This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Tuesday, May 31, 2011

Elephant Vs Car - Animal Humor Photos


Cool Design Shoes for Facebook and Twitter Lovers



Facebook vs. Twitter

I’m not at all thinking about quitting Twitter or stopping to recommend it. Twitter is a valuable social media tool that I wouldn’t want to be without. There are, however, many reasons I prefer Facebook over Twitter, and have switched my primary social media site from Twitter to Facebook.

Facebook vs. Twitter

Here are 16 reasons I like Facebook more than I like Twitter:

  • Easier for Group Discussion - Facebook discussions and neatly threaded and hashtags are unnecessary.

  • Rich Functionality - Facebook supports applications, events and instant messaging. Facebook also enables photo, video, link, page and event sharing.

  • More Powerful Lists - Create as many Facebook lists as you like and use them to manage both communication and privacy.

  • Better Private Messaging - No automated direct messaging on Facebook. Therefore, your private messages and updates are more manageable.

  • Less Spam Abuse - Facebook fights spam more effectively than Twitter.

  • News Feed Optimized for Relevance - Facebook uses edgerank to prioritize our Top News feeds. Optionally, we can choose to view Twitter-like Most Recent News, as well.

  • True Networking Site - We can create deep online connections with our friends, and we also discover friends-of-friends. Facebook messaging  is a good alternative to email, too.

  • Website Traffic - In 2009 when I focused on Twitter, I  received 7,834 visits from Twitter with average time on site of 2:10 minutes. Not bad. However, in 2010 when I turned my focus to Facebook, I received 5,134 visits with average time on site of 3:07 minutes and a larger number of blog comments. Facebook visitors tend to engage more than do Twitter visitors. That’s better website traffic.

  • Less Incentivization - Twitter has become very much about follower counts. People typically follow with the expectation of being followed back and unfollow if that doesn’t happen. Fans and friends on Facebook are much more authentic.

  • Real People - Facebook is mostly used by real people, while Twitter is mostly operated by robotic software called bots.

  • No 140 Limit - Facebook allows more than 140 characters per status update,  more than a 160 per bio, and more than one website link per account.

  • Much Greater Membership - I’m more able to find the people with whom I want to connect on Facebook than on Twitter.

  • Members Visit More Often - Facebook members are said to log into Facebook more often than Twitter members into Twitter.

  • Easily Manage Multiple Business Accounts - I can manage multiple Facebook business pages without logging out and back in, and without using third-party desktop clients.

  • Business Pages are Mini-Websites - Facebook business pages are mini-websites with a landing page and additional pages.

  • Off-site Integration - Like buttons and like boxes extend the reach of Facebook to blogs and other websites outside the Facebook domain.


  • Source :  http://online-social-networking.com/tag/facebook

    FACEBOOK FOR BUSINESS TIP: Migrate your ‘friends’ into ‘likes’

