Thursday, June 27, 2013

More about Firefox 22



Mozilla has released the latest version of the popular browser which promises direct, real-time communications for voice, video and data. The controversial for blocking third-party cookies is once turned off. Externally there is nothing fresh to see in Firefox22. All new features are hidden under the hood. With Firefox 22, the developers have once again put together a comprehensive package, which is available to all users for immediate download. The main innovation of the new Firefox browser is the comprehensive support of WebRTC. This is a relatively new, open standard that will transform communications in the network sustainable. Specifically, WebRTC is composed of different interfaces, which allows the transmission of audio and video signals as well as the exchange of files between different browsers. The individual elements of the standards had been incorporated in previous versions of Mozilla but now it is activated as a full package in Firefox 22 for the first time. Besides Mozilla is also a pioneer in the development of Google WebRTC both Firefox and Chrome only supports this technology.

Both swapping files and Internet telephony are nothing new in Mozilla or Google. But instead, for example, specially having to install Skype for video chat, the chat with friends (theoretically) works on any PC that can be found on the Firefox or Chrome. To use the technique; yet still lacking the appropriate applications in most of the web browsers. While there are a number of sites in the network for testing the function - such as AppRTC for video calling - for everyday use which are not. With the Talkilla Mozilla though operates on a promising project for the integration of functions and user interface - however, this ambitious project is still at a very early stage of development.

Mozilla's announcement of third-party cookies from Firefox to disable 22 by default, made primarily in the advertising industry for abdominal pain. Despite heavy criticism from the industry Mozilla is sticking to the blockade of third-party cookies, but his plan must be delayed because of technical problems. To see the menu under Privacy, although the option to reject third party cookies always, after installing Firefox 22 but this is not automatically enabled. The third major new feature of Firefox 22 refers to the faster execution of JavaScript code and listens to the name OdinMonkey. Thanks to this optimization module, the calculation of complex pages will henceforth succeed much faster. To demonstrate the efficiency of the technique, Mozilla has made the 3D games famous Unreal Engine 3 packed in collaboration with Epic Games in the browser. In the future, should be implemented as well as graphically demanding games in Firefox. Check the speed of websites show the technical changes of Mozilla effect. Especially in heavy SunSpider JavaScript test makes the new version of Firefox in comparison to its predecessor a strong push forward. However, despite all efforts, Chrome remains the unchallenged speed Primus.

In addition to several new features for web developers Firefox gets 22 HiDPI support donated for web pages to be displayed more sharply on high-resolution screens. Using the newly added "Web Notifications" interface can now also display notifications like incoming e-mails in the Firefox browser. In the Add-ons Manager can henceforth manage the social services. Users with Mac OS X get your download progress in the dock icon appears at the top right.

Know more about OS X Mavericks -2


Other highly anticipated features that helps more to the new users: better management of configurations with multiple screens. Until then, OS X was bad enough when we plugged a (second) screen to your Mac. The most glaring example was the full screen introduced with OS X Lion and required to have the same application on any screen mode. OS X Mavericks profoundly modifies the operation and offers a much more powerful solution, but probably more complex. The idea is to bring autonomy to each of the screens that you use: there is the menu bar on all screens and you can place applications in full screen on one monitor, but especially on any monitor. Specifically, you can now organize your windows as you want and simply work in OS X Mavericks. In this example, when writing an article, therefore, we have a compose window and a browser window on the right, a preview window, the corrector and Twitter on the left.

You receive an email? You can use Mission Control directly or trackpad gestures to change only the left screen. The right one is writing mode, the time to respond to email received. A gesture later, you will find the previous virtual desktop, one that allows a glimpse of the current document and correction.
Since it refers to the full screen mode, we regret that this release is not more evolved Mail application. The edit window is modal in part: it blocks the entire interface when writing a new message or a reply from the application, but if you create a mail from another program, the window is placed over another screen.

In theory, OS X Mavericks is supposed to remove any notion of primary or secondary display. Apple's new system has to guess that you are using at any given time and place the dock, knowing that the menu bar is constantly present. In fact, this operation does not seem to develop and can still be found in the System Preferences option available which allows you to choose the main screen. Last, Apple also supports these new options available for Apple TV. AirPlay can be used for a presentation on a television screen while using the Mac on.

