prevent a security threat from happening again. While some of the website’s information was encrypted, Applesaid it hadn’t been able to rule out whether names, mailing addresses or e-mail addresses may have been accessed.”

    The website targeted by the cyberattack is used by the Cupertino, California-based tech giant to communicate with its community of nearly six million software developers, according to Reuters reporter Aman Shah. A UK-based Turkish researcher named Ibrahim Balic has claimed responsibility for the attack, which he says was not malicious in nature, but not everyone buys his story.

    “Balic, who describes himself as a security consultant, claimed on Sunday that he had discovered a number of weaknesses in the site at developer.apple.com which allowed him to grab email addresses of registered developers,” Guardian reporter Charles Arthur explained. “In all, Balic said he had been able to grab the details of 100,000 people registered on the site, and that he included 73 of them in a bug report to Apple.

    “He claimed that he exploited a cross-site scripting (XSS) bug in the site,” he added. “However XSS attacks generally require the attacker – which in this case would be Balic – to ‘infect’ a page with a malicious piece of Javascript or HTML which would then be used to extract data from a visiting user. If Balic’s claim is correct, he seems to have used the XSS exploits against his own system.”

    Arthur said they attempted to contact 29 people whose emails were allegedly extracted by Balic during the hacking, but seven of those emails bounced and none of the remaining 22 responded to requests to state whether or not they are registered Apple developers. Furthermore, none of the names or email addresses could be located online, which the Guardian notes would be unusual for active software developers.

    “Many of the names and email addresses either don’t look like they would belong to Apple developers, or appear to have left no footprints anywhere else on the net,” added independent security consultant Graham Cluley. In addition, in reference to ten emails featured in a YouTube video created by the alleged hacker, Cluley said, “It’s almost as though these are long-discarded ghost email addresses from years ago or have been used by Balic in his video for reasons best known to himself.”

    In related news, a new phishing scam involving Apple has arisen on the heels of the developer website hacking,according to CNET’s Charlie Osborne. Attempting to capitalize on security concerns raised by the cyberattack, the new phishing scam warns users to click on a link in order to change their passwords.

    While the email is short, it may appear legitimate to some users, Osborne said. However, it includes a grammar mistake in the title, fails to capitalize Apple on several locations and includes a link that clearly does not lead to a domain registered or owned by the tech giant.

    “Users have taken to Twitter to warn others of the phishing attacks, and security firm Kaspersky Lab has found that Apple-related phishing scams have skyrocketed in the last six months, with scammers focused on stealing login credentials and financial data,” the CNET writer added.

    Tags: , , , ,

  • Features ‘Handwriting’ Simplify Use Google Translate

    Comments Off on Features ‘Handwriting’ Simplify Use Google Translate

    CALIFORNIA – Google is taking the handwriting feature in Google Translate. This feature allows users to write their own posts with hard letters like Japanese, Chinese, and Arabic, and then translated by their gadgets by Google Translate.

    Google reveals, this feature is provided for the traveler who currently travel to countries with languages ​​that do not use the letters of the alphabet or has complicated letters.

    Can imagine if a British tourist who was a walk to China and see the street names with writing that is not understood. With handwriting input features of Google Translate, its just write or draw a silly row of letters on his smartphone or tablet, and then stay translate into the desired language.

    “Handwriting feature allows you to translate phrases, even if you yourself did not know and did not know how to type the character,” said Google product manager, Xiangye Xiao, as reported by CNet.

    For example, you see the writing in Chinese characters, but you do not know how to type in the text. With Handwriting feature, you just need to mimic the shape of the piece and then translate it, “she added.

    Handwriting feature has been provided by Google in 45 kinds of language that are considered complicated character. Among them are Arabic, Chinese, Japanese, Laos, and Greece.

    Tags: , , , ,

  • Microsoft Denies Spying Issues Skype

    Comments Off on Microsoft Denies Spying Issues Skype

    CALIFORNIA – Microsoft has denied allegations that the government says it gave the United States (U.S.) direct access to a number of Microsoft products, including SkyDrive, Outlook.com, Skype, for the U.S. government (U.S.).

    Reported by Read Write, Tuesday (16/07/2013), the software giant’s rebuttal to respond to a report in The Guardian, which has channeled suspect Skype user data into the monitoring program PRISM National Security Agency (NSA) since 2011.

    Microsoft confirmed the company has clear principles in responding to government demands for user information related to law enforcement and national security issues. Perusahana consumers insist only provide data in response to legal process and only permitaan adhere to certain accounts or identification.

    “We appreciate our commitment to the user and in accordance with applicable law very seriously, so we provide only to respond to consumer data due process. To be clear, Microsoft does not give the government direct access to SkyDrive, Outlook.com, Skype, or Microsoft products the other, “explains Microsoft.

