Intel Launched It's CORE i7 2600K

Posted by Unknown Minggu, 13 Maret 2011 0 komentar



Something new has been found in the INTEL CORE i7-2600K. although used in high speed, no experience problems with this product.


Core i7-2600K is the second generation of the CORE i Intel Processors that have the highest place. but the price of this product is still at a reasonable price that is about the range of $ 300. This product has undergone several improvements that make the CORE i7 can be integrated with graphics processing units (GPU), which can improve system performance.


Another feature that can be utilized in this product called Intel Quick Sync Videos that is designed to improve the quality of rendering this processor. but this feature can not function when users use an additional graphics card like the AMD Radeon or NVidia GeForce. Generally Intel Core i7-2600K work fast enough to 3,4 Ghz and can be autoatically increased to 3,8 Ghz. Even if still not quite as well this product can easily overclock the processor so that it can touch the speed of 4 Ghz

Baca Selengkapnya ....

$999.99 iPhone App

Posted by Unknown Selasa, 08 Maret 2011 0 komentar
It's so easy to make an iPhone app purchase for $0.99 and think nothing of it. It's less expensive than a coffee even. Getting a couple little apps and songs each week might add up, but considering the cost of the iPhone and plan, it really isn't that much more.

Surfing the iTunes store, as I do on a regular basis, I came an iPhone application that was a little more pricy than most out there. BarMax is designed to help students pass the bar exam. No, not the drinks serving kind, but the LAW kind. It's loaded with questions from previous exams and on the iPhone makes a neat little platform for studying.



I must have looked at it too quickly because all I saw at first was the 99 cents and I was all too willing to buy it. I was a little shocked when I noticed the iPhone application was actually $999.99. Wow, a grand for an app!

Baca Selengkapnya ....

Texting mistakes

Posted by Unknown Minggu, 06 Maret 2011 0 komentar
We've all made the occasional typing mistake in an email or text message, and usually the iPhone is great at catching these and changing anything close to the word into the proper spelling. This is a good thing... most of the time. Sometimes, it's quite disastrous.

If you mistyped a message to your sweety and your text to her came out as "you are such a sweaty!" she might not get the warm fuzzy feeling. Neither would she like a message saying you'd "like to die with her tonight," as opposed to "dine" with her.




These are a few examples of some iPhone text mistakes you can find at DAMN YOU AUTO CORRECT which has many hilarious mistakes for your reading pleasure. I bet you can't read much without laughing historically... I mean hysterically.

I've never done anything quite that bad on my iPhone yet, but I've had a few silly ones!

Baca Selengkapnya ....

How the w3c invented the ‘semantics’ logo

Posted by Unknown Selasa, 18 Januari 2011 0 komentar
Today the w3c launched an HTML5 logo, that includes sub-logos for different technologies included in or associated with the standard. Here's my parodic view of how the semantics one was made:
How the w3c invented the 'semantics' logo

Jeremy is upset that they're using 'HTML5' to include CSS3, SVG, WOFF too. I've seen SVG and CSS3 versions of the logo - who's got a WOFF one?

Update: I made a version of the logo in HTML only for the purists.


Baca Selengkapnya ....

Two faces of Android

Posted by Unknown Selasa, 04 Januari 2011 0 komentar

The most remarkable thing about Android is that it is the first widely adopted Open Source client operating system. It's long been clear that Open Source is the best way to preserve infrastructural code from the vicissitudes of corporate and governmental volatility, but using it for client applications has so far not taken off as well. There has often been a separation between an open source underlying layer and a proprietary user experience that is built atop it.

Android does follow this pattern to some extent - the underlying OS code is fully Open Source under an Apache License, so anyone can bend it to their own uses, but in order to get the "with Google" logo on your device, you need to conform to Google's Compatibility Definition Document. That has changed over time; for example the 2.1 version specifies that your device MUST have a camera and 1.6 requires telephony.

If you do this, you might then get access to what I call the top half of Android - the closed source Google apps that integrate the device closely with their web services - Contacts, GMail, Talk, Android Market, Google Maps, Navigation, Listen, Earth, Places and so on. However, this requires an explicit partnership with Google.