Apple's browser has received some significant new features, but they do not apply to all OS X Mavericks. The new version of Safari is offered to remain with Lion and Mountain Lion and you can find the main news item in that other user: Small new Safari 6.1. In Apple's new system, the browser is Safari 7 and not 6.1. The change is not only symbolic, even if the interface has few differences, are important internal changes between the two versions. OS X 10.9, Safari and finally adopts the separation process for tabs. As in Chrome, for example, each open tab is a process, which should both accelerate and stabilize the browser. In case of problem on a tab, the browser will simply interrupt the matching process and avoid the complete crash. Apple ahead of many figures to prove that the browser is faster: from what we could tell, Safari is better than before and the gain is sensitive. This is especially the case on a Mac with Retina display, the computer that was just on the point with OS X 10.8.

1ShoppingCart online store software

Being able to sell products or services online is a great way to make semi-passive income, as it can come in regardless of what you're doing. While this is the dream of many entrepreneurs and businesses, not everyone is successful in this type of venture. If you want to make sales online, you have to make sure that your website is setup just right. One of the best things that you can do when you want to sell products online is get the right type of ecommerce software setup. With a good ecommerce solution, customers will be able to find the products that they are looking for, purchase them, and get them shipped out without you having to do anything. For example, 1ShoppingCart online store software is a good one to use. It has the potential to simplify your life and make things much more successful online. When you are interested in doing more with your online business, you should make sure that the look and feel of your ecommerce pages is also right. You do not want to overload the pages with information like many websites make the mistake of doing. If you do, you'll have a hard time getting people to stick around on your site long enough to make a purchase. By simplifying your site and making it so that your customers can find what they're looking for, you will increase the time they spend on your site and the amount of sales that your site makes on a regular basis.

Tuesday, June 25, 2013

Screen Capture for Mac

Some of the most simple, easy to use and effective video processing software are available at reliable online store that cater to the various needs of their clients. Viewer could get plenty of information and guidance from the website on their products that are displayed at the site and could be very beneficial to the customers. The provider in question started operating way back in the year 2004 and has seen steady grown in business with hard work and dedicated service to all their customers. They started off with two products in the beginning and now have a wide range of 20 titles for Mac and PC. With their focus on catering to products suitable to adults, children students, business men and for people of all categories of life, they came out with products that were simple, accessible and scalable making it easy for the user to install their software straight out of the box without any complication. They strive to improve on their products with each passing phase of life by concentrating on the growing needs of the users with a tendency to be the providers and caterers of more sophisticated products for all their customers.

The products available at website mac are Video converter, DVD Ripper, Screen capture etc: and individuals can use presets for mobile devices, convert the most popular formats, save time with high conversion speed, rip DVDs and save DVD movies in many formats, The can also extract audio and convert between audio formats, enjoy clean design with great usability, merge several files into one file and much more. For users interested in learning, the choice of video guides, information about Video Codec, Audio and Video formats with Video filters and effects are also provided at the site to enlighten their users on their products and its usage. Their support center is available for the service of their customers and should they arise any queries with immediate replies; the facility of a live chat is also made available at their site. A quick tour at the site can give the viewer all the required information with regards to the products, its benefit and usage with all the desired support from their service team on board.

Monday, June 24, 2013

Three Entry Points for Cross-Site Scripting



Cross-site scripting (XSS) can be more of an annoyance than a serious threat in some instances. However, there are circumstances where XSS is used for malicious purposes, where hackers may easily exploit your information and wreak havoc. This can be especially dangerous to your sensitive data if your website contains vulnerabilities that welcome exploits.

According to a report by Symantec, 84 percent of the security vulnerabilities documented by this security expert were attributed to XSS committed on websites in 2007. It has been concluded that at least 68 percent of existing websites for that year were vulnerable to XSS attacks.