    In the end, Microsoft said, when companies update product liability law, may in some circumstances have to retain the ability to provide information in response to requests by law enforcement or national security.

    “That’s why, we argue that additional transparency will help everyone understand and debate the important issues,” said Microsoft.

    Tags: , , , ,

  • Opera’s State Of The Mobile Web Report: Majority Of Indonesian Opera Mini users migrate to Android

    Comments Off on Opera’s State Of The Mobile Web Report: Majority Of Indonesian Opera Mini users migrate to Android

    Opera, which is one of the leading providers of web browsers in the world, yesterday (24/7) through the official website has just released its latest infographic reports relating to one of its products namely Opera Mini which states, increasing the number of Opera Mini browser users in Indonesia are turning to the Android platform in mid-May 2012 to May 2013. This report shows the number of Android smartphone users in Indonesia are using the Opera Mini browser on the device.

    At least that’s the conclusion of a report released by the Opera releases infographic “State of the Mobile Web Report”. In the report, there are some brief conclusions that can indicate the condition and situation of smartphone users in Indonesia in the use of web browsers – especially in the Opera Mobile web browsing on Android smartphone devices.

    In the report mentions, after the number of smartphone users continues to rise in Indonesia, Opera Mini has recorded a growth of 182% of all smartphone platforms. Specifically for the Android platform, it turns out Opera Mini managed to increase the number of users up to 46% of the total increase of 189% over the past year.

    Opera Mini in the report claims of the various options available browsers – especially on the Android platform, Opera Mini remains an option for some users with varied reasons. Many users assume the Opera Mini browser has been very familiar to many users of the service and the availability of data compression feature that is known to provide a faster cruising needs. In addition, Opera Mini is also recorded growth of data consumption on Android users who access the Opera Mini also grow up to 218%, this figure is much higher than the consumption data from other platforms.

    Another conclusion is no less interesting is the report released by Opera Software stated, of the total amount of consumption data obtained, as many as 36% of consumption data obtained from access to a variety of popular social media sites such as Facebook, Twitter, and so forth, followed by sites such as e-commerce, media, and a variety of other websites that charge a percentage amount of the consumption data. Facebook specifically for social media, as much as 68% of users managed to “donate” the number of page views on the Opera Mini browser on their Android devices.

    Compact and simple system that brought the Android platform turned out to have a role on the growth of Opera Mini users on the Google’s platform. It is believed by the release of Opera The report also stated that Android users in Indonesia using the Opera Mini browser surfing 83% more than users running Opera Mini on other smartphone devices.

    Of the report may actually be concluded, that there is only reporting an increase in migration of users of Opera Mini for the Android platform that can be a concern, but also the condition of the mobile web users in Indonesia was enough to get special attention from the internet industry abroad. Of this report is also expected to become a benchmark for the industry in the internet world that Indonesia is arguably one of the market is important for the development of the internet industry in the whole world.

    Tags: , , , ,

  • Compete with Microsoft, Google Destroy Copy Paste Systems

    Comments Off on Compete with Microsoft, Google Destroy Copy Paste Systems

    California – Now Google browser users can copy and paste the various forms of documents and slide sheets from Gmail to Google Docs, Sheets, and Slides or otherwise more easily. Unfortunately, to be able to feel the system copy and paste from Google this, the user must have the Chrome browser.
    The browser engine giant announced on Wednesday, July 10, 2013 when the company had a massive overhaul copy and paste system. “With Google Docs, Sheets and Slides, Chrome browser users can copy and paste text and images between all documents, spreadsheets or tables, and presentations as well as for different types of files,” Google wrote in his blog. Google claims that copied and pasted the format will remain the same.
    Copy and paste system not unlike the way Google copy paste that is commonly used to keyboard shortcuts through or from the right-click menu. Users can also copy images from applications on the computer and insert it directly into the document, spreadsheet or presentation slide.
    To compete with Microsoft Officenya Microsoft, Google did provide another alternative for users who do not have the Chrome browser with the web clipboard. However, how to copy and paste his work is not as easy as on the Chrome browser. There are eight steps that need to be done.
    First, select the section to be copied. Second, click on the Edit menu, and select Web clipboard. Thirdly, click the Copy to clipboard web. When the user has reached the destination file, the user enters the fourth stage click the Edit menu and select Web clipboard again. Users will see an option that previously be copied.
    Fifth, Place the cursor where the user wants to insert content. Sixth, select another Web clipboard from the Edit menu. In the seventh stage, the user will select the parts to be inserted with pilhan various formats, such as plain text or HTML. Finally, select the appropriate format and finish.

