Jimmy Wales, founder of the online encyclopaedia Wikipedia, Buenos Aires highlighted the need to promote access to a "free culture" based on traditional social values such as faith and responsibility.
In a lecture entitled "Wikipedia, Wikia and the future of free culture," Wales said digital work in a community made up of many people means supporting the same values that operate in society.
"We must rely on faith and hope that everyone is responsible for their own actions," Wales said, adding that if it is wrong to members of a real or digital community "will never move forward."
Wales, who was today awarded a Doctor Honoris Causa by the Universidad Empresarial Siglo XXI de Argentina, said the international success of Wikipedia is based on "all people on the planet free access to knowledge and the ability to edit information.
"We are an NGO, a project with the globalized world we foster knowledge with a strong sense of responsibility", he analyzed.
Wales, who reflected on the reliability problems waking Wikipedia maintenance by their nature collective, stressed that it is important to validate the information before applying for academic purposes.
"Wikipedia has to function as a starting point when working, but then it is very important to validate the information," he said.
The encyclopedia, which currently has 800 million users worldwide, consists of more than 500,000 articles written in various languages and under the premises of "simplicity, neutrality and usefulness."
It is also an advertising-free site with the aim, according to its founder, to "maintain the purity of spirit that makes him a humanitarian mission," so that its funding comes exclusively from private donations and institutional.
Currently the most viewed topics are related to pop culture, especially in Europe and Japan, geography and gender.
Wikipedia founder calls for social values in the network
Jimmy Wales, founder of the online encyclopaedia Wikipedia, Buenos Aires highlighted the need to promote access to a "free culture" based on traditional social values such as faith and responsibility.
In a lecture entitled "Wikipedia, Wikia and the future of free culture," Wales said digital work in a community made up of many people means supporting the same values that operate in society.
"We must rely on faith and hope that everyone is responsible for their own actions," Wales said, adding that if it is wrong to members of a real or digital community "will never move forward."
Wales, who was today awarded a Doctor Honoris Causa by the Universidad Empresarial Siglo XXI de Argentina, said the international success of Wikipedia is based on "all people on the planet free access to knowledge and the ability to edit information.
"We are an NGO, a project with the globalized world we foster knowledge with a strong sense of responsibility", he analyzed.
Wales, who reflected on the reliability problems waking Wikipedia maintenance by their nature collective, stressed that it is important to validate the information before applying for academic purposes.
"Wikipedia has to function as a starting point when working, but then it is very important to validate the information," he said.
The encyclopedia, which currently has 800 million users worldwide, consists of more than 500,000 articles written in various languages and under the premises of "simplicity, neutrality and usefulness."
It is also an advertising-free site with the aim, according to its founder, to "maintain the purity of spirit that makes him a humanitarian mission," so that its funding comes exclusively from private donations and institutional.
Currently the most viewed topics are related to pop culture, especially in Europe and Japan, geography and gender.
sSocial network veto access to sexual harassment
The U.S. Attorney in New York, Andrew Cuomo, announced that thirteen of the major social networking sites will veto the access to users with a history of sexual harassment through the e-STOP.
"It's no secret that sexual harassment and abuse of social networks to find and manipulate their victims, so these companies have taken an important step in making the Internet a safer place through the use of e-STOP," said Cuomo in a statement today.
After the popular social networks Facebook and MySpace announced last week it had eliminated 3,500 sexual predators among its users, the companies AOL, Google and Yahoo take the same measures to their websites dedicated to communication and information exchange .
AOL's social network, Bebo, that of Google, Orkut, and the multiple sites of Yahoo such as Flickr, BlackPlanet, Classmates, Flixster, Fotolog, hi5, MyLife, Stickam and tagged, form the list of portals that join the fight against sexual abuse with Multiply, and Imeem, recently acquired by MySpace.
Despite the welcome of the initiative, websites Friendster, Buzznet, hawthorn, Habbo and LiveJournal have not yet joined the e-STOP program, which offers a database of abusers.
"What some companies still refuse to use the database of e-STOP is not only inexcusable but poses a potential danger," the prosecutor said.
The e-STOP, launched by Cuomo and entered into force in 2008, became the first such law requiring sex offenders to report to the relevant record from upstate New York for their email addresses as well as other user names that are identified in the network.
Furthermore, pedophiles who are on probation and who contacted their victims via Internet, will be prohibited access to any social network, pornographic material and contact with children under eighteen.
Cuomo invited Since the December 1 seventeen social networks to use the database e-STOP to eliminate sexual harassment from their websites, twelve of these companies have welcomed the initiative and another has requested access to the system.
Also, major U.S. internet providers for the first time pledged last year to rid their servers of Web sites devoted to child pornography.
"It's no secret that sexual harassment and abuse of social networks to find and manipulate their victims, so these companies have taken an important step in making the Internet a safer place through the use of e-STOP," said Cuomo in a statement today.
After the popular social networks Facebook and MySpace announced last week it had eliminated 3,500 sexual predators among its users, the companies AOL, Google and Yahoo take the same measures to their websites dedicated to communication and information exchange .
AOL's social network, Bebo, that of Google, Orkut, and the multiple sites of Yahoo such as Flickr, BlackPlanet, Classmates, Flixster, Fotolog, hi5, MyLife, Stickam and tagged, form the list of portals that join the fight against sexual abuse with Multiply, and Imeem, recently acquired by MySpace.
Despite the welcome of the initiative, websites Friendster, Buzznet, hawthorn, Habbo and LiveJournal have not yet joined the e-STOP program, which offers a database of abusers.
"What some companies still refuse to use the database of e-STOP is not only inexcusable but poses a potential danger," the prosecutor said.
The e-STOP, launched by Cuomo and entered into force in 2008, became the first such law requiring sex offenders to report to the relevant record from upstate New York for their email addresses as well as other user names that are identified in the network.
Furthermore, pedophiles who are on probation and who contacted their victims via Internet, will be prohibited access to any social network, pornographic material and contact with children under eighteen.
Cuomo invited Since the December 1 seventeen social networks to use the database e-STOP to eliminate sexual harassment from their websites, twelve of these companies have welcomed the initiative and another has requested access to the system.
Also, major U.S. internet providers for the first time pledged last year to rid their servers of Web sites devoted to child pornography.
Less than 10% of Hispanic Internet users shop online
About ten percent of Internet users in Latin America using e-commerce, although it is expected that over the next five years this figure will rise to 30 percent.
This is manifested in Lima Peru's representative in the Internet portal Mercado Libre, Constanza Abdala, citing recent studies by U.S. consultancy Pyramid Research.
During the presentation of the report "Ten years of free markets in Latin America," Abdala said Internet penetration in the region, 30 percent of the population is low compared to 74 and 49 percent on record, respectively in North America and Europe.
For electronic commerce to be increased in the region need better and more broadband connections, personal computers and Internet devices, and ease of online payment and e-commerce laws, said Abdullah.
Free Market, the largest electronic market in Latin America, has 40 million users accumulated at 30 September 2009 and 6960 million in transactions since its inception in 2009, company sources said.
Although it operates in 12 countries in Latin America, its main markets are in Mexico, Argentina, Brazil and Colombia, according to company sources, some 40,000 people remain from the sale of their products through the electronic market.
This is manifested in Lima Peru's representative in the Internet portal Mercado Libre, Constanza Abdala, citing recent studies by U.S. consultancy Pyramid Research.
During the presentation of the report "Ten years of free markets in Latin America," Abdala said Internet penetration in the region, 30 percent of the population is low compared to 74 and 49 percent on record, respectively in North America and Europe.
For electronic commerce to be increased in the region need better and more broadband connections, personal computers and Internet devices, and ease of online payment and e-commerce laws, said Abdullah.
Free Market, the largest electronic market in Latin America, has 40 million users accumulated at 30 September 2009 and 6960 million in transactions since its inception in 2009, company sources said.
Although it operates in 12 countries in Latin America, its main markets are in Mexico, Argentina, Brazil and Colombia, according to company sources, some 40,000 people remain from the sale of their products through the electronic market.
Finns use of networked computers heat heating
On a cold, a huge cave under Orthodox Christian cathedral, an energy firm in Helsinki is developing a data center expected to become the greenest on the planet.
The excess temperature of the hundreds of computers to be located under the Uspensky Cathedral will be captured and channeled to the heating network of the city, a system of pipes heated with warm water for keeping the houses in the Finnish capital.
"It is perfectly feasible that a considerable proportion of the heating in the capital may come from the thermal energy generated by computer enclosures," said Juha Sipila, project manager of Helsingin Energia.
Finland and other northern European countries are using their networks fed water as a conduit for renewable energy sources and capture waste to heat water that is pumped through the system.
With the start of activities in January, the new data center for computer services firm Academica is a way of addressing environmental concerns about the expansion of the Internet as a central repository of data and processes of the world, known as "computer in cloud. "
Companies seeking to cut costs and long-term large-scale computing are focusing on data centers, which represent up to 30 percent of the energy costs of many corporations.
Data centers like those in Google and used about 1 percent of the world's energy, and energy demand is growing rapidly with the trend towards outsourcing of computations.
One major problem is that in a typical data center only 40 to 45 percent of the energy used for the computations is proper, the rest is mostly used in the cooling of the servers.
"It's a pressing issue for vendors of information technology, it is estimated that increased energy costs to power and cool servers is outstripping demand servers," said Steven Nathasingh, CEO of research firm växa Inc.
"But the computer companies will not solve the challenge on their own and must create new partnerships with energy management expertise and service companies and others," he said.
The carbon dioxide emissions from data centers are around one third the number reported by airlines, but are growing 10 percent annually and now approach the level of entire countries, like Argentina or Holland.
Energy saving
In addition to providing heating for households in the Finnish capital, the new fair use computer Uspenski half the energy of a typical data center, Sipila said.
Its contribution to the district heating network will be comparable to a wind turbine, or enough to heat 500 homes big domestic.
"The Green is a great selling point, but equally important is the cost savings," said Pietari päivänä, commercial director of Academica.
When the center is expanded as planned, will reduce 375,000 euros (561,000 dollars) a year of the annual energy bill of the company. Academica revenues in 2008 were 15 million.
"It's a win-win situation. We are offering the customer because we can use cheap cooling the excess heat," he said.
The location of the center in the bowels of the cathedral has an additional benefit: safety.
The firm occupies an old bomb shelters carved into the rock by the fire brigade in the Second World War as a haven for city officials of Russian air strikes.
The excess temperature of the hundreds of computers to be located under the Uspensky Cathedral will be captured and channeled to the heating network of the city, a system of pipes heated with warm water for keeping the houses in the Finnish capital.
"It is perfectly feasible that a considerable proportion of the heating in the capital may come from the thermal energy generated by computer enclosures," said Juha Sipila, project manager of Helsingin Energia.
Finland and other northern European countries are using their networks fed water as a conduit for renewable energy sources and capture waste to heat water that is pumped through the system.
With the start of activities in January, the new data center for computer services firm Academica is a way of addressing environmental concerns about the expansion of the Internet as a central repository of data and processes of the world, known as "computer in cloud. "
Companies seeking to cut costs and long-term large-scale computing are focusing on data centers, which represent up to 30 percent of the energy costs of many corporations.
Data centers like those in Google and used about 1 percent of the world's energy, and energy demand is growing rapidly with the trend towards outsourcing of computations.
One major problem is that in a typical data center only 40 to 45 percent of the energy used for the computations is proper, the rest is mostly used in the cooling of the servers.
"It's a pressing issue for vendors of information technology, it is estimated that increased energy costs to power and cool servers is outstripping demand servers," said Steven Nathasingh, CEO of research firm växa Inc.
"But the computer companies will not solve the challenge on their own and must create new partnerships with energy management expertise and service companies and others," he said.
The carbon dioxide emissions from data centers are around one third the number reported by airlines, but are growing 10 percent annually and now approach the level of entire countries, like Argentina or Holland.
Energy saving
In addition to providing heating for households in the Finnish capital, the new fair use computer Uspenski half the energy of a typical data center, Sipila said.
Its contribution to the district heating network will be comparable to a wind turbine, or enough to heat 500 homes big domestic.
"The Green is a great selling point, but equally important is the cost savings," said Pietari päivänä, commercial director of Academica.
When the center is expanded as planned, will reduce 375,000 euros (561,000 dollars) a year of the annual energy bill of the company. Academica revenues in 2008 were 15 million.
"It's a win-win situation. We are offering the customer because we can use cheap cooling the excess heat," he said.
The location of the center in the bowels of the cathedral has an additional benefit: safety.
The firm occupies an old bomb shelters carved into the rock by the fire brigade in the Second World War as a haven for city officials of Russian air strikes.
China closes 530 file-sharing websites in BitTorrent crackdown
The Chinese authorities have closed in recent days 530 file-sharing sites using BitTorrent technology, including the popular BTChina.net, informed the official China Daily.
The State Administration of Radio, Film and Television said that the closed pages did not have the necessary licenses to operate, leaving the door open to return to be operational if they get official permission.
Sources of that administration, responsible for censorship China, noted that the sites offered on all movies, television series and other programs, "some erotic content.
The state institution emphasized that research will continue its campaign of websites that offer audiovisual content via P2P, and stressed that the regulation of audiovisual content on the Internet is "a long-term."
The newspaper China Daily said, however, that the campaign against websites using the BitTorrent system has been a sharp increase in the sale of pirated DVDs and CDs on the street.
China is one of the countries most censorship and control exercised over the content on the Internet, but also the nation with the largest number of Internet users (300 million).
The file-sharing websites have been placed in the crosshairs of state authorities on culture in other countries, like Spain, where the preparation of a law that provides closure without requiring a court decision has caused the Spanish Internet protests.
Some of them, in a recent meeting with the Minister of Culture, Angeles Gonzalez-Sinde, argued that adopting such a law would get that state controls on the Internet Spanish is very similar to those of China
The State Administration of Radio, Film and Television said that the closed pages did not have the necessary licenses to operate, leaving the door open to return to be operational if they get official permission.
Sources of that administration, responsible for censorship China, noted that the sites offered on all movies, television series and other programs, "some erotic content.
The state institution emphasized that research will continue its campaign of websites that offer audiovisual content via P2P, and stressed that the regulation of audiovisual content on the Internet is "a long-term."
The newspaper China Daily said, however, that the campaign against websites using the BitTorrent system has been a sharp increase in the sale of pirated DVDs and CDs on the street.
China is one of the countries most censorship and control exercised over the content on the Internet, but also the nation with the largest number of Internet users (300 million).
The file-sharing websites have been placed in the crosshairs of state authorities on culture in other countries, like Spain, where the preparation of a law that provides closure without requiring a court decision has caused the Spanish Internet protests.
Some of them, in a recent meeting with the Minister of Culture, Angeles Gonzalez-Sinde, argued that adopting such a law would get that state controls on the Internet Spanish is very similar to those of China
Apple sues Nokia and accused of copying the iPhone
Apple Incorporated Nokia Corporation sued for patent violation in a counterattack to the demand that Nokia brought against the type of technology used by the Apple iPhone.
Apple said in its complaint that Nokia is behind in the market for smart phones or "smart phones" because they chose to focus on old phones with conventional interfaces, in a time when new models were increasingly popular.
Nokia will review the allegations and respond in a timely manner, he said in a statement.
Demand for Apple argues that Nokia infringed 13 Apple patents, said that Finland-based company chose "to copy the iPhone, particularly its user interface, to offset its declining importance in the market for phones high technology.
Demand for Nokia, which was filed in October, argues that Apple, based in Cupertino, California, violated 10 of its patents related to telephone calls and access to wireless Internet connections such Wi-Fi.
The patents that Apple claims that Nokia is failing relate, inter alia, with: the phone connections to computers, teleconferencing, menus on a touch screen, energy conservation in chips and "abstraction of patterns and colors in the interface a graphical user. Apple also refuses Nokia patent infringement.
The cross demands are somewhat common in patent cases, which often end up licensing agreements for both parties. Nokia said in October that 40 manufacturers of phones, except Apple, have given licensing of the patents mentioned in their application.
Nokia shares added 35 cents, 2.8%, to $ 12.91 in afternoon trade while shares of Apple fell $ 2.14 to $ 194.29.
Apple said in its complaint that Nokia is behind in the market for smart phones or "smart phones" because they chose to focus on old phones with conventional interfaces, in a time when new models were increasingly popular.
Nokia will review the allegations and respond in a timely manner, he said in a statement.
Demand for Apple argues that Nokia infringed 13 Apple patents, said that Finland-based company chose "to copy the iPhone, particularly its user interface, to offset its declining importance in the market for phones high technology.