Android Cambrian Explosion

The fascinating thing here is that there is already a Cambrian Explosion of new Android devices going on in China and India. You can buy iPad lookalikes, things that look like a huge iPod, TV-based video game systems and more that run Android, often for under $100. I fully expect most digital photo frames and mp3 players being built this year will end up running some form of Android, with cameras following on too.

This means that more and more devices will be naturally web-connected, able to run browsers, and to plug into web publishing ecosystems naturally - the Android Intent model means that Apps can plug together neatly, and replace system features if desired.

However, a lot of the day-to day utility of an Android device is in the proprietary, partners-only layer - that you only get after doing a business development deal with Google of some kind. What we will start to see is alternatives for these Applications being developed. To some extent we're already seeing this from US carriers, but I think this year we'll see both an Open Source suite of apps to swap in many of these functions, and other proprietary offerings to compete with the Google upper half.

Who could build such a suite? Facebook, Twitter, Microsoft clearly have most of the necessary pieces, but how about Baidu, Tencent, Vkontakte or other companies with strong regional ties?

Now we have a truly Open consumer OS, a world of possibilities open up.


Baca Selengkapnya ....

Firesheep, enterprise software and other broken models

Posted by Unknown Sabtu, 13 November 2010 0 komentar

There has been a lot of fuss about FireSheep, a browser plugin that show how easy it is to intercept packets on the internet, and masquerade as someone else. The idea is nothing new: EtherPeg—which intercepts wifi traffic and shows the JPEGs and other images passing by—is over 10 years old. Annalee Newitz wrote a Wired story on people packet sniffing in coffee shops back in 2004.

The underlying design of the internet means that you don't know who will be able to see any packets you send. If you care about not being snooped on, you need an encrypted connection from your computer to the one serving you at the other end. The best way to do this on the web is to use HTTPS, which all browsers support, and most servers support with configuration changes. It's not perfect, but it's good enough.

However, much of the advice following on from FireSheep was misleading or outright wrong. I saw several articles saying:

  • Avoid Open WiFi
  • Turn on WPA encryption
  • Use a VPN to tunnel the traffic into a server elsewhere

These techniques may protect for a while against those nearby you in the Café, but by not securing the whole connection, they just change who is able to intercept your communications.

The security model here is the firewall one - the notion that there are trusted networks and untrusted networks, and as long as you're inside a trusted one, you'll be OK. This is an obsolete worldview. When computers were large fixed physical entities with software controlled by a specialist, and networks were wires under their control too, this had some correspondence with reality, but it was always tenuous - others within the firewall could be running compromised machines; outbound connections could still leak data.

If you VPN into a company or service to mask your outbound connections, that endpoint is an attractive point of attack, as it has collected a set of people who think their data needs securing. There's a clear example of this in this NYT article about a hacker who lured his friends to use an FBI VPN to track them down and arrest them.

This worldview connects with two other themes. The US Government is trying to pass a law requiring ISPs to enable your communications to be intercepted. The UK government is also working on legislation on retaining all email and web traffic. Similarly, many companies monitor internet traffic within and leaving their secure networks for legal compliance and employee monitoring. Such mandated backdoors, like the VPN tunnel, become attractive targets for other bad actors - remember the Greek government being spied on through a legally mandated interception backdoor in the phones they used?

This week, I spent a couple of days at the Enterprise 2.0 conference, hearing how open standards like Activity Streams and OpenSocial are being used to bridge separate business information systems both within and between companies, with OAuth used to enforce corporate policy.

This seems anathema to old-line IT managers who assume that they dictate who gets to see what, but the pragmatic realisation that many business people have more powerful and connected computing devices in their pockets as phones than on their desks from corporate IT was in evidence at E2.0 at least.

This brought to mind the great conversation we had with Josh Klein on TummelVision last week, discussing his book Hacking Work - breaking stupid rules for smart results:

one of the most common hacks we found: jumping IT’s firewall and working around their restrictions and tools in open computing environments, then bringing the work back over the firewall and presenting it to bosses as if the corporate tools had actually been used.

