Thursday, April 21, 2011

Why Apple Tracks You Via iPhone: It's Not Why You Think

Wondering why your iPhone and 3G-enabled iPad are storing your general location in an easily accessible database on your PC? It's simple. Apple uses this information to build a cell tower and Wi-Fi access point location database, and the company admitted as much last year. At least that's my theory. Let's take a look.

The iTracking "Scandal"

On Wednesday, two researchers released an open source application called iPhone Tracker that pulls data from a hidden location history database contained in your iOS device's backup files saved on your PC. The app then plots this location information on a map allowing you to see your phone's travels over the past year. Your iOS devices have been building this location database since iOS 4 was released in June of last year, the researchers say.

The data appears to be based on cell tower triangulation and not GPS. This means the location information is not pinpoint accurate, but only shows your general location. The researchers also discovered in the database a list of Wi-Fi access points that your device has been in range of during the past year.

The researchers don't believe this data is leaving your custody, but I disagree. My best guess is that it is leaving your device as anonymized and encrypted information that Apple then uses to build its cell tower and Wi-Fi access point database.

Here's why.

What Apple Said

In July 2010, Apple sent a letter to Reps. Edward J. Markey (D-Mass.) and Joe Barton (R-Texas) spelling out in detail what kind of location information Apple collects from device owners. Apple may "collect and transmit cell tower and Wi-Fi Access point information automatically [from your device]," the letter reads. "This information is batched and then encrypted and transmitted to Apple over a secure Wi-Fi Internet connection every twelve hours."

The letter was requested by the Congressmen after a Los Angeles Times report in late June 2010 said Apple had changed its privacy policy to allow the company to collect and share your Apple device's location information. You can find the letter to the Congressmen here.

Same File?

It's not clear if the location database the researchers found and the "batched" location information Apple takes from your device are the same file. But that seems very likely. I have sent a note to Apple about this and will update this post should the company reply.

The only troubling thing, however, is that Apple said in the letter that it encrypts your location data before sending it back to company servers. But the database on your computer is sitting there unencrypted in an easily discoverable location. This means the database is a potential target for malware or even law enforcement if the authorities should decide to seize and search your PC. Apple will need to do a better job of protecting this data in future iOS updates now that its existence has been well publicized.

What You Can Do

An important thing to note is that Apple says it will collect almost no location information from your phone if you don't have location services turned on. To adjust your preference open up your device's Settings app (the silver cog) and toggle 'Location Services' to 'Off' if you don't want to be tracked.

Even then, location information is only collected when you are using an application that requires your location such as Foursquare or Facebook Places, according to Apple. The only exception to this rule is that Apple will automatically collect cell tower information when your GPS-enabled device has location services turned on and is searching for a cellular network. Phones typically search for a network after dropping a connection or when first powering on.

Apple started building its own cell tower and Wi-Fi database after introducing iPhone OS 3.2 in April 2010. Previously, the company had used data from Skyhook Wireless and Google and still does for devices still running iOS 3.1 or older.

Your iPhone Records Your Whereabouts Secretly

Location based services are making the best of the GPS and A-GPS capabilities of modern day smartphones. The secret of those who've faking locations to win FourSquare Checkins to earn the Mayor batch using iPhones could be unleashed any time. Two Security Researchers - Pete Warden, Founder of Data Science Toolkit and Alasdair Allan, Senior Research Fellow, University of Exeter, have discovered that the Apple iOS 4.x mobile operating system keeps a log of user's location for iPhone and iPad. Even if you haven't been any using any of those location based services, the device still keeps a secret log of your locations along with timestamps on the device itself.

Nothing sounds creepier than the fact that you are being watched, secretly. According to Warden and Allan, the iPhone and iPad keeps a secret log file inside the iOS 4.X operating system with a log of user's location - latitude and longitiude co-ordinates along with the timestamp. According to both, the user's location datalog is stored in a file called consolidate.db and the entire location logging started from iOS 4.X update.

Allan wrote:
What makes this issue worse is that the file is unencrypted and unprotected, and it's on any machine you've synched with your iOS device. It can also be easily accessed on the device itself if it falls into the wrong hands. Anybody with access to this file knows where you've been over the last year, since iOS 4 was released.

As of now, both aren't openly speaking about how the device keeps a track of the location - using GPS or on cell-based triangulation.

Almost a Security Researcher Stefan Esser talked about the Address Space Layer Randomization to jailbroken iPhones and brought to light that jailbroken iOS devices were more prone to remote exploits than a non-jailbroken one. As Allan mentioned, the consolidated.db is unencrypted and unprotected so any nefarious hacker could get a copy of that file to track user location.

Apple iOS 4.3.2 did come with some security updates but as of now, there's no word on whether the consolidated.db file is encrypted/protected or not. Its not sure if Apple intends to store such data on the user's device.

It's not just Apple because even Android by default keeps the Location API for your Android turned on whenever the device is booted. Those who wish to check, can go to Settings>Applications>Services (common for most Android phones). Over there, you'll find Google's Map service active in them. Over here, premise is that the Android device supports A-GPS.

Take a look at the video where Warden and Allan talk about the iPhone's location logging.



Wednesday, April 20, 2011

MIT Turns Pile of Phones into a Big Display Screen

Imagine creating a large screen out of a collection of randomly scattered mobile phones - and that is what a team at MIT's Center for Future Civic Media has managed to achieve.

MT's Rick Borovoy released the Junkyard ­Jumbotron project, which allows laptops or phones in close proximity to be ganged together to form a large display.

The Junkyard Jumbotron requires no special software; it is simply a web page that receives real-time updates from their server, allowing scrolling, zooming, and soon video.

Rick developed the project as part of a larger suite of tools that he calls the Brown Bag Toolkit, all oriented around making technology work better with face-to-face interactions, like meetings, canvasing, or chance encounters.

The software is in a Beta stage, and released as an Open Source project.


New Technology Would Dramatically Extend Battery Life for Mobile Devices

Technophiles who have been dreaming of mobile devices that run longer on lighter, slimmer batteries may soon find their wish has been granted.

University of Illinois engineers have developed a form of ultra-low-power digital memory that is faster and uses 100 times less energy than similar available memory. The technology could give future portable devices much longer battery life between charges.

Led by electrical and computer engineering professor Eric Pop, the team will publish its results in an upcoming issue of Science magazine and online in the March 10 Science Express.

"I think anyone who is dealing with a lot of chargers and plugging things in every night can relate to wanting a cell phone or laptop whose batteries can last for weeks or months," said Pop, who is also affiliated with the Beckman Institute for Advanced Science and Technology at Illinois.

The flash memory used in mobile devices today stores bits as charge, which requires high programming voltages and is relatively slow. Industry has been exploring faster, but higher power phase-change materials (PCM) as an alternative. In PCM memory a bit is stored in the resistance of the material, which is switchable.

Pop's group lowered the power per bit to 100 times less than existing PCM memory by focusing on one simple, yet key factor: size.

Rather than the metal wires standard in industry, the group used carbon nanotubes, tiny tubes only a few nanometers in diameter - 10,000 times smaller than a human hair.

"The energy consumption is essentially scaled with the volume of the memory bit," said graduate student Feng Xiong, the first author of the paper. "By using nanoscale contacts, we are able to achieve much smaller power consumption."

To create a bit, the researchers place a small amount of PCM in a nanoscale gap formed in the middle of a carbon nanotube. They can switch the bit "on" and "off" by passing small currents through the nanotube.

"Carbon nanotubes are the smallest known electronic conductors," Pop said. "They are better than any metal at delivering a little jolt of electricity to zap the PCM bit."