It is good practice for developers and testers to be fully aware of the possibility that every one of your data entry points could be targeted for an XSS attack. Web applications are at high risk for malicious actions committed through the:

  • Hijacking of user accounts
  • Access to sensitive data and ability to modify that data
  • Bypassing of controls for access
  • Presentation of fraudulent content

The Most Common Entry Point

Session cookies are the most common way that XSS is used to exploit user information. A session cookie is used to store the user’s identity while logged into a website. If another site is opened while logged into the first website and XSS is present, the second website could hijack the session cookie from the first. The hijacker would be able to use the session cookie in their browser, in addition to using the information to impersonate the user on the initial website. Depending upon the nature of the first website that the session cookie has been hijacked from, the results could be very damaging.

Examples include:

  • If the user is logged into a banking website, the hacker could use the session cookie to impersonate the user and conduct transactions that will remove cash from the user’s bank account.
  • Banking information can be accessed from shopping sites and allow the hacker to make purchases with that information.

Additional XSS Entry Points for Web Applications

Forms. Web forms such as login forms, if improperly coded can be vulnerable to XSS. If the hacker takes advantage of this vulnerability and injects a script into the login form, the script will send them the user’s password—allowing hackers access to the user’s account where changes or purchases could be made.

Examples include:

  • If a login form is compromised for a shopping website, a hacker could then impersonate the user and make purchases using whatever pre-stored means of payment are entered into the account.
  • With so many users neglecting to follow the best practices with password security, the hacker could potentially access many different websites just by assuming that the credentials for each are the same.

URLs. If a hacker sends an email to a user with what appears to be a legitimate URL, could infact be a malicious script that is embedded within the URL. Once the user has been lured to the legitimate site, they log in and the script sends the session cookie to the hacker.

Examples include:

  • An attack such as this can also be attributed to postings on social networking websites. The hacker could post a message with XSS code hidden within it. An unsuspecting user clicks on the URL and their information is sent to the hacker who can then steal their credentials and make changes to their account.
  • The hacker could impersonate the user and post messages on social network websites that are malicious in nature, possibly resulting in the user being banned from the website

Best Ways to Avoid XSS Attacks

By identifying vulnerabilities for XSS attacks on your websites, you are taking the first step toward preventing and mitigating the problems that could result. Developers can reduce their risk of XSS attacks by adopting the following practices:

  • Validating output by sanitizing data HTML encoding to eliminate malicious characters.
  • Avoiding inserting user-controlled data in script code and reducing the amount of allowed HTML.
  • Using server-side validation to detect request containing malicious exploits.

XSS is more common than many users realize, with vulnerabilities discovered even across major brands. Developers using sound XSS practices and thoroughly testing for vulnerabilities save end users from the potentially devastating effects of an attack via XSS.


Fergal Glynn is the Director of Product Marketing at Veracode, an award-winning application security company specializing in secure software supply chain and other security breaches with effective risk assessment tools like secure software supply chain toolkit.

Saturday, June 22, 2013

Know more about OS X Mavericks -1



Apple took advantage of the opening Keynote WWDC 2013 being held in San Francisco to introduce OS X Mavericks, the successor of Mountain Lion. This new named after a famous surfing spot in California does not change as the iOS system 7 on mobile devices, but it brings some significant new features. OS X 10.8 was clearly aimed at novices with its new iOS inherited, the system tried to ease the transition from iPhone to Mac for those who knew nothing about traditional computing. LaunchPad presented as applications on an iPhone or iPad, the applications themselves were digging in the mobile system interfaces and Apple simplified the transition from one system to another with better iCloud integration. OS X Mavericks tries to seduce rather more advanced users, those who already know how to use a computer in general, especially a Mac and want to go further. Requested by many users, the tabs are appearing in the Finder. The file manager for OS X can open several files in the same window by creating tabs. The operation is the same as in a browser, shortcuts as: creating a tab with ⌘ T, in a farm with ⌘ W (must now make ⌘ ⇧ W to close the window, unless of course you did no open tab).


You can also open a folder in a new tab using the secondary click: a new item appears in the Finder's contextual menu. As always in a browser, you can double-click a folder while holding down ⌘ supported and the file is displayed in a new tab. The Finder OS X 10.9 also features all the functions of management tabs ⇥ ctrl ctrl ⇧ ⇥ display the next and previous tabs, you can drag a tab out of the current window to create a new window, move tabs within the window or windows merge all with a single tab. Secondary click on the dedicated area displays unsurprisingly other options to close all other tabs except the current one.


