Saturday 10 August 2013

Brief Introduction About Moto X

Inside lies the answer to a question we’ve been asking since Google announced its $12.5 billion purchase of Motorola: what happens when Google builds a smartphone?

The answer to that question is the Moto X. It has endlessly leaked out in various forms for the past few months — Google chairman Eric Schmidt even posed for an impromptu photo shoot with one several weeks ago. Eighteen phones, face-down in rectangles of gray foam.

Okay, Google. Now.



The same, only different

         There are actually 504 potential versions of Moto X — the 18 available backplate covers, from concrete gray to hot pink, are just the start. You can also choose a black or white front panel, and the side-mounted buttons and the ring around the rear camera lens come in seven different colors. You have to pick between 16 and 32GB of storage. And then you can engrave the back of your phone.

You pick the color palette you want online, using a tool called Moto Maker. Although the Moto X will come to every carrier, the customization is exclusive to AT&T customers at launch, which is odd — it’s easily the most compelling thing about the Moto X. (It won’t last, either: everyone I spoke to said the exclusive is "just for now.") And if you pick, buy, and change your mind? Just ship it back within two weeks and try another.

To allow for the custom design process, Motorola placed its entire assembly operation for the X in Fort Worth, Texas. Components come from 16 states and countries around the world, but 2,000 or so workers assemble the phones in Texas and ship them all over America. There's certainly a patriotic element to the decision — Osterloh says "it's just the right thing to do" — but the real upside is practical. Since there's no boat from China to wait for, Motorola can have you a new phone in four days. It's like the Warby Parker of cellphones; just try it and see how you feel.

But while Moto X is clothed in high fashion, underneath that wardrobe you’ll find decidedly department-store internals. And that may be Motorola’s most interesting bet of all.




The sweet spot

         Jim Wicks calls this size "the sweet spot." Clad in a pink dress shirt that may well have inspired a Moto X color option, he says that Motorola's goal was to build an X that worked for everyone, and the process started with screen size. "We had a lot of debates about the density of the display — 1080 versus 720 — and what the right size is," says Wicks. "It's easy to hold for people. Basically they feel like they have an ample screen to do everything they want to do, but also it's highly pocketable."

Wicks and his team ended up choosing a 4.7-inch 720p AMOLED display, with whites that look a little pink when examined closely and the same motion-blur problems that plague every similar panel. Compared to the the HTC One and Samsung Galaxy S4, both of which have 1080p screens, it’s a mid-range panel, but Wicks says it doesn’t matter. "We could go and make a higher-resolution screen," Wicks says, "but it would just suck battery and nobody would know the difference."



Borne of the Droid

           Even though Motorola was aiming for simplicity, there are some software flourishes that don’t quite pay off. The phone constantly monitors its sensors to be aware of where you are and what you're doing, and can automatically switch into Driving Mode when it detects that you're in a car. But it can't tell whether you're driving or the passenger — so, you'll have to manually disable it every time you get in the back of a cab.

But overall, the Moto X runs what is essentially stock Android (version 4.2.2), and Motorola hopes to provide updates quickly by giving itself very little work to do. Osterloh characterizes Motorola's plan as simply to "remove a lot of the customizations that have plagued Android phones for a long time, and just focus right on the core Android user experience, which has evolved to a great place." Motorola's changes, he says, focus on improving existing features — like allowing Google Now to always be listening — without changing for the sake of changing.

Osterloh insists there's no nepotism from the Android team, and that Motorola is treated like every other manufacturer. A Google Play edition of the Moto X is coming, but it’s not clear when, or how much it’ll cost, or whether it’ll come at the cost of some of Motorola’s great software features. The Moto X is just a Motorola phone, prone to the same carrier hangups and bloatware as every other.

"But we also of course have a lot of Google influence," says Osterloh. Seventy Google employees took advantage of a company program that allowed people to transfer to Motorola, and Dennis Woodside, Motorola’s CEO, spent nine years at Google before being tasked with revitalizing the company. It may not be codified, and it may not help the Moto X get Android updates any faster, but Google's influence on Motorola is everywhere.


Detailed Specs Sheet :




Wednesday 7 August 2013

Yahoo! to get a new logo with the same old flavour next month



        There are plenty of changes afoot in the Yahoo! office at Sunnyvale. Under iron-fisted CEO Marissa Mayer, Yahoo! is not only seeing a small but noticeable change in fortunes with the service refreshes and acquisitions, the Internet giant is also set to get a brand new look with a logo redesign in the works.


             In a blog post early this morning, Kathy Savitt, Chief Marketing Officer at Yahoo! announced that the company is going to introduce a brand new logo next month. “Over the past year, there’s been a renewed sense of purpose and progress at Yahoo!, and we want everything we do to reflect this spirit of innovation. While the company is rapidly evolving, our logo — the essence of our brand — should too.”

           To kick off the countdown to the new logo, Savitt announced that Yahoo! will be putting up a new design each day and on day number 30, will unveil the new Yahoo! logo. For those of you who think Yahoo! will completely change its identity, think again, Yahoo! will still be retaining its exclamation mark – the service’s calling card. It will also be retaining the colour purple and the famous yodel, the double “O”s that increase in size. Essentially, we could be looking at just a change in the font for the logo.