Nanotubes also boast an extraordinary stability, as they are not susceptible to the degradation that can plague metal wires. In addition, the PCM that functions as the actual bit is immune to accidental erasure from a passing scanner or magnet.

The low-power PCM bits could be used in existing devices with a significant increase in battery life. Right now, a smart phone uses about a watt of energy and a laptop runs on more than 25 watts. Some of that energy goes to the display, but an increasing percentage is dedicated to memory.

"Anytime you're running an app, or storing MP3s, or streaming videos, it's draining the battery," said Albert Liao, a graduate student and co-author. "The memory and the processor are working hard retrieving data. As people use their phones to place calls less and use them for computing more, improving the data storage and retrieval operations is important."

Pop believes that, along with improvements in display technology, the nanotube PCM memory could increase an iPhone's energy efficiency so it could run for a longer time on a smaller battery, or even to the point where it could run simply by harvesting its own thermal, mechanical or solar energy - no battery required.

And device junkies will not be the only beneficiaries.

"We're not just talking about lightening our pockets or purses," Pop said. "This is also important for anything that has to operate on a battery, such as satellites, telecommunications equipment in remote locations, or any number of scientific and military applications."

In addition, ultra-low-power memory could cut the energy consumption - and thus the expense - of data storage or supercomputing centers by a large percentage. The low-power memory could also enable three-dimensional integration, a stacking of chips that has eluded researchers because of fabrication and heat problems.

The team has made and tested a few hundred bits so far, and they want to scale up production to create arrays of memory bits that operate together. They also hope to achieve greater data density through clever programming such that each physical PCM bit can program two data bits, called multibit memory.

The team is continuing to work to reduce power consumption and increase energy efficiency even beyond the groundbreaking savings they've already demonstrated.

"Even though we've taken one technology and shown that it can be improved by a factor of 100, we have not yet reached what is physically possible. We have not even tested the limits yet. I think we could lower power by at least another factor of 10," Pop said

As Smartphone Usage Rises, India SMBs Are Set to Spend US$173M In 2011

With the world spending more on smart phones, India SMBs are as well. With 54% of India medium businesses (MBs, companies with 100-999 employees) currently using these devices and a clutch of innovations on the horizon, smartphone penetration and spending are poised for growth. In 2011, India SMBs (companies with less than 1000 employees) are set to grow that spending to $173M, according to New York-based Access Markets International (AMI) Partners.

"At present many smartphone users in India do not use the data services that these phones offer," says Priti Verma, Research Analyst at AMI-Partners, Bangalore. "Insufficient data bandwidth is hindering usage of these services. With the advent of 3G spectrum we are observing an increase in the coverage that phone companies are able to offer and in turn smartphone penetration levels and data plan usage are on the rise," continues Verma.

Smartphone vendors can improve demand for smart phones by continuing to reduce prices as well as offering more and varied plan options. "Users prefer using only one device for presentations, email or downloading information," adds Verma. "This eliminates the need to have multiple devices such as a projector, computer and a phone when conducting normal business and personal transactions."

The landscape of mobile internet usage has changed to such an extent that in some cases the first internet experience is now through a mobile phone rather than a PC. "Search, financial services, sports, online trading and entertainment get a big share of smartphone usage," says Verma, "and people spend more time on smartphone entertainment than talking or sending messages."

Currently India SMBs' installed base of smartphones is less than one million with the maximum penetration of these devices understandably in the professional services vertical. Data show that India SMBs are planning increased spending on smartphone data plan services. With many more companies recognizing the advantages of using social networking, podcasting and micro-blogging, it seems natural that the adoption of the smart phone is on the rise throughout India.

As India continues to move towards a more mobile workforce, the smart phone will become an essential tool that all employees will require. With the improvement in the quality of navigation maps and simplification of licensing terms, phones with GPS capabilities are expected to become more in demand. And the emergence of open source operating systems and 2GHz processors will also help also boost smart phones. Looking forward, all of these changes together will forge a new paradigm of a true collaborative ecosystem.

More Than 1 Billion Devices to Have Embedded Wireless Networking Capability in 2011

Shipments of electronic products with embedded wireless local area networking technology (WLAN) will surpass one billion units for the first time ever in 2011 and then rise to more than two billion in 2015, as ubiquitous connectivity increasingly becomes a standard feature, new IHS iSuppli research indicates.

Shipments of consumer electronics, computer, communications and automotive products with built-in WLAN capability such as Wi-Fi will amount to 1.2 billion units in 2011, up 35.8 percent from 880.4 billion units in 2010. In 2015, shipments will nearly double from the 2011 level to reach 2.2 billion.

"In today's world of connected electronics, consumers expect seamless access to Internet communications, services and content in any place and at any time," said Dr. Jagdish Rebello, senior director and principal analyst for communications and consumer electronics at IHS. "From sharing Facebook news on their iPads, to viewing Hulu programs on their flat-panel TVs, to streaming audio and Video in cars with their automotive infotainment systems, consumers depend on built-in WLAN technology to get the most out of their electronic products. Because of this, embedded WLAN is becoming the norm for all kinds of devices."

In 2011, 19.7 percent of suitable devices shipped worldwide will have some form of embedded WLAN, up from 15.6 percent in 2010. By 2015, that percentage will rise to 28.1 percent.

The penetration of embedded WLAN has risen dramatically in recent years, expanding from just 1 percent of these devices in 2002.
IHS iSuppli research tracks 28 major categories of electronic products that are adopting WLAN technology. These devices include PCs, cell phones, digital cameras and camcorders, home and handheld video game consoles, televisions, set-top boxes and portable navigation devices.

Early adopters

Several product categories in 2011 already are expected to have 100 percent penetration for embedded WLAN, including media tablets, access point/routers and handheld video game consoles. Others are near 100 percent, such as mobile PCs and home video game consoles.

In terms of shipments, cell phones represent the largest category for embedded WLAN, with 512.8 million units set to ship this year. Mobile PCs will come in second at 230.1 million units.

Fast growers

During the next few years, the fastest growth in embedded WLAN will be generated by other categories of devices.

Leading the way will be automotive electronics head units, whose embedded WLAN penetration will rise at a compound annual growth rate (CAGR) of 98.2 percent from 2010 to 2015. The penetration of embedded WLAN technology in liquid crystal display televisions (LCD TVs) will rise at a Cagr of 77.8 percent from 2010 to 2015. By the end of 2015, a significant majority of LCD TVs will include embedded WLAN, up from 2 percent in 2010 and 9 percent in 2011.

Other fast-growing segments in the coming years will be digital camcorders and still cameras, DVD players and recorders, and e-book readers.

Click on images to enlarge


Global Unit Shipments and Penetration of WLAN Capability

MegaFon Selects Juniper Networks for Mobile Infrastructure

Russia's MegaFon has implemented Juniper Networks SRX Services Gateways and MX Series 3D Universal Edge Routers to deliver mobile Internet services. MegaFon's aim was to upgrade its NAT Gateways that provide access to the Internet for mobile subscribers and ensure a high number of simultaneous sessions in the main regions can be supported.

Running on the Junos operating system, the SRX Series can handle up to 10 million concurrent sessions and up to 120 Gbps of firewall throughput.

Deployment of Juniper Networks MX Series 3d Universal Edge Routers also enabled Megafon to simplify its core and edge network.

Juniper Networks' local partner on the MegaFon deployment was Inline, a specialized provider in mobile telecom services nationwide.

Upgrading Softswitch to Enable SS7 Interconnect Provides Hugely Efficient for Core Telecom

The flexibility and rapid enhancement of the SVI-C4 supported the continued growth of Core Telecom while allowing them to maintaining the highest levels of service quality.