Another new Finder Version 10.9, these are the keywords. It is not so much a new function, as a new interface for something that has long existed in OS X, but was rarely used. Until then, Apple talked about labels, OS X Mavericks employs him the English word 'Tags'. The principle is the same: you can assign to each folder or file a keyword and a color option and the system then gives you several options to find all the elements associated with the same keyword. By default, OS X creates Mavericks seven tags for all colors. They are also just named according to the color, but nothing prevents you from changing the names and colors of the keywords in the Finder preferences. Thereafter, you can attach a tag to a file or folder using the context menu, to the new icon in the Finder toolbar (below) or by dragging and dropping the element in the sidebar. Through the icon, you can also create a new tag.


The Finder sidebar already contained fast access to some records, the machines on the network and local volumes, it gets the tags. You can drag items on a tag to associate with him, they said, but this presentation can also display all the items associated with a particular keyword. The research will support these tags, but this feature does not seem active in the first OS X beta Mavericks. What works however, is the integration of tags directly in dialogs applications. Example here in a text editor that does a field "tags" between the file name and its position in the storage volume. This field is used both to select an existing tag to create a new one. Last point can be noted, the management area dedicated to iCloud in each software also integrates keywords and has an additional button at the bottom to add. As throughout the Finder, the color is more discreet, it no longer appears as a point. Incidentally, the views put now lists the column names forward, others are grayed out.

7 Most Useful Web Browser Functions for Web and Graphic Designers



Both web designers and graphic designers rely on browsers not only to find and source information, files and ideas, but to test their designs in real-world settings to ensure maximum functionality for users. Usability is one of the most essential aspects of web design—after all, if users have a difficult time navigating or loading a site, they’re likely to bounce. Fortunately, today’s browsers offer some advanced features useful for both web and graphics professionals.

1. Drag-and-Drop Search

You know what you’re looking for when you browse the web, or you at least have a general idea. Spending extra time to open a new search tab and type in what you’re looking for isn’t an efficient use of your resources. That’s why browsers with drag-and-drop search functionality are ideal for graphic designers. Find something you want to know more about on one site, and simply drag and drop links, words and even photos to relevant titles to find what you’re looking for without wasting a second.

2. Torrent Capabilities

When you’re searching for a source file online, such as an open-source software application, you don’t have a lot of time to downloading files. Browsers with built-in torrent capabilities make downloading photos, videos, and other files a breeze. With a built-in torrent, you can manage your downloads from directly within your browser—no need to utilize a separate download application.

3. Speedy Downloading

A built-in torrent is great, but not ideal if it’s not any faster than standard downloading practices. Don’t waste your precious time waiting for endless downloads. Choose a browser with accelerated download speeds so you can stay on task instead of frustratingly tapping your fingers on the mouse while you wait.

4. Easy Media-Grabbing Capabilities

Web designers are often grabbing media from the ‘net. Embedding videos from other sources is pretty commonplace in today’s rich media Internet environment, both on standard websites among social media. Designers are tasked with sourcing media, re-vamping it when necessary and appropriate, reformatting it for compatibility and embedding those files online. The whole process can take quite a bit of time. Browsers with media-grabbing capabilities make the job of designers much simpler, enabling them to pull media files from the web with a simple click.

5. Seamless Sharing Functionality

While social sharing isn’t necessarily a core component of a web or graphic designer’s job, these professionals like to interact with their social networks just as much as anyone. In the course of a day’s work, you might come across dozens of articles you find interesting and want to read later—or just something you feel is worthy of a share. Instead of letting distraction take you from the task at hand, a browser with built-in social sharing features lets you share the content you find most intriguing without taking you into full distraction mode.

6. Easy Bookmarking

Bookmarking is a pretty commonplace browser function, but some are more usable than others with streamlined organization capabilities. Graphic and web designers rely on a variety of resources online, including blogs with coding shortcuts, tutorials and other information that helps you create the best results for your clients or your employer. Browsers with functional, easy-to-use and easy-to-navigate bookmarking functions make the task of organizing all those favorite resources much simpler.