Demand for Nokia, which was filed in October, argues that Apple, based in Cupertino, California, violated 10 of its patents related to telephone calls and access to wireless Internet connections such Wi-Fi.
The patents that Apple claims that Nokia is failing relate, inter alia, with: the phone connections to computers, teleconferencing, menus on a touch screen, energy conservation in chips and "abstraction of patterns and colors in the interface a graphical user. Apple also refuses Nokia patent infringement.
The cross demands are somewhat common in patent cases, which often end up licensing agreements for both parties. Nokia said in October that 40 manufacturers of phones, except Apple, have given licensing of the patents mentioned in their application.
Nokia shares added 35 cents, 2.8%, to $ 12.91 in afternoon trade while shares of Apple fell $ 2.14 to $ 194.29.
MySpace imeem purchase by nearly a million dollars
The online music company that is MySpace with record labels on Tuesday completed the purchase of the site provider imeem songs, taking its 16 million users and its mobile applications for less than a million dollars.
In a message on the network, the chief executive of MySpace, Owen Van Natta said the deal would allow the MySpace Music joint venture eventually incorporate tools imeem.
One of the roles of absent imeem MySpace is a cell phone application that lets you listen without downloading songs through Apple Inc. 's iPhone devices and devices with the Android operating system from Google Inc. as the new smartphone Droid .
"In the coming weeks, our people will be working to take aspects of imeem that users love and bring them to MySpace Music," he said.
The music industry is still low CD sales, while revenue in the respective digital system has not covered the difference, in part because people prefer to buy singles instead of entire albums when they decide to pay for music.
Firms like imeem and MySpace Music lets people listen to and share music online for free, while revenue generated by advertising.
Imeem The company, headquartered in the U.S. city of San Francisco, began distributing free music in 2007, but advertising revenue could not support the debt payments and royalties, which drained the company money.
The price of under a million dollars is a bargain for MySpace and a sign of continuing difficulties in the free music distribution companies.
From imeem, CEO Dalton Caldwell, the chief technology officer Brian Berg, the chief operating officer Ali Akhdar and the vice president of sales David Wade will remain as advisors during the transition. It was not immediately whether they are permanent employees.
In a message on the network, the chief executive of MySpace, Owen Van Natta said the deal would allow the MySpace Music joint venture eventually incorporate tools imeem.
One of the roles of absent imeem MySpace is a cell phone application that lets you listen without downloading songs through Apple Inc. 's iPhone devices and devices with the Android operating system from Google Inc. as the new smartphone Droid .
"In the coming weeks, our people will be working to take aspects of imeem that users love and bring them to MySpace Music," he said.
The music industry is still low CD sales, while revenue in the respective digital system has not covered the difference, in part because people prefer to buy singles instead of entire albums when they decide to pay for music.
Firms like imeem and MySpace Music lets people listen to and share music online for free, while revenue generated by advertising.
Imeem The company, headquartered in the U.S. city of San Francisco, began distributing free music in 2007, but advertising revenue could not support the debt payments and royalties, which drained the company money.
The price of under a million dollars is a bargain for MySpace and a sign of continuing difficulties in the free music distribution companies.
From imeem, CEO Dalton Caldwell, the chief technology officer Brian Berg, the chief operating officer Ali Akhdar and the vice president of sales David Wade will remain as advisors during the transition. It was not immediately whether they are permanent employees.
YouTube said that advertising sales rise
The CEO of YouTube said that sales have shot up by advertising, but still failed to clarify whether the popular video site makes money.
Chad Hurley, one of the founders of YouTube, said the company had "two quarters spectacular" and that receives more than 1,000 million hits a day.
"Our costs continue to decline and our revenue growth. It's a good combination for success and will continue building on that trend," Hurley said at a ceremony to launch the personal channel on YouTube to Israeli President Shimon Peres.
"We have continued to grow in terms of traffic, we have over 1,000 million daily users and receive nearly 24 hours of video every minute," he said.
Peres said he wants to use the channel to hear ideas from people across the world and communicate with them directly.
YouTube has not been profitable since it was acquired by Google for U.S. $ 1,760 million three years ago, but Google executives have indicated that approaches its first profit.
The company does not publish its revenues, but analysts estimate that YouTube reached in 2008 about 200 million.
Despite attracting a worldwide audience, YouTube has not been a great source of revenue for Google yet.
Peres, 86 and winner of the Nobel Peace Prize, has a reputation for tenaciously promote coexistence and peace in the Middle East. A welcome message for Peres in the channel of YouTube asks users to help you find solutions in three areas: power the world peace, promoting religious tolerance and use new technologies to benefit humanity.
Chad Hurley, one of the founders of YouTube, said the company had "two quarters spectacular" and that receives more than 1,000 million hits a day.
"Our costs continue to decline and our revenue growth. It's a good combination for success and will continue building on that trend," Hurley said at a ceremony to launch the personal channel on YouTube to Israeli President Shimon Peres.
"We have continued to grow in terms of traffic, we have over 1,000 million daily users and receive nearly 24 hours of video every minute," he said.
Peres said he wants to use the channel to hear ideas from people across the world and communicate with them directly.
YouTube has not been profitable since it was acquired by Google for U.S. $ 1,760 million three years ago, but Google executives have indicated that approaches its first profit.
The company does not publish its revenues, but analysts estimate that YouTube reached in 2008 about 200 million.
Despite attracting a worldwide audience, YouTube has not been a great source of revenue for Google yet.
Peres, 86 and winner of the Nobel Peace Prize, has a reputation for tenaciously promote coexistence and peace in the Middle East. A welcome message for Peres in the channel of YouTube asks users to help you find solutions in three areas: power the world peace, promoting religious tolerance and use new technologies to benefit humanity.
University turns iPhone into musical instruments
Welcome to an orchestra of twenty-first century. The iPhone cell being used as musical instruments in a course at an American university.
Students at the University of Michigan are learning to design, build and play instruments in their 'smartphones' Apple, and have planned a public performance on December 9.
The university said he thought the course was unique in the world. Professor Georg Essl is a musician and scientist who has worked on the development of mobile phones and musical instruments.
Essl and his colleagues began to use the microphone and wind sensor some years ago, allowing iPhone applications like the Ocarina, which basically turns the device into a wind instrument similar to an ancient flute.
"The mobile phone is a very good platform to explore new forms of musical performance," Essl said in a statement.
"We are not tied to the physics of traditional instruments. We can do interesting things, strange, unusual. This type of technology is in its infancy but is an area with attractive growth prospects and to use the iPhone for artistic expression, said.
Essl said that to make an instrument on an iPhone, the students programmed the device to play as sound information received from each of the multiple sensors.
"The touch screen, microphone, GPS, compass, wireless sensor and accelerometer can be transformed so that when passing a finger across the screen, blow into the microphone or shake the phone, for example, different sounds come out," said .
Students at the University of Michigan are learning to design, build and play instruments in their 'smartphones' Apple, and have planned a public performance on December 9.
The university said he thought the course was unique in the world. Professor Georg Essl is a musician and scientist who has worked on the development of mobile phones and musical instruments.
Essl and his colleagues began to use the microphone and wind sensor some years ago, allowing iPhone applications like the Ocarina, which basically turns the device into a wind instrument similar to an ancient flute.
"The mobile phone is a very good platform to explore new forms of musical performance," Essl said in a statement.
"We are not tied to the physics of traditional instruments. We can do interesting things, strange, unusual. This type of technology is in its infancy but is an area with attractive growth prospects and to use the iPhone for artistic expression, said.
Essl said that to make an instrument on an iPhone, the students programmed the device to play as sound information received from each of the multiple sensors.
"The touch screen, microphone, GPS, compass, wireless sensor and accelerometer can be transformed so that when passing a finger across the screen, blow into the microphone or shake the phone, for example, different sounds come out," said .
Screen of death threat to Windows 7
Computer giant Microsoft has confirmed it is investigating a problem called the "black screen of death", which is affecting their operating systems, including the brand new Windows 7.
The error occurs that all users of Windows 7 are the computer screen totally black after making the log in.
The company said it is reviewing reports suggesting that its latest security update, released on Nov. 10, is the cause of the problem.
Reports indicate that the fault also affects other Microsoft operating systems like Vista, XP, NT and Windows 2000.
"Millions affected
The software company Prevx, which created a program to solve the problem, says that "millions" of people may be harmed.
"Users have made a reload (reload) of Windows as a desperate attempt to solve the problem," he wrote in a blog on the firm's chairman, David Kennerley.
"We hope to help many of you to avoid the need for a recharge," he added.
However, Kennerley said the solution did not work in all cases, since "there can be many causes."
"But if you began to see her black screen in the two weeks following a Windows update or after installing any security program (including Prevx) to remove malware (malicious software) during this time, then this solution will have a high probability of working .
Kennerly said the firm had identified "at least 10 different situations that cause the same effects of the black screen.
"It seems that they have been around a few years ago," he said.
Unknown issue
Microsoft advises that all people who experience this problem with their computer should contact their customer service line.
A company spokesman said the reports "did not match any known problem" documented by Microsoft.
It has not yet submitted any solution for this bug, which causes the screen, taskbar, icons, and the vertical bar disappear.
This problem arises within two months the release of Windows 7, with the expectation that their success (or failure) will determine the future of the largest software company in the world, as outlined by the BBC journalist Tim Weber.
"90% of the world's computers use Windows, the company itself estimates that more than 1,000 million people use it," Weber said.
The error occurs that all users of Windows 7 are the computer screen totally black after making the log in.
The company said it is reviewing reports suggesting that its latest security update, released on Nov. 10, is the cause of the problem.
Reports indicate that the fault also affects other Microsoft operating systems like Vista, XP, NT and Windows 2000.
"Millions affected
The software company Prevx, which created a program to solve the problem, says that "millions" of people may be harmed.
"Users have made a reload (reload) of Windows as a desperate attempt to solve the problem," he wrote in a blog on the firm's chairman, David Kennerley.
"We hope to help many of you to avoid the need for a recharge," he added.
However, Kennerley said the solution did not work in all cases, since "there can be many causes."
"But if you began to see her black screen in the two weeks following a Windows update or after installing any security program (including Prevx) to remove malware (malicious software) during this time, then this solution will have a high probability of working .
Kennerly said the firm had identified "at least 10 different situations that cause the same effects of the black screen.
"It seems that they have been around a few years ago," he said.
Unknown issue
Microsoft advises that all people who experience this problem with their computer should contact their customer service line.
A company spokesman said the reports "did not match any known problem" documented by Microsoft.
It has not yet submitted any solution for this bug, which causes the screen, taskbar, icons, and the vertical bar disappear.
This problem arises within two months the release of Windows 7, with the expectation that their success (or failure) will determine the future of the largest software company in the world, as outlined by the BBC journalist Tim Weber.
"90% of the world's computers use Windows, the company itself estimates that more than 1,000 million people use it," Weber said.
Video Games, latest target Walmart discounts
Wal-Mart lowered prices by $ 10 from popular video games and offers a $ 50 gift card for the purchase of the Nintendo Wii console in a bid to attract buyers to come to their centers of face-to-end sales year.
From now and until Christmas Eve, Walmart will sell''Rock Band: Beatles''for the Wii for $ 40 from the 50 initial and Left 4 Dead will offer''2''for Xbox 360 from Microsoft for $ 50 , a game that used to cost $ 60.
From December 5 to 12, Walmart also announced that customers who purchase a Nintendo Wii from the Japanese in their stores for $ 199 also are in for a $ 50 gift card.
Walmart is cutting prices on selected items every week until Christmas, in an attempt to do business with customers more reluctant to spend money. The discount giant has already lowered prices on items such as toys and televisions, while Walmart.com has lowered prices on books and DVDs.
But competitors like Target and Amazon.com have responded with price cuts in its articles or offers to achieve competitive prices.
The race for the holiday shopping started the weekend of Thanksgiving, but statistics showed a slight increase sales that disappointed investors, who expected a more robust early in the season.
Vendors are now trying to prevent the fall of the influx of buyers that occurs in the first weeks of December, after the drastic discounts offered the weekend of Thanksgiving.
Meanwhile, the video game industry hopes that new titles, like''The Beatles: Rock Band,''boost sales during the holiday season.
The industry, which in the past it was thought that would remain relatively insulated from economic problems, has made efforts this year on sales of the once powerful musical category, blockbuster movies as well as proposing to make conscious customers spent.
Sales of video game and software items in the U.S. fell 19 percent in October, to 1,070 million dollars, according to research group NPD.
From now and until Christmas Eve, Walmart will sell''Rock Band: Beatles''for the Wii for $ 40 from the 50 initial and Left 4 Dead will offer''2''for Xbox 360 from Microsoft for $ 50 , a game that used to cost $ 60.
From December 5 to 12, Walmart also announced that customers who purchase a Nintendo Wii from the Japanese in their stores for $ 199 also are in for a $ 50 gift card.
Walmart is cutting prices on selected items every week until Christmas, in an attempt to do business with customers more reluctant to spend money. The discount giant has already lowered prices on items such as toys and televisions, while Walmart.com has lowered prices on books and DVDs.
But competitors like Target and Amazon.com have responded with price cuts in its articles or offers to achieve competitive prices.
The race for the holiday shopping started the weekend of Thanksgiving, but statistics showed a slight increase sales that disappointed investors, who expected a more robust early in the season.
Vendors are now trying to prevent the fall of the influx of buyers that occurs in the first weeks of December, after the drastic discounts offered the weekend of Thanksgiving.
Meanwhile, the video game industry hopes that new titles, like''The Beatles: Rock Band,''boost sales during the holiday season.
The industry, which in the past it was thought that would remain relatively insulated from economic problems, has made efforts this year on sales of the once powerful musical category, blockbuster movies as well as proposing to make conscious customers spent.
Sales of video game and software items in the U.S. fell 19 percent in October, to 1,070 million dollars, according to research group NPD.
Nintendo sold 1.5 million consoles in one week
Japan's Nintendo said it sold more than 1.5 million consoles during the key week of Thanksgiving.
Nintendo estimated that over a week sold more than 550,000 Wii consoles and over a million of its Nintendo DS model and other handhelds.
The week of Thanksgiving, which kicks off the holiday shopping season in the U.S., is crucial to the annual revenues of companies.
Nintendo estimated that over a week sold more than 550,000 Wii consoles and over a million of its Nintendo DS model and other handhelds.
The week of Thanksgiving, which kicks off the holiday shopping season in the U.S., is crucial to the annual revenues of companies.
Michael Jackson, the king of search of the year on Yahoo! Spain
The singer Michael Jackson and the intrigues surrounding her death have placed as the first name that appears in the list of 'Top Picks for 2009' on Yahoo! Spain.
For the first time, Yahoo! Spain announces the most searched terms over mobile, most notably the football results, contributions or the films.
A Like last year, gaming, mail and chat are the three words most frequently written in the form.
In terms of news, besides the death of the King of Pop'',''the disappearance of teenager Martha Castillo, abortion reform, the web of corruption "Gürtel" which affects the conservative Popular Party leaders, or the Madrid 2016 Olympic bid focused attention and searches on Yahoo! Spain.
The Spanish also have been seduced by the more frivolous side of information and among the ten most wanted items are the daughters of the prime minister, José Luis Rodríguez Zapatero, and the child's balloon, the false incident that took place last October in the United States and kept in suspense to the public around the globe.
In terms of film, Twilight saga by Stephenie Meyer and the release of his second installment, New Moon, being first and third place respectively.
The success of the popular vampire story has led to its protagonist, Robert Pattinson, known to be the most wanted in the men.
As referred to famous women, actress Megan Fox has led the search.
The word "crisis" has disappeared from the ten terms typed into the category of finance and has been displaced by more specific as the National Employment Institute (INEM),''job''and''employment''.
In sports, Real Madrid and Barcelona are leading the ranking and Cristiano Ronaldo, occupies a modest fifth place, overtaken by basketball (CBA) and Formula 1.
As for entertainment, three women (Shakira, Rihanna and Lady Gaga) lead the search for music.
For the first time, Yahoo! Spain announces the most searched terms over mobile, most notably the football results, contributions or the films.
A Like last year, gaming, mail and chat are the three words most frequently written in the form.
In terms of news, besides the death of the King of Pop'',''the disappearance of teenager Martha Castillo, abortion reform, the web of corruption "Gürtel" which affects the conservative Popular Party leaders, or the Madrid 2016 Olympic bid focused attention and searches on Yahoo! Spain.
The Spanish also have been seduced by the more frivolous side of information and among the ten most wanted items are the daughters of the prime minister, José Luis Rodríguez Zapatero, and the child's balloon, the false incident that took place last October in the United States and kept in suspense to the public around the globe.