    I often get asked how to grow numbers – fans and ‘likes’ – on your Facebook Page. There are a slew of techniques you should use on an ongoing basis (for example, well-placed social media icons on your website/blog, in your email signature, and on your marketing materials, to name a few), but one that stands out to me the most is growing your numbers through your personal profile first. Use your personal Facebook profile as a bridge to your Facebook Page.
    I hear a lot of people talk about their hesitation to open up their personal accounts to people they don’t know. Listen, if you’re on Facebook to do business, it’s important to understand that your target market does not want to be approached for business first. In fact, I dare say that no one wants to be approached for business first.
    People aren’t coming to Facebook to meet their accountant. They’re coming to Facebook to connect, reconnect, and engage with others. They might meet a person who happens to be an accountant and then decide to do business with them, but most likely, potential clients that find business connections have done so because they connected on a personal level first.
    This is the crux of social media – the ability to connect and relate to one another first and foremost. Those similarities and interests bring us together and business leads are developed through this organic process.
    There are no shortcuts or ways around it. You can’t automate your presence and drive business leads to your site. You either get it or you don’t, but one of the main reason most corporate brands don’t do well using social media is because they don’t have a personality.
    My suggestion: clean up your personal profile. Get rid of anything that you think is too much information: pictures of your kids (if you deem this too much information), negative personal details about your life (going through a divorce, you hate your ex-husband’s new girlfriend, etc.) and include bits and pieces of the real you (not the “you” with your skirt over your head drunk in Barcelona), but the essence of who you are: male or female, books and movies you like, and music you listen to – for starters.
    Add people as friends to your personal account first. Get to know them, compliment them on their site, and ask them a question about themselves. Then, once a month send out a blanket invitation to all of your friends to invite them to your Page. Don’t pounce on them when they first become your friends. Give it time. Be patient.
    When I’m working with a new client, I explain this slow process to the clients so they understand I am not a fairy godmother with a magic wand. This process takes time.
    Before Pages existed, I built up my personal profile to include pictures, videos, and descriptions of my interests and activities – my garden, my dog, my kids, my love of beer, my neighborhood. It’s easy to get a sense of who I am when you take a look at my personal profile.
    I make it a point to wish people a happy birthday and comment back when people post to my Wall. This is what I mean by engagement. Social media is not the new fangled way to make money, but rather, a new fangled way to meet people.
    When Pages became available and after I created my own, I sent out an invitation to my friends list through my Facebook profile and had 400 fans in one day. That happened because I established a relationship with them first – built up some trust before asking for their click.
    Asking people to skip over your personal profile and proceed straight to your Page doesn’t work as well. I’ve seen many folks send out return messages after I’ve sent them a friend request telling me that they have too many friends and can’t take on anymore, but to join them over on their Page.
    Uh… I don’t think so.
    I want to get to know you as a person before I join you over on your Page. I don’t necessarily want to know about your latest business venture but I would like to know basic personal details about you if I’m friending you on Facebook.
    And I realize Facebook has a 5,000 friend limit for personal accounts. The notion is that anything over 5000 should naturally migrate over to your Page. And yet, it doesn’t always work that way. The numbers don’t add up as well when people skip over your personal profile before being introduced to the “business you”.
    I’m not suggesting opening up the flood gates and letting any ol’ person in – rather, develop a criterion, a standard of who you want to friend. If you’re a brick and mortar business in New Jersey, find your city’s Facebook Page. Assuming they have one, friend those people on that Page. Most likely, they are New Jersey residents and/or have ties to the community. You can’t add them directly to your Page, but you can request their friendship and add them on through your personal profile. Eventually you can migrate them over to your Page.
    Use your personal profile to grow your Page. Look at your personal profile as an addendum to your professional Page. Infuse your online presence with your personality and business leads will be generated through these efforts.
    Remember, automation cannot do this for you. There are no shortcuts in social media. Take your time. Social media is a 401k plan and not a lottery ticket.
    For more ways to grow your numbers on your Facebook Page check out: http://www.socialmediaexaminer.com/10-ways-to-grow-your-facebook-page-following/.