7. Maximum Browsing Security

As a web or graphic designer, you likely have access to pertinent data about your clients. Whether that means top-secret branding initiatives or financial payment data, you don’t want any of that information to leak into the wrong hands. That’s why a top-notch browser with maximum security is critical—not just for you, but for your clients and your reputation.

Web and graphic designers love technology. Modern web browsers provide advanced functionality that benefits tech-savvy career professionals. Browser functions serve to both streamline job functions and to satisfy the tech lover’s lifestyle demands.


Kathleen Martins is a tech writer for various businesses including TorchBrowser; you can download torrent files with TorchBrowser.com.

Thursday, June 20, 2013

MacBook Air 2013 which is best with core i5 or i7?


With MacBook Air 2013, Apple offers an optional Intel Core i7 dual-core processor at 1.7 GHz with Turbo Boost up to 3.3 GHz. This option is charged € 150. Meanwhile, Macworld published tests to determine the impact of the processor on the autonomy of the ultraportable Apple. Compared to the standard model - Core i5 1.3 GHz - the difference is almost zero during the test video playback. MacBook Air is the standard 8 hours and 18 minutes while the Core i7 equipped stops working after 8 hours and 7 minutes.

With the tool of self-seeking PeaceKeeper much the processor test, the gap is much larger: 5 hours 45 minutes for the standard model against four hours and 35 minutes for the model with Core i7. A score may seem disappointing, but this configuration is still an hour more than any 13" laptop released last year. Regarding performance, the gap is larger than the range in 2012. With house system Macworld performance, the MacBook Air Core i7 2013 1.7 GHz scored 204, against 166 for the Core i5 MacBook Air (2012 and 2013). The MacBook Air Core i7 2012 had a score of 187. The difference is significant. Note that it is also more powerful than the Retina MacBook Pro 13 "revived in the early days of the year.


This difference is explained by the fact that the processor is more powerful, but also that the frequency difference is greater between the Core i7 and Core i5. If we are to believe the battery of tests conducted, the difference is mostly felt when testing with Aperture, VMware and CineBench. At first glance, the choice is pretty simple. If the list of applications that you use frequently, you have none of CPU intensive, so take your sights on the Core i5 to make the most of the autonomy of Apple's ultra-portable. If, against, you occasionally need power, the Core i7 is more than ever an option to consider.

Tuesday, June 18, 2013

Google Loon: Internet Access via Balloons

After his Hi-tech glasses, Google has unveiled a new experimental project for the less ambitious and unconventional Loon. Via balloons filled with helium and sent into the stratosphere, it is to provide internet access to people who cannot even enjoy it. A first experiment is already launched in New Zealand. There are more than a year now, Google X a research laboratory "secret" of the web giant, emerged from the shadows by revealing the Google Glass. This time, he returns to the front of the stage with Loon, a crazy project that seems straight out of a science fiction novel. Indeed, it is to provide access to the Internet via balloons in the sky. 2/3 of the population does not have access to the Internet and therefore Google tried for a fast and effective solution

The Mountain View company is part of a simple fact about the Internet: "Two thirds of the world's population, however, still do not have access to a fast connection and cheap, and there is still much to be done in this area. It indeed takes with many natural obstacles (jungles, islands, mountains, etc...) and financially. In majority of countries in the southern hemisphere, the cost of an Internet connection today still exceeds the equivalent of a monthly income“. Based on this inventory, the web giant unveiled a solution for home, in theory, to provide Web access to the largest number for a cost that should be mastered and increase the number of users on its services? The chosen solution is to send the balloons in the stratosphere at about 20 km altitude, twice as high as commercial flights. The problem is they cannot remain in geostationary position (the orbit is 35,768 miles) as satellites for example, so they derive the liking of the winds. However, thanks to solar and wind energy, it is possible to adjust the height of the ball and take advantage of a favorable wind to the best position. Obviously, they are in communication with each other to create a mesh over our heads and spread over a wide area Internet, the whole being connected to a server. This however raises the question of managing a full fleet of balloons which should include many components. On one hand, the web giant sweeps this issue claiming to have already "developed algorithms and complex computer systems" without further details.