In terms of film, Twilight saga by Stephenie Meyer and the release of his second installment, New Moon, being first and third place respectively.
The success of the popular vampire story has led to its protagonist, Robert Pattinson, known to be the most wanted in the men.
As referred to famous women, actress Megan Fox has led the search.
The word "crisis" has disappeared from the ten terms typed into the category of finance and has been displaced by more specific as the National Employment Institute (INEM),''job''and''employment''.
In sports, Real Madrid and Barcelona are leading the ranking and Cristiano Ronaldo, occupies a modest fifth place, overtaken by basketball (CBA) and Formula 1.
As for entertainment, three women (Shakira, Rihanna and Lady Gaga) lead the search for music.
India blocks 25 million Chinese mobile phone
India blocked for security reasons the connections of 25 million Chinese mobile phones after finding they did not have the necessary IMEI identification number for tracking calls, announced Tuesday the Indian Ministry of Telecommunications.
The inability to "crawl" the 'phones without IMEI number is a security threat, "the Ministry of Telecommunications.
These low quality phones manufactured in China do not have the 15 issues of international portable Identification (IMEI), so the connections have been cut, told AFP a ministry official.
The IMEI can identify incoming and outgoing calls from a mobile phone and provides information on the manufacturer and type of appliance.
"All mobile operators were ordered to block the services of these 25 million handsets," said the source.
The owners of these phones will get their operators the IMEI number by paying $ 4.
With 500 million subscribers, India is the second largest mobile market, behind China.
Recently, the Indian intelligence services had warned of the possibility that Chinese products may have contained equipment designed to launch a cyberattack or prevent the operation of appliances.
The inability to "crawl" the 'phones without IMEI number is a security threat, "the Ministry of Telecommunications.
These low quality phones manufactured in China do not have the 15 issues of international portable Identification (IMEI), so the connections have been cut, told AFP a ministry official.
The IMEI can identify incoming and outgoing calls from a mobile phone and provides information on the manufacturer and type of appliance.
"All mobile operators were ordered to block the services of these 25 million handsets," said the source.
The owners of these phones will get their operators the IMEI number by paying $ 4.
With 500 million subscribers, India is the second largest mobile market, behind China.
Recently, the Indian intelligence services had warned of the possibility that Chinese products may have contained equipment designed to launch a cyberattack or prevent the operation of appliances.
Google will limit free access to five stories a day
The Google search engine and by extension "Google News" to limit to five the number of stories and articles to which users can access for free, in response to complaints from newspaper editors, who have criticized the company is profited by providing access to their digital content payment.
One of the primary responsibility for Google's Josh Cohen explains in his blog that "so far, each''click''of a surfer was processed as free access.
The readers had discovered that they could access fee journalistic content simply by entering the page they were interested in the Google search engine.
According to the company, this is because of its strict policy to avoid cloaking, a phenomenon that occurs when the user searches through Google, to follow a link resulting page that opens is not expected .
Cohen points out in his blog that Google offers publishers the opportunity to benefit from the program "First Click Free" (the first click, free).
"We have updated the program so that publishers can restrict free access to their pages to a maximum of five stories a day. From this figure will need to register or subscribe," says Cohen.
The company believes that this way it protects its users against cloaking yet allows publishers to "focus on potential subscribers who regularly access to a high percentage of their digital content.
"We will continue the dialogue with publishers to refine these methods. After all, whether they are offering free content as if they charge for them, it is crucial that people can find them. And that's where Google can help," says the head of most Extended search engine.
Among the harshest critics of Google for this issue is the Australian media magnate Rupert Murdoch, who had previously accused these companies of profiting from journalism, as it connects the Internet with the news getting them involved in high-income advertising.
One of the primary responsibility for Google's Josh Cohen explains in his blog that "so far, each''click''of a surfer was processed as free access.
The readers had discovered that they could access fee journalistic content simply by entering the page they were interested in the Google search engine.
According to the company, this is because of its strict policy to avoid cloaking, a phenomenon that occurs when the user searches through Google, to follow a link resulting page that opens is not expected .
Cohen points out in his blog that Google offers publishers the opportunity to benefit from the program "First Click Free" (the first click, free).
"We have updated the program so that publishers can restrict free access to their pages to a maximum of five stories a day. From this figure will need to register or subscribe," says Cohen.
The company believes that this way it protects its users against cloaking yet allows publishers to "focus on potential subscribers who regularly access to a high percentage of their digital content.
"We will continue the dialogue with publishers to refine these methods. After all, whether they are offering free content as if they charge for them, it is crucial that people can find them. And that's where Google can help," says the head of most Extended search engine.
Among the harshest critics of Google for this issue is the Australian media magnate Rupert Murdoch, who had previously accused these companies of profiting from journalism, as it connects the Internet with the news getting them involved in high-income advertising.
eBay must pay $ 2.5 million for the illegal sale
The French courts convicted the Internet auction site eBay to pay a fine of $ 2.5 million (1.7 million) the world leader in luxury for the illegal sale of LVMH perfumes, announced the two sides.
This internet site selling was convicted in June of 2008 for "illegal practices" after the sale of perfumes Kenzo, Givenchy, Christian Dior and Guerlain, all brands of the LVMH group.
On Monday, the Paris commercial court sentenced him to two fines of 850,000 euros (1.2 million) in finding that eBay did not respect the order prohibiting him from selling those products, told AFP Pierre Gode, group manager LVMH.
"We are clearly pleased with this decision, which again supports the principle of selective distribution," he added. This principle allows manufacturers to choose their distribution network.
To comply with the injunction, eBay launched a series of significant human and technical measures for buyers and sellers can buy and sell non-genuine products, "said its general manager in France, Alex von Schirmeister.
"It is true that there are users that try to bypass the order," he added, before describing the fine "disproportionate."
In a statement further held that the decision of the court "punishes consumers by preventing them from buying or selling real products on the Internet.
The Internet auction site last September was sentenced by the Tribunal de Grande Instance de Paris for using without authorization the name of several brands of LVMH perfumes, a decision appealed.
This internet site selling was convicted in June of 2008 for "illegal practices" after the sale of perfumes Kenzo, Givenchy, Christian Dior and Guerlain, all brands of the LVMH group.
On Monday, the Paris commercial court sentenced him to two fines of 850,000 euros (1.2 million) in finding that eBay did not respect the order prohibiting him from selling those products, told AFP Pierre Gode, group manager LVMH.
"We are clearly pleased with this decision, which again supports the principle of selective distribution," he added. This principle allows manufacturers to choose their distribution network.
To comply with the injunction, eBay launched a series of significant human and technical measures for buyers and sellers can buy and sell non-genuine products, "said its general manager in France, Alex von Schirmeister.
"It is true that there are users that try to bypass the order," he added, before describing the fine "disproportionate."
In a statement further held that the decision of the court "punishes consumers by preventing them from buying or selling real products on the Internet.
The Internet auction site last September was sentenced by the Tribunal de Grande Instance de Paris for using without authorization the name of several brands of LVMH perfumes, a decision appealed.
Web keeps track of the last 350 years of science
Dante recounts a 1666 blood transfusion and entertaining notes on how you answered a Mozart from 8 years to the evidence of his genius were published on Monday in a story line of scientific endeavors.
The website "Trailblazing" (marking the road, with its translation in Spanish) was created by the influential Royal Society scientific academy and includes handwritten documents on some of the most important scientific discoveries of the last three and half centuries.
Studies of Benjamin Franklin on how to trace a kite in a thunderstorm, which date from 1752, was the first time someone suggested that lightning and electricity were not a supernatural force.
And the notes of Edward Stone in 1763 about the success of willow bark to treat fever discovery documents the rise of acetyl salicylic acid and aspirin production, currently one of the most used drugs worldwide.
Trailblazing creators say it is a virtual trip to the rhythm of each "through science, the Royal Society hopes to inspire people to see science as part of life and culture in everyday .
Martin Rees, president of the Royal Society, said the documents showed "an incessant demand of scientists for centuries (...) to try and build our knowledge of mankind and the universe."
"They represent the exciting moment that science allows us to better understand and see beyond," he added.
The documents, taken from the oldest scientific journal in the English speaking world, Philosophical Transactions, also includes documents dating from 1776 on how Captain James Cook saved his sailors from scurvy with pickled cabbage, lemon and malt, well before them to develop ideas on nutrition.
They also include the first work on black holes by Stephen Hawking and the historic work of Isaac Newton in 1672 on the nature of light and color documents in 1940 about the discovery of penicillin.
Daines Barrington, a skeptical scientist who wanted to test the claim that Mozart was a genius when he visited London in 1770 at age 8, said that the boy was so wicked and distracted as any child, but showed an outstanding talent.
"As the score was placed under his desk, he began playing the symphony in a masterful way," he wrote.
And the 1755 edition has a count of the first vaccines, and Hans Sloane wrote that "takes place with a slight incision in the skin of the arm" and introduce "a small amount of matter smallpox mature and appropriate to protect against a subsequent infection.
Sloane goes on to describe how he first tried "six convicted felons" and then "half a dozen children in charitable institutions.
The website "Trailblazing" (marking the road, with its translation in Spanish) was created by the influential Royal Society scientific academy and includes handwritten documents on some of the most important scientific discoveries of the last three and half centuries.
Studies of Benjamin Franklin on how to trace a kite in a thunderstorm, which date from 1752, was the first time someone suggested that lightning and electricity were not a supernatural force.
And the notes of Edward Stone in 1763 about the success of willow bark to treat fever discovery documents the rise of acetyl salicylic acid and aspirin production, currently one of the most used drugs worldwide.
Trailblazing creators say it is a virtual trip to the rhythm of each "through science, the Royal Society hopes to inspire people to see science as part of life and culture in everyday .
Martin Rees, president of the Royal Society, said the documents showed "an incessant demand of scientists for centuries (...) to try and build our knowledge of mankind and the universe."
"They represent the exciting moment that science allows us to better understand and see beyond," he added.
The documents, taken from the oldest scientific journal in the English speaking world, Philosophical Transactions, also includes documents dating from 1776 on how Captain James Cook saved his sailors from scurvy with pickled cabbage, lemon and malt, well before them to develop ideas on nutrition.
They also include the first work on black holes by Stephen Hawking and the historic work of Isaac Newton in 1672 on the nature of light and color documents in 1940 about the discovery of penicillin.
Daines Barrington, a skeptical scientist who wanted to test the claim that Mozart was a genius when he visited London in 1770 at age 8, said that the boy was so wicked and distracted as any child, but showed an outstanding talent.
"As the score was placed under his desk, he began playing the symphony in a masterful way," he wrote.
And the 1755 edition has a count of the first vaccines, and Hans Sloane wrote that "takes place with a slight incision in the skin of the arm" and introduce "a small amount of matter smallpox mature and appropriate to protect against a subsequent infection.
Sloane goes on to describe how he first tried "six convicted felons" and then "half a dozen children in charitable institutions.
Want to download applications like iTunes music down?
Through devices such as Blackberry or Mac can download applications and tools currently used a PC desktop, as if it is an Internet music download.
Users of the world, "gummy" of technology and finding new services that meet their specific needs are part of the consuming public Windows, Mac, iPhone and BlackBerry devices with Android, you can now download applications for their PCs or smartphones the same way as if they were downloading music from the Net. All this through Dazzle, a self-service tools around the clock, seven days a week offering wide range of applications and content to choose exactly what users need when they need it.
This solution, which works with Receiver, enables virtual desktops are much more convenient for users by providing greater flexibility, mobility and immediacy. With this infrastructure, access to applications and virtual desktops on any device is now as simple as turning on the TV. Thus, each employee will have instant access to corporate applications and desktops from the device is most convenient at the time.
While granting centralized security, simplify management and reduce costs have been the main drivers of virtualization, providing a better experience for end users is equally important. This is especially appreciated by younger employees who enter companies with self-service expectations flexibility and customization.
2010: The Year of the virtual desktop
Multiple factors converge to make 2010 a landmark year for virtual desktops. As 2009 draws to a close, desktop virtualization is improving as fast path to server virtualization enjoyed two or three years away quickly from the laboratory to test pilot and later deployments Full-scale production.
As the virtual desktop technologies continue to mature, an increasing number of companies are trying to introduce its viability predominant virtual desktop deployments scale to thousands of users, improving safety and reducing desktop management costs up to 50 percent in the process.
It is expected that the market for desktop virtualization will accelerate further in 2010 with the arrival of Windows 7, as organizations of all sizes will take time to evaluate their strategies at the enterprise level. In fact, many experts expect that eventually exceed desktop virtualization server virtualization, While desktop virtualization now has a market size of approximately 35 million servers worldwide, desktop virtualization has the potential to impact more than 600 million desktop users, counting only the corporate environment.
Demand for end users and IT alike
While the benefits of server virtualization is concentrated almost exclusively on IT agility and cost savings, desktop virtualization has the distinct advantage of benefit to the user and IT alike. Centralized management of employee desktop IT gives what he most wants: greater security, control and cost savings. At the same time, returning virtual desktop also gives end users what they most want: flexibility and self-service options. Through the power of virtualization, IT can deliver Windows desktops as a service on demand to any device. This flexibility gives users the ability to work from any device they choose and choose for themselves the services they need, when needed.
This unprecedented flexibility makes the virtual desktops into a practical reality for all types of employees, from service workers and office workers and power users with mobile employees.
Virtualization comes to any device
Dazzle is a customer-facing application that runs on any computer compatible with Mac or Windows. It works as a business for all applications is centrally located IT infrastructure products in the data center, and Citrix XenDesktop. To select an application in Dazzle, users simply browse and search based on name, description or type of application.
Dazzle is fully integrated with Citrix Receiver, which simplifies user access to corporate desktops and applications from any device they choose. With the new Blackberry and Android Receivers, Citrix has extended access at any time to even more mobile devices. Together, Dazzle and Citrix Citrix XenDesktop Receiver to bring the power of desktop virtualization to millions of devices. "Virtualization has brought many positive changes for IT in recent years," said Gordon Payne, vice president and general manager of Citrix desktop division. "Server virtualization has transformed the data center and holds great promise for cloud computing. As virtualization will move to the desktop in 2010, our goal is to revolutionize desktop computing experience for end users and IT alike "adds Citrix Payne.v Dazzle and Receiver are offered at no cost to any consumer or XenApp and XenDesktop will be available beginning of December worldwide.
Users of the world, "gummy" of technology and finding new services that meet their specific needs are part of the consuming public Windows, Mac, iPhone and BlackBerry devices with Android, you can now download applications for their PCs or smartphones the same way as if they were downloading music from the Net. All this through Dazzle, a self-service tools around the clock, seven days a week offering wide range of applications and content to choose exactly what users need when they need it.
This solution, which works with Receiver, enables virtual desktops are much more convenient for users by providing greater flexibility, mobility and immediacy. With this infrastructure, access to applications and virtual desktops on any device is now as simple as turning on the TV. Thus, each employee will have instant access to corporate applications and desktops from the device is most convenient at the time.
While granting centralized security, simplify management and reduce costs have been the main drivers of virtualization, providing a better experience for end users is equally important. This is especially appreciated by younger employees who enter companies with self-service expectations flexibility and customization.
2010: The Year of the virtual desktop
Multiple factors converge to make 2010 a landmark year for virtual desktops. As 2009 draws to a close, desktop virtualization is improving as fast path to server virtualization enjoyed two or three years away quickly from the laboratory to test pilot and later deployments Full-scale production.
As the virtual desktop technologies continue to mature, an increasing number of companies are trying to introduce its viability predominant virtual desktop deployments scale to thousands of users, improving safety and reducing desktop management costs up to 50 percent in the process.
It is expected that the market for desktop virtualization will accelerate further in 2010 with the arrival of Windows 7, as organizations of all sizes will take time to evaluate their strategies at the enterprise level. In fact, many experts expect that eventually exceed desktop virtualization server virtualization, While desktop virtualization now has a market size of approximately 35 million servers worldwide, desktop virtualization has the potential to impact more than 600 million desktop users, counting only the corporate environment.
Demand for end users and IT alike
While the benefits of server virtualization is concentrated almost exclusively on IT agility and cost savings, desktop virtualization has the distinct advantage of benefit to the user and IT alike. Centralized management of employee desktop IT gives what he most wants: greater security, control and cost savings. At the same time, returning virtual desktop also gives end users what they most want: flexibility and self-service options. Through the power of virtualization, IT can deliver Windows desktops as a service on demand to any device. This flexibility gives users the ability to work from any device they choose and choose for themselves the services they need, when needed.
This unprecedented flexibility makes the virtual desktops into a practical reality for all types of employees, from service workers and office workers and power users with mobile employees.
