Did Your Code Ever Make Anyone Deaf ?
"Siemens AG anticipates additional costs from a software problem with new mobile phones that has led retailers to suspend sales. Five models of its new 65 series can emit a piercing melody into users' ears if the battery fails during a call, causing hearing damage in extreme cases, according to a statement."
29 August, 2004
28 August, 2004
Techtree.com�>>�Virus Snoops via Webcam:
The worm spies on users by taking control of their webcam and microphone, then sending images and soundtracks back to the hackers...With many home users keeping poorly-defended PCs in their bedroom, there is considerable potential for abuse....
The worm spies on users by taking control of their webcam and microphone, then sending images and soundtracks back to the hackers...With many home users keeping poorly-defended PCs in their bedroom, there is considerable potential for abuse....
25 August, 2004
Internet2: 2004 and beyond: Internet2 was developed by a consortium of universities and technology companies in 1996 to provide vast improvements in connection speeds. The goal of the project has always been to stay three to four years ahead of what is commercially available through the public Internet. The network itself is in its third generation of design. Earlier this year the backbone was upgraded to 10gbps (gigabits per second).
Most of the public Internet today uses 2.5gbps links, but some carriers are upgrading those links to 10gbps.
More than 227 universities, libraries, public schools and research institutions are connected to Internet2. The network connects to more than 57 international high-capacity networks. It provides a test-bed for new technologies such as IP version 6.
Most of the public Internet today uses 2.5gbps links, but some carriers are upgrading those links to 10gbps.
More than 227 universities, libraries, public schools and research institutions are connected to Internet2. The network connects to more than 57 international high-capacity networks. It provides a test-bed for new technologies such as IP version 6.
24 August, 2004
Software maker exposes hidden data:
Metadata, hidden information that can specify everything from a document's creator to deleted text, has become a growing risk for companies. British Prime Minister Tony Blair was embarrassed last year, when documents meant to bolster his cause for intervention in Iraq contained metadata with information that contradicted the official position.
Metadata, hidden information that can specify everything from a document's creator to deleted text, has become a growing risk for companies. British Prime Minister Tony Blair was embarrassed last year, when documents meant to bolster his cause for intervention in Iraq contained metadata with information that contradicted the official position.
09 August, 2004
RealNetworks plays to Linux developers
RealNetworks on Wednesday will announce plans to release the source code of its audio and video player to run on the Linux operating system.
The Seattle-based company will announce details of the code-sharing plan at the LinuxWorld Conference and Expo in San Francisco. With the source code, developers can build tailored versions of RealNetworks' audio-video player to run on Linux and Solaris systems. Linux is an open-source OS based on Unix; Solaris is Sun Microsystems' version of Unix.
The code release also complements RealNetwork's strategy to promote its multiformat system over proprietary systems, such as Microsoft's Windows Media. RealNetworks has taken this approach to recoup market share in the media software business that Microsoft has gained in recent years.
RealNetworks on Wednesday will announce plans to release the source code of its audio and video player to run on the Linux operating system.
The Seattle-based company will announce details of the code-sharing plan at the LinuxWorld Conference and Expo in San Francisco. With the source code, developers can build tailored versions of RealNetworks' audio-video player to run on Linux and Solaris systems. Linux is an open-source OS based on Unix; Solaris is Sun Microsystems' version of Unix.
The code release also complements RealNetwork's strategy to promote its multiformat system over proprietary systems, such as Microsoft's Windows Media. RealNetworks has taken this approach to recoup market share in the media software business that Microsoft has gained in recent years.
Wi-Fi phones make a splash
Early versions of Wi-Fi cell phones failed miserably because of the enormous drain on the batteries--which must support two chipsets rather than one--and because users were forced to manually switch between networks. But at least one phone maker, Motorola, now claims to have solved the automatic transfer problem. As a result, carriers are promising some dizzying scenarios by Christmas. For instance, a customer could start a call on an office Wi-Fi network, switch to a cell phone network as he or she travels outside the office building, then conclude the call on a home wireless network, all with no interruptions.
The only thing a consumer will notice is the change in the quality of the caller's voice--for the better if the phone is switching to a Wi-Fi network and for the worse if it's hopping onto the cell phone network.
"What's happening here is we're setting up two different IP addresses for the same call, and that's something that's never been done before," White said.
Early versions of Wi-Fi cell phones failed miserably because of the enormous drain on the batteries--which must support two chipsets rather than one--and because users were forced to manually switch between networks. But at least one phone maker, Motorola, now claims to have solved the automatic transfer problem. As a result, carriers are promising some dizzying scenarios by Christmas. For instance, a customer could start a call on an office Wi-Fi network, switch to a cell phone network as he or she travels outside the office building, then conclude the call on a home wireless network, all with no interruptions.
