Thursday, June 20, 2013

MacBook Air 2013 which is best with core i5 or i7?

With MacBook Air 2013, Apple offers an optional Intel Core i7 dual-core processor at 1.7 GHz with Turbo Boost up to 3.3 GHz. This option is charged € 150. Meanwhile, Macworld published tests to determine the impact of the processor on the autonomy of the ultraportable Apple. Compared to the standard model - Core i5 1.3 GHz - the difference is almost zero during the test video playback. MacBook Air is the standard 8 hours and 18 minutes while the Core i7 equipped stops working after 8 hours and 7 minutes.

With the tool of self-seeking PeaceKeeper much the processor test, the gap is much larger: 5 hours 45 minutes for the standard model against four hours and 35 minutes for the model with Core i7. A score may seem disappointing, but this configuration is still an hour more than any 13" laptop released last year. Regarding performance, the gap is larger than the range in 2012. With house system Macworld performance, the MacBook Air Core i7 2013 1.7 GHz scored 204, against 166 for the Core i5 MacBook Air (2012 and 2013). The MacBook Air Core i7 2012 had a score of 187. The difference is significant. Note that it is also more powerful than the Retina MacBook Pro 13 "revived in the early days of the year.

This difference is explained by the fact that the processor is more powerful, but also that the frequency difference is greater between the Core i7 and Core i5. If we are to believe the battery of tests conducted, the difference is mostly felt when testing with Aperture, VMware and CineBench. At first glance, the choice is pretty simple. If the list of applications that you use frequently, you have none of CPU intensive, so take your sights on the Core i5 to make the most of the autonomy of Apple's ultra-portable. If, against, you occasionally need power, the Core i7 is more than ever an option to consider.

Tuesday, June 18, 2013

Google Loon: Internet Access via Balloons

After his Hi-tech glasses, Google has unveiled a new experimental project for the less ambitious and unconventional Loon. Via balloons filled with helium and sent into the stratosphere, it is to provide internet access to people who cannot even enjoy it. A first experiment is already launched in New Zealand. There are more than a year now, Google X a research laboratory "secret" of the web giant, emerged from the shadows by revealing the Google Glass. This time, he returns to the front of the stage with Loon, a crazy project that seems straight out of a science fiction novel. Indeed, it is to provide access to the Internet via balloons in the sky. 2/3 of the population does not have access to the Internet and therefore Google tried for a fast and effective solution

The Mountain View company is part of a simple fact about the Internet: "Two thirds of the world's population, however, still do not have access to a fast connection and cheap, and there is still much to be done in this area. It indeed takes with many natural obstacles (jungles, islands, mountains, etc...) and financially. In majority of countries in the southern hemisphere, the cost of an Internet connection today still exceeds the equivalent of a monthly income“. Based on this inventory, the web giant unveiled a solution for home, in theory, to provide Web access to the largest number for a cost that should be mastered and increase the number of users on its services? The chosen solution is to send the balloons in the stratosphere at about 20 km altitude, twice as high as commercial flights. The problem is they cannot remain in geostationary position (the orbit is 35,768 miles) as satellites for example, so they derive the liking of the winds. However, thanks to solar and wind energy, it is possible to adjust the height of the ball and take advantage of a favorable wind to the best position. Obviously, they are in communication with each other to create a mesh over our heads and spread over a wide area Internet, the whole being connected to a server. This however raises the question of managing a full fleet of balloons which should include many components. On one hand, the web giant sweeps this issue claiming to have already "developed algorithms and complex computer systems" without further details.

A first experimental phase was launched in the region of Canterbury in New Zealand. It brings together 50 testers equipped with special receivers and about thirty balloons. The web giant is now seeking countries on the same latitude as the country to expand their experience. Balloons communicate and sprinkle the area with access to internet. Of course, no price or availability date was mentioned for marketing Loon and rates side, Google only says he hopes to provide "access to the Internet at speeds comparable or superior to those networks of current 3G "remains to be seen whether it is 3G base (384 kb / s in urban mode) or 3G + up to 42 Mb / s, the difference is huge. Finally, note that Google+ and dedicated web pages have been implemented. Finally, here are two videos presenting Loon.