Virtualization comes to any device
Dazzle is a customer-facing application that runs on any computer compatible with Mac or Windows. It works as a business for all applications is centrally located IT infrastructure products in the data center, and Citrix XenDesktop. To select an application in Dazzle, users simply browse and search based on name, description or type of application.
Dazzle is fully integrated with Citrix Receiver, which simplifies user access to corporate desktops and applications from any device they choose. With the new Blackberry and Android Receivers, Citrix has extended access at any time to even more mobile devices. Together, Dazzle and Citrix Citrix XenDesktop Receiver to bring the power of desktop virtualization to millions of devices. "Virtualization has brought many positive changes for IT in recent years," said Gordon Payne, vice president and general manager of Citrix desktop division. "Server virtualization has transformed the data center and holds great promise for cloud computing. As virtualization will move to the desktop in 2010, our goal is to revolutionize desktop computing experience for end users and IT alike "adds Citrix Payne.v Dazzle and Receiver are offered at no cost to any consumer or XenApp and XenDesktop will be available beginning of December worldwide.
"Sex" and "bank", among the first domain in Cyrillic
Among the first domains under the Code. "Rf" in Cyrillic, whose applications have priority for government agencies and major trademarks in Russia, appear surprisingly names like "sex.rf", "znakomstva.rf (contactos.rf) or "bank.rf" published the newspaper "Vedomosti".
On Wednesday it opened the application period in the new domain names for organisms and trademarks will close on 25 March.
Then, between April and June, will be the turn of other organizations and private companies, and from 10 July may apply for other legal and natural persons.
The purpose of this order to the application of the new code names in Cyrillic (. "Rf" by Rossiiskaya Federatsia or Russian Federation) is to prevent "cybersquatters" buy the rights of certain domains in high demand on the network or relevant for companies and public figures and then resale.
But there who knows bypass these limitations.
Thus, in the first day of applications, a single company, the Center for Effective Technology and Information Systems (Ctesias) acquired the domains "bank.rf", "nedvizhimost.rf" ( "inmuebles.rf"), "Ipoteka. rf "" sex.rf "," znakomstva.rf "," kino.rf "," striptis, rf "," dosug.rf "(" ocio.rf ")," parket.rf "and others.
This company, which is dedicated to the development of Internet projects, a member of "Reg.ru" one of the domain registration companies.
The general director of "Reg.ru" Alexei Nikolayevich Koroliuk, said his company registered these domains for Ctesias, he needed them for their clients.
According to the Single State Register of Legal Persons, Koroliuk owns 42 percent of the shares of "Reg.ru" while another Koroliuk, Nikolai Ivanovich, has 100 percent of the shares of Ctesias.
However, Alexei Koroliuk called it coincidence, and denied any relationship between the companies.
He added that "Reg.ru" checked before granting Ctesias domains that really counts with trademarks that correspond to the names requested.
Thus, the word "sex" is registered with the State Patent Office Rospatent under the label "women's bags, suitcases, etc.". and "kino" appears under "water heaters, lamps, lanterns, etc."..
According to Andrei Vorobyov, a spokesman for record company Ru-Center, Ctesias found a very clever way of bypassing the legal and law as it prepared well in advance any documentation sent to the patent office and in the spring.
Thus, the domains could purchase Ctesias to 1,200 rubles (28 euros) and not the cost price once applications are opened to all natural and legal persons, estimated for the first day in about 10 billion rubles (about 230,000 euros).
Russia, where more than thirty million Internet users browse at least once a week (nearly a quarter of the population), until now the domain used in the Latin alphabet (. Ru).
ICANN (the private organization regulating Internet domain names) decided last October 30 at their annual summit in Seoul, the internationalization of the use of different characters in web addresses in alphabets such as Cyrillic, Hebrew, Korean, Hindi, Arabic and, of course, Chinese.
The aim of this decision, which comes into force in mid-2010, is to make the network more accessible to the 800 million Internet-half the total-who speak languages with alphabets
On Wednesday it opened the application period in the new domain names for organisms and trademarks will close on 25 March.
Then, between April and June, will be the turn of other organizations and private companies, and from 10 July may apply for other legal and natural persons.
The purpose of this order to the application of the new code names in Cyrillic (. "Rf" by Rossiiskaya Federatsia or Russian Federation) is to prevent "cybersquatters" buy the rights of certain domains in high demand on the network or relevant for companies and public figures and then resale.
But there who knows bypass these limitations.
Thus, in the first day of applications, a single company, the Center for Effective Technology and Information Systems (Ctesias) acquired the domains "bank.rf", "nedvizhimost.rf" ( "inmuebles.rf"), "Ipoteka. rf "" sex.rf "," znakomstva.rf "," kino.rf "," striptis, rf "," dosug.rf "(" ocio.rf ")," parket.rf "and others.
This company, which is dedicated to the development of Internet projects, a member of "Reg.ru" one of the domain registration companies.
The general director of "Reg.ru" Alexei Nikolayevich Koroliuk, said his company registered these domains for Ctesias, he needed them for their clients.
According to the Single State Register of Legal Persons, Koroliuk owns 42 percent of the shares of "Reg.ru" while another Koroliuk, Nikolai Ivanovich, has 100 percent of the shares of Ctesias.
However, Alexei Koroliuk called it coincidence, and denied any relationship between the companies.
He added that "Reg.ru" checked before granting Ctesias domains that really counts with trademarks that correspond to the names requested.
Thus, the word "sex" is registered with the State Patent Office Rospatent under the label "women's bags, suitcases, etc.". and "kino" appears under "water heaters, lamps, lanterns, etc."..
According to Andrei Vorobyov, a spokesman for record company Ru-Center, Ctesias found a very clever way of bypassing the legal and law as it prepared well in advance any documentation sent to the patent office and in the spring.
Thus, the domains could purchase Ctesias to 1,200 rubles (28 euros) and not the cost price once applications are opened to all natural and legal persons, estimated for the first day in about 10 billion rubles (about 230,000 euros).
Russia, where more than thirty million Internet users browse at least once a week (nearly a quarter of the population), until now the domain used in the Latin alphabet (. Ru).
ICANN (the private organization regulating Internet domain names) decided last October 30 at their annual summit in Seoul, the internationalization of the use of different characters in web addresses in alphabets such as Cyrillic, Hebrew, Korean, Hindi, Arabic and, of course, Chinese.
The aim of this decision, which comes into force in mid-2010, is to make the network more accessible to the 800 million Internet-half the total-who speak languages with alphabets
Tokyo hosts the largest fair in the world robots
A robot can recognize its creator, electronic arms to assemble at breakneck speed and even a humanoid that plays ping pong: the latest in robotics is shown in Tokyo in an exhibition involving about 200 companies.
The International Robot Exhibition, held every two years in central Tokyo Big Sight, is the largest global event of an industry standard-bearer for Japan, leaving half of the world's industrial robots.
How could it be otherwise, a humanoid robot was asked to cut the ribbon to access the building, which presented an appearance worthy of a science fiction movie.
Dozens of robots, for most industrial processes, displayed their skills before the large audience, while representatives of 192 companies involved proud explaining their features and improvements in electronic wits.
Companies such as Toshiba and Mitsubishi, alongside lesser-known names as ABB Anybots or led to Japan's capital from huge machines to perform processes automotive to tiny unmanned aircraft for precision operations.
Among the most attention in the first day of the fair were humanoid robots, which in recent years have improved their "view" and "touch" thanks to advances in digital optical and electrical sensors development.
In the laboratories of Japan's Kawada Industries, for example, has gone "Hiro", a device with cameras in the eyes and palms of hands, able to recognize colors and shapes and moving through time operating system real.
"Hiro," thanks to these features, is able to identify a face, "Efe said one of its creators, Maksim Radev, while the robot stared at him and was still watching his every move.
"Hiro" is just over five feet, weighs 70 kilos and is capable of holding 20 kilos on her arms and grasp objects of up to two kilos in each hand.
"It can be easily controlled using the Windows XP, making it very accessible," said Radev, who said that this robot has no industrial use, unlike his fellow "New Age", of similar appearance.
Another company, Anybots, exhibits a robot drone, slightly larger than a domestic vacuum cleaner, designed to act as a "supervisor" at a distance in the era of offshoring.
"The robot can be for example in a factory in Japan while the other side of the world someone in the production department is in charge and you can see how production goes through the eyes of the robot," he told Efe Daniel Casner, one their creators.
While many of the mills are for industrial use, their presence in other areas is growing: According to the Japan Robotics Association, estimates that the market for robots dedicated to the service sector will involve 15,000 million dollars in 2015.
Thus, the fair is taught geniuses like Ping Pong Robot, an android who almost always wins, or "Herby", a form of baby doll designed for the elderly so tightly against his chest, allowing the sensors to The doll has implemented the measure her pulse and even perform an electrocardiogram.
He was also the improved version of "Stop", a seal stuffed full of sensors to behave like a real animal, moving, making sounds and responding to stimuli.
This robot has an end "and pediatric treatment," according to its makers, who contend that the seal robot increases the communication capacity of the holder and reduces stress.
It is expected that at the end of the fair, be given the award for the Robot of the Year, an award in the past have found a genius inventions capable of cleaning an office building, moving from floor to floor or a little mini-robot 15 cm capable of performing up to 200 shares.
The International Robot Exhibition, held every two years in central Tokyo Big Sight, is the largest global event of an industry standard-bearer for Japan, leaving half of the world's industrial robots.
How could it be otherwise, a humanoid robot was asked to cut the ribbon to access the building, which presented an appearance worthy of a science fiction movie.
Dozens of robots, for most industrial processes, displayed their skills before the large audience, while representatives of 192 companies involved proud explaining their features and improvements in electronic wits.
Companies such as Toshiba and Mitsubishi, alongside lesser-known names as ABB Anybots or led to Japan's capital from huge machines to perform processes automotive to tiny unmanned aircraft for precision operations.
Among the most attention in the first day of the fair were humanoid robots, which in recent years have improved their "view" and "touch" thanks to advances in digital optical and electrical sensors development.
In the laboratories of Japan's Kawada Industries, for example, has gone "Hiro", a device with cameras in the eyes and palms of hands, able to recognize colors and shapes and moving through time operating system real.
"Hiro," thanks to these features, is able to identify a face, "Efe said one of its creators, Maksim Radev, while the robot stared at him and was still watching his every move.
"Hiro" is just over five feet, weighs 70 kilos and is capable of holding 20 kilos on her arms and grasp objects of up to two kilos in each hand.
"It can be easily controlled using the Windows XP, making it very accessible," said Radev, who said that this robot has no industrial use, unlike his fellow "New Age", of similar appearance.
Another company, Anybots, exhibits a robot drone, slightly larger than a domestic vacuum cleaner, designed to act as a "supervisor" at a distance in the era of offshoring.
"The robot can be for example in a factory in Japan while the other side of the world someone in the production department is in charge and you can see how production goes through the eyes of the robot," he told Efe Daniel Casner, one their creators.
While many of the mills are for industrial use, their presence in other areas is growing: According to the Japan Robotics Association, estimates that the market for robots dedicated to the service sector will involve 15,000 million dollars in 2015.
Thus, the fair is taught geniuses like Ping Pong Robot, an android who almost always wins, or "Herby", a form of baby doll designed for the elderly so tightly against his chest, allowing the sensors to The doll has implemented the measure her pulse and even perform an electrocardiogram.
He was also the improved version of "Stop", a seal stuffed full of sensors to behave like a real animal, moving, making sounds and responding to stimuli.
This robot has an end "and pediatric treatment," according to its makers, who contend that the seal robot increases the communication capacity of the holder and reduces stress.
It is expected that at the end of the fair, be given the award for the Robot of the Year, an award in the past have found a genius inventions capable of cleaning an office building, moving from floor to floor or a little mini-robot 15 cm capable of performing up to 200 shares.
Google will display treasures from the Iraq Museum Internet
Google will document the treasures of Iraq's national museum and exhibit on the Internet photographs of artefacts belonging to the ancient civilizations at the beginning of next year, announced Tuesday the director of Google, Eric Schmidt.
The museum was looted during the chaos that followed the overthrow of Saddam Hussein in April 2003, and was only reopened to the public earlier this year. Schmidt, who toured the museum on Tuesday with U.S. Ambassador Christopher Hill, said it was important that the world would see the rich heritage of Iraq and its contribution to Western civilization.
"The story of the origins, practically, civilization took place here and has been preserved in this museum," Schmidt said at a ceremony attended by Iraqi officials.
"I can think of no better way to use our time and resources that make the images and ideas of civilization, from the very beginning, at the disposal of billions of people around the world," he said.
Schmidt said Google has taken 14,000 photographs of the museum and its parts, and the images will be available on the Internet in early 2010.
The antiquities found in the vast repository of museum pieces elsewhere in the country will also be photographed as they become available and then will be placed on the Internet, he said.
The museum is among many entities, including universities, hospitals, libraries and art galleries that were looted or burned across Iraq in the days and weeks that followed the fall of Saddam.
The museum contains exhibits from the Stone Age to the era of Babylon, the Assyrian culture and Islamic periods. The richness of its collection and its importance as the curator of the relics of early civilizations provoked a worldwide outcry.
U.S. troops, the only power in the city at that time, has been strongly criticized for failing to protect the treasures of the museum and other cultural institutions like the National Library and the Saddam Art Center, a museum of modern Iraqi art.
The museum was looted during the chaos that followed the overthrow of Saddam Hussein in April 2003, and was only reopened to the public earlier this year. Schmidt, who toured the museum on Tuesday with U.S. Ambassador Christopher Hill, said it was important that the world would see the rich heritage of Iraq and its contribution to Western civilization.
"The story of the origins, practically, civilization took place here and has been preserved in this museum," Schmidt said at a ceremony attended by Iraqi officials.
"I can think of no better way to use our time and resources that make the images and ideas of civilization, from the very beginning, at the disposal of billions of people around the world," he said.
Schmidt said Google has taken 14,000 photographs of the museum and its parts, and the images will be available on the Internet in early 2010.
The antiquities found in the vast repository of museum pieces elsewhere in the country will also be photographed as they become available and then will be placed on the Internet, he said.
The museum is among many entities, including universities, hospitals, libraries and art galleries that were looted or burned across Iraq in the days and weeks that followed the fall of Saddam.
The museum contains exhibits from the Stone Age to the era of Babylon, the Assyrian culture and Islamic periods. The richness of its collection and its importance as the curator of the relics of early civilizations provoked a worldwide outcry.
U.S. troops, the only power in the city at that time, has been strongly criticized for failing to protect the treasures of the museum and other cultural institutions like the National Library and the Saddam Art Center, a museum of modern Iraqi art.
The iPhones "unlocked" are vulnerable to new viruses
Hackers programmed a virus that attacks the iPhone from Apple Inc., secretly taking control of devices via internet connections, security experts reported.
"Virus attacks for the first time the iPhone
The virus was detected in the Netherlands and can attack only owned iPhones to disable some security features pre-installed, according to analysts who watch the progress of the virus, known as Worm Duh.
Hackers try to use the virus to obtain passwords for banking sites in the Netherlands, said Graham Cluley, a researcher at antivirus software maker Sophos.
When an iPhone user tries to access a banking site, Duh Worm directs the browser to a similar site controlled by hackers, Cluley said.
The phones are vulnerable phones "unlocked" in which users disable key security features of Apple to avoid meeting the terms of use agreement.
For example, Apple prevents users to change service providers and carriers limited to unauthorized users to nearly 100,000 programs the company has researched to install on the device.
There are thousands of unauthorized programs covering areas from phone calls over the Internet, access to WiFi networks and pornography.
"The vast majority of customers unlock their iPhones, and for good reason. These hacks not only violate the warranty, the iPhone will also become unstable and does not work reliably," said Natalie Harrison, a spokeswoman for Apple.
Three independent security experts said it is better for iPhone users to unlock their devices not because the security risks outweigh the benefits.
"They are leaving open the back door. Everyone else know what the key to open that door," said Cluley.
"Virus attacks for the first time the iPhone
The virus was detected in the Netherlands and can attack only owned iPhones to disable some security features pre-installed, according to analysts who watch the progress of the virus, known as Worm Duh.
Hackers try to use the virus to obtain passwords for banking sites in the Netherlands, said Graham Cluley, a researcher at antivirus software maker Sophos.
When an iPhone user tries to access a banking site, Duh Worm directs the browser to a similar site controlled by hackers, Cluley said.
The phones are vulnerable phones "unlocked" in which users disable key security features of Apple to avoid meeting the terms of use agreement.
For example, Apple prevents users to change service providers and carriers limited to unauthorized users to nearly 100,000 programs the company has researched to install on the device.
