Category Archives: Technology

Adobe: Flash Apps Will Run On The iPad, Even Full Screen At Some Point

adobe_flash

While Apple is being lamented here and there for not supporting Flash on its shiny new iPad – boy does Cupertino have a strong dislike for the platform – Adobe has already responded to the news on the official Flash Platform blog.

The blog post, unambiguously titled “Building iPad Applications with Flash”, is mostly just to remind people of the company’s Packager for iPhone product, which will enable developers to make Flash apps function on the iPhone / iPod Touch through a work-around whereby Flash apps can be easily converted into iPhone apps using Creative Suite 5 (CS5). Adobe also published a post on its Adobe Flash Platform blog addressing the apparent lack of Flash support in the iPad.

Andreessen-Backed Makara Unveils Cloud Application Deployment And Management Platform

Stealth startup Makara is launching publicly tonight with its cloud-based application deployment and management platform. Formerly known as WebappVM, Makara has raised angel funding from Marc Andreessen and Ben Horowitz. The startup also raised $6 million last year from Shasta Ventures and Sierra Ventures.

Rather than offer a system management software designed for traditional application environments to the cloud, Makara’s’s cloud-based platform leverages the virtual layer to allow developers to rapidly deploy, scale and monitor applications in cloud environments. The product, which is self-service and self-managing, is available for free on its site

Top 100 Twitter Applications

twitter

 

  1. twittervision (4282 overall)
  2. twitterfeed (3867 overall)
  3. twhirl (3319 overall)
  4. tweetscan (2655 overall)
  5. twistori (2631 overall)
  6. twitter-search (2500 overall)
  7. tweetdeck (2439 overall)
  8. twitpic (2244 overall)
  9. hellotxt (1979 overall)
  10. twitterrific (1729 overall)
  11. twitterholic (1612 overall)
  12. tweetstats (1549 overall)
  13. twellow (1527 overall)
  14. twitturly (1460 overall)
  15. twitter-grader (1431 overall)
  16. twitscoop (1410 overall)
  17. quotably (1334 overall)
  18. twitterlocal (1319 overall)
  19. monitter (1285 overall)
  20. twubble (1264 overall)
  21. twittearth (1191 overall)
  22. grouptweet (1180 overall)
  23. hashtags (1124 overall)
  24. tweetburner (1113 overall)
  25. twitbin (1093 overall)
  26. twittercounter (1081 overall)
  27. tweetlater (994 overall)
  28. terraminds-twitter-search (966 overall)
  29. tweetvolume (944 overall)
  30. qwitter (935 overall)
  31. friendorfollow (929 overall)
  32. twitthis (902 overall)
  33. twist (883 overall)
  34. twitter-karma (854 overall)
  35. xpenser (822 overall)
  36. twittermail (813 overall)
  37. twemes (803 overall)
  38. tweetbeep (803 overall)
  39. twitdir (770 overall)
  40. twitxr (767 overall)
  41. twitterfox (760 overall)
  42. hahlo (688 overall)
  43. twinfluence (654 overall)
  44. tweetmeme (652 overall)
  45. tweetwheel (647 overall)
  46. twuffer (636 overall)
  47. botanicalls-twitter-diy (631 overall)
  48. twittersnooze (629 overall)
  49. twtpoll (614 overall)
  50. mrtweet (609 overall)
  51. twittercal (605 overall)
  52. remember-the-milk-for-twitter (594 overall)
  53. snitter (593 overall)
  54. twitterpatterns (585 overall)
  55. strawpollnow (575 overall)
  56. twitterfone (547 overall)
  57. whoshouldifollow (539 overall)
  58. twitbacks (539 overall)
  59. tweetr (526 overall)
  60. twitdom (525 overall)
  61. tweetree (522 overall)
  62. favrd (520 overall)
  63. election.twitter (506 overall)
  64. peoplebrowsr (501 overall)
  65. tweetclouds (498 overall)
  66. pockettweets (498 overall)
  67. cursebird (488 overall)
  68. twistory (480 overall)
  69. twitterverse (470 overall)
  70. tweetgrid (470 overall)
  71. twittermap (466 overall)
  72. tweetag (458 overall)
  73. twilert (457 overall)
  74. twitterposter (456 overall)
  75. loudtwitter (443 overall)
  76. twitterfriends (439 overall)
  77. spaz (431 overall)
  78. be-a-magpie (421 overall)
  79. tweetake (420 overall)
  80. twitter-friends-network-browser (419 overall)
  81. matt (414 overall)
  82. twitter100 (411 overall)
  83. colorwar2008 (411 overall)
  84. twitteroo (408 overall)
  85. tweetrush (389 overall)
  86. fuelfrog (385 overall)
  87. twitter-blocks (383 overall)
  88. tweeterboard (375 overall)
  89. spy (373 overall)
  90. twerpscan (372 overall)
  91. splitweet (371 overall)
  92. twittergram (364 overall)
  93. twittgroups (362 overall)
  94. brightkit (361 overall)
  95. twitlinks (359 overall)
  96. twitternotes (358 overall)
  97. tweetwasters (354 overall)
  98. foodfeed (352 overall)
  99. twitterblacklist (348 overall)
  100. twitku (347 overall)