             The new-logo-a-day exercise will be limited to Yahoo’s network throughout the US only, but you will be able to check out the daily new logo on Yahoo’s Tumblr blog, Twitter and Facebook page. The logo redesign was done in partnership with artists like Macklemore and Ryan Lewis, John Legend and Imagine Dragons. The “30 days of change” campaign will come to an end on September 4 with the unveiling of Yahoo’s new logo.

Facebook changes News Feed again

                 
               Facebook's quest to be a personalized newspaper for the internet age continued on Tuesday with tweaks aimed at making sure members spy hot stories from their friends.

Changes to the leading social network's formula for figuring out which posts will be of interest included "bumping" up potentially intriguing stories that went unnoticed during prior visits to Facebook.

"It is hard for users to get back to old things; you have to scroll through things you have already seen," Facebook News Feed team engineering Lars Backstrom said while discussing the latest changes.

"We wanted to make it so people weren't missing important stories that didn't make top slots but were just below the fold."

Signals weighed in the machine learning algorithm were modified to bump-up a story considered more interesting than fresher material that formerly got priority simply for being newer.

"We tweaked the model," Backstrom said, noting that about 30,000 signals are balanced in the algorithm.

"Instead of just taking the new stories, we would take all stories that were new to you, that you haven't seen, even if it isn't the freshest."

A test of the change showed that the number of stories people read in News Feeds rose to 70% from 57% with "bumping," according to Facebook.

"Story Bumping is going to be a really nice tool for people if they... are sitting with a Facebook account and have run out of things to look at," said Facebook vice president of product Chris Cox. "It will bump up new stuff."

News Feeds were also modified to take into account the "last actor" a member interacted with and then give that friend's posts temporary priority since they seem to be up to something interesting.

"We wanted to capture your current state of mind as you were using Facebook," Backstrom said.

"A lot of signals are long term, such as the relationship with each friend; we wanted a real time factor."

Facebook's ranking software assigns numerical scores to the roughly 1,500 stories typically eligible for delivery to a member's News Feed and displays the top 300.

Powerful factors for ranking are relationships, along with how often a member comments, shares, "likes," or otherwise acts on posts of friends. Hiding posts sinks content from that person in News Feed rankings.

"Our goal is to create the best personalized newspaper for each of our readers," Backstrom said.

Facebook engineers are experimenting with ways for News Feeds to better handle chronological posts, such as a friend firing off play-by-play updates from a sporting event.

Backstrom's team meets each Tuesday to brainstorm ways to improve the Facebook News Feed, with worthwhile ideas tested internally among workers or with a tiny fraction of the social network's more than one billion members.

"It starts with intuition and then that gets written into code as a feature," said Cox. "Then we look at interactions."

Ads displayed as promoted posts in News Feeds are handled separately from content generated by people's friends or family members at Facebook, according to the ranking team.

"We figure out the most relevant News Feed with the organic content, and then, as a newspaper or television programme might do, we create advertising slots," said Facebook product manager Will Cathcart.

Backstrom compared the job of ranking News Feed posts to the challenge faced by internet search engines Google or Bing when it comes to quickly determining optimal results for queries.

"Facebook is one of the only places where you have a problem on the same scale as what Google or Bing is doing but you have to use different techniques because of the personal aspects of it," Backstrom said.

Sunday 4 August 2013

Usian Bolt Now Playable in Temple Run 2

 

The six-time Olympic gold medalist and so-called "fastest man on Earth", Jamaican runner Usian Bolt, is now a playable character in the mobile game Temple Run 2.

This is the first instance in which Imangi Studios, the game’s creator, has added a character based on someone in real life. Imangi Studios, called Bolt's addition to the game an "obvious and fitting partnership."

Bolt joins the game's cast of fictional characters as a 99-cent in-app purchase available from the game's "Upgrades" menu, wearing his signature yellow-and-green Olympic uniform. He also brings the unique power-up, "Bolt", when activated, the character auto-dashes at breakneck speed, immune from the game's traps, with the coin magnet.

"I am a big fan of Temple Run. I travel all over the world, and travel time gives me lots of opportunity to play Temple Run at airports or on car journeys," Bolt said. "It's exciting to see myself represented within a game I already play."

Temple Run 2 is free for iOS and Android


Saturday 3 August 2013

Types Of Hackers

This is How Google Defines Hacker

Q. Ever Wondered If there are type of Mobiles,PC's,Animals,People Then Are There Type of Hackers

Ans. Yes ,3 Major Types Lets Me Give A Brief Intro About Them.

1. White hat hacker                                 2. Gray hat hacker                         3. Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?

What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.

So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.

1. What Is A White Hat Hacker?

A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.

In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.


When computers appeared, this people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.

Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.

On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, Linux, a PC and an internet connection is all you need.

2. Grey Hat Hackers

A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.

For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.

If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.


Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers are not the only ones who go to this event. There are also computer journalists, computer security professionals, lawyers, and employees of the federal government. The event is composed by tracks of different kind, all of them related, in some way, to the world of hackers (computer security, worms, viruses, new technologies, coding, etc). Besides the tracks, there are contests that involve hacking computers, l ock picking and even robot related events. Ethical hacking, white hat hacking or whatever names you wish to use, at the end, it has a purpose: to protect the systems of organizations, public or private, around the world. After all, hackers can now be located anywhere, and they can be counted by the millions. Soon, concepts like white hat, linux operating system or grey hat will become common knowledge. A real proof of how much has our society been influenced by technology.

3. Black Hat Hackers

Black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals.
Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let's learn about black hat techniques and how they make our lives a little more difficult.
Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.


What Is Black Hat Hacking?

A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transfernces to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.

Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10'000,000 to Citigrou.


Interesting Windows Tricks And Hacks You May Find Interesting

Always Thought of Hacking And Cracking But Always Confused Where To Start With Let Me Help You To Boost You Towards Start.

>>Open COMMAND PROMPT while Locked by User.

>open notepad
>type www.command.com
> then save as cmd.bat at desktop
>then enter now its open.....enjoy

>>CracK BIOS Password

>Open the CPU
>Observe the Motherbord
>Remove the Silver Battery(3v)
>Wait 2 minutes and place the Battery
>>Restoring a Lost Desktop-
>Start
>Run
Type a period " . "
Then press Enter

>>If ur PC is hanged then do this.

Press shift+ctrl+esc or ctrl+alt+del
n den click on 'END TASK'
ur PC is runing now

>>create folder without name

>select any folder
>rename it
>press alt & type 0160 or 255
>enter

>>Turning off the Help on Min, Max, Close Icons

When the mouse goes over the minimize, maximize and close icons on the upper
right hand side of a window.

To disable that display:
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control Panel \ Desktop
3. Create a String Value called MinMaxClose
4. Give it a value of 1
5. Reboot

>>AUTO DELETE TEMPORARY FOLDER.!!

what i prefer is %temp% " without quotes.. at Start -> Run.. this opens ur temp folder n den u cal erase it nearly
First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in
that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

>>HIDE DRIVES

 How to Hide the drives(c:,d:,e:,f:...etc)

To disable the display of local or networked drives when you click My Computer.
1.Go to start->run.Type regedit.Now go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies

\Explorer

2.In the right pane create a new DWORD item and name it NoDrives(it is case sensitive).

3.Modify it's value and set it to 3FFFFFF (Hexadecimal) .

4.Restart the computer.

5.Now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created. Restart your computer. All the drives are back again.

>>Locking Drives:

We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.
Start & Run and type Regedit to open Registry editor
Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Create a new DWORD value NoViewOnDrive and set its value as

2^ (Alpha Number of Drive Letter-1) where Alpha number are simple counting of alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
To lock more drives, calculate the value of each drive and then set sum of those numbers as value
To unlock your drive just delete the key from the registry.

>>Locking Folders:

Consider you want to lock a folder named XXXX in your E:\, whose path is E:\XXXX.
Now open the Notepad and type the following

[code]ren xxxx xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D}[/code]
Where xxxx is your folder name. Save the text file as loc.bat in the same drive.
Open another new notepad text file and type the following

[code]ren xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D} xxxx[/code]
Save the text file as key.bat in the same drive.

Steps to lock the folder:
To lock the xxxx folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.

HOPE THIS TRICKS HELP YOU FOR INITIAL BOOST OF WINDOWS PC HACKING..........

STAY CONNECTED FOR MORE HIGH CLASS HACKING.........



Wednesday 31 July 2013

The Days Of Gigabyte Is Over

GƉANT has been upgraded to a maximum capacity of two terabits per second, with individual researchers and scientists able to enjoy connections of up to 100 gigabits per second.

        European scientists are pumping out an ever-increasing amount of data – just look at CERN’s Large Hadron Collider experiments for example – so here’s some welcome news for them: GƉANT, Europe’s research data backbone, has just completed a two terabits-per-second (2Tbps) upgrade.

         That’s a whopping amount of capacity for the network, which connects Europe’s national research and education networks (NRENs) with one another and also with overseas counterparts – in total, the network takes in 32,000 universities, schools, research institutes, hospitals and so on. And the result is just as impressive for individual researchers, who will now get connection speeds of up to 100Gbps each – that’s 1,000 times more than the pretty darned impressive cable connection I’m using as I type, and about 10 times the maximum they could hope for before the upgrade.

            The self-healing network offers capacity of up to 500Gbps today, with 2Tbps being the maximum that can be exploited in future. Entry into the terabit era will probably be necessary for handling the data spewing out of the Large Hadron Collider and other sources, including the upcoming Square Kilometre Array, the largest radio telescope ever, which is being constructed in South Africa and Australia.

            The upgrade meant renewing 50,000km (31,000 miles) of backbone, plus putting in new equipment – the backbone’s 500Gbps “super-channels” use Infinera’s DTN-X optical transmission platform, while the 100Gbps end-user speeds come courtesy of Juniper’s MX-series routers.