There are thousands of unauthorized programs covering areas from phone calls over the Internet, access to WiFi networks and pornography.
"The vast majority of customers unlock their iPhones, and for good reason. These hacks not only violate the warranty, the iPhone will also become unstable and does not work reliably," said Natalie Harrison, a spokeswoman for Apple.
Three independent security experts said it is better for iPhone users to unlock their devices not because the security risks outweigh the benefits.
"They are leaving open the back door. Everyone else know what the key to open that door," said Cluley.
Chinese cyber increases against U.S.
The Chinese Government appears to be more often keying the computer networks of government and industry, U.S. Defense to collect information useful to the Army, said a congressional advisory panel.
"An enormous amount of circumstantial and forensic evidence strongly suggests the involvement of the Chinese state in such activities," said the Committee on Economic and Security Review between the U.S. and China in its 2009 report to Congress.
The 12-member bipartisan commission was established in 2000 to discuss the implications of growing trade with China.
Beijing has begun to expand its national security concerns beyond a possible confrontation across the Taiwan Strait and its periphery issues, said the report of 367 pages.
China is the most aggressive in conducting espionage against the United States, focusing on obtaining data and knowledge to help in modernizing its military and economic development, he added.
The amount of computing activities "malicious" against the United States rose in 2008 and is growing sharply this year, he said, adding that "much of this activity appears to originate in China."
The Chinese Embassy in the United States did not immediately respond to requests for comment.
The commission said that the Chinese government has put much of their operational capabilities of computer networks between elements of the PLA.
"The efforts of China's computer operation in peacetime are mainly concentrated on collecting intelligence against U.S. targets and Chinese dissident groups overseas," he said.
The ticking report the findings of Northrop Grumman Corp., a leading Pentagon contractors, which meant that the Chinese government is engaged in widespread anti-US cyber activities.
It omitted any description of the techniques used in forensic cyber espionage.
A study by Northrop Grumman was prepared for the committee and was published in October. He argues that Beijing seems to be making a "campaign of prolonged operation and sophisticated computer networks" against the government and defense industries United States.
"An enormous amount of circumstantial and forensic evidence strongly suggests the involvement of the Chinese state in such activities," said the Committee on Economic and Security Review between the U.S. and China in its 2009 report to Congress.
The 12-member bipartisan commission was established in 2000 to discuss the implications of growing trade with China.
Beijing has begun to expand its national security concerns beyond a possible confrontation across the Taiwan Strait and its periphery issues, said the report of 367 pages.
China is the most aggressive in conducting espionage against the United States, focusing on obtaining data and knowledge to help in modernizing its military and economic development, he added.
The amount of computing activities "malicious" against the United States rose in 2008 and is growing sharply this year, he said, adding that "much of this activity appears to originate in China."
The Chinese Embassy in the United States did not immediately respond to requests for comment.
The commission said that the Chinese government has put much of their operational capabilities of computer networks between elements of the PLA.
"The efforts of China's computer operation in peacetime are mainly concentrated on collecting intelligence against U.S. targets and Chinese dissident groups overseas," he said.
The ticking report the findings of Northrop Grumman Corp., a leading Pentagon contractors, which meant that the Chinese government is engaged in widespread anti-US cyber activities.
It omitted any description of the techniques used in forensic cyber espionage.
A study by Northrop Grumman was prepared for the committee and was published in October. He argues that Beijing seems to be making a "campaign of prolonged operation and sophisticated computer networks" against the government and defense industries United States.
Smartphone market will grow in 2010
The wireless industry processors expected to continue the eruption of the market for advanced phones, and the British microchip designer ARM announced that growth could even accelerate next year.
The market for so-called 'smartphones' drastically slowed the quarter ending in September, but chip makers - whose products are sold weeks if not months, before the phones to be sold to consumers - said they are seeing a strong market growth, indicating that the slowdown in the third quarter was temporary.
"The 'smartphones' grew this year, and we'll probably see faster growth next year,''said Tim Score, chief financial officer of ARM, at the Annual Conference Morgan Stanley Technology, Media and Telecommunications held in Barcelona .
ARM designs are in 90 percent of phones, including Apple's iPhone and the new high-end model of Nokia N900.
This market has tremendous growth since Apple introduced the iPhone in mid-2007, increasing the appetite of consumers surfing the Internet at any time.
"Things really began to start when Steve Jobs stood up and said: now you can access the Internet in your pocket,''said Erik Harrell, CFO of the Norwegian web browser for mobile phones, Opera Software.
Joep van Beurden, CEO of the company CSR said processor volumes advanced phone market would grow about 20 percent this year.
"There is a strong impetus for smartphones,''also said Carmelo Papa, head of the industrial division of STMicroelectronics.
The lower prices of these phones to shoot next year's growth market while Nokia and Google have their operating systems - Symbian and Android - for cheaper phones, where sales volumes are higher.
"In 2010 will see continued growth as manufacturers and operators seeking to launch open platforms in the mass market,''said Geoff Blaber, analyst at research firm CCS Insight.''Bear the Android and Symbian 'smartphones' below 150 euros.''
Nokia introduced its first smartphone from 150 euros in August.
China Mobile, the world's largest operator by subscribers, said last month it expects average prices of these phones were halved in a year or two.
The market for so-called 'smartphones' drastically slowed the quarter ending in September, but chip makers - whose products are sold weeks if not months, before the phones to be sold to consumers - said they are seeing a strong market growth, indicating that the slowdown in the third quarter was temporary.
"The 'smartphones' grew this year, and we'll probably see faster growth next year,''said Tim Score, chief financial officer of ARM, at the Annual Conference Morgan Stanley Technology, Media and Telecommunications held in Barcelona .
ARM designs are in 90 percent of phones, including Apple's iPhone and the new high-end model of Nokia N900.
This market has tremendous growth since Apple introduced the iPhone in mid-2007, increasing the appetite of consumers surfing the Internet at any time.
"Things really began to start when Steve Jobs stood up and said: now you can access the Internet in your pocket,''said Erik Harrell, CFO of the Norwegian web browser for mobile phones, Opera Software.
Joep van Beurden, CEO of the company CSR said processor volumes advanced phone market would grow about 20 percent this year.
"There is a strong impetus for smartphones,''also said Carmelo Papa, head of the industrial division of STMicroelectronics.
The lower prices of these phones to shoot next year's growth market while Nokia and Google have their operating systems - Symbian and Android - for cheaper phones, where sales volumes are higher.
"In 2010 will see continued growth as manufacturers and operators seeking to launch open platforms in the mass market,''said Geoff Blaber, analyst at research firm CCS Insight.''Bear the Android and Symbian 'smartphones' below 150 euros.''
Nokia introduced its first smartphone from 150 euros in August.
China Mobile, the world's largest operator by subscribers, said last month it expects average prices of these phones were halved in a year or two.
Six free programs useful for any PC user
The free downloadable software is an increasingly strong movement that allows the average PC user to improve performance and security of your computer without spending money.
There are antivirus to protect computers, photo editors to manipulate images with basic functions, spreadsheets and word processors that, while not as sophisticated as payments software, offer decent performance for users who only need the basics.
In addition, there are thousands of websites that offer legal downloads and free programs. But beware, many of these offers can be dangerous, stay away from dubious pages and be guided by the prestige of the software manufacturer you want to download.
To help you learn some programs that will no doubt be very useful, then we summarize five types of basic software for PC and mention any brands that stand among the most popular Internet.
1. Antivirus
Basic to any computer, especially if you have Windows operating system, is the antivirus. Normally, new PCs come with antivirus software installed, but when the license expires, do not worry. You can protect your computer from viruses without paying a dime. Only you must install the correct software usage habits and adopt "healthy for your computer."
Among the most popular free antivirus is AVG, a simple but effective program whose website offers a free version. For other antivirus recommended by experts familiar with our top five free antivirus. For tips to avoid infection, read our tutorial to protect your PC.
2. Document Management
If you need to write documents, manage spreadsheets and presentations from time to time and not paying for Microsoft Office license, you have several options.
One is to use the beta version of Microsoft Office 2010. After the release of Windows 7, Microsoft released temporarily for free download the trial version of Office 2010. It is a unfinished version of the programs included in this suite, aimed primarily at developers who report the errors, but can be useful in these times of economic crisis.
Alternatively, Open Office, an organization that developed a suite of programs similar to Microsoft Office, but simpler. Unless you need the more advanced features of Microsoft programs, OpenOffice.org will surely be helpful.
Google rival Microsoft, also has a kind of Office online. Google Docs is an online service that lets you create and share documents for free and "in the cloud", ie that everything is stored on Google servers, not your computer. The functions are much more basic than Office, but no less desirable.
3. Internet Navigation
Many internet users are unaware that there is more than a web browser. Internet Explorer, Microsoft certainly dominates the browser market. If you are using an earlier version of Internet Explorer 8, including version 6, it is important that you download and install the latest version, which is safer and more reliable than previous ones. It is indeed a good browser but not alone.
Firefox, Mozilla, an open source browser that has been improved over the years by the contribution of thousands of volunteer developers. If what you are looking for is speed, Google Chrome is noted for being lightweight and fast browser. However, there are still sites that do not work very well in this browser.
Other browsers are free to include Opera and Safari. The latter is the browser that comes installed on all Apple computers. If you have a Mac and want to explore other browsers, you can install Firefox for Mac or Camino, a Mozilla-based browser made specifically for Mac Google Chrome is a beta version for Mac that is not finished yet but it works.
4. Photo Editing
If you like the photos digitally manipulated to make surrealist creations, or simply want to improve focus and remove red eye from photos of your birthday, you can do for free.
Programs such as Gimp and Paint.net is free photo editors that, while not as sophisticated as Photoshop, Adobe, have useful features for non-professional user.
5. Playing multimedia
Finally, entertainment is one of the main uses of computers. breeding programs that are installed by default can not always reproduce the multitude of video and audio formats that exist. If you are looking for a versatile multimedia player, easy to use and free VLC Media Player is what you seek. One of the most popular free software recommended by Internet and specialized websites.
6. Communications
Instant messaging programs are a great tool to keep in touch with friends, family and coworkers. Perhaps the most popular Windows Live Messenger, who recently completed a decade since its inception and provides more customization options than ever.
Other instant messaging programs like Google Talk and Yahoo Messenger offer similar features, but if what you want is to make internet calls or conversations in real-time video, Skype is more suited to their needs. It is free and includes low rates for international calling.
There are also advanced email program like Thunderbird, Mozilla, or Windows Live Mail, Microsoft, which allow you to synchronize multiple e-mail accounts in one program.
There are antivirus to protect computers, photo editors to manipulate images with basic functions, spreadsheets and word processors that, while not as sophisticated as payments software, offer decent performance for users who only need the basics.
In addition, there are thousands of websites that offer legal downloads and free programs. But beware, many of these offers can be dangerous, stay away from dubious pages and be guided by the prestige of the software manufacturer you want to download.
To help you learn some programs that will no doubt be very useful, then we summarize five types of basic software for PC and mention any brands that stand among the most popular Internet.
1. Antivirus
Basic to any computer, especially if you have Windows operating system, is the antivirus. Normally, new PCs come with antivirus software installed, but when the license expires, do not worry. You can protect your computer from viruses without paying a dime. Only you must install the correct software usage habits and adopt "healthy for your computer."
Among the most popular free antivirus is AVG, a simple but effective program whose website offers a free version. For other antivirus recommended by experts familiar with our top five free antivirus. For tips to avoid infection, read our tutorial to protect your PC.
2. Document Management
If you need to write documents, manage spreadsheets and presentations from time to time and not paying for Microsoft Office license, you have several options.
One is to use the beta version of Microsoft Office 2010. After the release of Windows 7, Microsoft released temporarily for free download the trial version of Office 2010. It is a unfinished version of the programs included in this suite, aimed primarily at developers who report the errors, but can be useful in these times of economic crisis.
Alternatively, Open Office, an organization that developed a suite of programs similar to Microsoft Office, but simpler. Unless you need the more advanced features of Microsoft programs, OpenOffice.org will surely be helpful.
Google rival Microsoft, also has a kind of Office online. Google Docs is an online service that lets you create and share documents for free and "in the cloud", ie that everything is stored on Google servers, not your computer. The functions are much more basic than Office, but no less desirable.
3. Internet Navigation
Many internet users are unaware that there is more than a web browser. Internet Explorer, Microsoft certainly dominates the browser market. If you are using an earlier version of Internet Explorer 8, including version 6, it is important that you download and install the latest version, which is safer and more reliable than previous ones. It is indeed a good browser but not alone.
Firefox, Mozilla, an open source browser that has been improved over the years by the contribution of thousands of volunteer developers. If what you are looking for is speed, Google Chrome is noted for being lightweight and fast browser. However, there are still sites that do not work very well in this browser.
Other browsers are free to include Opera and Safari. The latter is the browser that comes installed on all Apple computers. If you have a Mac and want to explore other browsers, you can install Firefox for Mac or Camino, a Mozilla-based browser made specifically for Mac Google Chrome is a beta version for Mac that is not finished yet but it works.
4. Photo Editing
If you like the photos digitally manipulated to make surrealist creations, or simply want to improve focus and remove red eye from photos of your birthday, you can do for free.
Programs such as Gimp and Paint.net is free photo editors that, while not as sophisticated as Photoshop, Adobe, have useful features for non-professional user.
5. Playing multimedia
Finally, entertainment is one of the main uses of computers. breeding programs that are installed by default can not always reproduce the multitude of video and audio formats that exist. If you are looking for a versatile multimedia player, easy to use and free VLC Media Player is what you seek. One of the most popular free software recommended by Internet and specialized websites.
6. Communications
Instant messaging programs are a great tool to keep in touch with friends, family and coworkers. Perhaps the most popular Windows Live Messenger, who recently completed a decade since its inception and provides more customization options than ever.
Other instant messaging programs like Google Talk and Yahoo Messenger offer similar features, but if what you want is to make internet calls or conversations in real-time video, Skype is more suited to their needs. It is free and includes low rates for international calling.
There are also advanced email program like Thunderbird, Mozilla, or Windows Live Mail, Microsoft, which allow you to synchronize multiple e-mail accounts in one program.
IBM claims to have simulated the cerebral cortex of a cat
IBM Corp. researchers reported that by a massive supercomputer, able to simulate the cerebral cortex of a cat, the most developed part of the brain.
The computer has 147,456 chips, more than most modern personal computers, which have only one or two processors. The IBM team also has 144 terabytes of main memory, equivalent to 100,000 times the capacity of a standard computer.
Previously, scientists have simulated the 40% of the brain of a mouse in 2006, 100% of the brain of a rat in 2007 and 1% of the human cerebral cortex this year, using ever larger supercomputers.
The latest technological advancement, presented at a supercomputing conference in Portland, Oregon, does not mean that the computer can think like a cat, or that it is the progenitor of a new breed of robogatos.
The simulation, which runs 100 times slower than the brain of a real cat, looked rather how thoughts are formed in the brain and how they work together the 1,000 billion neurons and 10 trillion synapses in the brain of a cat.
The researchers created a program that sought to make the supercomputer, located at the Lawrence Livermore National Laboratory, to behave as it is believed that the brain behaves.
During an experiment, he showed the computer images of corporate logos, including one from IBM, and the scientists observed how different parts of the simulated brain working to figure out what was the image.
Dharmendra Mohd, manager of cognitive computing for IBM Research Unit and lead author of the research, said the experiment could lead to the creation of computers that rely less on "structured data" such as the sum of two plus two equals four.
He said the idea is to create teams that are capable of dealing with ambiguity, as the identification of a company logo, even if the image is blurred.
Such computers could incorporate mechanisms for receipt of information, equivalent to the senses of sight, touch and hearing to the decisions they make.
The computer has 147,456 chips, more than most modern personal computers, which have only one or two processors. The IBM team also has 144 terabytes of main memory, equivalent to 100,000 times the capacity of a standard computer.
Previously, scientists have simulated the 40% of the brain of a mouse in 2006, 100% of the brain of a rat in 2007 and 1% of the human cerebral cortex this year, using ever larger supercomputers.
The latest technological advancement, presented at a supercomputing conference in Portland, Oregon, does not mean that the computer can think like a cat, or that it is the progenitor of a new breed of robogatos.
The simulation, which runs 100 times slower than the brain of a real cat, looked rather how thoughts are formed in the brain and how they work together the 1,000 billion neurons and 10 trillion synapses in the brain of a cat.
The researchers created a program that sought to make the supercomputer, located at the Lawrence Livermore National Laboratory, to behave as it is believed that the brain behaves.
