Saturday, June 22, 2013

Know more about OS X Mavericks -1



Apple took advantage of the opening Keynote WWDC 2013 being held in San Francisco to introduce OS X Mavericks, the successor of Mountain Lion. This new named after a famous surfing spot in California does not change as the iOS system 7 on mobile devices, but it brings some significant new features. OS X 10.8 was clearly aimed at novices with its new iOS inherited, the system tried to ease the transition from iPhone to Mac for those who knew nothing about traditional computing. LaunchPad presented as applications on an iPhone or iPad, the applications themselves were digging in the mobile system interfaces and Apple simplified the transition from one system to another with better iCloud integration. OS X Mavericks tries to seduce rather more advanced users, those who already know how to use a computer in general, especially a Mac and want to go further. Requested by many users, the tabs are appearing in the Finder. The file manager for OS X can open several files in the same window by creating tabs. The operation is the same as in a browser, shortcuts as: creating a tab with ⌘ T, in a farm with ⌘ W (must now make ⌘ ⇧ W to close the window, unless of course you did no open tab).


You can also open a folder in a new tab using the secondary click: a new item appears in the Finder's contextual menu. As always in a browser, you can double-click a folder while holding down ⌘ supported and the file is displayed in a new tab. The Finder OS X 10.9 also features all the functions of management tabs ⇥ ctrl ctrl ⇧ ⇥ display the next and previous tabs, you can drag a tab out of the current window to create a new window, move tabs within the window or windows merge all with a single tab. Secondary click on the dedicated area displays unsurprisingly other options to close all other tabs except the current one.


Another new Finder Version 10.9, these are the keywords. It is not so much a new function, as a new interface for something that has long existed in OS X, but was rarely used. Until then, Apple talked about labels, OS X Mavericks employs him the English word 'Tags'. The principle is the same: you can assign to each folder or file a keyword and a color option and the system then gives you several options to find all the elements associated with the same keyword. By default, OS X creates Mavericks seven tags for all colors. They are also just named according to the color, but nothing prevents you from changing the names and colors of the keywords in the Finder preferences. Thereafter, you can attach a tag to a file or folder using the context menu, to the new icon in the Finder toolbar (below) or by dragging and dropping the element in the sidebar. Through the icon, you can also create a new tag.


The Finder sidebar already contained fast access to some records, the machines on the network and local volumes, it gets the tags. You can drag items on a tag to associate with him, they said, but this presentation can also display all the items associated with a particular keyword. The research will support these tags, but this feature does not seem active in the first OS X beta Mavericks. What works however, is the integration of tags directly in dialogs applications. Example here in a text editor that does a field "tags" between the file name and its position in the storage volume. This field is used both to select an existing tag to create a new one. Last point can be noted, the management area dedicated to iCloud in each software also integrates keywords and has an additional button at the bottom to add. As throughout the Finder, the color is more discreet, it no longer appears as a point. Incidentally, the views put now lists the column names forward, others are grayed out.

7 Most Useful Web Browser Functions for Web and Graphic Designers



Both web designers and graphic designers rely on browsers not only to find and source information, files and ideas, but to test their designs in real-world settings to ensure maximum functionality for users. Usability is one of the most essential aspects of web design—after all, if users have a difficult time navigating or loading a site, they’re likely to bounce. Fortunately, today’s browsers offer some advanced features useful for both web and graphics professionals.

1. Drag-and-Drop Search

You know what you’re looking for when you browse the web, or you at least have a general idea. Spending extra time to open a new search tab and type in what you’re looking for isn’t an efficient use of your resources. That’s why browsers with drag-and-drop search functionality are ideal for graphic designers. Find something you want to know more about on one site, and simply drag and drop links, words and even photos to relevant titles to find what you’re looking for without wasting a second.

2. Torrent Capabilities

When you’re searching for a source file online, such as an open-source software application, you don’t have a lot of time to downloading files. Browsers with built-in torrent capabilities make downloading photos, videos, and other files a breeze. With a built-in torrent, you can manage your downloads from directly within your browser—no need to utilize a separate download application.

3. Speedy Downloading

A built-in torrent is great, but not ideal if it’s not any faster than standard downloading practices. Don’t waste your precious time waiting for endless downloads. Choose a browser with accelerated download speeds so you can stay on task instead of frustratingly tapping your fingers on the mouse while you wait.

4. Easy Media-Grabbing Capabilities

Web designers are often grabbing media from the ‘net. Embedding videos from other sources is pretty commonplace in today’s rich media Internet environment, both on standard websites among social media. Designers are tasked with sourcing media, re-vamping it when necessary and appropriate, reformatting it for compatibility and embedding those files online. The whole process can take quite a bit of time. Browsers with media-grabbing capabilities make the job of designers much simpler, enabling them to pull media files from the web with a simple click.