    Facebook Friends - 5 Easy Steps to Grow Your Friends List on Facebook

    Social media is effective, it works and does not cost anything. So, definitely worth investing some time and efforts into it. The most popular site on the whole world wide web is Facebook.
    People on a Facebook are dealing with people - so its worth knowing that simple ways of communication, like rumours, fun, photos, links, etc. work very well. There are a few simple steps on how to grow your Facebook friends list in a simple and fast way.
    STEP ONE: create a personal profile of who you want your Facebook friends to see - a lawyer, consultant, property professional or simply a joyful and positive person. If you want to be seen as a professional, from time to time provide your Facebook friends with quality information, show them how they would benefit from dealing with you.
    You might want to post pictures of family, to tell everyone what a fantastic weekend away you had. People will identify with you and will want to know more. Be nice, consistent, proactive and responsive, comment on your Facebook friends pictures, on their posts, links and photos.
    STEP TWO: Identify Your target market or niche and join different pages and groups within that target market or group - it might be geographical, might be gender oriented, etc. Search for groups that have specific words in them: interior, website, model agency, etc.
    As I live in Ireland, I will give a few examples: Ashford castle fans page, Dramoland castle fan page - those people most likely visited place at least once and guess what - those are expensive places to stay, so visitors might have money for your product or service as well. Blackrock town near Dublin has even 2 groups created. There are some fun groups, like "I'm from Ireland, but more importantly I am from Dublin" - most of people in this group are from Dublin - 32.000 members and growing - what a fantastic place to get new Facebook friends and followers that live in the neighbourhood.
    STEP THREE: leave posts on those groups and pages walls. Do not advertise, write something interesting and catchy, then people will get interested in you, will go to your profile and will add you as their Facebook friend, also they will look through your profile, will visit your website - this is a free traffic for your business.
    STEP FOUR: Join as many groups as you can. You can be a member of 300 groups and 300 pages on Facebook. Alternatively you can also visit your target groups and pages, look through people's profiles and add them as a friend. That is effective, but more time consuming.
    STEP FIVE: Interact with your new friends. Add a personal welcome message once they join you as your new Facebook friend on the site. Send an email telling them what your interests are. Look through their profile and wall and make comments on their posts or links.
    Facebook is currently No.1 website on the internet in most countries with Google being the most popular search engine. So, best of luck with growing your Facebook friends list - a great potential in promoting your business through this powerful social media site. Have fun and enjoy!

    Article Source: http://EzineArticles.com/3923932

    Transparent Clear Snap On Crystal Hard Cover Case for Apple Ipod Touch 2nd 3rd GEN 2G/3G 8GB, 16GB, 32GB, 64GB

    • Brand new non-OEM. Durable clear hard plastic material.
    • Custom made to fit your iPod perfectly. Easy access to all buttons and features.
    • Plug your charger, cable or headset without removing the case.
    • Easy installation, just snap on your ipod without any tools.
    • Prevents damage to your iPod from objects in your pockets or purse. iPod not included. Does not fit
    Transparent Clear Snap On Crystal Hard Cover Case is brand new non-OEM, durable clear hard plastic material,custom made to fit your iPod perfectly,easy access to all buttons and features,Plug your charger, cable or headset without removing the case,easy installation, just snap on your ipod without any tools,prevents damage to your iPod from objects in your pockets or purse,iPod not included,does not fit Touch 1st generation

    Source : http://www.amazon.com/Transparent-Clear-Crystal-Cover-Apple/dp/B00302IK2K%3FSubscriptionId%3DAKIAIWLKATVOKF2A6B2A%26tag%3Ddigitalcam0f6-20%26linkCode%3Dxm2%26camp%3D2025%26creative%3D165953%26creativeASIN%3DB00302IK2K

    Sunday, May 29, 2011

    Fujitsu did not want to lose

    Johannesburg - The market for computer games andmultimedia segments in Indonesia is growing. A row of big players in this segment is fromDell's Alienware, Asus ROG, or the Toshiba Qosmio. But the Japanese vendors Fujitsu did not want to lose.

    After some time did not bring gaming and multimedia laptop, this year they tried to attackthis market in Indonesia. This product was named Fujitsu NH751.

    Indeed this is the only type of Fujitsu laptop gaming and multimedia this year. Apparentlythey were a bit unrealistic in the laptop market to pick up the ball game, which grow only inhigh end segment.

    "For gamers would prefer a desktop than a laptop to satisfy their hobby. But in Indonesia,the gaming market is growing, and we are very confident to go in it," said Edmund Lim,Product Marketing Manager for Fujitsu, as the Media Clinic on Thursday (05/26/2011) atPacific Place.

    Such as gaming and other multimedia laptops, NH751 has a screen size 17 inch screencapable of displaying full HD. Laptop screen is equipped with LED backlit technology, with300nits brightness very comfortable in the eye.

    This product is already available in the market at a price of USD 1898. Here are some otherexcellent features:
    The Intel Core i7,
    Middle-class graphics with Nvidia Optimus
    HD entertainment, blu-ray RW with HDMI out
    Audio DTS 5.1 audio solution
    Support for dual hard drives


    Source :
    http://infomartion4u.blogspot.com/2011/05/fujitsu-did-not-want-to-lose.html

    This is a true incident and the Indian is none other than

    An Indian man walks into the New York City bank and asks for the loan officer.