    Tags: , , , ,

  • Google releases Chrome 28 with Blink browser engine

    Comments Off on Google releases Chrome 28 with Blink browser engine
    February 28, 2020 /  Computer Technology, Internet Informations

    Google on Tuesday released Chrome 28, the first polished version of the browser to use the company’s home-grown “Blink” rendering engine. On Windows, the upgrade also sported Google’s new notification service that lets developers of Chrome apps and add-ons display messages and alerts outside the browser window.

    The upgrade was the first since May 21, when Google shipped Chrome 27 and touted some minor performance improvements.

    [ Also on InfoWorld: Bug bounty programs provide strong value for Google, Mozilla. | Get your websites up to speed with HTML5 today using the techniques in InfoWorld’s HTML5 Deep DivePDF how-to report. | Learn how to secure your Web browsers in InfoWorld’s “Web Browser Security Deep Dive” PDF guide. ]

    Google announced in April that it was dropping the open-source WebKit browser engine — at the time also used only by Apple’s Safari — and was instead launching Blink, a WebKit variant, to power Chrome. Since then, Opera Software’s Opera has also adopted WebKit as an interim step before it eventually moves to Blink.

    Google cited difficulties in adapting WebKit to Chrome, and in the first weeks after the announcement, stripped copious amounts of unnecessary-for-Chrome code from the fork that became Blink. Previously, only the rougher “Dev” and “Beta” builds of Chrome relied on the Blink engine. Users can verify that Blink is present by typing chrome://version/ in the Chrome address-search bar, dubbed the “Omnibox.”

    Also included in Chrome 28 is new support for more sophisticated notifications that appear outside the browser pane and display even when the browser’s not running. “Packaged apps” — ber-Web apps that look and behave like “native” code written specifically for the underlying OS — and add-ons can push brief messages and alerts to Chrome users after their developers have enabled the feature.

    Only the Windows version of Chrome 28 currently supports these next-generation notifications, but Google promised that the feature would soon make its way to OS X and Linux. On a Mac, Chrome notifications are not integrated with OS X Mountain Lion’s Notification Center.

    Along with the debut of Blink and notifications, Chrome 28 contained patches for 15 security vulnerabilities, one of them rated “critical,” Google’s most serious threat ranking. According to Google’s terse security advisory, that flaw was a memory management bug — dubbed a “use-after-free” vulnerability — in the browser’s network sockets code.

    But while Colin Payne, who reported the bug, received an impressive reward of $6,267.40, another researcher was handed triple that. Andrey Labunets was paid a record $21,500 for filing several vulnerability reports, including two in the Google synchronization service and an unknown number of others that Google said were “…since-fixed server-side bugs.”

    That last phrase and the amount paid were clues that Labunets discovered one or more flaws in a core Google service. In April, Google boosted bounties for vulnerability reports in its core websites, services and online apps, resetting the top reward to $20,000 for remote code executable bugs, those that attackers could use to slip malicious code onto a server or into an app or site.

    Labunets is no stranger to large bug bounties. Earlier this year, after reporting a string of weaknesses in Facebook’s authentication protocol, Labunets was awarded $9,500 by the social networking giant.

    Altogether, Google this week paid bounties totaling $34,901 to six researchers, including Payne and Labunets, for reporting eight different bugs. Through Tuesday, the Mountain View, Calif., company has awarded nearly $250,000 thus far this year in bounties or hacking contest prizes.

    Users can download Chrome 28 from Google’s website. Active users can simply let the automatic updater retrieve the new version.

    Tags: , , , ,

  • Intel Aims to “Re-Architect” Datacenters to Meet Demand for New Services

    Comments Off on Intel Aims to “Re-Architect” Datacenters to Meet Demand for New Services
    February 25, 2020 /  Computer Technology, Internet Informations
    • Reveals new details of the forthcoming 22nm Intel® Atom™ processors C2000 product family, enabling the company to target a larger portion of the datacenter market.
    • Unveils future roadmap of 14nm datacenter products including a system-on-chip (SoC) that for the first time will incorporate Intel’s next-generation Broadwell architecture to address an even broader range of workloads.
    • Rackspace Hosting* announces that it will deploy a new generation of rack designs as part of its hybrid cloud solutions aligned with Intel’s Rack Scale Architecture vision.

    As the massive growth of information technology services places increasing demand on the datacenter, Intel Corporation today outlined its strategy to re-architect the underlying infrastructure, allowing companies and end-users to benefit from an increasingly services-oriented, mobile world.

    The company also announced additional details about its next-generation Intel® Atom™ processor C2000 product family (codenamed “Avoton” and “Rangeley”), as well as outlined its roadmap of next-generation 14nm products for 2014 and beyond. This robust pipeline of current and future products and technologies will allow Intel to expand into new segments of the datacenter that look to transition from proprietary designs to more open, standards-based compute models.