5. Seamless Sharing Functionality

While social sharing isn’t necessarily a core component of a web or graphic designer’s job, these professionals like to interact with their social networks just as much as anyone. In the course of a day’s work, you might come across dozens of articles you find interesting and want to read later—or just something you feel is worthy of a share. Instead of letting distraction take you from the task at hand, a browser with built-in social sharing features lets you share the content you find most intriguing without taking you into full distraction mode.

6. Easy Bookmarking

Bookmarking is a pretty commonplace browser function, but some are more usable than others with streamlined organization capabilities. Graphic and web designers rely on a variety of resources online, including blogs with coding shortcuts, tutorials and other information that helps you create the best results for your clients or your employer. Browsers with functional, easy-to-use and easy-to-navigate bookmarking functions make the task of organizing all those favorite resources much simpler.

7. Maximum Browsing Security

As a web or graphic designer, you likely have access to pertinent data about your clients. Whether that means top-secret branding initiatives or financial payment data, you don’t want any of that information to leak into the wrong hands. That’s why a top-notch browser with maximum security is critical—not just for you, but for your clients and your reputation.

Web and graphic designers love technology. Modern web browsers provide advanced functionality that benefits tech-savvy career professionals. Browser functions serve to both streamline job functions and to satisfy the tech lover’s lifestyle demands.


Kathleen Martins is a tech writer for various businesses including TorchBrowser; you can download torrent files with TorchBrowser.com.

Thursday, June 20, 2013

MacBook Air 2013 which is best with core i5 or i7?


With MacBook Air 2013, Apple offers an optional Intel Core i7 dual-core processor at 1.7 GHz with Turbo Boost up to 3.3 GHz. This option is charged € 150. Meanwhile, Macworld published tests to determine the impact of the processor on the autonomy of the ultraportable Apple. Compared to the standard model - Core i5 1.3 GHz - the difference is almost zero during the test video playback. MacBook Air is the standard 8 hours and 18 minutes while the Core i7 equipped stops working after 8 hours and 7 minutes.

With the tool of self-seeking PeaceKeeper much the processor test, the gap is much larger: 5 hours 45 minutes for the standard model against four hours and 35 minutes for the model with Core i7. A score may seem disappointing, but this configuration is still an hour more than any 13" laptop released last year. Regarding performance, the gap is larger than the range in 2012. With house system Macworld performance, the MacBook Air Core i7 2013 1.7 GHz scored 204, against 166 for the Core i5 MacBook Air (2012 and 2013). The MacBook Air Core i7 2012 had a score of 187. The difference is significant. Note that it is also more powerful than the Retina MacBook Pro 13 "revived in the early days of the year.


This difference is explained by the fact that the processor is more powerful, but also that the frequency difference is greater between the Core i7 and Core i5. If we are to believe the battery of tests conducted, the difference is mostly felt when testing with Aperture, VMware and CineBench. At first glance, the choice is pretty simple. If the list of applications that you use frequently, you have none of CPU intensive, so take your sights on the Core i5 to make the most of the autonomy of Apple's ultra-portable. If, against, you occasionally need power, the Core i7 is more than ever an option to consider.

Tuesday, June 18, 2013

Google Loon: Internet Access via Balloons

After his Hi-tech glasses, Google has unveiled a new experimental project for the less ambitious and unconventional Loon. Via balloons filled with helium and sent into the stratosphere, it is to provide internet access to people who cannot even enjoy it. A first experiment is already launched in New Zealand. There are more than a year now, Google X a research laboratory "secret" of the web giant, emerged from the shadows by revealing the Google Glass. This time, he returns to the front of the stage with Loon, a crazy project that seems straight out of a science fiction novel. Indeed, it is to provide access to the Internet via balloons in the sky. 2/3 of the population does not have access to the Internet and therefore Google tried for a fast and effective solution

The Mountain View company is part of a simple fact about the Internet: "Two thirds of the world's population, however, still do not have access to a fast connection and cheap, and there is still much to be done in this area. It indeed takes with many natural obstacles (jungles, islands, mountains, etc...) and financially. In majority of countries in the southern hemisphere, the cost of an Internet connection today still exceeds the equivalent of a monthly income“. Based on this inventory, the web giant unveiled a solution for home, in theory, to provide Web access to the largest number for a cost that should be mastered and increase the number of users on its services? The chosen solution is to send the balloons in the stratosphere at about 20 km altitude, twice as high as commercial flights. The problem is they cannot remain in geostationary position (the orbit is 35,768 miles) as satellites for example, so they derive the liking of the winds. However, thanks to solar and wind energy, it is possible to adjust the height of the ball and take advantage of a favorable wind to the best position. Obviously, they are in communication with each other to create a mesh over our heads and spread over a wide area Internet, the whole being connected to a server. This however raises the question of managing a full fleet of balloons which should include many components. On one hand, the web giant sweeps this issue claiming to have already "developed algorithms and complex computer systems" without further details.