6 Steps to Securing Your Software Supply Chain

As the software supply chain has become global, there are increased concerns that applications may contain vulnerabilities or be substituted for compromised products during delivery or possibly during installation. Even without these direct attempts to compromise the software supply chain, vulnerabilities are often inadvertently introduced during development. Enterprises must take full responsibility for ensuring the security of both proprietary and third-party applications.

Securing the software supply chain has been a top concern among security providers, developers and global enterprises for years. In 2009, the Software Assurance Forum for Excellence in Code (SAFECode) released The Software Supply Chain Integrity Framework: Defining Risks and Responsibilities for Securing Software in the Global Supply Chain, intended as a guide for addressing software supply chain vulnerabilities in an efficient and cost-effective manner. The report outlines a number of essential considerations for making the software supply chain safer for developers, enterprises and end consumers. Veracode’s secure software supply chain toolkit also contains an abundance of up-to-date resources for making the right decisions throughout the development and supply chain process.

  1. Thorough Testing of Software of Unknown Pedigree – To secure the software supply chain, it’s important that each transaction and change of hands is authorized, verifiable and transparent. This leaves less likelihood that entities with malicious intent would intentionally introduce vulnerabilities, knowing that it would likely be traceable.

Enterprises making use of software of unknown pedigree (SOUP) face additional challenges, usually necessitating the use of third-party application security testing to identify potential vulnerabilities. SOUP isn’t necessarily developed with malicious intent, but it’s often outdated code that has changed hands multiple times, been modified and adapted to meet various needs and hasn’t undergone adequate testing in its current form or application.

  1. Minimizing Access Privileges – Software applications are a conglomerate of hardware components, portions of code obtained via various sources, cloud services, networks and outsourced operations. It’s no surprise that multitudes of individuals will have access to critical components throughout the product lifecycle. When access controls are implemented, restricting access to only what is necessary to complete tasks, the risk of compromised code or components being introduced is minimized.

  1. Distributing Controls and Responsibilities – During development, no single individual should have total access or the ability to unilaterally change data. Incorporating cross-checks, distributing controls and responsibilities and sharing the responsibility for application security makes it more difficult for a single person or entity to intentionally introduce malicious files or vulnerabilities.

  1. Incorporating Tamper-Evident Safeguards - When software will undergo several phases of development and pass through the hands of multiple entities before reaching the end user, incorporating safeguards that provide evidence of tampering can both prevent and provide a means for quickly identifying and reversing attempts to insert code and files with malicious intent.

  1. Apply Compliance Standards and Regulations – Universal compliance standards are necessary for ensuring the security of the modern software supply chain. Enterprises must set clear expectations and requirements of vendors—including the vendors serving direct suppliers. When enterprises and vendors work collaboratively to bring applications to the market, mutually agreed-upon compliance regulations, combined with cross-checking and distributed responsibility serves to keep partners on the same page with the shared goal of bringing safe and effective applications to the software market.

  1. Third-Party Application Testing – Regardless of the safeguards incorporated throughout the supply chain, third-party application testing and code verification, such as vendor application security testing (VAST) is an essential final step in the process. Third-party application testing solutions detect vulnerabilities otherwise overlooked, and offer recommendations for eradicating risks before applications are delivered and installed.
Securing the software supply chain, especially globally, requires a significant commitment and investment from the software development community, as well as the enterprises they serve and the vendors which serve them. Software supply chain security is a collaborative effort that neither begins nor ends with a single entity. While great strides have been made in creating a solid framework for software security, the risks remain. Without adequate safeguards and stringent testing, modern enterprises are open to a variety of vulnerabilities introduced either intentionally or unintentionally throughout the product lifecycle.

Fergal Glynn is the Director of Product Marketing at Veracode, an award-winning application security company specializing in secure software supply chain and other security breaches with effective risk assessment tools like secure software supply chain toolkit.