Core Telecom is an independent Telecommunications Network, which specialises in supplying bespoke, industry leading inbound call solutions, specifically designed to improve the way companies handle their telephony infrastructure. Focused on providing premium Wholesale termination at competitive, stable, mobile and UK landline termination rates; as well as thousands of memorable Non-Geographic numbers, Core Telecom is able to provide Control, quality and differentiation to its clients.

In 2010 Core Telecom installed a single plane Class 4 soft switch, from Squire Technologies, for 'All IP' routing and protocol conversion, enabling IP Exchange interconnect with BT.

Core Telecom took advantage of the flexibility provided by the SVI-C4 by continuing to work with Squire Technologies with a remote upgrade. This delivered not only interoperability with SS7 but also a carrier grade system architecture that will expand quickly and efficiently into the future.

"Strategically planning our system development with a reliable partner, who has a product portfolio that is designed to expand and support our growing needs, has proven to deliver outstanding results. With unparalleled ease of integration with SS7, the system enhancing upgrade ensured our customers continue to receive the highest quality of service available. From a management perspective, using a single online management system (SVI-MS) to control multiple boxes and features has made integration into our organisation seamless", commented Mr. Sam Richardson, Senior Engineer, Core Telecom.

Simon Dinnage, Business Development Director of Squire Technologies added "As network dynamics evolve it is important for companies throughout the world to implement flexible solutions that will evolve and adapt to meet their ever changing needs. By providing cost effective, easy to migrate solutions, Squire Technologies is in a unique position to help support our customers as they grow."

As the 'All IP' world grows in dominance, providers need to build now with their future success in mind. By developing your system with a business partner that offers products designed to efficiently adapt and enhance telecommunications and NGN services it is the end user that benefits.

To find out how you can prepare for the future of quality communications, ask the experts at Squire Technologies.


People want iPads, not tablets

Ask anyone today why one should own a tablet and no one will be able to give a convincing answer. Then why are all those iPads virtually flying off the shelves? The answer is simple; people don't want tablets, they want iPads. Call it Apple's marketing genius or anything else but they managed to revive a dying segment and turn it into a profitable one. They made everyone take notice of it and now suddenly it is the hottest thing in the technological space. Yet, competitors are unable to match Apple's success in the segment, despite of the fact that on paper they offer everything that Apple's device does, at times even more. So what is not working for them?

The thing is, Apple has not created a demand for tablets, they have created a demand for iPads. In their ads they show cool people doing cool things with the iPad and people want to do those things the moment they see those ads. Apple's advertising has always been brilliant. They show people how to use their device. They never waste time boasting about specifications, which are meaningless to the general public, who form a rather large portion of the people who buy these devices.

In comparison you see other manufacturers boast about their high resolution displays, dual-core processors, RAM, basically stuff a common man won't understand. These things will appeal to the geeks but geeks actually form a very small portion of the people who buy these things. But show them a person sitting on a couch and browsing the web on an iPad with a mug of coffee next to him on a table and they get it instantly. They now know what to do with it, what to do with an iPad. They have no clue what they can or will do with a Motorola Xoom, for instance, because they don't show that in its ads. Apple didn't just tell people their device can do video call. They showed them people actually talking, connecting with each other through video over a distance using their devices. Now everyone wants to do that. Some people call this brainwashing, making it sound like it's something bad or evil but I think it is brilliant. Very few companies connect to their customers on the same emotional level that Apple does.

Apple iPad 2



And that's the reason why iPad's competitors are failing to achieve the same success as the iPad. Apple is telling their users why they should buy the iPad, not tablets, and others need to give a good enough reason why people should buy their tablet instead of the iPad in a manner that people understand. That's how you sell a completely new product to someone, tell them what they will do with it instead of just shoving specifications down their throat. No one needs to tell people what they can do with a car before they sell it; they already know that. But they will need to explain if they ever decide to sell a magic carpet, that too about that particular brand of magic carpet, not magic carpets in general or else people will go to your competitors if they know what magic carpets do and if someone else has a better model. The sooner other manufacturers realize this, the better for them. Or till then, people will continue to buy iPads, not tablets.

Relief Ahead for Mobile Networks As Traffic Moves Onto WiFi and Femtocells

New research has found that the majority of traffic (63%) generated by Smartphones, Tablets and Feature Phones will transfer onto the fixed network via Wi-Fi and Femtocells by 2015. This means that the annual mobile data traffic offloaded from operators' networks via WiFi and Femtocells is forecast to reach nearly 9000 petabytes (PB) by 2015.

Juniper Research found that the percentage of traffic offloaded in developed markets will actually diminish towards the end of the forecast period, and will begin to plateau in several other regions due to the accelerating take-up of LTE. Despite this, however, the volume of data traffic offloaded from mobile networks will continue to grow strongly throughout the next five years as the total volume of data traffic delivered to mobile devices accelerates.

According to Mobile Data Offload & Onload report author Nitin Bhas, "As a high percentage of mobile data consumption occurs while indoors or in motion, operators have an opportunity to offload data traffic onto complementary fixed networks via WiFi and Femtocells. Offloading also has the potential for creating new services and applications and enhancing the usage of existing services."

WiFi vs. Femtocell

Although currently WiFi accounts for over 98% of the traffic offloaded, Femtocells will account for a steadily increasing proportion over the forecast period. The highest penetration of femtocells for Data Offload will occur in North America.

Opportunities for Operators

The report recommends that operators view offloading solutions as being complementary to their 3G/4G network investments providing opportunities to seize market share and revenues from fixed line operators, extending their reach beyond mobile and making their 3G/4G business case profitable.

Other key findings include:

  • Total mobile data traffic generated by smartphones, featurephones and tablets to exceed 14,000 PB by 2015.
  • Mobile data offloaded via WiFi from operators' networks expected to reach almost 90% of total data offloaded.

Google Denies Tightening Control Over the Android OS

Google has hit back at widespread reports that it is trying to clamp-down on the divergence of the Android operating system saying that it is still committed to an open-source approach to the software.

Writing on the Android Developer's blog, Andy Rubin, VP of Engineering at Google said that the Android platform had spurred the development of hundreds of different types of devices - many of which were not originally contemplated when the platform was first created.

This fragmentation has been a concern to software developers, but it is a boon to the handset manufacturers who are able to personalise their handsets and avoid becoming just manufacturers of "beige boxes".

However, Rubin did confirm that if someone wishes to market a device as Android-compatible or include Google applications on the device, then the company would require the device to conform with some basic compatibility requirements.

"Our 'anti-fragmentation' program has been in place since Android 1.0 and remains a priority for us to provide a great user experience for consumers and a consistent platform for developers." he wrote - trying to counter reports that the apparent clamp-down on handset manufacturers was a recent issue.

"Our approach remains unchanged: there are no lock-downs or restrictions against customizing UIs. There are not, and never have been, any efforts to standardize the platform on any single chipset architecture."

On the issue of the lock-down of the Honeycomb release which sparked much of the initial speculation, he confirmed that the software would be released as open-source, but not until "it is ready".

Android OS Fragmentation Issues Fading

Concerns about device fragmentation in the Android OS market seem to be dying down as increasing numbers of existing smartphone owners upgrade their OS to the latest versions. The number of handsets detected by the Android Market running the older versions 1.5 and 1.6 have now fallen below the 10% mark

Apple's Steve Jobs famously said that device and OS variances in the Android platform would be a problem for developers, although Motorola countered by saying that some limited fragmentation is actually a good thing as it offers consumer choice.

The Android OS is certainly quite good at internally managing the issues of differing screen sizes between handsets - a problem that bedeviled J2ME and MMS services.