A first experimental phase was launched in the region of Canterbury in New Zealand. It brings together 50 testers equipped with special receivers and about thirty balloons. The web giant is now seeking countries on the same latitude as the country to expand their experience. Balloons communicate and sprinkle the area with access to internet. Of course, no price or availability date was mentioned for marketing Loon and rates side, Google only says he hopes to provide "access to the Internet at speeds comparable or superior to those networks of current 3G "remains to be seen whether it is 3G base (384 kb / s in urban mode) or 3G + up to 42 Mb / s, the difference is huge. Finally, note that Google+ and dedicated web pages have been implemented. Finally, here are two videos presenting Loon.

6 Steps to Securing Your Software Supply Chain



As the software supply chain has become global, there are increased concerns that applications may contain vulnerabilities or be substituted for compromised products during delivery or possibly during installation. Even without these direct attempts to compromise the software supply chain, vulnerabilities are often inadvertently introduced during development. Enterprises must take full responsibility for ensuring the security of both proprietary and third-party applications.

Securing the software supply chain has been a top concern among security providers, developers and global enterprises for years. In 2009, the Software Assurance Forum for Excellence in Code (SAFECode) released The Software Supply Chain Integrity Framework: Defining Risks and Responsibilities for Securing Software in the Global Supply Chain, intended as a guide for addressing software supply chain vulnerabilities in an efficient and cost-effective manner. The report outlines a number of essential considerations for making the software supply chain safer for developers, enterprises and end consumers. Veracode’s secure software supply chain toolkit also contains an abundance of up-to-date resources for making the right decisions throughout the development and supply chain process.

  1. Thorough Testing of Software of Unknown Pedigree – To secure the software supply chain, it’s important that each transaction and change of hands is authorized, verifiable and transparent. This leaves less likelihood that entities with malicious intent would intentionally introduce vulnerabilities, knowing that it would likely be traceable.

Enterprises making use of software of unknown pedigree (SOUP) face additional challenges, usually necessitating the use of third-party application security testing to identify potential vulnerabilities. SOUP isn’t necessarily developed with malicious intent, but it’s often outdated code that has changed hands multiple times, been modified and adapted to meet various needs and hasn’t undergone adequate testing in its current form or application.

  1. Minimizing Access Privileges – Software applications are a conglomerate of hardware components, portions of code obtained via various sources, cloud services, networks and outsourced operations. It’s no surprise that multitudes of individuals will have access to critical components throughout the product lifecycle. When access controls are implemented, restricting access to only what is necessary to complete tasks, the risk of compromised code or components being introduced is minimized.

  1. Distributing Controls and Responsibilities – During development, no single individual should have total access or the ability to unilaterally change data. Incorporating cross-checks, distributing controls and responsibilities and sharing the responsibility for application security makes it more difficult for a single person or entity to intentionally introduce malicious files or vulnerabilities.

  1. Incorporating Tamper-Evident Safeguards - When software will undergo several phases of development and pass through the hands of multiple entities before reaching the end user, incorporating safeguards that provide evidence of tampering can both prevent and provide a means for quickly identifying and reversing attempts to insert code and files with malicious intent.

  1. Apply Compliance Standards and Regulations – Universal compliance standards are necessary for ensuring the security of the modern software supply chain. Enterprises must set clear expectations and requirements of vendors—including the vendors serving direct suppliers. When enterprises and vendors work collaboratively to bring applications to the market, mutually agreed-upon compliance regulations, combined with cross-checking and distributed responsibility serves to keep partners on the same page with the shared goal of bringing safe and effective applications to the software market.

  1. Third-Party Application Testing – Regardless of the safeguards incorporated throughout the supply chain, third-party application testing and code verification, such as vendor application security testing (VAST) is an essential final step in the process. Third-party application testing solutions detect vulnerabilities otherwise overlooked, and offer recommendations for eradicating risks before applications are delivered and installed.
Securing the software supply chain, especially globally, requires a significant commitment and investment from the software development community, as well as the enterprises they serve and the vendors which serve them. Software supply chain security is a collaborative effort that neither begins nor ends with a single entity. While great strides have been made in creating a solid framework for software security, the risks remain. Without adequate safeguards and stringent testing, modern enterprises are open to a variety of vulnerabilities introduced either intentionally or unintentionally throughout the product lifecycle.

Fergal Glynn is the Director of Product Marketing at Veracode, an award-winning application security company specializing in secure software supply chain and other security breaches with effective risk assessment tools like secure software supply chain toolkit.