The Top 21 Twitter Applications with Minium Visits Per month

                 
1. Twitpic1,236,828
2. Tweetdeck285,864
3. Digsby233,472
4. Twittercounter212,200
5. Twitterfeed 149,812
6. Twitterholic147,164
7. Twhirl143,333
8. Twitturly88,793
9. Twtpoll74,154
10. Retweetist60,051
11. Tweepler51,304
12. Hellotxt45,754
13. Twitdom45,411
14. Tweetscan44,463
15. Tweetburner41,754
16. Tweetvisor31,621
17. Twittervision30,708
18. Twitterfall29,592
19. Monitter25,433
20. Twibs17,168
21. Twistori16,229
22. Twitbin14,986

Airtel’s customer service – the bitter truth

airtel sucksI have been a loyal customer of Airtel untill recently when they started to call me regarding one number which I had never applied for nor am aware of. They say that the bill of tha number which is in excess of 3k is pending and I would have to pay it. They crossed their limits when they barred my real number because of that previous number which I have been telling them since more than six months that It doesnt belong to me. The customer care executives are hell bent on the fact that It was my number and there is no way that any one else could have got that number other than me. This had happened with me once more while I was working in Delhi. That time they forced me to pay the bill of some unknown number just like this. But this time I am not going to pay some one elses bill even if I have to now move away from Airtel. The customer care executives are totally unaware of what to do. Nodal oficers dont reply and if you pay a bill at their centre in cash they take more than 3 days to update the same and charge you for the late fee in next months bill.  Airtel is bringinf shame to itself and its customer service level is deteriorating day by day.

My E63 caught cold

I came to my home in Lucknow for a week. The time being the most cold time of the year. I had recently bought me an E63 so it also travels with me. Yesterday when I was out in the morning with my dad  with my phone in hand I tried to do some chatting as I always do [dad was talking to someone on his phone]. I noticed some lag in the response of my phone and also the keypresses failed to register and required to be pressed harder. Then I opened some more application and then it just froze… I took out the battery. Plugged it again and restarted… again the same issues… Till then dad was done with his call so I kept the E63 in pocket. When I took it out gain after an hour or so from my jacket it was not that cold and I could feel the warmth on the phone… I decided to have a shot again and this time all was ok … no freezing of screens and no faltering keypresses… I gues it was the morning chill 🙂 Will keep you warm, my E63 till I’m home. Love you.

One avatar throughout the globe – Gravatar

Gravatar! What is it?

Your Gravatar is an image that follows you from site to site appearing beside your name when you do things like comment or post on a blog. Avatars help identify your posts on blogs and web forums, so why not on any site?

Some Sample Gravatars

MayaRyanAnthonyGianThorsten


Visit Gravatar site to create one for you. Its easy.

And where ever you post anything with you email there you gravatar would be displayed.

How it works?