During an experiment, he showed the computer images of corporate logos, including one from IBM, and the scientists observed how different parts of the simulated brain working to figure out what was the image.
Dharmendra Mohd, manager of cognitive computing for IBM Research Unit and lead author of the research, said the experiment could lead to the creation of computers that rely less on "structured data" such as the sum of two plus two equals four.
He said the idea is to create teams that are capable of dealing with ambiguity, as the identification of a company logo, even if the image is blurred.
Such computers could incorporate mechanisms for receipt of information, equivalent to the senses of sight, touch and hearing to the decisions they make.
China orders Microsoft to stop some sales of Windows
A Chinese court ordered Microsoft, the software maker in the world, stop selling versions of its Windows operating systems including fountains designed by a local company, citing a violation of license agreements.
The ruling, signed Monday by the No. 1 Intermediate People's Court of Beijing, is a setback for Microsoft, which intends to increase its market share in China, which is already struggling with rampant piracy problems.
The ruling said that Microsoft violated the license agreements between the company and a Chinese technology company, Zhongyi Electronic, designing fonts for Chinese characters.
Microsoft will have to stop selling Chinese versions of its Windows 98, 2000, 2003 and Windows XP, according to the court. It is unclear when the decision will be effective or how many copies will be affected.
The U.S. company said it would appeal the ruling.
"Microsoft respects intellectual property rights. We use the intellectual property of others when we have a lawful right to do so," the company said in a statement.
Zhongyi Electronic said on its website that the agreements signed only allowed to use their IP in Windows 95, but the U.S. giant's technologies used in subsequent versions of its Windows operating systems.
China has long been the target of foreign firms seeking to protect its intellectual property, but the situation is turning as Chinese companies mature and become more aggressive in protecting their own designs.
"By winning this case against a well known international company like Microsoft, shows that China, while a developing country, is taking positive steps to protect intellectual property rights," he told Reuters Xin Ling Yu, a lawyer for Zhongyi .
In fact, they expect more lawsuits with Chinese companies, according to Michael Vella, head of intellectual property rights and litigation in China in the Morrison & Foerster law firm.
"(Chinese companies) are going to think of China as a place to have its own litigation strategy, I think it is a trend that is coming," said Vella.
"We saw it in Taiwan. At first, the Taiwanese companies were always on the defensive, and in recent years we have been initiating litigation," she said.
The ruling, signed Monday by the No. 1 Intermediate People's Court of Beijing, is a setback for Microsoft, which intends to increase its market share in China, which is already struggling with rampant piracy problems.
The ruling said that Microsoft violated the license agreements between the company and a Chinese technology company, Zhongyi Electronic, designing fonts for Chinese characters.
Microsoft will have to stop selling Chinese versions of its Windows 98, 2000, 2003 and Windows XP, according to the court. It is unclear when the decision will be effective or how many copies will be affected.
The U.S. company said it would appeal the ruling.
"Microsoft respects intellectual property rights. We use the intellectual property of others when we have a lawful right to do so," the company said in a statement.
Zhongyi Electronic said on its website that the agreements signed only allowed to use their IP in Windows 95, but the U.S. giant's technologies used in subsequent versions of its Windows operating systems.
China has long been the target of foreign firms seeking to protect its intellectual property, but the situation is turning as Chinese companies mature and become more aggressive in protecting their own designs.
"By winning this case against a well known international company like Microsoft, shows that China, while a developing country, is taking positive steps to protect intellectual property rights," he told Reuters Xin Ling Yu, a lawyer for Zhongyi .
In fact, they expect more lawsuits with Chinese companies, according to Michael Vella, head of intellectual property rights and litigation in China in the Morrison & Foerster law firm.
"(Chinese companies) are going to think of China as a place to have its own litigation strategy, I think it is a trend that is coming," said Vella.
"We saw it in Taiwan. At first, the Taiwanese companies were always on the defensive, and in recent years we have been initiating litigation," she said.
Office 2010 Beta and you can download free
The software giant Microsoft launched free internet test version of its new office software, Office 2010, which first will be integrated with virtual social networks.
The announcement was made at the Professional Developers Conference 2009 (PDC09) being held in Los Angeles on Tuesday morning and will close their doors and where he presented the final version of Windows Azure, Microsoft's platform for programming in the cloud .
The remodeled version of Office 2010 will offer in its Outlook e-mail manager the opportunity to companies like Twitter and Facebook to develop an application to enable access to user accounts or profiles.
So far, only the business network LinkedIn has pledged to be ready for connection to Outlook when Office 2010 comes out officially on the market in the first half of next year.
"You can browse the updates of contacts with those who have communication," he told Efe Luis Daniel Soto, director of Microsoft New Technologies for the area of Latin America.
The application will access the public profile on LinkedIn email sender which reference will be more professional performance of the contact.
Outlook will comprise, in addition, with Windows Live and will create new networks through Software Developer SharePoint 2010.
"The model was not intended to do something specific to a particular social networks, but that was extended to others. For example in Latin America that are most successful networks as Sonic can build and participate in the scheme," said Soto.
The Microsoft manager said the company is working to have the most relevant social networks in the new Outlook and found that more connections will be available also on LinkedIn to where the new Office is available for sale.
"We liberated the possibility that the creator of each incorporate social networking functionality. You may have multiple connectors for multiple social networks, some are free and others will be commercial enterprises," he said.
Through its website, Microsoft allowed from today free download of Office 2010 in its test version in order to debug errors before final marketing, just as they did with Windows 7, the beta model was reviewed by more than 8 million users.
The Web version of Office 2010, more simple and requires no installation, is available on the Internet since the summer.
Since Microsoft makes sure the office software that will replace the Office 2007 will be more stable and allow for improved navigation, as well as incorporating updates in design, icons, logo or greater versatility for the use of videos in its PowerPoint presentation software.
The company has not released the product release date or their cost.
In addition to Office 2010, Microsoft launched today in beta versions on SharePoint Server 2010 and Silverlight 4, two programs for professionals.
The biggest ovation of the day at PDC09 took her Steven Sinofsky, Windows division president when he announced to the surprise of those present and each of the thousands of attendees to the event receive a free laptop.
The touch screen computer was built jointly by Microsoft and ACER, and is not scheduled to go on sale.
"The aim of this computer is that developers also have the hardware necessary to create such applications. There is nothing special in itself. There are many who already have the same functions that are sold for prices from $ 1000, Soto said.
The announcement was made at the Professional Developers Conference 2009 (PDC09) being held in Los Angeles on Tuesday morning and will close their doors and where he presented the final version of Windows Azure, Microsoft's platform for programming in the cloud .
The remodeled version of Office 2010 will offer in its Outlook e-mail manager the opportunity to companies like Twitter and Facebook to develop an application to enable access to user accounts or profiles.
So far, only the business network LinkedIn has pledged to be ready for connection to Outlook when Office 2010 comes out officially on the market in the first half of next year.
"You can browse the updates of contacts with those who have communication," he told Efe Luis Daniel Soto, director of Microsoft New Technologies for the area of Latin America.
The application will access the public profile on LinkedIn email sender which reference will be more professional performance of the contact.
Outlook will comprise, in addition, with Windows Live and will create new networks through Software Developer SharePoint 2010.
"The model was not intended to do something specific to a particular social networks, but that was extended to others. For example in Latin America that are most successful networks as Sonic can build and participate in the scheme," said Soto.
The Microsoft manager said the company is working to have the most relevant social networks in the new Outlook and found that more connections will be available also on LinkedIn to where the new Office is available for sale.
"We liberated the possibility that the creator of each incorporate social networking functionality. You may have multiple connectors for multiple social networks, some are free and others will be commercial enterprises," he said.
Through its website, Microsoft allowed from today free download of Office 2010 in its test version in order to debug errors before final marketing, just as they did with Windows 7, the beta model was reviewed by more than 8 million users.
The Web version of Office 2010, more simple and requires no installation, is available on the Internet since the summer.
Since Microsoft makes sure the office software that will replace the Office 2007 will be more stable and allow for improved navigation, as well as incorporating updates in design, icons, logo or greater versatility for the use of videos in its PowerPoint presentation software.
The company has not released the product release date or their cost.
In addition to Office 2010, Microsoft launched today in beta versions on SharePoint Server 2010 and Silverlight 4, two programs for professionals.
The biggest ovation of the day at PDC09 took her Steven Sinofsky, Windows division president when he announced to the surprise of those present and each of the thousands of attendees to the event receive a free laptop.
The touch screen computer was built jointly by Microsoft and ACER, and is not scheduled to go on sale.
"The aim of this computer is that developers also have the hardware necessary to create such applications. There is nothing special in itself. There are many who already have the same functions that are sold for prices from $ 1000, Soto said.
Gamers ready for the launch of 'Assassin's Creed 2'
The French video game giant Ubisoft launch on Tuesday the second episode of his hit 'Assassin's Creed', in which the user must carry out missions in historical scenes recreated in detail and realistically.
"It promises to be one of the games most ambitious action-adventure of the season," Scott told AFP Steinberg, a specialist firm of entry for Digital Trends.
The first 'Assassin's Creed', released in 2007, sold eight million copies worldwide. "It was the first video game that immersed the user in a realistic scenario inspired by historical events," he told AFP Ubisoft video game producer Sebastien Puel.
'Assassin's Creed 2' places the player in the Italian Renaissance, while the original version did in the time of the Crusades, and take him on missions in Jerusalem.
"It promises to be one of the games most ambitious action-adventure of the season," Scott told AFP Steinberg, a specialist firm of entry for Digital Trends.
The first 'Assassin's Creed', released in 2007, sold eight million copies worldwide. "It was the first video game that immersed the user in a realistic scenario inspired by historical events," he told AFP Ubisoft video game producer Sebastien Puel.
'Assassin's Creed 2' places the player in the Italian Renaissance, while the original version did in the time of the Crusades, and take him on missions in Jerusalem.
Univision TV station broadcast its programming on YouTube
The Hispanic television audiences around the United States, Univision, announced Monday an agreement to spread its programming on the internet video portal YouTube, including galas as editing Premios Lo Nuestro Latin Music Awards next year.
"Univision is using the technology known as YouTube's Content ID (identification of content) to measure the participation of users with its content," the press release.
The company shall make public the programming of Univision, TeleFutura and Galavision.
Univision recently won a lawsuit against the Mexican Televisa (the largest producer of telenovelas in Spanish) so that the latter could not deliver on your own website programs that had previously provided.
"Univision is using the technology known as YouTube's Content ID (identification of content) to measure the participation of users with its content," the press release.
The company shall make public the programming of Univision, TeleFutura and Galavision.
Univision recently won a lawsuit against the Mexican Televisa (the largest producer of telenovelas in Spanish) so that the latter could not deliver on your own website programs that had previously provided.
Countries are equipped with "ciberarmas" for virtual conflict
U.S., Russia, France, Israel and China are equipped with "ciberarmas" according to a report released Tuesday by the Internet security firm McAfee, who also said that the politically motivated cyber attacks have increased in recent months .
Virtual Criminology Report each year McAfee has said that U.S. White House, the Department of Homeland Security, the Secret Service and the Defense Department have been victims of politically motivated cyberattacks.
The attacks, in the form of "denial of service" in coordination occurred on July 4, the date that the United States celebrates its independence, and also affected the Treasury Department, the New York Stock Exchange, Nasdaq, Amazon and Yahoo .
A few days later on 11 Internet sites of the South Korean government were "turned off" by the same network of 50,000 computers used to attack the U.S..
The secret services of Seoul to North Korea accused of orchestrating the attack, the report said.
Dmitri Alperovitch, research vice president of McAfee's Virus, the report speculates that if the U.S. attacks and South Korea originated in North Korea, the motivation could have been testing the impact of the attacks on the communications between the two countries and their effect on military communications.
Another case cited by the signature is the information avalanche Georgia suffered in parallel to the armed conflict with Russia remained the region of South Ossetia in the summer of 2008.
In 2007, another former Soviet republic, Estonia, saw a flood caused by denial of service attack the websites of their government. The attacks lasted for weeks and affected everyone in the country, often preventing their access to bank accounts via the Internet.
In this environment, McAffe said countries are developing their military capabilities in cyberspace, what he called a "race ciberarmas" which is in the crosshairs government computer networks and other infrastructure critical to the functioning of nations.
The report notes that the theoretical and actual targets of these attacks are power grids, transportation systems, telecommunications, finance and water supply "because the damage can be done quickly and with little effort."
But the report also warned that the private sector that is at greatest risk of attack, partly because the critical infrastructure of a country is usually in the hands of private companies and partly because the industry depends on governments to prevent attacks
Virtual Criminology Report each year McAfee has said that U.S. White House, the Department of Homeland Security, the Secret Service and the Defense Department have been victims of politically motivated cyberattacks.
The attacks, in the form of "denial of service" in coordination occurred on July 4, the date that the United States celebrates its independence, and also affected the Treasury Department, the New York Stock Exchange, Nasdaq, Amazon and Yahoo .
A few days later on 11 Internet sites of the South Korean government were "turned off" by the same network of 50,000 computers used to attack the U.S..
The secret services of Seoul to North Korea accused of orchestrating the attack, the report said.
Dmitri Alperovitch, research vice president of McAfee's Virus, the report speculates that if the U.S. attacks and South Korea originated in North Korea, the motivation could have been testing the impact of the attacks on the communications between the two countries and their effect on military communications.
Another case cited by the signature is the information avalanche Georgia suffered in parallel to the armed conflict with Russia remained the region of South Ossetia in the summer of 2008.
In 2007, another former Soviet republic, Estonia, saw a flood caused by denial of service attack the websites of their government. The attacks lasted for weeks and affected everyone in the country, often preventing their access to bank accounts via the Internet.
In this environment, McAffe said countries are developing their military capabilities in cyberspace, what he called a "race ciberarmas" which is in the crosshairs government computer networks and other infrastructure critical to the functioning of nations.
The report notes that the theoretical and actual targets of these attacks are power grids, transportation systems, telecommunications, finance and water supply "because the damage can be done quickly and with little effort."
But the report also warned that the private sector that is at greatest risk of attack, partly because the critical infrastructure of a country is usually in the hands of private companies and partly because the industry depends on governments to prevent attacks
Taiwanese have a robot guide, guard and porter
Taiwan researchers have invented a robot that can double as a receptionist, tour guide, guard and assistant physician, the latest offering from one island to make a name for the global robotics market.
The interactive robot, 60 kilos and called Monica, can shoot and recognize people well enough to support its entry into an office building or send an emergency text message to a human security guard, said the director of project, Ren Luo, on Tuesday.
The sensory functions also let you interact by remote control between doctors and patients, especially when the patient worsens.
Tourists could use the robot, a 1 meter high, to give them directions.
"Within the community of the robot, this is pretty impressive because it can replace many human functions," said Luo, a professor at National Taiwan University.
Taiwan, the world center PC market, is opening a gap in the market robotic 18,000 million face stronger foreign rivals such as Japan, because profits from sales in the computer chip industry on the island and begin to decline.
Taiwan aspires to a market share of 7 per cent in the global robotics market and its international exports, expected to involve 7,800 million dollars by 2015, according to the Center for Research and Development of Precision Machinery Taiwan.
Four university professors, encouraged with 1.81 million dollars from the Taiwanese government, were built last year a couple of robots Monica, who were activated on Monday.
Researchers have already spoken with a manufacturer on the mass production of consumer Monica, Luo said. The current price is set at around 12,500 euros, he said.
Developers worldwide are also working on robots for domestic assistance and dangerous tasks normally performed by humans, such as bomb detection and deactivation.
The interactive robot, 60 kilos and called Monica, can shoot and recognize people well enough to support its entry into an office building or send an emergency text message to a human security guard, said the director of project, Ren Luo, on Tuesday.
The sensory functions also let you interact by remote control between doctors and patients, especially when the patient worsens.
Tourists could use the robot, a 1 meter high, to give them directions.
"Within the community of the robot, this is pretty impressive because it can replace many human functions," said Luo, a professor at National Taiwan University.
Taiwan, the world center PC market, is opening a gap in the market robotic 18,000 million face stronger foreign rivals such as Japan, because profits from sales in the computer chip industry on the island and begin to decline.
Taiwan aspires to a market share of 7 per cent in the global robotics market and its international exports, expected to involve 7,800 million dollars by 2015, according to the Center for Research and Development of Precision Machinery Taiwan.
Four university professors, encouraged with 1.81 million dollars from the Taiwanese government, were built last year a couple of robots Monica, who were activated on Monday.
Researchers have already spoken with a manufacturer on the mass production of consumer Monica, Luo said. The current price is set at around 12,500 euros, he said.