Platform API Level Distribution
Android 1.5 3 3.0%
Android 1.6 4 4.8%
Android 2.1 7 29.0%
Android 2.2 8 61.3%
Android 2.3 9 0.7%
Android 2.3.3 10 1.0%
Android 3.0 11 0.2%

Data collected during two weeks ending on March 15, 2011

Intel Confirms Plans to Support Android OS for Tablets

Intel has confirmed that it will develop chips that support the Android OS for tablets and will start shipping chips for use in smartphones within the next 12 months.

Intel CEO, Paul Otellini confirmed that the company has received the source code from Google for the Honeycomb release of the Andoid OS, which is optimised for use on tablet devices. Google had­ been holding back on releasing the source code except for selected handset manufacturers.

Mr Otellini said the company was working with Google, Microsoft's Windows and still developing the MeeGo platform which it was working with Nokia on before it dropped the project in favour of the alliance with Microsoft.

The company made the announcement about the Android OS during the release of its financial results, where it reported a 29% rise in first-quarter profits to US$3.16 billion, whilr erevnues rose by 25% to US$12.8 billion.

The company said strong spending by businesses on new computers helped the company overcome a serious product design error and supply chain disruption from Japan's recent earthquake.

Cisco merges Wi-Fi mgmt interfaces

Cisco is taking strides to automate service provisioning, security and access control across mobile devices with a more integrated management suite that will eventually usurp the company's Wireless Control System (WCS) platform.

Cisco Prime Network Control System (NCS), scheduled to be available in June, is a Wi-Fi component of Cisco Prime for Enterprise, a set of integrated network management modules announced today that Cisco says converges user and access management of wired and wireless networks.

IN DEPTH: Cisco enterprise management tools take on new network realities

NCS will integrate what are currently separate interfaces for the WCS, Cisco Mobility Services Engine (MSE) location appliance, Cisco LAN Management System (LMS) and Cisco Network Admission Control (NAC) appliance, says Greg Beach, director of product management in Cisco's wireless networking business unit.

The announcement comes about a month after Cisco competitor Aruba Networks announced that it, too, was smashing down wired and wireless management silos with its Mobile Virtual Enterprise (MOVE) architecture.

Cisco's Beach describes NCS as an "evolution of WCS. We're moving from box management to focusing on end points and [having] one inventory for wired and wireless clients," he says.

That said, however, the company's new Identity Services Engine (ISE), intended to allow centralized, cross-domain policy setting and enforcement, remains a separate platform from NCS, he acknowledges.

Beach describes NCS as being focused on endpoint visibility and troubleshooting to get users back on line as soon as possible. Policy setting and configuration, however, require a separate log-on to the ISE, he says. ISE collapses access control and network admission control (NAC) functions.

NCS will cost $14,995 plus licensing, and the ISE will be $9,900 plus licensing based on number of end points, Beach says.

Thursday, April 14, 2011

Announcing Symbian Anna aka ‘PR2’

Today we launch the Nokia X7 and Nokia E6, both of which come with a renewed version of the Symbian operating system. This version – which has been referred to previously as PR2 – is now known as Symbian Anna. It comes with a faster browser, improved text input, fresh, new icons and the latest version of Ovi Maps. Symbian Anna will also be made available for owners of the Nokia N8, C7, C6-01 and E7 in the coming months.

The most obvious and visible feature of Symbian Anna is the new icons.

Text input has also been improved: there’s the long-awaited portrait QWERTY input, plus a split screen when entering text into web pages and apps, so you don’t lose sight of what you’re filling in.

The browser now offers faster performance and is easier to use.

The usability of the photo gallery has also been improved.

For business users, the update also includes instant messaging with Microsoft Communicator Mobile, email enhancements that include full meeting request support and hardware-accelerated device encryption.

For version watchers, the application versions available in Symbian Anna are:

Enhanced Browser (v7.3): high value touch UI improvements, including URL entry bar, always visible ‘Go Back’ and extended toolbar buttons and search-integrated address field; better user responsiveness, faster history navigation and page loading, split screen virtual Qwerty keyboard.

Enhanced Ovi Maps (v3.06): smarter search; Check-in to Facebook, Twitter, Foursquareor local social networks; ability to share places via email and SMS, and also with friends using non-Nokia phones; public transport network lines view; update and download full country maps via WLAN

Enhanced Ovi Store (v2.06.xx): increased file size limits for downloading over WLAN

Enhanced Social (v1.3): status updates in contact card, ability to retweet and view follower list in Twitter, higher resolution image uploads, ability to add caption to images

Enhanced Ovi Suite (v3.x): works seamlessly with the latest version of Ovi Suite to update the device software, download free street maps, download new music and discover the latest mobile apps, back up the device to keep content safe, and sync content with Ovi.

For Developers:
Flashlite 4
Java Runtime 2.2
Qt Mobility 1.1
Qt4.7

Symbian 'Anna' Official

The long-rumoured Symbian update, called Anna, has finally been made official by Nokia today, bringing with it a new browser, new icons, an on-screen portrait qwerty keyboard, and more. The Finnish Windows Phone OEM (sorry) also launched two new Symbian phones today.

The update includes new icons, a portrait on-screen qwerty keyboard, and a new web browser. The Ovi Maps application as also been updated, and several enterprise features have been added such as hardware accelerated encryption and several other additions related to security and messaging. Also: homescreen navigation is now real-time.

Nokia also announced two new Symbian phones today. First, the Nokia E6, which has a 326ppi display on a qwerty portrait phone. This device is squarely aimed at business users, and I can assure you, at least here in Europe these things are still incredibly popular. I had a E71 myself, and even in the days of the iPhone and Android, it was still quite pleasurable to use.

The second one is the Nokia X7, a 4" touchscreen phone, which looks incredibly beautiful.

So, despite going Windows Phone, Nokia is still getting some Symbian updates out the door, which is good news for owners of the N8, E7, C7 and C6-01, who will be getting this first update over the coming months.

Android Handsets Specification Comparison



The Rs. 20,000 to Rs. 30,000 price range has suddenly become very exciting because of all the new Android phones that are pouring in thick and fast. For a prospective buyer, this is both good news as well as bad news. Good news because he now has a choice; bad news because there are too many options to choose from.

Each of these phones differs from one another by one or two features. It becomes difficult to keep track of these things and even if you use a compare engine the task becomes tedious because of the sheer number. So we decided to club all of these high-end smartphones into a table and list out all the important specifications, so that it is easy to compare. Some of these handsets are currently on sale in India, whereas others are yet to launch but worth keeping an eye out for.

Since these are just the specifications, we would advise not to make your buying decision solely based on them, but also have a hands-on with the phone or read/watch online reviews before committing to any of them.
This table is only for high-end phones but we may even come up with a similar one for mid-range and low-end Android phones too. Do let us know what you think about this chart, if it requires any additions or if you spot any errors.



Click on the image to view it in full size. If you are unable to view the image above, click here.

Please note that we are constantly updating the image above to correct any errors or add extra parameters as we come across them. Hence, we would advise not to save the image on your computer.



How The First Man Went Into Space

A story of how the space race propelled the first man into space 50 years ago.

Space and its wondrous objects have always held a fascination in man's mind since time immemorial. Exploring the moon and planets and visiting others world has always caught the fancy of every human being. But that dream lingered on through the ages and it took the determination and the race between two men to realize that dream. Today, on the 50th anniversary of the launch of first man in space, we will tell you how the story began.

While the story begins as the space race between two World War II allies started, you first need to know about the individuals who deserve credit for the seemingly unattainable feat.