A commenter creates an image suitable for a gravatar and uploads it to his account on gravatar.com.  The gravatar is rated using pretty much the same ratings as the movie industry: G, PG, R, and X.  These ratings are used by bloggers to set limits on the kinds of gravatars that appear on their sites — a gravatar with a G rating will appear everywhere while a gravatar with an X rating may not appear on many blogs at all.

Meanwhile, a blogger (like me) sets up his/her blog to enable it for gravatars.  Then, when a commenter submits a comment, the blog’s gravatar plugin (automatic since WordPress 2.5) takes the commenter’s e-mail address (submitted in the comment form) and attempts to find a match at gravatar.com.  If it finds a match, it displays the corresponding image. (The e-mail address is not used anywhere in the underlying page code.)  If there’s no image on file, the blog software either displays nothing or displays a default image chosen by the blogger.

How the URL is constructed?

Step 1, The URL base: A gravatar is a dynamic image resource that is requested from our server. The request URL is presented here, broken into its segments. The URL always begins with

http://www.gravatar.com/avatar/

Step 2, The email hash: The next part of the URL is the hexadecimal MD5 hash of the requested user’s lowercased email address with all whitespace trimmed, for example the fictitious “iHaveAn@email.com” would have a hash of “3b3be63a4c2a439b013787725dfce802” This may be followed by .jpg (useful for some places on the internet which require that image URLs have filename extensions)

http://www.gravatar.com/avatar/3b3be63a4c2a439b013787725dfce802

http://www.gravatar.com/avatar/3b3be63a4c2a439b013787725dfce802.jpg

Everything from here on… is optional and can be found here

Femtocell

A femtocell is a small cellular base station designed for use in residential or small business environments. It connects to the service provider’s network via broadband (such as DSL or cable) and typically supports 2 to 5 mobile phones in a residential setting. A femtocell allows service providers to extend service coverage inside of your home – especially where access would otherwise be limited or unavailable – without the need for expensive cellular towers. It also decreases backhaul costs since it routes your mobile phone traffic through the IP network.
A femtocell is sometimes referred to as a “home base station”, “access point base station”, “3G access point”, “small cellular base station” and “personal 2G-3G base station”.

http://www.femtoforum.org/femto/Files/Image/Femtocell-House-Diagram.jpg

The Benefits of Femtocells

Due to the substantial benefits, femtocell technology is causing quite a “buzz” in the industry. ABI Research has forecasted that by 2011 there will be 102 million users of femtocell products on 32 million access points worldwide.

Femtocell Benefits to End Users

  • Reduced “in home” call charges
  • Improved indoor coverage
  • Continued use of current handset
  • Reduced battery drain
  • One consolidated bill
  • Multiple users/lines
  • Landline support

Femtocell Benefits to Mobile Operators

  • Improves coverage
  • Reduces backhaul traffic
  • Provides capacity enhancements
  • Reduces churn
  • Enables triple play
  • Addresses the VoIP threat
  • Stimulates 3G usage
  • Captures termination fees
  • Allows for multiple users/lines
  • Addresses the fixed mobile convergence market with a highly attractive and efficient solution

Femtocells: Why Now?

Indoor coverage has been an industry problem for year and vendors have unsuccessfully tried to develop relevant technology solutions for the home. Most services to date involved micro or pico base stations and did not really have the price points to support residential users. Alternative approaches tried most recently involve dual mode devices based on Wi-Fi. While technically compelling, these solutions depend on adoption of new (and expensive) handsets.

A number of factors are coming together to enable femtocell based solutions:
• The high adoption of broadband connections allows the service providers to leverage the IP backhaul to reduce the backhaul costs for additional usage.
• Advances in embedded technologies make it possible to offer a home base station at an acceptable price point approaching $100 over time
• Users are now accustomed to the idea of having a home gateway – thanks to prevalent products like TiVo, Vonage, Slingbox, Wi-Fi AP, as well as DSL/cable modems.
• As 3G adoption increases, indoor coverage becomes a challenge even in otherwise good 2G coverage regions such as Europe and Asia.
• Operators who have trialed cell-site based home zone type services have seen the potential to leverage home zones for improved customer retention.
• New low power GSM spectrum has enabled new players to participate in mobile offerings based on licensed band femtocells.