Friday, June 7, 2013

Apple signed an agreement with Warner Music

Apple signed an agreement with Warner Music. Yes, After Universal, Apple has reached a new agreement with, Warner Music a major music industrial giant, and still negotiating with Sony. A competing service Pandora could be launched as early as WWDC. Apple's launch of a new online music listening on the occasion of its largest annual conference, WWDC, seems to be confirmed. According to sources, the company has concluded an agreement with another major, Warner Music.

In April, they have entered an agreement with Universal Music, the first label in the world; Apple would have reached an agreement allowing him to use the catalog of titles in the Major for his new service called iRadio unofficially as inspired Pandora. As for Sony, the last one is still negotiating with Apple. According sources, the music giant would be more financially advantageous than that made with Pandora. Yet at the beginning of negotiations, Apple would have had a much lower price, since, would have been reassessed. And to encourage the Majors to sign, Apple has promised two sources of income: the amount of each distribution ("stream") and a percentage of advertising revenues collected by Apple via its listening service attached to iTunes and thought to use of mobile terminals.

Sunday, June 2, 2013

Windows 8.1 named Windows Blue!

Under the code name Blue Microsoft is working on a future release of Windows 8 we have all the important information about the new operating system for you compiled. Compared to its predecessors, Microsoft Windows 8 makes for much else. With a new operating concept (Metro interface) appears to be the operating system of the software giant as an all-rounder. But some users react negatively at first contact. Some enhancements have not been thought through. At Microsoft, therefore already they are working on a successor who will make things a lot better.

How the Windows Tami Reller confirms while talking to Mary Jo Foley, the internal code name Blue is a major update of Windows 8; Blue also represents a new publishing Microsoft strategy: Instead of bringing out a new operating system as before, every three years, to the current Windows in future receive a generous annual revision cycle. As Microsoft officially confirmed, comes with Windows 8.1, the first update yet launched in 2013. According to Microsoft there are some new features of Windows 8.1 will be officially awarded? Accordingly, the update brings back the missing of many users start button. By clicking through to the start screen, the start menu of the predecessor obviously does not find its way into Windows 8 Can also request the desktop wallpaper use for the start screen. So far, it has not been possible to start the Windows 8 computer immediately in the desktop mode. Also the changes with Windows 8.1 can be only available for users of Windows 8 Pro. Microsoft plans to integrate its own search engine, Bing. There are also improvements to the photo and mail service, as well as SkyDrive and camera. Internet Explorer 11 is part of Windows 8.1, at the end of June it is expected to be available for all Windows 8 users.

At the end of March has come to the Internet an early version of Windows 8.1. We guess. The example for this is the Windows Phone 8. It contains the tile surface makeover: Similar to the new Windows Phone 8 can be zoomed in and out tiles. You can also select and move several tiles at the same time. And instead of 20 colors define users with Windows blue of a spacious background and buttons. In Windows 8, there were only 20 color combinations for the new Start Center. It is colorful with Blue: Now you can create hundreds of color combinations for the background of the buttons from Windows to a smooth color control. The good old familiar Windows 8 background patterns are still present.

The diverse speculations, when Microsoft released an official version of the new Windows, Julie Larson-Green has put an end to. In early May, announced the developer's head of Windows that for 26 July 2013 a public beta version of Windows 8.1 is planned for all Windows 8 users. Microsoft will release version within the build-house developer’s conference 2013, which of 25 to 28 June runs in San Francisco. Then the update will be distributed through the Windows Store for Windows 8 and The final version should released. Microsoft's traditional strategy of the release of a new version of Windows every three years is not sustainable in today's highly mobile world. The company had no choice but to change. Microsoft now competitive with Apple that will eventually bring out a new version of Windows in cyclic and for this the first step is Instead of Windows service packs it should now pull in new functions. On the contrary, Microsoft shifted step by step functions of the traditional surface into the new tile surface. On the desktop itself, there are (so far) no significant changes. To see more, You have to wait till June end.