The only thing a consumer will notice is the change in the quality of the caller's voice--for the better if the phone is switching to a Wi-Fi network and for the worse if it's hopping onto the cell phone network.
"What's happening here is we're setting up two different IP addresses for the same call, and that's something that's never been done before," White said.
06 August, 2004
Image flaw pierces PC security:
Six vulnerabilities in an open-source image format could allow intruders to compromise computers running Linux and may allow attacks against Windows PCs as well as Macs running OS X.
The security issues appear in a library supporting the portable network graphics (PNG) format, used widely by programs such as the Mozilla and Opera browsers and various e-mail clients. The most critical issue, a memory problem known as a buffer overflow, could allow specially created PNG graphics to execute a malicious program when the application loads the image.
Among the programs that use libPNG and are likely to be affected by the flaws are the Mail application on Apple Computer's Mac OS X, the Opera and Internet Explorer browsers on Windows, and the Mozilla and Netscape browsers on Solaris
Six vulnerabilities in an open-source image format could allow intruders to compromise computers running Linux and may allow attacks against Windows PCs as well as Macs running OS X.
The security issues appear in a library supporting the portable network graphics (PNG) format, used widely by programs such as the Mozilla and Opera browsers and various e-mail clients. The most critical issue, a memory problem known as a buffer overflow, could allow specially created PNG graphics to execute a malicious program when the application loads the image.
Among the programs that use libPNG and are likely to be affected by the flaws are the Mail application on Apple Computer's Mac OS X, the Opera and Internet Explorer browsers on Windows, and the Mozilla and Netscape browsers on Solaris
02 August, 2004
Top jobs now in telecom, pharma : Hunting for a job? Read on. According to online job players, opportunities are slowly pointing at sectors like pharmaceutical, research and development (R&D), healthcare services, telecommunication and retail. Sunrise sectors infotech and IT-enabled services (including call centres) that created a boom in the job market continue to offer jobs but at a slower pace.
Another trend within the job market, as pointed out by Jobstreet.com, is the upward movement in jobs available in the IT and ITES sector. "Earlier, most of the job postings on our site within IT was for application programming (low-end work) but now the job postings for IT and ITES are also moving up the value chain," JobStreet.com India general manager operations and marketing Arijit Sarkar said. With the success of the Indian software and ITES industry, global companies are more confident in outsourcing high-end work to India. "These high-end areas are R&D in product development, embedded software and chip designing," Sarkar said.
Another trend within the job market, as pointed out by Jobstreet.com, is the upward movement in jobs available in the IT and ITES sector. "Earlier, most of the job postings on our site within IT was for application programming (low-end work) but now the job postings for IT and ITES are also moving up the value chain," JobStreet.com India general manager operations and marketing Arijit Sarkar said. With the success of the Indian software and ITES industry, global companies are more confident in outsourcing high-end work to India. "These high-end areas are R&D in product development, embedded software and chip designing," Sarkar said.
DNS opens networks to data attacks
The data will not normally be recorded or detected by network security, Kaminsky said, because it appears to just be legitimate DNS servers communicating with one another. "The user is not actually sending data outside the network," he said. "They (seem to be) requesting data from the local DNS server and it is sending it outside the network."
The data will not normally be recorded or detected by network security, Kaminsky said, because it appears to just be legitimate DNS servers communicating with one another. "The user is not actually sending data outside the network," he said. "They (seem to be) requesting data from the local DNS server and it is sending it outside the network."
IBM to make Java database open source
Raising its stakes in open-source software, IBM plans to create an open-source project around Cloudscape, a specialized Java database.As a Java-only database, it does not compete directly against mainstream relational database servers, such as DB2, Oracle or Microsoft's SQL Server, according to industry executives.
Still, the move to make its database products open source deepens IBM's commitment to the open-source development model. With its multibillion-dollar investment in Linux, Big Blue is credited with having made open-source technology more palatable to corporate customers.
Raising its stakes in open-source software, IBM plans to create an open-source project around Cloudscape, a specialized Java database.As a Java-only database, it does not compete directly against mainstream relational database servers, such as DB2, Oracle or Microsoft's SQL Server, according to industry executives.
Still, the move to make its database products open source deepens IBM's commitment to the open-source development model. With its multibillion-dollar investment in Linux, Big Blue is credited with having made open-source technology more palatable to corporate customers.
Subscribe to:
Posts (Atom)