Ben Horowitz's article on enterprise sales in TechCrunch today tries to justify corporate practices, even as he recognizes the inversion of the innovation flow.

What this misses is the underlying economic justification for the existence of a corporation in the first place - the economic theories that build on Coase's work saying that firms exist because transaction costs are lower within them than external transactions mediated by the marketplaces. Pettifogging internal purchasing rules should be subject to this test: does the internal transaction cost of approving and purchasing something exceed the value of the thing being purchased?

Reading Ben's explanation of how corporate salespeople help institutions negotiate their own labyrinthine processes, I couldn't help but be reminded of John Hagel's Big Shift model, (also discussed on TummelVision), which continues to show a declining return on assets for corporations.

The challenge we have on the web is to maintain the kinds of open-to-all interoperable standards that empower us to work round these creaking bureaucracies. If we delegate our online identities to a few firms operating proprietary APIs, that they can revoke access to, or decide who can call them for reasons of corporate strategy, the lowered transaction costs suddenly get very high again.

Doc Searls's work on VRM (this week's TummelVision) is all about making sure that we can retain agency over our own information. I expect to discuss this in depth at Defrag next week.


Baca Selengkapnya ....

Geek Cinema: 'The Social Network' vs 'The Man in the White Suit'

Posted by Unknown Jumat, 01 Oktober 2010 0 komentar

I recently watched a film that dramatically evoked the disruption caused by geeky inventors, the difficulties they have getting funded, and the forces that combine to oppose them in the name of the status quo.

Sadly, this wasn't at last night's showing of The Social Network, but watching the 1951 Ealing comedy The Man In The White Suit on my phone while flying home.

The Social Network has zinging dialogue, tilt-shift rowing at Henley, and has lawyers as its most sympathetic characters. Most of its humour comes from heavy-handed prefiguring of Facebook's eventual success; clearly you can't spoil the ending, so the trailer just recaps the whole film:

The opening hacking scene, dramatized almost verbatim from Zuckerberg's blog at the time, is perhaps the best 'using a computer' scene in a movie yet - Mark should get a screenwriting credit. But the mythical girlfriend who dumped him and his reactions to that - 'cyberbullying', seeking fame, plaintively hitting refresh on the friend request - that frame the film are a disappointing narrative touch that duck the chance to try to explain his real motivation. Apart from the lawyer, all the women in this film are purely sex objects - when Zuck is asked 'What are the girls going to do?' and replies 'Nothing', that's clearly Sorkin talking.

In contrast, The Man in the White Suit has Alec Guinness inventing a monomolecular fibre that can't break and naturally repels dirt. To do this he has to get to work into labs at textile factories under false pretenses, and when he eventually succeeds, provokes a hostile reaction from both the factory owners and the unionized employees, who want to suppress his work. If you haven't seen it, Amazon and Netflix have it.

Here, the motivation to invent something new and exciting is expressed well, and the technology behind it is plausibly explained. Guinness inspires Joan Greenwood with his idea, and she researches it and champions him to get his work funded. The women in this sixty-year-old film are well-drawn characters, with motivations of their own. They are peers and colleagues to Guinness's Stanley, not sex objects; indeed that is directly challenged. The film is stronger and more emotionally powerful for it.

Both films capture the ascetic geek intensity and focus well, but Sorkin and Fincher want to tear it down, whereas MacDougal and MacKendrick see the Innovators Dilemma clearly 45 years before Christensen did. As Lessig says, The Social Network portrays a legal system that preys on invention, not supporting it; the Man in the White Suit has the inventor's notebooks establishing rights that he needs to be paid for.

Conversely, to get his invention out to people, Stanley needs to convince the very industry he is disrupting to adopt it, whereas the existence of the Internet and it's open protocols mean that Zuckerberg was able to get his idea adopted by thousands with a small loan from a friend.

Technology has made a lot of progress in 60 years, but judging by this new film, law and women's roles have gone backwards.


Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of apk zenonia 5.