Developers worldwide are also working on robots for domestic assistance and dangerous tasks normally performed by humans, such as bomb detection and deactivation.
Billboard launches website to see free concerts
A new website allows music lovers to see concerts on the Internet for free and select from five different angles while doing it.
BillboardLive.com says his new concert site offers different perspectives surfers performances by Alicia Keys, Usher, David Archuleta, Daughtry and other artists still to be announced.
Users can select from five different cameras while enjoying full concerts of these singers, focusing only on the drummer or guitarist if they wish.
The site also allows the use of Twitter or Facebook in transit without leaving the show.
The application is also available for iPhone. In February, new concerts added.
The founder, Michael Williams, says the site is "reconnecting artists and fans, for free."
BillboardLive.com says his new concert site offers different perspectives surfers performances by Alicia Keys, Usher, David Archuleta, Daughtry and other artists still to be announced.
Users can select from five different cameras while enjoying full concerts of these singers, focusing only on the drummer or guitarist if they wish.
The site also allows the use of Twitter or Facebook in transit without leaving the show.
The application is also available for iPhone. In February, new concerts added.
The founder, Michael Williams, says the site is "reconnecting artists and fans, for free."
Nokia starts shipping its new smartphone N900
Nokia began shipments of its new N900 model, a key product for the handset maker world number one in its battle against rivals of the iPhone and Blackberry.
Nokia CEO Olli-Pekka Kallasvuo said in a speech that the company began delivering their phones Tuesday.
The N900 model is the first Nokia phone that operates on Maemo Linux system, seen by analysts as the key to Nokia to gain ground in the coming years.
Nokia has maintained its global market share stable at close to 40 percent, but lost a strip between the more expensive models in front of Apple and RIM.
Investing in high-tech products is important for Nokia because the company has not only lost market share in this type of product, but its average selling prices have fallen faster than the industry average.
Nokia CEO Olli-Pekka Kallasvuo said in a speech that the company began delivering their phones Tuesday.
The N900 model is the first Nokia phone that operates on Maemo Linux system, seen by analysts as the key to Nokia to gain ground in the coming years.
Nokia has maintained its global market share stable at close to 40 percent, but lost a strip between the more expensive models in front of Apple and RIM.
Investing in high-tech products is important for Nokia because the company has not only lost market share in this type of product, but its average selling prices have fallen faster than the industry average.
Microsoft shut down "pirates" of the Xbox
The U.S. company Microsoft has blocked the online service "Xbox Live" to thousands of users who had modified their console to install pirated games.
Reports circulating the internet suggest that 600,000 players could be affected by this blackout forced.
Microsoft did not give specific figures, but confirmed they had blocked a "small percentage" of the nearly 20 million users of "Xbox Live".
According to the software giant, the modification of the Xbox 360 "violated" the conditions of use and the possibility of being disconnected from the network is a risk we must take those who do.
Modified Consoles
"All consumers should know that piracy is illegal to modify your Xbox 360 console to use pirated discs violates the terms of use, voids the warranty and may involve the blockade of Xbox Live, the company said in a statement.
"The health of the video game business depends on users to use genuine products and services supplied by the manufacturers or authorized dealers," added Microsoft.
Many players tend to modify their consoles by installing chips or additional elements that allow them to use unofficial software. Some of these chips are specifically designed to make certain pirated games compatible with the Xbox.
According to information released, the disconnect has implemented Microsoft does not preclude continued operation of the console, since it affects only the account of "Xbox Live".
The statistics of the games industry suggests that piracy costs over U.S. $ 1270 million each year.
Moreover, recently a British court rejected an appeal by Christopher Gillham, a man who had been convicted of selling chips to modify the Xbox.
According to Case, Gillham activities violated the laws of copyright.
Reports circulating the internet suggest that 600,000 players could be affected by this blackout forced.
Microsoft did not give specific figures, but confirmed they had blocked a "small percentage" of the nearly 20 million users of "Xbox Live".
According to the software giant, the modification of the Xbox 360 "violated" the conditions of use and the possibility of being disconnected from the network is a risk we must take those who do.
Modified Consoles
"All consumers should know that piracy is illegal to modify your Xbox 360 console to use pirated discs violates the terms of use, voids the warranty and may involve the blockade of Xbox Live, the company said in a statement.
"The health of the video game business depends on users to use genuine products and services supplied by the manufacturers or authorized dealers," added Microsoft.
Many players tend to modify their consoles by installing chips or additional elements that allow them to use unofficial software. Some of these chips are specifically designed to make certain pirated games compatible with the Xbox.
According to information released, the disconnect has implemented Microsoft does not preclude continued operation of the console, since it affects only the account of "Xbox Live".
The statistics of the games industry suggests that piracy costs over U.S. $ 1270 million each year.
Moreover, recently a British court rejected an appeal by Christopher Gillham, a man who had been convicted of selling chips to modify the Xbox.
According to Case, Gillham activities violated the laws of copyright.
Malaysia is building an optical network between 10 megabytes and a gigabyte
Malaysia began building a fiber optic network that will allow 1.2 million homes access to broadband of 10 megabits per second (Mbps) and one gigabyte per second (Gbps), local media reported Monday.
Telekom Malaysia, the company responsible for the project, completed in the next two years the installation of this optical network, whose hub is in the city of Putrajaya, the administrative capital of the country.
This optical network will enable Malaysian Internet users to download movies in two minutes, rather than the two hours used in the present (with between 2 and 4 Mbps available).
This project is part of the Malaysian Multimedia Super Corridor, which aims to create a new generation technology center within a radius of 50 kilometers from the international airport to the Petronas Towers, including Kuala Lumpur and Cyberjaya.
"It's no coincidence that the technologically advanced countries like the United States, Japan, Switzerland or Australia, are also at the head of the richest nations," said Malaysian Prime Minister Najib Razak.
More than 200 companies in the IT sector and technological generate about $ 200 million (133 million) in this corridor, born in 1995.
The speed of broadband Internet in Japan is 15.8 Mbps, 12.8 Mbps in Sweden, Holland, 11 Mbps and 5.1 Mbps United States, according to union Communications Workers of America ( CWA, by its initials in English).
Telekom Malaysia, the company responsible for the project, completed in the next two years the installation of this optical network, whose hub is in the city of Putrajaya, the administrative capital of the country.
This optical network will enable Malaysian Internet users to download movies in two minutes, rather than the two hours used in the present (with between 2 and 4 Mbps available).
This project is part of the Malaysian Multimedia Super Corridor, which aims to create a new generation technology center within a radius of 50 kilometers from the international airport to the Petronas Towers, including Kuala Lumpur and Cyberjaya.
"It's no coincidence that the technologically advanced countries like the United States, Japan, Switzerland or Australia, are also at the head of the richest nations," said Malaysian Prime Minister Najib Razak.
More than 200 companies in the IT sector and technological generate about $ 200 million (133 million) in this corridor, born in 1995.
The speed of broadband Internet in Japan is 15.8 Mbps, 12.8 Mbps in Sweden, Holland, 11 Mbps and 5.1 Mbps United States, according to union Communications Workers of America ( CWA, by its initials in English).
New artists paint on the screen of the iPhone
In a not too distant future, visitors to a museum of modern art could be quite different from those we now know: for through halls of a building, the visitor can admire in your mobile phone or computer in his works that have not been created on canvas, but painted with fingers on a touch screen.
Brushes, an application for the Apple iPhone that allows you to "paint" with their fingers on the screen of this phone or iPod Touch, has become a popular tool among developers interested in experimenting with new technologies.
And not just talking about fans. Artists the likes of David Hockney are using Brushes and Canadian painter Matthew Watkins recently opened in Bari (Italy) a exposión of works only on the screen of your iPhone.
With over 100,000 downloads since it went on sale in August 2008, Brush has become one of the most popular iPhone applications, and sales soared after the New Yorker magazine published on its front page last June a work of Portuguese artist Jorge Colombo done with this application.
"It's accessible to anyone," said Steve Sprang, creator of Brushes, told The Washington Post. Brushes can paint without the mess "and it is always with you," said Sprang, Appple received from 70 per cent of $ 4.95 (3.30 euros), which costs the program.
In Flickr, one of the most popular portals for hanging pictures on the net, was born a group called iPhone Brushes Art Gallery-"where there are more than 10,000 works of different artists all created by painting with his fingers on the screen iPhone.
Some approach the hyper-realism, as images of American Henry Maddocks. Others have a more surreal, like those of Hubertk or Matthew Watkins.
Patricio Villarroel, Chilean musician and artist living in Paris, is the most active member of the group with more than a thousand works published.
"The finger painting is so funny ...! Us back to childhood," he told EFE Villarroel, who has been doing digital painting with Corel since 1996 Panter-x, but a year ago has become a fan of iPhone.
"It gives you great ease of use, anywhere and any way," he says. Brushes is the most used application, but also paints Villarroel similar programs for the iPhone and touch nptr and artists.
With over 100,000 applications already available, Apple has found the goose that lays golden eggs in these programs for iPhone and iPod Touch, developed mostly by programmers outside the company and can be downloaded from iTunes, its online store.
Many are free and most do not exceed five dollars (3.33 euros). Among the most popular programs this week include several games and a bar code reader for telling us if the product to have in our hands can be found cheaper online.
One of the newcomers is Cry Translator, an application created by the Catalan firm Biloop Technology that, say its creators, can "translate" the crying of babies to see what happens.
This dream of every father and mother can be downloaded for $ 9.99 (6.66 euros) until 11 November-after cost 29.99 (20 euros) - and promises only ten seconds to figure out if the baby cries from hunger, sleep, pain, or simply bored, no doubt another application on iPhone will remedy.
Brushes, an application for the Apple iPhone that allows you to "paint" with their fingers on the screen of this phone or iPod Touch, has become a popular tool among developers interested in experimenting with new technologies.
And not just talking about fans. Artists the likes of David Hockney are using Brushes and Canadian painter Matthew Watkins recently opened in Bari (Italy) a exposión of works only on the screen of your iPhone.
With over 100,000 downloads since it went on sale in August 2008, Brush has become one of the most popular iPhone applications, and sales soared after the New Yorker magazine published on its front page last June a work of Portuguese artist Jorge Colombo done with this application.
"It's accessible to anyone," said Steve Sprang, creator of Brushes, told The Washington Post. Brushes can paint without the mess "and it is always with you," said Sprang, Appple received from 70 per cent of $ 4.95 (3.30 euros), which costs the program.
In Flickr, one of the most popular portals for hanging pictures on the net, was born a group called iPhone Brushes Art Gallery-"where there are more than 10,000 works of different artists all created by painting with his fingers on the screen iPhone.
Some approach the hyper-realism, as images of American Henry Maddocks. Others have a more surreal, like those of Hubertk or Matthew Watkins.
Patricio Villarroel, Chilean musician and artist living in Paris, is the most active member of the group with more than a thousand works published.
"The finger painting is so funny ...! Us back to childhood," he told EFE Villarroel, who has been doing digital painting with Corel since 1996 Panter-x, but a year ago has become a fan of iPhone.
"It gives you great ease of use, anywhere and any way," he says. Brushes is the most used application, but also paints Villarroel similar programs for the iPhone and touch nptr and artists.
With over 100,000 applications already available, Apple has found the goose that lays golden eggs in these programs for iPhone and iPod Touch, developed mostly by programmers outside the company and can be downloaded from iTunes, its online store.
Many are free and most do not exceed five dollars (3.33 euros). Among the most popular programs this week include several games and a bar code reader for telling us if the product to have in our hands can be found cheaper online.
One of the newcomers is Cry Translator, an application created by the Catalan firm Biloop Technology that, say its creators, can "translate" the crying of babies to see what happens.
This dream of every father and mother can be downloaded for $ 9.99 (6.66 euros) until 11 November-after cost 29.99 (20 euros) - and promises only ten seconds to figure out if the baby cries from hunger, sleep, pain, or simply bored, no doubt another application on iPhone will remedy.
Companies give free access to Wi-Fi for new year
Google, Yahoo, eBay and Microsoft, competitors in the Internet, has had the same idea to promote themselves in the new year season: to provide temporary access free Wi-Fi in airports, airplanes and public places in the U.S.
Google Inc. announced Tuesday it will provide free access Wi-Fi at 47 airports in the country, including Boston, Houston and Seattle, until 15 January. For those airports passes 35% of U.S. travelers, the company said.
Netizens to connect on any of the airports will see a page on the screen that will give them the opportunity to donate to three charities and Google will donate the same amount.
Among the 47 airports there are some, like the McCarran International in Las Vegas, which already provide free Wi-Fi. Sponsors help keep the free service.
Google will also give free service for Wi-Fi in Virgin America flights during the same period.
EBay Inc., the giant online auctioneer, will provide free Wi-Fi on some flights for Delta Air Lines Inc. during the week of Thanksgiving Day, which falls on Thursday 26 October. The link will take users to the eBay site, but since there will be free to follow any other course.
Since September, Microsoft Corp. has offered Wi-Fi access in some hotels and airports, encouraging users to use its new search engine, Bing.
On Monday, Yahoo Inc. said it will give free Wi-Fi in Times Square in New York. A busy street in this area was converted into pedestrian zone in recent months.
Google Inc. announced Tuesday it will provide free access Wi-Fi at 47 airports in the country, including Boston, Houston and Seattle, until 15 January. For those airports passes 35% of U.S. travelers, the company said.
Netizens to connect on any of the airports will see a page on the screen that will give them the opportunity to donate to three charities and Google will donate the same amount.
Among the 47 airports there are some, like the McCarran International in Las Vegas, which already provide free Wi-Fi. Sponsors help keep the free service.
Google will also give free service for Wi-Fi in Virgin America flights during the same period.
EBay Inc., the giant online auctioneer, will provide free Wi-Fi on some flights for Delta Air Lines Inc. during the week of Thanksgiving Day, which falls on Thursday 26 October. The link will take users to the eBay site, but since there will be free to follow any other course.
Since September, Microsoft Corp. has offered Wi-Fi access in some hotels and airports, encouraging users to use its new search engine, Bing.
On Monday, Yahoo Inc. said it will give free Wi-Fi in Times Square in New York. A busy street in this area was converted into pedestrian zone in recent months.
Virus stored child pornography on his computer
Of all the things that make sinister computer viruses, this could be worse: They can turn a computer into a pornography store without its owner being aware, a sickening twist of technology where an innocent surfer may lose its reputation and much money to defend her honor.
Viruses are malicious programs that can steal credit card numbers for someone else to abuse them. Now they are able to place photographs and videos in the computers of another person, for a pedophiles will get away with it: by making an infected computer to save and view remote hiding their material without fear of being discovered with the materials stored on your own computer .
An Associated Press investigation found cases in which innocent people were classified as pedophiles after their colleagues or loved ones are faced with child pornography on their computers due to a virus. The victims may have to spend hundreds of thousands of dollars to prove his innocence.
One case involved Michael Fiola, a former researcher at the Massachusetts government office in charge of compensation for their workers.
In 2007, the heads of Fiola found that the Internet account for your laptop, owned by the state, showed that he went down four times more data than their colleagues. A technician found child pornography on the folder on your computer that stores images seen online.
Fiola was fired and charged with possession of child pornography, a charge that carries up to five years in prison. He endured death threats, her car tires were slashed and his friends walked away from him.
Fiola and his wife went to court, spending $ 250,000 in legal fees. Exhausted their savings, took out a second mortgage and sold their car.
An inspection by the defense revealed that the laptop was severely infected. He was scheduled to visit up to 40 child pornography sites per minute, something impossible for a human. While Fiola and his wife were out for dinner one night, someone entered his computer and pornography streamed in an hour and a half.
Prosecutors conducted another test and confirmed the results of the defense. The charge was withdrawn, almost 11 months after it was filed.
"Ruined my life, my wife's life and the lives of my family," said Fiola.
At any given time, some 20 million of the 1,000 million Internet-connected computers worldwide are infected by viruses that could give hackers full control of them, according to the software maker F-Secure Corp. The computers are often infected when the user opens an attachment to an email from an unknown person or visit a malicious page online.
Pedophiles can insert viruses in several ways. The simplest is to force another's computer to visit child pornography sites, collecting images during the process. A computer can be turned into a repository for images and videos that can be remotely when the computer is online.
It is also possible that some prankster or just someone you want to do harm between one of these viruses on your computer, to make it appear that you navigate through illegal Internet sites.
In the first publicly known cases of innocent people become victims, two men in Britain were acquitted in 2003 after it was shown that viruses were responsible for that had child pornography on their computers. In one case, a man spent more than a week in jail and three months in partial seclusion, besides losing custody of her daughter.