    He tells the Loan Officer that he was going to India for some business for 2 weeks and needs to borrow $5,000.

    The Loan Officer tells him that the bank will need
    Some form of security for the loan.

    So the Indian man hands over the keys and the documents of the new Ferrari car parked on the street in front of the bank.

    The loan officer consults the president of the bank,
    Produces all the required items and everything check out to be OK.

    The loan officer agrees to accept the car as a security for the loan.

    The bank president and the Loan Officer had a good laugh at the Indian
    For keeping a $750,000 Ferrari as a security and taking only $5,000 has a loan.

    An employee of the bank then drives the Ferrari
    Into the banks underground garage and parks it there.

    Two weeks later the Indian returns and pays $5000 and the interest which comes to it $15.41.

    Seeing this, loan officer says,

    “Sir, we are very happy to have your business
    And this transaction has worked out very nicely, but we are a little puzzled.
    While you are away, we checked you out and
    Found out that you were a multi millionaire.

    What puzzled us was why would you bother to borrow $5000?”

    The Indian replies
    "Where else in the New York City can I park my car for 2 weeks and
    For only $15.41 and expect it to be there when I return".
    This is a true incident and the
    Indian is none other than

    Friday, May 27, 2011

    Intel Capital Invests $24.5 Million Across the Compute Continuum

    NEW YORK, May 23, 2011 – Intel Capital, Intel Corporation's global investment organization, today announced four U.S. investments to drive continued innovation across the entire continuum of computing.

    The new deals total approximately $24.5 million and include CrowdStar, a developer of social games on Facebook and mobile platforms; iStreamPlanet, a provider of live Web broadcast management and automated video workflow; Music Mastermind, an independent entertainment and technology company; and PerspecSys, a cloud data security provider. The new investments were announced at an Intel Capital event in New York.

    The computing continuum is Intel's vision of delivering a smarter, more secure, and always-connected computing experience that spans a range of device segments – including laptops, cars, smartphones and smart TVs – and the Internet data centers to which they connect.

    "Intel Capital supports entrepreneurship all over the globe, helping to turn breakthrough ideas into successful companies," said Arvind Sodhani, president, Intel Capital and executive vice president, Intel. "The explosion of computing has created endless opportunities for the development of interesting applications that deliver unique user experiences. Intel Capital's investments in these companies will help advance applications ranging from cloud computing security to an enhanced entertainment experience."

    With the four new investments announced today, along with recently announced deals in China and India, Intel Capital has surpassed $10 billion in total investments since its inception.

    "This milestone is a significant achievement for Intel Capital and represents our dedication to continuously support companies pushing the edge of technology innovation," Sodhani said.

    Details on the new investments follow:

    CrowdStar is a global developer of social games with a growing community of 31 million monthly active users. CrowdStar is home to some of Facebook's most popular, fun and entertaining games, including "Happy Aquarium," "Happy Island," "Happy Pets," "CrowdStar's It Girl" and "Zoo Paradise." A YouWeb-incubated company, along with recently acquired former Intel Capital portfolio company OpenFeint, CrowdStar has quickly become one of the most successful developers in social gaming. CrowdStar will use the funding for hiring and acquiring talent.

    iStreamPlanet develops and operates live and on-demand content creation, management, security, monetization and delivery products and services that bring media experiences to life by creating content once and delivering across multiple screens and devices. This includes Over-The-Top (OTT) and TV Everywhere (TVE) live and on-demand HD video delivery, content protection, management, monetization, rich media experiences, collaboration and analytics. iStreamPlanet has streamed high-profile events to millions of viewers, including "NBC Sunday Night Football," The Championships at Wimbledon, U.S. Open Golf, Notre Dame college football, the Ryder Cup and the 2011 Kentucky Derby. iStreamPlanet and Intel also worked closely together to build out the Olympic Cloud Origin Services for the 2010 Vancouver Olympic Games. The investment will be used to expand U.S. operations and continue to build out in European markets.