Femtocell Architectures

There are two broad femtocell architecture approaches within a mobile service provider’s network.

1. All-IP (SIP/IMS): The SIP/IMS based approach integrates the femtocell through a SIP or IMS based network. This approach leverages a SIP based VoIP network for cost-effective delivery, while interworking with a cellular core to extend legacy circuit switched services. In this approach, the CPE converts cellular signals to SIP and interfaces to a SIP-MSC inter-working function (IWF) which connects to the SIP (or IMS) network as well as the circuit switched network.

2. Radio Access Network (IP RAN): The IP RAN based approach effectively considers a femtocell an extension into the operator RAN network and ties the femtocell into the circuit switch core at the edge of the network. This typically involves transporting “Iub” messages over IP into a Radio Network Controller (RNC) or a modified RNC/concentrator. (The Iub is the interface used by an RNC to control multiple Node B’s in a UMTS network.)

There are three different variants of this approach being pursued by different vendors, however all three of these variants require either the introduction of or major modification to network elements at the RNC layer of the mobile core network:

  • Modified RNC: This approach uses existing or modified RNCs to connect to the circuit switched core network. The CPE connects to the RNC via Iub over IP.
  • Concentrator: This is similar to modified RAN in that it connects to the CS core, but it does it through a new ‘concentrator’ device that interfaces with the CPE. The interface is again based on Iub over IP.
  • UMA: This approach incorporates a UMA client into the CPE and connects to the core network via a UMA UNC.

Students find ringtone that adults can’t hear

In that old battle of the wills between young people and their keepers, the young have found a new weapon that could change the balance of power on the cellphone front: a ring tone that many adults cannot hear.

In that old battle of the wills between young people and their keepers, the young have found a new weapon that could change the balance of power on the cellphone front: a ring tone that many adults cannot hear.

The technology, which relies on the fact that most adults gradually lose the ability to hear high-pitched sounds, was developed in Britain but has only recently spread to America — by Internet, of course.

Download here [credit: NY times]

The cellphone ring tone was the offshoot of an invention called the Mosquito, developed last year by a Welsh security company to annoy teenagers and gratify adults, not the other way around.

It was marketed as an ultrasonic teenager repellent, an ear-splitting 17-kilohertz buzzer designed to help shopkeepers disperse young people loitering in front of their stores while leaving adults unaffected.

The principle behind it is a biological reality that hearing experts refer to as presbycusis, or aging ear. While Miss Musorofiti is not likely to have it, most adults over 40 or 50 seem to have some symptoms, scientists say.

While most human communication takes place in a frequency range between 200 and 8,000 hertz (a hertz being the scientific unit of frequency equal to one cycle per second), most adults’ ability to hear frequencies higher than that begins to deteriorate in early middle age.

“It’s the most common sensory abnormality in the world,” said Dr. Rick A. Friedman, an ear surgeon and research scientist at the House Ear Institute in Los Angeles.

But in a bit of techno-jujitsu, someone — a person unknown at this time, but probably not someone with presbycusis — realized that the Mosquito, which uses this common adult abnormality to adults’ advantage, could be turned against them.

The Mosquito noise was reinvented as a ring tone.

“Our high-frequency buzzer was copied. It is not exactly what we developed, but it’s a pretty good imitation,” said Simon Morris, marketing director for Compound Security, the company behind the Mosquito. “You’ve got to give the kids credit for ingenuity.”