    “Datacenters are entering a new era of rapid service delivery,” said Diane Bryant, senior vice president and general manager of the Datacenter and Connected Systems Group at Intel. “Across network, storage and servers we continue to see significant opportunities for growth. In many cases, it requires a new approach to deliver the scale and efficiency required, and today we are unveiling the near and long-term actions to enable this transformation.”

    As more mobile devices connect to the Internet, cloud-based software and applications get smarter by learning from the billions of people and machines using it, thus resulting in a new era of context-rich experiences and services. It also results in a massive amount of network connections and a continuous stream of real-time, unstructured data. New challenges for networks, computing and storage are emerging as the growing volume of data is transported, collected, aggregated and analyzed in datacenters. As a result, datacenters must be more agile and service-driven than ever before, and easier to manage and operate.

    The role of information technology has evolved from being a way to reduce costs and increase corporate productivity to becoming the means to deliver new services to businesses and consumers. For example, Disney* recently started providing visitors with wirelessly connected-wristbands to enhance customers’ in-park experience through real-time data analytics. Additionally, a smart traffic safety program from Bocom* in China seeks to identify traffic patterns in a city of ten million people and intelligently offers better routing options for vehicles on the road.

    ‘Re-Architecting’ Network, Storage and Servers

    To help companies prepare for the next generation of datacenters, Intel revealed its plans to virtualize the network, enable smart storage solutions and invest in innovative rack optimized architectures.

    Bryant highlighted Intel’s Rack Scale Architecture (RSA), an advanced design that promises to dramatically increase the utilization and flexibility of the datacenter to deliver new services. Rackspace Hosting*, an open cloud company, today announced the deployment of new server racks that is a step toward reaching Intel’s RSA vision, powered by Intel® Xeon® processors and Intel Ethernet controllers with storage accelerated by Intel Solid State Drives. The Rackspace design is the first commercial rack scale implementation.

    The networking industry is on the verge of a transition similar to what the server segment experienced years ago. Equipping the network with open, general purpose processing capabilities provides a way to maximize network bandwidth, significantly reduce cost and provide the flexibility to offer new services. For example, with a virtualized software defined network, the time to provision a new service can be reduced to just minutes from two to three weeks with traditional networks. Intel introduced Open Network Platform reference designs to help OEMs build and deploy this new generation of networks.

    Data growth is a challenge to all datacenters and transferring this large volume of data for processing within a traditional, rigid storage architecture is costly and time consuming. By implementing intelligent storage technologies and tools, Intel is helping to reduce the amount of data that needs to be stored, and is improving how data is used for new services.

    Traditional servers are also evolving. To meet the diverse needs of datacenter operators who deploy everything from compute intensive database applications to consumer facing Web services that benefit from smaller, more energy-efficient processing, Intel outlined its plan to optimize workloads, including customized CPU and SoC configurations.

    As part of its strategy, Intel revealed new details for the forthcoming Intel® Atom™ processors C2000 product family aimed for low-energy, high-density microservers and storage (codenamed “Avoton”), and network devices (codenamed “Rangeley”). This second generation of Intel’s 64-bit SoCs is expected to become available later this year and will be based on the company’s 22nm process technology and the innovative Silvermont microarchitecture. It will feature up to eight cores with integrated Ethernet and support for up to 64GB of memory.

    The new products are expected to deliver up to four times1,3 the energy efficiency and up to seven times1,2 more performance than the first generation Intel Atom processor-based server SoCs introduced in December last year. Intel has been sampling the new Intel Atom processor server product family to customers since April and has already more than doubled the number of system designs compared to the previous generation.

    Roadmap for Expansion

    The move to services-oriented datacenters presents considerable opportunities for Intel to expand into new segments. To help bolster the underlying technologies that power much of the next generation of datacenters, Intel outlined its roadmap of next-generation products based on its forthcoming 14nm process technology scheduled for 2014 and beyond. These products are aimed at microservers, storage and network devices and will offer an even broader set of low-power, high-density solutions for their Web-scale applications and services.

    The future products include the next generation of Intel Xeon processors E3 family (codenamed “Broadwell”) built for processor and graphic-centric workloads such as online gaming and media transcoding. It also includes the next generation of Intel Atom processor SoCs (codenamed “Denverton”) that will enable even higher density deployments for datacenter operators. Intel also disclosed an addition to its future roadmap – a new SoC designed from the ground up for the datacenter based on Intel’s next-generation Broadwell microarchitecture that follows today’s industry leading Haswell microarchitecture. This SoC will offer higher levels of performance in high density, extreme energy efficient systems that datacenter operators will expect in this increasingly services-oriented, mobile world.

    Tags: , , , ,