A first experimental phase was launched in the region of Canterbury in New Zealand. It brings together 50 testers equipped with special receivers and about thirty balloons. The web giant is now seeking countries on the same latitude as the country to expand their experience. Balloons communicate and sprinkle the area with access to internet. Of course, no price or availability date was mentioned for marketing Loon and rates side, Google only says he hopes to provide "access to the Internet at speeds comparable or superior to those networks of current 3G "remains to be seen whether it is 3G base (384 kb / s in urban mode) or 3G + up to 42 Mb / s, the difference is huge. Finally, note that Google+ and dedicated web pages have been implemented. Finally, here are two videos presenting Loon.

6 Steps to Securing Your Software Supply Chain



As the software supply chain has become global, there are increased concerns that applications may contain vulnerabilities or be substituted for compromised products during delivery or possibly during installation. Even without these direct attempts to compromise the software supply chain, vulnerabilities are often inadvertently introduced during development. Enterprises must take full responsibility for ensuring the security of both proprietary and third-party applications.

Securing the software supply chain has been a top concern among security providers, developers and global enterprises for years. In 2009, the Software Assurance Forum for Excellence in Code (SAFECode) released The Software Supply Chain Integrity Framework: Defining Risks and Responsibilities for Securing Software in the Global Supply Chain, intended as a guide for addressing software supply chain vulnerabilities in an efficient and cost-effective manner. The report outlines a number of essential considerations for making the software supply chain safer for developers, enterprises and end consumers. Veracode’s secure software supply chain toolkit also contains an abundance of up-to-date resources for making the right decisions throughout the development and supply chain process.

  1. Thorough Testing of Software of Unknown Pedigree – To secure the software supply chain, it’s important that each transaction and change of hands is authorized, verifiable and transparent. This leaves less likelihood that entities with malicious intent would intentionally introduce vulnerabilities, knowing that it would likely be traceable.

Enterprises making use of software of unknown pedigree (SOUP) face additional challenges, usually necessitating the use of third-party application security testing to identify potential vulnerabilities. SOUP isn’t necessarily developed with malicious intent, but it’s often outdated code that has changed hands multiple times, been modified and adapted to meet various needs and hasn’t undergone adequate testing in its current form or application.

  1. Minimizing Access Privileges – Software applications are a conglomerate of hardware components, portions of code obtained via various sources, cloud services, networks and outsourced operations. It’s no surprise that multitudes of individuals will have access to critical components throughout the product lifecycle. When access controls are implemented, restricting access to only what is necessary to complete tasks, the risk of compromised code or components being introduced is minimized.

  1. Distributing Controls and Responsibilities – During development, no single individual should have total access or the ability to unilaterally change data. Incorporating cross-checks, distributing controls and responsibilities and sharing the responsibility for application security makes it more difficult for a single person or entity to intentionally introduce malicious files or vulnerabilities.

  1. Incorporating Tamper-Evident Safeguards - When software will undergo several phases of development and pass through the hands of multiple entities before reaching the end user, incorporating safeguards that provide evidence of tampering can both prevent and provide a means for quickly identifying and reversing attempts to insert code and files with malicious intent.

  1. Apply Compliance Standards and Regulations – Universal compliance standards are necessary for ensuring the security of the modern software supply chain. Enterprises must set clear expectations and requirements of vendors—including the vendors serving direct suppliers. When enterprises and vendors work collaboratively to bring applications to the market, mutually agreed-upon compliance regulations, combined with cross-checking and distributed responsibility serves to keep partners on the same page with the shared goal of bringing safe and effective applications to the software market.

  1. Third-Party Application Testing – Regardless of the safeguards incorporated throughout the supply chain, third-party application testing and code verification, such as vendor application security testing (VAST) is an essential final step in the process. Third-party application testing solutions detect vulnerabilities otherwise overlooked, and offer recommendations for eradicating risks before applications are delivered and installed.
Securing the software supply chain, especially globally, requires a significant commitment and investment from the software development community, as well as the enterprises they serve and the vendors which serve them. Software supply chain security is a collaborative effort that neither begins nor ends with a single entity. While great strides have been made in creating a solid framework for software security, the risks remain. Without adequate safeguards and stringent testing, modern enterprises are open to a variety of vulnerabilities introduced either intentionally or unintentionally throughout the product lifecycle.