Konstantin Tsiolkovsky



Konstantin Tsiolkovsky was a Russian rocket scientist who is considered one of the founding fathers of rocketry and astronautics. Born deaf and partially blind, he self taught and theorized ways for man to explore space by using multistage rockets fueled by liquid oxygen and liquid hydrogen. His mention is important because his works served as an inspiration and his ideas were put into practical use by future generations of rocket scientists around the world and most prominently, the two pioneers of rocket science - Sergei Korolev of the USSR and Wernher von Braun of Nazi Germany. Sergei Korolev and another Soviet rocket scientist Valentin Glushko studied his works as youths. It has been known that von Braun possessed a copy of one of his books and almost every page had annotations by von Braun.

Sergei Korolev



Sergei Korolev was one of the top most Soviet rocket scientists and pioneer of his time. He and his group of fellow engineers had already launched the Soviet Union's first liquid propelled rocket as early as 1933. He had a dream of man exploring space in general and Mars in particular. Just as his career was taking off, he was incarcerated in the gulag on false charges during the Great Purges of the late 1930s, he was sentenced to 10 years hard labor imprisonment and it seemed that his dream of space exploration would never be fulfilled. But by 1942, the Soviet Union needed someone capable of leading the fledgling space programme and Korolev was the only person deemed capable of that responsibility. Accordingly, he was released and made the Chief Designer and worked with Valentin Glushko who served as rocket engine designer.

Wernher von Braun



Wernher von Braun was a leading German rocket scientist under the Nazi regime. He also shared Korolev's dream of manned space exploration and was a rocket scientist par excellence. His talent for rocketry was soon recognized by the Nazi leadership and he was recruited to develop rockets to be launched to enemy territory. Thinking that he will eventually be able to convince the leadership to let him design rockets for manned space exploration, he did not resist the offer. He was the mastermind behind the development of the dreaded V-2 rocket, poised to snatch victory for Nazi Germany. The V-2 could reach over four times the speed of sound and could go past the stratosphere, taking just six minutes to travel the 200 miles to London from Peenemunde on the Baltic coast and was unstoppable at that time.

How it all began


V-2 rocket

Not enough number of V-2 rockets could be made to save Germany from defeat. With defeat appearing imminent, von Braun was asked by the SS to destroy the blueprints for the V-2 rocket design to prevent them from falling into enemy hands. Determined to not let his lifelong dream crumble in this way, Von Braun got the blueprints hidden in an abandoned quarry so he could retrieve them later. The Americans knew about von Braun and his V-2 rocket and were in pursuit. While they did not get their hands immediately on von Braun, they did manage to locate the abandoned V-2 factory. Eventually von Braun surrendered to the U.S. led allied forces and was taken with several of his associates to Fort Bliss in U.S.A. in what came to be known as Operation Paperclip. Needless to say, the Americans had plans to use his expertise in rocketry to their end.

With the Germans getting defeated in the war, the Soviet Union entered the race to get their hands on the German V-2 rocket, which was the deadliest and unstoppable weapon of that time. Germany was divided into eastern communist region governed by the Soviet Union and western democratic region governed by the Americans and allies. With von Braun already falling in American hands, the Russians were left to salvage whatever they could to get their own version of V-2. Accordingly, they sent Korolev, Glushko and Vasiliy Mishin (yet another rocket engineer) to study what was available. At the same time, the remaining 150 German rocket engineers in Soviet occupied Germany decided to join Korolev's efforts to manufacture a V-2. Lacking any blueprint, they painstakingly took two years to create new blueprints for parts of the V-2 by way of reverse engineering. The Soviet V-2, designated R-1, was ready in September 1948, but the failure rate was very high - of the eleven launched, only five hit the target. Incidentally, this was the same ratio as that of the German V-2, thus proving how unreliable this design was.

Failure, frustration on both sides, but the fight continues

Meanwhile, things weren't looking good for von Braun either, because the Americans were not really showing any interest in his rocket designs. He met with frustration when it became known to him that the U.S. Navy was instead planning to launch missiles from their submarines, disregarding his rockets completely. Failing to get any Von Braun tried to get public support for his rocket project.

In the Soviet Union, fed up with the constant failures, and coming under increasing pressure from the Politburo, Korolev decided to let go of the V-2 and instead to build a rocket of his own design. The rocket he envisioned was a multi-stage rocket so that it would automatically keep on losing stages and getting lighter as it ascended. For that, he needed Glushko to design a rocket engine with more thrust. The authorities wanted an intercontinental ballistic missile (ICBM) rather than a vehicle to transport humans into space, because they wanted it to be instead able to deliver a five ton warhead to American soil. Korolev took the bet and decided to build such a rocket with the actual goal of sending a satellite into space. For that, he needed help from the leading Soviet rocket engine designer Glushko. Since one engine could not possibly carry such a rocket, Korolev suggested the use of a cluster of four engines strapped to the main body of the rocket. Once the rocket attains sufficient speed and altitude, these four were to drop away and the central engine with a lighter weight would take over. The problem to solve was that these four rocket engines should fire simultaneously. The rocket thus developed was named the R-7.


R-7 rocket

In America, Wernher von Braun was held back in his efforts to develop a rocket due to competition from the U.S. Navy and was limited to create rockets with short range, rather than the long range ones he wished to create to be able to launch a satellite. Eventually in 1956, von Braun was allowed to create the Jupiter C rocket capable of launching a satellite, but to carry warhead. This was far less powerful than Korolev's R7, but could have launched a small satellite. To prevent von Braun from launching a satellite secretly before the U.S. Navy, Pentagon inspectors monitored the launch. The rocket reached an altitude of 682 miles, which could have actually allowed the U.S. to launch the first satellite.

While the world and Korolev knew about von Braun and his plan to launch a satellite, Korolev's identity remained a state secret. Alarmed that von Braun may launch a satellite before him, Korolev exhorted Soviet premier Khruschev to allow him to launch a satellite instead of a warhead, by telling him that it can be used to spy over any place on Earth. Most importantly, he stressed that if they don't, the Americans would launch it before them and they can later use a warhead in place of a satellite if required. Unknown to Korolev, von Braun faced tough challenges to his rocket programme and was unlikely to be allowed to launch a satellite.


he Soviets score a psychological victory



On October 4, 1957, the Soviet Union launched the first manmade satellite into space using the R-7 rocket with clustered boosters. This was quickly followed a month later on November 3, 1957 by Sputnik 2 carrying the first living creature to space - a female dog called Laika.

Shocked by the development and frustrated at being held back by the Pentagon, von Braun even resorted to divert some of the components provided by the government to slowly and secretly build a rocket to launch a satellite. But in April 1959, the newly created NASA decided to give him the go ahead to be able to launch the first astronaut. Seven test pilots known as Mercury 7, were selected, of which one would go to space. The Atlas rocket was chosen as the rocket to take America's first man into space, but it continued to fail, prompting NASA to choose an old U.S. Army missile called Redstone. Wernher von Braun tried to modify the Redstone to be able to carry man to space, but the rocket vibrated severely when reaching supersonic speeds and was unsuitable for the purpose.

The Soviet Union shocked America again by launching the Luna 2 in September 1959 to become the first spacecraft to reach the surface of the moon.

Hunt for the first man to space

In 1959, Korolev got the go ahead to launch a man into space. He decided to choose an astronaut and stated that to be eligible, the candidate has to be aged around 30, with height less than 170 cm, weight less than 70 kg, but most importantly, he must be a man with a broad smile on his face. Throughout Russia, the hunt for a spaceman to match Korolev's specifications was launched by military experts. This was kept so secret that even those chosen do not know what they are being chosen for. All twenty selected candidates were put under extreme physical tests, taking some to the brink of death.

A final six, known as the Sochi Six, was chosen eventually and it was now up to Soviet aviator Nikolai Kamanin to decide who would go to space. The Vostok 1 capsule was to be used to take the cosmonaut to space. Even at this point of time, Korolev was facing a challenge from other rocket groups, namely from his associate as well as rival Glushko. It was necessary for Korolev's team to succeed to be able to secure the funding for his space programme and to launch the first man in space. In order to secure the contract, he planned a historic mission to bring the first living creatures back from space. Belka and Strelka were two dogs sent to space in August 1960 and they safely returned back to Earth. Now that he proved it possible to bring back living creatures back from space, it was time to send a man to space.