    Music Mastermind is the developer of SoundBetter, the audio processing suite behind its consumer-focused platform. This groundbreaking technology eliminates the traditional effort required to make music, breaking down barriers hindering creativity and allowing anyone to instantly become a recording artist. Music Mastermind is currently preparing for the launch of its create-and-share music platform in the second half of this year, which will showcase the rich media capabilities of Intel-based PC, mobile and set-top platforms. The investment will be used to accelerate deployment of its product roadmap.

    PerspecSys enables enterprise adoption of cloud computing by addressing sensitive data Privacy, Residency, and Security (PRS) concerns. The PerspecSys PRS Solution* preserves enterprise management and protection of sensitive data used in public and private cloud applications. This helps to remove the traditional barriers to enterprise cloud adoption such as regulatory compliance requirements, industry standards or internal data management policies that would not normally allow sensitive data to go into the cloud. PerspecSys' global customers include financial services firms, banks, management consulting firms and public sector services. The investment from Intel Capital aligns well with Intel's Cloud 2015 vision and will be used to drive growth and vertical market segment expansion.

     About Intel Capital
    Intel Capital, Intel's global investment organization, makes equity investments in innovative technology start-ups and companies worldwide. Intel Capital invests in a broad range of companies offering hardware, software, and services targeting enterprise, home, mobility, health, consumer Internet, semiconductor manufacturing and cleantech. Since 1991, Intel Capital has invested more than US$10 billion in over 1,140 companies in 49 countries. In that timeframe, 191 portfolio companies have gone public on various exchanges around the world and 268 were acquired or participated in a merger. In 2010, Intel Capital invested US$327 million in 119 investments with approximately 44 percent of funds invested outside the United States and Canada

    Intel is a trademark of Intel Corporation in the United States and other countries.

    * Other names and brands may be claimed as the property of others.
     
     Source : http://newsroom.intel.com/community/intel_newsroom/blog/2011/05/23/intel-capital-invests-245-million-across-the-compute-continuum

    Intel Creates AppUp Small Business Service on Hybrid Cloud

    SANTA CLARA, Calif., May 24, 2011 – Intel® Corporation today launched the Intel AppUpSM Small Business Service, an innovative service running on the Intel® Hybrid Cloud platform that enables server manufacturers, software vendors, and service providers to offer small businesses key advantages of cloud computing with applications and data running on their own premises.

    Intel's AppUp Small Business Service, enabled by the Intel Hybrid Cloud platform, represents a new business model for Intel. The solution consists of a server, a catalog of prepackaged small business applications from a broad range of software providers, and Intel-developed software to securely manage and track use of the application software. Small business customers access the solution through service providers, paying on a monthly basis for the software they use, just like in the cloud, but getting the responsiveness and control of running their applications and data onsite.

    "We developed the Intel AppUp Small Business Service to build a foundation on which the industry can innovate and provide small business customers with a more convenient, secure, and high-performance experience," said Bridget Karlin, general manager, Intel Hybrid Cloud. "Small businesses are the ultimate beneficiaries because this service gives them a compelling new option for improving their business results through IT.This Intel-based solution comes ready to use, and doesn't require their own IT staff or the capital cost of a server."

    The Intel AppUp Small Business Service's innovations include use of a subscription-based delivery model for software applications. Intel-developed software activates, deactivates, and then tracks the customer's usage of those applications on a platform that is secured using Intel® Trusted Execution Technology (Intel® TXT) in Intel® Xeon® processors.

    Each month, that server tracks software usage and sends a secure encrypted report to an Intel data center. Intel invoices the small business's service provider, which bills the small business customer.

    In addition, service providers can remotely manage their customers' servers that employ this Intel Hybrid Cloud reference design by using a Web portal hosted by Intel and secured by a Web application firewall and HTTPS encrypted communication. Using Intel® Active Management Technology (Intel® AMT), service providers can remotely troubleshoot, diagnose, and support the servers, saving the time and cost of sending a technician onsite in most cases.

    Intel® Virtualization Technology (Intel® VT) and virtualization software enable delivery of "virtual appliances" to the small business user, providing pre-integrated operating systems and small business software that can be turned on or off as needed, and easily maintained by the service provider.