The detailed post can be found here

The Unhackable Cellphone

Gold Line Group’s Hacker Challenge has a cartoonish James Bond aspect to it that begs a bunch of hard questions, but it also has a deadly serious side.
The Israeli company invited hackers, cyber spooks, and industrial espionage geeks to try breaking its new Gold Lock 3G cell phone encryption system. Anyone who succeeds wins a cool quarter million dollars in gold ingots.
The software, launched in mid-2009, is already used by the Israeli military to scramble field communications. South American moguls are using it to prevent kidnap gangs eavesdropping on their conversations. Life and death stuff.
But Gold Lock 3G, which the company launched in North America late last year, can also be used by organizations just looking to protect trade secrets from prying ears.
Cyber spooks
The software encrypts voice conversations, SMS messages, instant message conversations and file transfers to and from Nokia, Windows Mobile, BlackBerry, and iPhone mobile devices.
Phones at both ends have to be running Gold Lock 3G. List prices start from about $35 a month per device, or $1,700 for a perpetual license.
The software does introduce a level of latency in voice conversations – typically about a second – but the company’s North American channel manager, Douglas Haskins, insists users barely notice or, if they do, adjust easily.
Software such as Gold Line’s takes on added significance now with recent news that a German encryption expert succeeded in breaking the native 64-bit protocols used by GSM carriers to encrypt cell calls.
In the past, says Haskins, industrial spies would have to spend $80,000 or more on specialized equipment to intercept and decrypt cell phone conversations.
Now they can use a laptop and $100 worth of software.
“It could be somebody sitting outside your business or your house – they can be a couple of hundred of yards away, or in a nearby cubicle,” Haskins says. “So it’s very serious. If you’re talking about sensitive information – it’s wide open now.”
Gold Line claims that between 2,000 and 3,000 hackers, including security organizations, have taken a crack at breaking its system. The company bumped the prize from $100,000 to $250,000 in November, and renewed the challenge recently.

Final deadline for breaking the Gold Lock 3G system: February 1, 2010.

All hackers have to do is unscramble a Gold Lock-encrypted conversation that the company intercepted and recorded using commonly available call sniffer technology and posted at its Web site.
(To find out how to participate, see this page at the company’s site.)
On the line
There’s more at stake here than cash, of course. There’s also Gold Line’s reputation.
If someone does decrypt the conversation, the company will have egg on its face – although Haskins tries to spin it otherwise.
“If it happens, [it means] there’s one really smart guy out there – and a lot of hackers are really smart,” he concedes.
“I think if it does happen, the way we look at it is that it gives us the opportunity to make [Gold Lock 3G] that much better. We already have by far the best product out there. We not only have the confidence to issue this challenge, but we’re prepared to take [it] even a step higher.”
Haskins says Gold Lock 3G is superior to comparable products from competitors, such as Cellcrypt because it uses a unique three-layer system.
It starts with automatic handshaking between devices using Diffie–Hellman key exchange protocols. Then the software uses the same AES-256 (Advanced Encryption Standard) used by the U.S. government for top secret communications. Finally, it re-encrypts the already encrypted data using 384-bit Elliptic curve cryptography (ECC).
“It’s just off the charts,” Haskins says of the effort that would be required to break the system. “Even if you could break AES-256, then you’d have to work on the 384-bit [ECC].”
The company claims an independent auditor estimated it would take hundreds of years to break the system using brute strength methods. But encryption systems have been broken before using cleverer techniques.
Are hacker challenges like Gold Line’s anything more than flimsy publicity stunts? How legitimate are they really?
For example, to what extent does putting a four-month time limit on the challenge tilt the board in the developer’s favor. After all, if some cyber snoop breaks the system on February 2, the implications for users relying on the product are just as dire – but with no negative publicity.
And notwithstanding the very attractive prize, has the challenge really brought all the best talent out of the woodwork? Would criminal hackers, for example, risk registering with Gold Line to participate?
And then too, how would we ever know if somebody actually succeeded in breaking the Gold Lock system? Isn’t it possible Gold Line would decide to just pay off the winner and keep it quiet while it fixed the vulnerability?
Certainly the company wouldn’t be stupid enough to stiff a successful hacker, Haskins says. For one thing, participants in effect enter into a contract with the company. Besides, it would be too easy for the person to go public with the information and embarrass Gold Line even more.
“It would cause more damage to try and hide the fact than it would to admit it and fix the product,” he says.
But couldn’t Gold Line make them sign a non-disclosure agreement to get their loot and keep it all on the QT?

Yet another scary thought: if a criminal hacker did participate and succeed, might they decide the information was more valuable on the black market? How much would Al-Qaeda or the Iranian secret service pay to be able to eavesdrop on the Israeli military?

Gerry Blackwell is a veteran technology journalist who writes from Canada, Italy, and Spain