Final efforts on both sides of the iron curtain

Von Braun had prepared a modified version of the Redstone rocket, which he test-launched in November 1960. But it had problems and failed to ignite the booster rocket. Only the escape tower got launched in a humiliating public display. Alan Shepard was chosen to be the first astronaut to achieve sub-orbital flight on 6 March, 1961. The next Redstone flight on 31 January, 1961, carrying a live passenger - a chimp, narrowly averted disaster and the chimp returned safely. Notwithstanding the Soviet competition, von Braun decides against risking the life of an astronaut in the still shaky Redstone rocket, thus eliminating any competition for Korolev to send his cosmonaut first to space.

In the USSR, 27 years old Yuri Gagarin was selected to become the first cosmonaut. But Korolev was yet to perfect his rocket too, especially the re-entry part, so that the passenger returns safely back to Earth. Two more attempts with dogs result in disaster. If the problems are not rectified and they go ahead with a flight, this could be Gagarin's fate. They decide to go ahead with the flight on 12 April, 1961.


Vostok 1 is launched, Yuri Gagarin becomes the first man in space

At 9:06 am local time on 12 April, 1961, the Vostok 1 lifted off with cosmonaut Yuri Gagarin to take the first man to space. Within 3 minutes of the liftoff, the central booster accelerates the Vostok 1 to 17,500 miles per hour. After 5 minutes, Gagarin became the first human to ever look back on our planet from space. Gagarin described seeing Earth and cumulus clouds from his capsule porthole. Nine minutes later, he experienced weightlessness.


Yuri Gagarin aboard the Vostok 1 space capsule

Thirty minutes after the launch, the Vostok 1 with Gagarin was on the night side of the Earth over the South Pacific. Calculations for re-entry were made after just about an hour for the capsule to safely enter the atmosphere and return to Earth. If the orbit was too steep, the capsule would be burnt out, if too shallow and he would move into a higher orbit and get lost in space. The retro rockets were fired to propel the capsule back towards the Earth along the calculated descent.


Vostok 1 space capsule

In a last minute glitch, the retro rocket service modules failed to separate from the capsule and the capsule hurtled towards Earth. At the last moment, the service module separated from the capsule by the cable connecting the two being burnt up by heat during re-entry. Gagarin ejected from the capsule four miles above the Earth mid-air and landed safely at a location far from the intended location.



In his 108 minutes flight, Gagarin had traveled 25,000 miles and become the first human to orbit Earth.

Soon after this, Alan Shepard became the first American in space, Alexei Leonov became the first person to do EVA (Extra-vehicular Activity) or spacewalk, Russian cosmonaut Valentina Tereshkova became the first woman in space and Neil Armstrong became the first human to set foot on the moon. It has been 50 years now that this landmark was achieved and over 500 human beings have since been to space. This event will always be remembered for paving way for future manned space missions for the benefit of humanity.

Monday, April 11, 2011

How Tech Company Logos Evolved

A company's corporate logo is something that becomes a symbol of the company and the company starts getting identified by that logo. It is this power of identity that makes us instantly recognize a brand by just glimpsing at its logo. Corporate logos of almost every technology company have changed over the course of years and that is what we are going to have a look at today.

Apple

Apple Computer Corporation had its humble beginnings in 1976 when it was established by three individuals - Steve Jobs, Steve Wozniak and principal investor Ronald Wayne.

apple newton logo



At its inception, Apple had a very complicated logo designed by co-founder Ronald Wayne, with a picture of Isaac Newton sitting under an apple tree with a phrase from Wordsworth: "Newton 'A Mind Forever Voyaging Through Strange Seas of Thought Alone." This logo was used during the era of Apple-1 and it made Jobs think that the complex logo may be one of the reasons for the low sales of the Apple-1.

apple rainbow logo



Soon they had to prepare for the display at the first West Coast Faire (a technology trade show) and it was important to have a brand new logo that reflected all that Apple stands for - simplicity and great design. A young art director, Rob Janoff was assigned this task.



Since Apple computers were distinguished from the rest by their ability to display many colors, Rob made this new logo of an apple in colorful horizontal stripes of rainbow colors and with a bite taken out of it on one side. Though it is rumored that this bite taken out of the apple was to signify that this is from the world of "bits and bytes", Janoff has stated that he did so to prevent this apple from appearing like a cherry tomato. The apple design was, obviously, taken from the name of the company. The resulting logo was a lot more attractive and eye-catching and it stayed so until 1998.

Apple launched its new iMac in 1998 and with it, they wanted a new logo to suit the sober-looking lineup of its products. While the apple with a bite taken out of it remained, the rainbow color went and got replaced by a gradient chrome silver color which is currently in use.

Canon

Canon had recognized the importance of having a global presence right from the start and that can be seen from its logos from that time. This company actually hired a specialized advertising designer to create its logo and used a typeface that was never used before in Europe or America.

Its first camera was launched in 1934 and named Kwanon, which was the Buddhist goddess of mercy. The logo included the words Kwanon and a picture of the goddess with several arms and flames.

canon logo



Just like other companies, Canon also tried to simplify its logo and at the same time make it as noticeable as possible. Canon trademarked its new logo in 1935, but it still kept on evolving to make improvements in its design to make it more balanced. This evolution of the Canon logo went on till 1956, when the logo assumed its form that we are familiar with today.

Google

The search giant we know as Google was founded in 1996 by two Stanford University computer science graduate students Larry Page and Sergey Brin. The name is derived from Googol, which means one followed by 100 zeros. Sergey Brin, who had self-taught the free computer graphics program GIMP, created the first logo in rainbow colored Catall BQ font for his company in this program and later even added an exclamation mark to it to mimic the Yahoo! logo (as Yahoo! was the major search engine of that time).

google logo



In 1999, Google hired Stanford's Consultant Art Professor Ruth Kedar to design the now famous Google logo. Ruth Kedar says, "There were a lot of different color iterations. We ended up with the primary colors, but instead of having the pattern go in order, we put a secondary color on the L, which brought back the idea that Google doesn't follow the rules."

The last overhaul that this logo received was in 2010, when it used a typeface similar to the previous logo, but featured a distinctly orange colored "o" in place of the previously yellowish "o". Also, there was a subtle shadow rendered in a different shading style.
IBM

IBM as a company was formed in 1911 as the Computing Tabulating Recording Corporation (CTR) because it was actually a merger of four companies: the Tabulating Machine Company, the International Time Recording Company, the Computing Scale Corporation and the Bundy Manufacturing Company and hence such a complicated and long name. Therefore, the early logo of this company had the letters ITR, which was a major part. Just after this merger, the logo was changed to reflect the change and it contained both ITR and CTR initials in 1911.

CTR adapted the new name International Business Machines Corporation in 1924, and hence the old logo had to be replaced with a new one. The old logo with the ornate rococo font was replaced by one in which it was written Business Machines in san serif font, written in the form of a globe and the word International as its equator. This suggested a more global role for the company.

ibm logo



With the advent of computing, IBM decided that it was time to change more and adapt to the new technology. It decided to do away with it its punched-card tabulating system and favor computers. The new logo sported a Beton Bold font.

Then in 1956, company CEO Thomas J. Watson, Sr appointed Tom Watson, Jr. as the CEO, before he died. The new CEO had a different vision for the company and so he decided to change the logo one more time. Paul Rand was hired to design the new logo in such a way that it would be subtle and will appear more grounded and solid and exuded confidence.