The situations for innocent netizens are complicated by the fact that real pedophiles often blame the virus for their crimes, an argument legitimately viewed with skepticism by the judges.
"This is an example of the old excuse''the dog ate my homework'''''', said Phil Malone, director of the office Cyberlaw Clinic Berkman Center for Internet & Society at Harvard University." The problem is that sometimes it is the dog eating their homework. "
It would be difficult, however, that a pedophiles get away with it using the excuse of a fictional virus, the expert said Jeff Fischbach.
Even careful collectors of child pornography tend to leave incriminating clues, such as emails and DVDs. No lawyer who uses the excuse of the virus may explain the existence of such evidence, said Damon King, attorney for Unity Child Exploitation and Obscenity U.S. Justice Department.
Either way, the concrete is shown pornography on a computer and must demonstrate how it got there.
A prosecution expert in a case of child pornography found on a computer, Randy Huff, admits that many antivirus programs can work properly and still infect a PC.
"You can not trust computers," said Jeremiah Grossman, founder of WhiteHat Security Inc. company described as "painfully simple" make a computer download something your landlord will not, either a program that displays unwanted advertisements or one that keeps illegal images.
It is possible, "said Grossman, who still has more illegal material that has not been discovered yet.
"Just because it's there does not mean that a person wanted to be there, whatever it is, including child pornography," he admitted.
Viruses are malicious programs that can steal credit card numbers for someone else to abuse them. Now they are able to place photographs and videos in the computers of another person, for a pedophiles will get away with it: by making an infected computer to save and view remote hiding their material without fear of being discovered with the materials stored on your own computer .
An Associated Press investigation found cases in which innocent people were classified as pedophiles after their colleagues or loved ones are faced with child pornography on their computers due to a virus. The victims may have to spend hundreds of thousands of dollars to prove his innocence.
One case involved Michael Fiola, a former researcher at the Massachusetts government office in charge of compensation for their workers.
In 2007, the heads of Fiola found that the Internet account for your laptop, owned by the state, showed that he went down four times more data than their colleagues. A technician found child pornography on the folder on your computer that stores images seen online.
Fiola was fired and charged with possession of child pornography, a charge that carries up to five years in prison. He endured death threats, her car tires were slashed and his friends walked away from him.
Fiola and his wife went to court, spending $ 250,000 in legal fees. Exhausted their savings, took out a second mortgage and sold their car.
An inspection by the defense revealed that the laptop was severely infected. He was scheduled to visit up to 40 child pornography sites per minute, something impossible for a human. While Fiola and his wife were out for dinner one night, someone entered his computer and pornography streamed in an hour and a half.
Prosecutors conducted another test and confirmed the results of the defense. The charge was withdrawn, almost 11 months after it was filed.
"Ruined my life, my wife's life and the lives of my family," said Fiola.
At any given time, some 20 million of the 1,000 million Internet-connected computers worldwide are infected by viruses that could give hackers full control of them, according to the software maker F-Secure Corp. The computers are often infected when the user opens an attachment to an email from an unknown person or visit a malicious page online.
Pedophiles can insert viruses in several ways. The simplest is to force another's computer to visit child pornography sites, collecting images during the process. A computer can be turned into a repository for images and videos that can be remotely when the computer is online.
It is also possible that some prankster or just someone you want to do harm between one of these viruses on your computer, to make it appear that you navigate through illegal Internet sites.
In the first publicly known cases of innocent people become victims, two men in Britain were acquitted in 2003 after it was shown that viruses were responsible for that had child pornography on their computers. In one case, a man spent more than a week in jail and three months in partial seclusion, besides losing custody of her daughter.
The situations for innocent netizens are complicated by the fact that real pedophiles often blame the virus for their crimes, an argument legitimately viewed with skepticism by the judges.
"This is an example of the old excuse''the dog ate my homework'''''', said Phil Malone, director of the office Cyberlaw Clinic Berkman Center for Internet & Society at Harvard University." The problem is that sometimes it is the dog eating their homework. "
It would be difficult, however, that a pedophiles get away with it using the excuse of a fictional virus, the expert said Jeff Fischbach.
Even careful collectors of child pornography tend to leave incriminating clues, such as emails and DVDs. No lawyer who uses the excuse of the virus may explain the existence of such evidence, said Damon King, attorney for Unity Child Exploitation and Obscenity U.S. Justice Department.
Either way, the concrete is shown pornography on a computer and must demonstrate how it got there.
A prosecution expert in a case of child pornography found on a computer, Randy Huff, admits that many antivirus programs can work properly and still infect a PC.
"You can not trust computers," said Jeremiah Grossman, founder of WhiteHat Security Inc. company described as "painfully simple" make a computer download something your landlord will not, either a program that displays unwanted advertisements or one that keeps illegal images.
It is possible, "said Grossman, who still has more illegal material that has not been discovered yet.
"Just because it's there does not mean that a person wanted to be there, whatever it is, including child pornography," he admitted.
Google to buy mobile advertising network
Google Inc. on Monday strengthened its efforts to sell advertising on cell phones, announcing the purchase of the company AdMob, for 750 million dollars in stock.
Google already has a distribution system for mobile advertising, DoubleClick Mobile, which he bought for 3,200 million dollars to the firm DoubleClick Inc. in 2008.
Google said the purchase of AdMob will give greater control of the mobile advertising market, expected to grow rapidly in the coming years.
During the afternoon of Tuesday, Google shares were up $ 9.84 per unit (1.8 to $ 560.94.
Omar Hamoui AdMob created in 2006. The company is headquartered in San Mateo, California, provides a marketplace for advertisers, so they can buy space in cyber sites targeting mobile phones.
"The mobile advertising has great potential as a marketing medium and although this sector is still in its infancy, AdMob has already made exceptional progress in a short time," he said in a statement Susan Wojcicki, Google vice president for management product.
Google already has a distribution system for mobile advertising, DoubleClick Mobile, which he bought for 3,200 million dollars to the firm DoubleClick Inc. in 2008.
Google said the purchase of AdMob will give greater control of the mobile advertising market, expected to grow rapidly in the coming years.
During the afternoon of Tuesday, Google shares were up $ 9.84 per unit (1.8 to $ 560.94.
Omar Hamoui AdMob created in 2006. The company is headquartered in San Mateo, California, provides a marketplace for advertisers, so they can buy space in cyber sites targeting mobile phones.
"The mobile advertising has great potential as a marketing medium and although this sector is still in its infancy, AdMob has already made exceptional progress in a short time," he said in a statement Susan Wojcicki, Google vice president for management product.
A computer worm attacks for the first time the iPhone
The first worm to infect the cell phone iPhone, Apple, was found to spread in Australia. Experts fear to see more attacks in the future.
The program changes the traditional wallpaper of the iPhone by a picture of Rick Astley, an English singer of the 80s, with the message "ikee will never abandon you."
The worm, known as ikee concerns only unlocked phones (or jail broken), in which the user has deleted the Apple protection mechanisms to allow the device to run any software.
Experts say the worm is not harmful, but that might appear more malicious variants.
"The virus writer has published the full source code of the four existing variants of the worm," wrote Mikko Hypponen of F-Secure, a security company.
"This means that soon there will be more viruses that could have a load more unpleasant than just changing the wallpaper," he added.
Risks
"Ikee" until now has circulated only in Australia, home to Ashley Town, who said he created the worm for discussion the issue of security.
The virus can be eliminated by changing the phone password and deleting some files.
Some estimates suggest up to 10% of all iPhones and iPod Touch are operating under the mode "unlocked".
This practice can install applications that have not been approved by Apple.
For Graham Cluley, from security firm Sophos, "telephone users may rush (...) to increase functionality that Apple may have denied it, but if they do not care also run the risk that your iPhone will become the target of a hacker ".
"My prediction is that we may see more attacks like this in the future," added Cluley.
The program changes the traditional wallpaper of the iPhone by a picture of Rick Astley, an English singer of the 80s, with the message "ikee will never abandon you."
The worm, known as ikee concerns only unlocked phones (or jail broken), in which the user has deleted the Apple protection mechanisms to allow the device to run any software.
Experts say the worm is not harmful, but that might appear more malicious variants.
"The virus writer has published the full source code of the four existing variants of the worm," wrote Mikko Hypponen of F-Secure, a security company.
"This means that soon there will be more viruses that could have a load more unpleasant than just changing the wallpaper," he added.
Risks
"Ikee" until now has circulated only in Australia, home to Ashley Town, who said he created the worm for discussion the issue of security.
The virus can be eliminated by changing the phone password and deleting some files.
Some estimates suggest up to 10% of all iPhones and iPod Touch are operating under the mode "unlocked".
This practice can install applications that have not been approved by Apple.
For Graham Cluley, from security firm Sophos, "telephone users may rush (...) to increase functionality that Apple may have denied it, but if they do not care also run the risk that your iPhone will become the target of a hacker ".
"My prediction is that we may see more attacks like this in the future," added Cluley.
Lenses are intelligent and subtitles to translate user
The most advanced translation tool is smart lenses automatically show subtitles when they speak foreign words or phrases.
The machine-created by the high-tech company NEC-is similar to glasses but instead of lenses has a tiny projector that presents the images on the retina of the user.
The company produced a version that uses a real-time translation displaying subtitles when conducting a conversation between two people without a common language.
According to NEC, the lenses created far Tele Scouter baptized, are a business tool that can help the sales staff to receive, in the retina of your eye-registration information on customer purchases during a conversation.
But the device may also have uses more "exotic" such as assisting in the translation of words.
"These lenses have a microphone that picks up the voices of two people in conversation," the BBC said Don DePalma. technology expert.
"Subsequently transferred to the translation software and systems for voice to text and then sends the translated text to the retinas of each individual in the language of each person using the device.
While the user receives the information in the retina can hear the translation in your headphones.
According to NEC the device could be very useful in confidential conversations that do not want to use a human translator.
As DePalma notes, progress is a prime example as if we all want, ie, overcome the language barrier. "
"And now being achieved with spectacles that enable people to overcome this inability to speak a foreign language," he adds.
The system, says the company, is compact and lightweight so it can be used comfortably for long periods and use a lot of battery.
But there is still some time to have a pair of glasses that if we lost in a foreign country, we automatically translate the directions we are given.
For the moment, are still in Tele protitipo Scouter.
The company expects to launch in Japan in November 2010, but initially will be the enterprise version and will not have translation capabilities.
It is expected that lenses with ready translation capacity in 2011. The bad news is that may not be available to everyone.
It is expected that a set of 30 devices costing about 7.5 billion yen, about U.S. $ 83,000 dollars. And the cost does not include the price of translation tools, or software.
The machine-created by the high-tech company NEC-is similar to glasses but instead of lenses has a tiny projector that presents the images on the retina of the user.
The company produced a version that uses a real-time translation displaying subtitles when conducting a conversation between two people without a common language.
According to NEC, the lenses created far Tele Scouter baptized, are a business tool that can help the sales staff to receive, in the retina of your eye-registration information on customer purchases during a conversation.
But the device may also have uses more "exotic" such as assisting in the translation of words.
"These lenses have a microphone that picks up the voices of two people in conversation," the BBC said Don DePalma. technology expert.
"Subsequently transferred to the translation software and systems for voice to text and then sends the translated text to the retinas of each individual in the language of each person using the device.
While the user receives the information in the retina can hear the translation in your headphones.
According to NEC the device could be very useful in confidential conversations that do not want to use a human translator.
As DePalma notes, progress is a prime example as if we all want, ie, overcome the language barrier. "
"And now being achieved with spectacles that enable people to overcome this inability to speak a foreign language," he adds.
The system, says the company, is compact and lightweight so it can be used comfortably for long periods and use a lot of battery.
But there is still some time to have a pair of glasses that if we lost in a foreign country, we automatically translate the directions we are given.
For the moment, are still in Tele protitipo Scouter.
The company expects to launch in Japan in November 2010, but initially will be the enterprise version and will not have translation capabilities.
It is expected that lenses with ready translation capacity in 2011. The bad news is that may not be available to everyone.
It is expected that a set of 30 devices costing about 7.5 billion yen, about U.S. $ 83,000 dollars. And the cost does not include the price of translation tools, or software.
Apple opens first store in France in the Louvre Museum
The computer giant Apple opened its first French store under the glass pyramid of the Louvre Museum on Saturday, barely two weeks after Microsoft opened a coffee theme to promote its software in Windows 7.
Although Microsoft first began promoting its new Windows operating system in France, Apple has made its first store in a strategic position: the bowels of "The Museum", the shopping center "Carrousel".
See Apple's facilities Luvre.
Both companies have large operations in France, according to Paul Jackson, an analyst at Forrester Research. Jackson said that Apple, in particular, was looking to burnish its image quality with its new site in Paris.
"It has more to do with the sense of partnership with the purchases of first to market with as such," said Jackson. He said that France as a technology market tends to lag behind Britain and Germany, which already have Apple stores.
Apple French expansion will take place in a climate of economic uncertainty. Consumer spending in France is still volatile.
But spending on gadgets "forced" as the Apple iPhone has demonstrated its robustness. France Telecom has sold 1.3 million iPhones between November 2007 and September 2009, while new operators SFR and Bouygues Telecom has sold about 200,000 iPhones since France Telecom lost exclusivity in the spring.
"We are very confident in the French consumer," says the head of Apple retail, Ron Johnson, in the event in Paris to launch the store.
Although Microsoft first began promoting its new Windows operating system in France, Apple has made its first store in a strategic position: the bowels of "The Museum", the shopping center "Carrousel".
See Apple's facilities Luvre.
Both companies have large operations in France, according to Paul Jackson, an analyst at Forrester Research. Jackson said that Apple, in particular, was looking to burnish its image quality with its new site in Paris.
"It has more to do with the sense of partnership with the purchases of first to market with as such," said Jackson. He said that France as a technology market tends to lag behind Britain and Germany, which already have Apple stores.
Apple French expansion will take place in a climate of economic uncertainty. Consumer spending in France is still volatile.
But spending on gadgets "forced" as the Apple iPhone has demonstrated its robustness. France Telecom has sold 1.3 million iPhones between November 2007 and September 2009, while new operators SFR and Bouygues Telecom has sold about 200,000 iPhones since France Telecom lost exclusivity in the spring.
"We are very confident in the French consumer," says the head of Apple retail, Ron Johnson, in the event in Paris to launch the store.
China wants Robot Olympics
China already had the Olympic Games in 2008. He now plans to hold another in 2010. Only robots.
The international event will be held in Harbin, northeast of the country and will house robots around the world, competing in 16 categories.
Some disciplines will participate in the Olympic Games themselves, such as athletics, but also in other more appropriate for a humanoid, like cleaning.
May take part in the competition the robots that have human form and have two legs and two arms (the wheels are forbidden).
Games organizers expect more than 100 universities worldwide send their representatives to the event.
Harbin will host Olympic success robotic Instituto Tecnológico of the city, from which emerged a successful football team composed of humanoids.
In search of innovation
Professor Hong Rongbing, a member of this institution, said the goal of these games is to increase innovation and ensure that future devices are more flexible.
Still no date for the event because the organizers are still looking for sponsors to finance it.
Furthermore, this event will have to compete with RoboJuegos also be held in 2010. Take place in April in California (United States).
The Harbin joins the growing number of robot competitions. Not only in the realm of "sport." For example, Roboexotica is a tournament where the robots must demonstrate their ability to mix cocktails or light cigarettes.
Moreover, robots have their own World Cup. 400 teams from 35 countries competed in the 2009 edition. Next year will be in Singapore in June 2010.
The international event will be held in Harbin, northeast of the country and will house robots around the world, competing in 16 categories.
Some disciplines will participate in the Olympic Games themselves, such as athletics, but also in other more appropriate for a humanoid, like cleaning.
May take part in the competition the robots that have human form and have two legs and two arms (the wheels are forbidden).
Games organizers expect more than 100 universities worldwide send their representatives to the event.
Harbin will host Olympic success robotic Instituto Tecnológico of the city, from which emerged a successful football team composed of humanoids.
In search of innovation
Professor Hong Rongbing, a member of this institution, said the goal of these games is to increase innovation and ensure that future devices are more flexible.
Still no date for the event because the organizers are still looking for sponsors to finance it.
Furthermore, this event will have to compete with RoboJuegos also be held in 2010. Take place in April in California (United States).
The Harbin joins the growing number of robot competitions. Not only in the realm of "sport." For example, Roboexotica is a tournament where the robots must demonstrate their ability to mix cocktails or light cigarettes.
Moreover, robots have their own World Cup. 400 teams from 35 countries competed in the 2009 edition. Next year will be in Singapore in June 2010.
Subscribe to:
Posts (Atom)