Wednesday, February 13, 2013

Motorola X will be a revolution

Source : Appy Geek.

In a previous post , I spoke about Google and Motorola working on a new smartphone, the Motorola X Phone which is the first Smartphone 100% by Google, operating under the next android, Android 5.0 Key Lime Pie.

 

The new information on this phone is that , Hugh Bradlow, chief technology officer at Telstra, just announced that the Motorola Phone X will be "a breakthrough, it will shuffle the cards and will put pressure on Samsung and Apple."

And SmartHouse added:

"Google is working on this unit for a very long time. It will have software features and capabilities that do not exist on a Samsung Galaxy nor Apple's iPhone. The software is very powerful and it features Google services like no other manufacturer has done in the past ".



According to the latest information, it would be presented on May 15th at the Google I / O and come out July 8, 2013.

Do you think that the smartphone revolution is possible with X Motorola Phone?

Monday, February 11, 2013

Audacity.

For those who follow this blog regulary, don't worry this is still a tech related post; for the others, well, I don't really care about you. Unless you're planning to become a regular.

In this post we'll be talking about a behavior that really bugs me, which is audacity.
First I'm going to define it, then I'm going to show you some examples.

Definition: Rude or disrespectful behavior.


First example:

"She had the audacity to pick up the receiver and ask me to hang up".

Our second example will be "Scroogled"

When we talk about lack of security, vulnerability, spyware, malware and viruses the first thing that comes to you mind is Microsoft.

Microsoft, the mother of the infamous IE which seems to constantly be in the news for its security issues and vulnerabilities (take a look IE wiki page);
Microsoft the mother of the newly born windows 8 surface that sends data to Microsoft about each application that is installed in Windows 8, which is a very serious privacy problem.
(The process is well described by canadian security researcher Nadim Kobeissy )


Now, this Microsoft that earned its reputation is starting a campaign agaisnt google privacy (gmail to be more specific) just to promote their outlook.com, which, it happens, that also display ads.

This is audacity.

Our Third and last example is of course Google:

Google does read your sent and recieved mail. I just wanted to make clear this up. And here's Google Chairman Eric Schmidt.

"We don’t need you to type at all. We know where you are, with your permission; we know where you’ve been, with your permission; we can more or less know what you’re thinking about." - Google Chairman Eric Schmidt at the The Atlantic Washington Ideas Forum in 2010.

If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.
Google Executive Chairman Eric Schmidt on Consumer Privacy.

You all know, that google has this browser named Chrome. And what you might not all know is that chrome, like any other browser have a private surfing mode or "incognito" as Google named it.
Now when start you chrome with incognito mode, this is the message that will be displayed :



This is like me, trashing new readers at the beginning of my post and bitching later about how no one is following me.

And finally, I know this post might not be interesting for the most of you; but I think that "Audacity" is the word of this century and I wanted to have some fun with it.

Wednesday, February 6, 2013

A featherweight HD video cam?

It seems that The Raspberry Pi Model A won't be the last hardware release for this year. Blogger Liz, posted yesterday, an article on the  Raspberry Pi website, showing off the new Raspberry Pi video camera, a tiny, single-lens unit that will be released this year.
This post was followed by a thread on the RP forum, unveiling some specs of the new camera :

  •  The PCB is 25x20x9mm (approx). Weight currently unknown but very light.
  • The module is an OV5647. 
  • Fixed focus 5MP sensor capable of 2592x1944 stills, but also 1080p30, 720p60 and 640x480p60/90. 
  • Working on the faster frame rates, but stills capture and 1080p30 are already working. 
  • There is still some work to do on the camera driver and on image quality.
  • The module package is 8.5x8.5x5mm.


The camera will connect directly to the Pi and offer hobbyists the opportunity to build vision-based applications. It’s attached to a nice long ribbon that connects directly to the Raspberry Pi.
The total cost of this module is  $25.

Tuesday, February 5, 2013

Why Mega is different?


Dropbox, Box, rapidshare, filesonic, google drive and Mega are services that allow you to put your data on the cloud for free.

Now of course when we consider to put our data on the cloud, our biggest concerns is security. And whether this data is for enterprise or personal use, it always feels like compromising your privacy desire when you decide to put it on the public internet.

When uploading your data on the could, it will exposed to attacks at two points:
  • in-flight :when it is being transmitted over the security of the public internet.
  • At rest :When it is on the cloud servers. 
Like every other service, Mega employs cryptography to protect data in-flight by wrapping communication with SSL encryption. So, there is nothing new in this part.

Why Mega is different? Why I trust it?

But Mega is unique in its approach to handling encryption at rest. Instead of storing encryption keys for a client’s data within Mega’s infrastructure, Mega gives their cryptography back to their users.
So Mega users encrypt their own data after sending it to Mega’s servers, and store keys locally such that even Mega can’t read their data.

Which mean that Mega can't and is not able to hand your content to
authorities. 

In simpler words: users keep their own keys and send data in the form of encrypted cipher text rather than unencrypted plain text. And it seems like Kim is very comfortable with Mega's security since he's offering 14000$ per vulnerability.

Kim Dotcom @KimDotcom
The #Mega crypto & security REWARD PROGRAM is live. Earn up to 10,000 EURO per vulnerability. https://mega.co.nz/#blog_6

After falling victim or its success for the first few days of its launching (Overloaded servers), Mega is functionning perfectly and users are satisfied as Kim Dotcom state in a tweet that raised the question of : "What's next?"


 

Friday, February 1, 2013

The first transparent smartphone!!

While we got sick and tired of rumors about the next iphone or the next galaxy, Polytron Technologies, a Taiwanese company and a world leader in glass technology, revealed the first smartphone to be transparent is developed. The company already announced the possibility of marketing the end of 2013.

Unlike previous attempts, it is not only the screen but almost all of the phone that are transparent: battery, circuit ... Only NanoSim and MicroSD cards and some circuits still apparent but it is a very promising start.

first transparent smartphone

Although it is not yet perfect, the tactile part is very small, limited to only a small area on the face of the smartphone. For the moment there was no release information on the capabilities of the device, which raises many questions. However, the concept will enable real developments in the design of smartphones and tablets. It has great potential that designers will be able to use the devices to imagine the future.