After this, Paul Rand made one more change to the logo to reflect speed and dynamism of the company. The solid font was replaced by stripes. This logo has been since used in IBM.

Kodak

Kodak understood the importance of brand recognition as it was the first company to integrate its name and looks into one symbol when it started in 1907. Since 1935, Kodak started incorporating its complete name in its logo which predominantly contained the colors yellow and red to make it eye catchy.

Kodak tried to introduce a flip page as a logo in 1960. In 1971, that logo design was dropped in favor of a complicated design in the form of a box and graphic "K" element. In 1987, Kodak changed the fonts of this logo to make it more contemporary, but retained the overall design.

Following a general trend of companies trying to simplify their logo designs, Kodak too decided to simplify its logo in 1996 by removing the boxes. This 1996 logo was given a slight facelift in 2006 by replacing the "a" and "d" to a more rounded and contemporary form.

kodak logo


A company's corporate logo is something that becomes a symbol of the company and the company starts getting identified by that logo. It is this power of identity that makes us instantly recognize a brand by just glimpsing at its logo. Corporate logos of almost every technology company have changed over the course of years and that is what we are going to have a look at today in part 2 of this series.

LG



The Korean company we know today as LG had its humble beginnings as a merger of two different companies owned by Koo In-Hwoi - Lucky (Lak-Hui), which was a chemical cosmetic company, and Goldstar, which was a radio manufacturing plant. Known as Lucky Goldstar since then, the company was renamed as LG Electronics in 1995.

The LG logo in use today is of symbolic importance to the company. According to LG, the letters "L" and "G" in a circle symbolize the world, future, youth, humanity and technology. The red color represents friendliness along with a strong impression of the company's commitment to the best.

The circle symbolizes the globe, the stylized image of a smiling face conveys friendliness and approachability, while the one eye conveys goal-oriented, focused and confident. The LG Grey represents technology and reliability. The logo is asymmetrical and it has been deliberately created thus to represent the creativity and adaptability to changes of this company.

While it is a well-known fact that LG stands for Lucky Goldstar, the company now denies it and rather states that it stands for "Life is Good" or simply LG.

Microsoft



When Microsoft was founded in 1975 by Bill Gates and Paul Allen, the first product of this company was the computer language BASIC. Being a software company and since the software runs on hardware based on a microprocessor, they named this company taking the first few letters of the word microprocessor and software to create Micro-Soft (with a hyphen separating the two words). The company logo was also designed to reflect the name of the company at that time.

They decided to drop the hyphen in the same year and rename the company Microsoft, and in the process also changed the logo accordingly. The new green Microsoft logo with an artistic O (nicknamed "Blibbet" by company employees) was used till 1987 as the company logo.

Microsoft decided to introduce a new corporate logo in 1987 and did away with the "Blibbet" (causing Dave Norris to run an internal joke campaign called "Save the Blibbet"). Nevertheless, the company had made up its mind to get a new logo designed by Scott Baker using Hevletica italic typeface. The slant was an indicator of motion and speed. This came to be known as the "Pacman logo" because the O in this logo looked like the video game character Pacman, with a distinctive cut, to subtly differentiate between the Micro and Soft part.

Microsoft added the tagline "Where do you want to go today?" to this logo below the original logo in 1994. Microsoft retained the logo design, but opted to change the tagline in 2006 to "Your potential. Our passion" with the tagline also written in italics typeface. In 2011, Microsoft yet again changed its tagline to "Be What's Next." and this tagline is in normal typeface.

Mozilla Firefox



When Dave Hyatt and Blake Ross first created the open source browser in 2001, they named it Phoenix and this is visible in its first logo. But there were some trademark issues which forced them to change the name of their browser to Firebird, which allowed them to retain the original logo since the meaning is the same.

When it was later found out that even the name Firebird was already trademarked, they had to quickly find an alternative name. They decided to name it Firefox in 2003 and that name was the final name of this browser. Accordingly, they got the logo changed by professional interface designer John Hicks to a Firefox engulfing the blue globe representing the world. Was it a play on the Microsoft Internet Explorer logo getting engulfed by this new promising browser? We do not know.

Nevertheless, this has remained the logo of the Firefox browser since then and has changed very little, save for some colors of the continents using a lighter blue color to be able to differentiate the oceans from the land mass.

Nokia



In Finnish, the word "Nokia" means a dark and furry animal called the Pine Marten weasel. The name of the company Nokia came from the company set up on the banks of the river Nokiavirta in the town of Nokia in 1868 by Knut Fredrik Idestam as a second groundwood pulp mill in his new business established in 1865. Nokia has therefore been in the communication business right from the start as this company manufactured paper, which was a major means of communication back then.

It is not exactly known if it is really true, but it is generally believed that since the company was situated on the banks of the Nokiavirta river, the first Nokia Company logo was that of a diving salmon fish, possibly from that river.

Finnish Rubber Works was founded in 1898, which would eventually become part of Nokia and along with Nokia Ab and the Finish Cable works, would form Nokia Corporation in 1967.

The current slogan of Nokia - "Connecting People", which is part of its present logo, was invented by Ove Strandberg.

Xerox



At its inception in 1906, the company Xerox Corporation was known as The Haloid Photographic Company, which manufactured photographic paper and equipment. In 1938, Chester Carlson invented a technique called xerography, now known as the photocopy technique. Despite his persistent efforts, he could not find a financer for his invention. Being turned down by the big giants such as IBM, GE and RCA, Carlson turned to The Haloid Photographic Company, which decided to back his invention. The company made the first photocopying machine named Haloid Xerox 14.

The company's name was later changed to Haloid Xerox in 1958. You will notice in the company logos, that the original word Haloid, which used to be prominent in earlier logos, was gradually replaced in prominence by the word Xerox in the 1948 logo and in the 1949 logo. Haloid Xerox made a brief appearance in the logo in 1958, but was dropped three years later when it was completely replaced by Xerox in 1961. This was due to the unprecedented success enjoyed by the photocopying machines named thus.

Xerox retained this logo from 1961 to 2004. In 2004, Xerox decided that it does not want to be associated just with photocopy machines as had been happening over the years; they wanted to diversify. They changed the logo just a little bit by removing the words "The Document Company", while retaining the rest of the logo.

Since they had already decided to get away from the complete association with photocopying machines, in 2008 they changed the font of the logo and added a ball with a stylish X.



Thursday, April 7, 2011

A Glance at Windows Intune

These days most homes and offices have both desktops and laptops. But managing and securing both systems can be become quite tedious. Now you can imagine the plight of a System Administrator or the one you call "IT Guy" in office in such a situation. In small, medium or large organizations, management of IT assets is quite difficult and time consuming. With the advent of Cloud computing, several solutions like automatic software and anti-virus database updates keep PCs and Macs up-to-date.

Now imagine a situation where you don't have to look around, call or scream for the IT guy to fix your machine. Nor do you have to call your system vendor (one who sold you the PC) to attend to your query. Instead, the issues are taken care of remotely and without having the IT guy visit you personally. Yes, that's quite possible with Microsoft's new Cloud computing service based solution - Windows Intune

What is Windows Intune?

Microsoft's Windows Intune is a Cloud-computing based service meant for PC management and protection from virtually anywhere. Though it's Cloud-based, Windows Intune interface is accessible via all major Web Browsers that support Microsoft Silverlight plug-in. One can manage the PC systems and take action against the alerts from anywhere and while on the move. Only an internet connection is required and the client system should have the 17MB initiation package installed on it.

Windows Intune



Since it is a cloud-based service, Windows Intune offers PC management, Inventory reports, licensing management, assets tracking, deploying Microsoft updates as well as patches and quickly addressing security issues in the client system.