Fergal Glynn is the Director of Product Marketing at Veracode, an award-winning application security company specializing in secure software supply chain and other security breaches with effective risk assessment tools like secure software supply chain toolkit.

Friday, June 7, 2013

Apple signed an agreement with Warner Music


Apple signed an agreement with Warner Music. Yes, After Universal, Apple has reached a new agreement with, Warner Music a major music industrial giant, and still negotiating with Sony. A competing service Pandora could be launched as early as WWDC. Apple's launch of a new online music listening on the occasion of its largest annual conference, WWDC, seems to be confirmed. According to sources CNet.com, the company has concluded an agreement with another major, Warner Music.

In April, they have entered an agreement with Universal Music, the first label in the world; Apple would have reached an agreement allowing him to use the catalog of titles in the Major for his new service called iRadio unofficially as inspired Pandora. As for Sony, the last one is still negotiating with Apple. According sources, the music giant would be more financially advantageous than that made with Pandora. Yet at the beginning of negotiations, Apple would have had a much lower price, since, would have been reassessed. And to encourage the Majors to sign, Apple has promised two sources of income: the amount of each distribution ("stream") and a percentage of advertising revenues collected by Apple via its listening service attached to iTunes and thought to use of mobile terminals.

Sunday, June 2, 2013

Windows 8.1 named Windows Blue!



Under the code name Blue Microsoft is working on a future release of Windows 8 we have all the important information about the new operating system for you compiled. Compared to its predecessors, Microsoft Windows 8 makes for much else. With a new operating concept (Metro interface) appears to be the operating system of the software giant as an all-rounder. But some users react negatively at first contact. Some enhancements have not been thought through. At Microsoft, therefore already they are working on a successor who will make things a lot better.

How the Windows Tami Reller confirms while talking to Mary Jo Foley, the internal code name Blue is a major update of Windows 8; Blue also represents a new publishing Microsoft strategy: Instead of bringing out a new operating system as before, every three years, to the current Windows in future receive a generous annual revision cycle. As Microsoft officially confirmed, comes with Windows 8.1, the first update yet launched in 2013. According to Microsoft there are some new features of Windows 8.1 will be officially awarded? Accordingly, the update brings back the missing of many users start button. By clicking through to the start screen, the start menu of the predecessor obviously does not find its way into Windows 8 Can also request the desktop wallpaper use for the start screen. So far, it has not been possible to start the Windows 8 computer immediately in the desktop mode. Also the changes with Windows 8.1 can be only available for users of Windows 8 Pro. Microsoft plans to integrate its own search engine, Bing. There are also improvements to the photo and mail service, as well as SkyDrive and camera. Internet Explorer 11 is part of Windows 8.1, at the end of June it is expected to be available for all Windows 8 users.

At the end of March has come to the Internet an early version of Windows 8.1. We guess. The example for this is the Windows Phone 8. It contains the tile surface makeover: Similar to the new Windows Phone 8 can be zoomed in and out tiles. You can also select and move several tiles at the same time. And instead of 20 colors define users with Windows blue of a spacious background and buttons. In Windows 8, there were only 20 color combinations for the new Start Center. It is colorful with Blue: Now you can create hundreds of color combinations for the background of the buttons from Windows to a smooth color control. The good old familiar Windows 8 background patterns are still present.

The diverse speculations, when Microsoft released an official version of the new Windows, Julie Larson-Green has put an end to. In early May, announced the developer's head of Windows that for 26 July 2013 a public beta version of Windows 8.1 is planned for all Windows 8 users. Microsoft will release version within the build-house developer’s conference 2013, which of 25 to 28 June runs in San Francisco. Then the update will be distributed through the Windows Store for Windows 8 and The final version should released. Microsoft's traditional strategy of the release of a new version of Windows every three years is not sustainable in today's highly mobile world. The company had no choice but to change. Microsoft now competitive with Apple that will eventually bring out a new version of Windows in cyclic and for this the first step is Instead of Windows service packs it should now pull in new functions. On the contrary, Microsoft shifted step by step functions of the traditional surface into the new tile surface. On the desktop itself, there are (so far) no significant changes. To see more, You have to wait till June end.