How and where does it work?

Microsoft Windows Intune management console connects the account holder to the Cloud computing based services that fetches notifications, alerts, reports and reminders about the issues existing in the client computers. A simple web browser with Microsoft Silverlight support is usable to get the Windows Intune console after Windows Live login. One must download and install the client software program on the client computer to let it connect with the Windows Intune management console.

Windows Intune



Windows Intune helps managing and securing PCs with the help of Windows 7 and Windows Cloud based services. With this web-based management console one can,

- Manage system updates and patches
- Protect computers from malware
- Monitor the computers
- Provide remote assistance
- Track report of hardware and software inventory
- Set security policies
- Efficient software and hardware reporting
- Alerts management

Though the PC is managed remotely via cloud-based PC management interface, any action on the client PC requires the user to accept and allow the Windows Intune account holder to make necessary changes. For instance, if Windows Intune got an alert from a client computer about a software update, then the update would only be successful when the computer user accepts the administrator's request to update the software.

Windows Intune



Windows Intune is available through Microsoft's partners at a subscription price of $11 per month per system with update rights to Windows 7 Enterprise.

Here's the transcript of my interaction with Sumeet Khanna, Director - Windows Client Business Group, Microsoft. For the product demo we had Arun Subramanian, Product Marketing Lead - Windows Client Business Group, Microsoft (Below: TT = Techtree, SK = Sumeet Khanna, AS = Arun Subramanian).


TT: What's Indian contribution in the development of Windows Intune?

SK:
Microsoft teams located in Redmond and Hyderabad collaborated to work on Windows Intune. Since Windows Intune involves and overlaps several Microsoft products as well as technologies, different teams have worked together in their respective areas.

TT: Is Windows Intune capable of controlling other Operating Systems such as GNU\Linux distros or Mac OS X?

SK: Cloud-based Windows Intune is like the first version of our offering and we currently offer discounts on purchase of 250 or more licenses. We've no announcement to make about cross-platform support as of now.

AS: Windows Intune was launched with a motive to work seamlessly across Windows eco-system. That was our basic aim and we've achieved it. It's a complete suite that offers management tools, anti-malware protection, and upgrade rights to Windows 7 Enterprise.

TT: Any plans to work on/include cross-platform management controls?

SK: As of now, we have nothing to announce. This product is like the first version of our efforts and we hope to bring more enhancements in due course of time.

TT: Companies face trouble finding experts to run and manage basic IT infrastructure in the company. Do you think SMEs and SoHos will get the required manpower for efficient Windows Intune usage?

SK: The beauty of Windows Intune is the ease to use its interface. IT organizations need not hire any specifically skilled manpower to manage it. Windows Intune allows IT management anywhere and anytime, so companies with multiple offices across India can have one or more System Administrators at a centralized location. Microsoft is happy to have about 300 Microsoft Software Partners on board for its launch in India. Small and large organizations can leave IT management with Windows Intune solution partners.

TT: Would you shed some light on the security aspect in the Windows Intune?

SK: Security of the end-users systems and the MSPs is a major concern for us. Hence, we've taken good measures in the development of Windows Intune and also integrating enough features to secure the client systems.

AS: One of the several functions of Windows Intune is to protect the systems against malware and secure them. Windows Intune has been built using Microsoft Malware Protection Engine and other security technologies such as Microsoft Forefront Endpoint Protection and Microsoft Security Essentials. With this dual-layer security incorporated Windows Intune is secure and alerts are available to keep the client systems secured against root kits, spyware, viruses and other kinds of malware.

TT: Can we expect an end-user edition of Windows Intune for someone like an independent developer?

SK: Well, it's ready even for the Small Office Home Office and even home user environment. All it requires is initiating the transaction of enabling the Windows Intune subscription with Microsoft Software Partners. It's quite a viable solution for home users who wish to secure and manage several PCs in their family from one end. Hence, you won't have to run around to fix your uncle's computer in case of any software issue or malicious attack query.

TT: Microsoft Windows Intune's billing control lies in the hand of Microsoft instead of Manager Services Providers? Are there any plans to put more partners on the list?

SK: Microsoft has launched Windows Intune in India with about 300 partners on board and it's a simultaneous launch globally as well. As of now, our goal is to make these partners completely comfortable in the usage and implementation of Cloud-based Windows Intune solution. As mentioned earlier, we'd be investing about 60 per cent of Income from Windows Intune to help MSPs improve and the faster implementation of Windows Intune. We've received feedback about the billing from partners and would be working on a harmonious solution.

In Conclusion:

Cloud-computing based services are going to take India by storm. Small, medium and large business would be able to optimize their productivity and resolve day-to-day IT issues quickly with Windows Intune.

Windows Intune's web based console requires Silverlight plug-in supporting web browser. At this moment, no mobile web browser supports Silverlight by default except Skyfire mobile web browser. So one needs to install and use the latest Skyfire mobile browser to access and use the Windows Intune console on the go.

Microsoft Windows Intune is usable and available for Managing Services Providers as well as the end users. You can always register at http://www.microsoft.com/online/windows-intune.aspx for a free 30-day trial of Windows Intune and get a hang of cloud-based PC management.

Nokia sends Symbian Event Invites for April 12

Finnish handset maker Nokia has sent out invites for a Symbian smartphone focused event scheduled for April 12. BoyGeniusReport noted that the event will take place in London. Will Nokia show new Symbian smartphone or Symbian update at this event? Nothing can be inferred from the invite but it certainly seems like a major Symbian update.



Back in December, Nokia promised that about four to five updates to Symbian operating system would be released in this year and in the first half of 2012. Gunther Kottzieper, senior manager at Nokia China, in his presentation at the International Mobile Internet Conference in Beijing stated that more than 50 enhancements would be added in four to five Symbian upgrades.

These new Symbian upgrades are said to bring a new look and feel for UI, more flexible home screen, updateable HTML5 browser, and better software update experience are being planned for the second and third quarter of this year.

We've been promised dual-core 1Ghz processor based Nokia smartphones with "true zoom camera" in the fourth quarter of this year. Maybe Nokia is eager to show a sneak peek of the device. There's no confirmation on that as of now.

Apparently, HTC too is having a smartphone event on same date in London. So it's going to be sort of a clash, unless they're going to launch the devices which have already been announced.

Tuesday, April 5, 2011

Intel Oak Trail Tablets to Arrive in May

A majority of PC makers are busy preparing to launch their own Tablet with mostly Android OS running on it. Currently, the number of Intel Atom processor based tablets is countable. British site PC Advisor has learned that Intel will introduce its next generation Atom CPU dubbed Oak Trail based tablets next month. These new Intel Oak Trail tablets will be shown at the Computex 2011 Show in Taipei, Taiwan.

Intel spokeswoman told PC Advisor, Oak Trail tablets are expected to start hitting shelves in May and throughout 2011. At the Computex 2011 show, we can expect to see Intel Oak Trail based tablets from different companies. Intel has designed the single-core Z670 Oak Trail chip with capability of decoding high-definition videos and also accelerate the playback of MPEG files in Windows Media Player.

More companies will show Intel Oak Trail chip based tablets running Windows 7 OS since the operating system won't support Intel's Moorestown chip. Alongside Oak Trail chip, Intel is also working on a new version of MeeGo OS for tablets and notebooks. Apparently, Intel also anticipates that the near future versions of Oak Trail chip based tablets will support Google Android 3.0 Honeycomb OS.

We'll soon get to see Intel Oak Trail competing with Nvidia Tegra Kal-El SoC later this year. Intel has been away and will certainly strike the tablet scene with a bang later this year. However, Microsoft is secretly working on Tablet centric Windows 8 version which would be available only in late 2012, hopefully.