    The Intel AppUp Small Business Service provides an innovative delivery mechanism and a catalog of a wide variety of software for small businesses from software providers including, Astaro, GFI Software, gloStream, Intuit, Level Platforms, Microsoft, SIOS, Tally, and Vembu. A growing number of applications will be soon available in the catalog from additional software providers including Allscripts, Apani, Asigra, ClearCenter, Coversant, Critical Links, Elina Networks, Ensim, eTurns, Fonality, KineticD, Lumension, McAfee, Novell, Pragma Systems, StorageCraft, Symantec, and WorkSpace Communications.

    Service providers work with their small business customers to choose what they need from the catalog. The service provider orders the solution and the Intel AppUp Small Business Service delivers the software to the Intel Hybrid Cloud server deployed at the customer's premises

    Initial server platforms include the Lenovo ThinkServer TS200v and a white box server. A range of additional server models from Acer, NEC and others will soon be available.

    The Intel AppUp Small Business Service is available now to qualified IT service providers and MSPs in North America and India. Intel expects to expand the program to other countries.

    Source : http://newsroom.intel.com/community/intel_newsroom/blog/2011/05/24/intel-creates-appup-small-business-service-on-hybrid-cloud

    Intel Reinvents Transistors Using New 3-D Structure

    SANTA CLARA, Calif., May 4, 2011 – Intel Corporation today announced a significant breakthrough in the evolution of the transistor, the microscopic building block of modern electronics. For the first time since the invention of silicon transistors over 50 years ago, transistors using a three-dimensional structure will be put into high-volume manufacturing. Intel will introduce a revolutionary 3-D transistor design called Tri-Gate, first disclosed by Intel in 2002, into high-volume manufacturing at the 22-nanometer (nm) node in an Intel chip codenamed "Ivy Bridge." A nanometer is one-billionth of a meter.

    The three-dimensional Tri-Gate transistors represent a fundamental departure from the two-dimensional planar transistor structure that has powered not only all computers, mobile phones and consumer electronics to-date, but also the electronic controls within cars, spacecraft, household appliances, medical devices and virtually thousands of other everyday devices for decades.

    "Intel's scientists and engineers have once again reinvented the transistor, this time utilizing the third dimension," said Intel President and CEO Paul Otellini. "Amazing, world-shaping devices will be created from this capability as we advance Moore's Law into new realms."

    Scientists have long recognized the benefits of a 3-D structure for sustaining the pace of Moore's Law as device dimensions become so small that physical laws become barriers to advancement. The key to today's breakthrough is Intel's ability to deploy its novel 3-D Tri-Gate transistor design into high-volume manufacturing, ushering in the next era of Moore's Law and opening the door to a new generation of innovations across a broad spectrum of devices.

    Moore's Law is a forecast for the pace of silicon technology development that states that roughly every 2 years transistor density will double, while increasing functionality and performance and decreasing costs. It has become the basic business model for the semiconductor industry for more than 40 years.

    Unprecedented Power Savings and Performance Gains
    Intel's 3-D Tri-Gate transistors enable chips to operate at lower voltage with lower leakage, providing an unprecedented combination of improved performance and energy efficiency compared to previous state-of-the-art transistors. The capabilities give chip designers the flexibility to choose transistors targeted for low power or high performance, depending on the application.

    The 22nm 3-D Tri-Gate transistors provide up to 37 percent performance increase at low voltage versus Intel's 32nm planar transistors. This incredible gain means that they are ideal for use in small handheld devices, which operate using less energy to "switch" back and forth. Alternatively, the new transistors consume less than half the power when at the same performance as 2-D planar transistors on 32nm chips.

    "The performance gains and power savings of Intel's unique 3-D Tri-Gate transistors are like nothing we've seen before," said Mark Bohr, Intel Senior Fellow. "This milestone is going further than simply keeping up with Moore's Law. The low-voltage and low-power benefits far exceed what we typically see from one process generation to the next. It will give product designers the flexibility to make current devices smarter and wholly new ones possible. We believe this breakthrough will extend Intel's lead even further over the rest of the semiconductor industry."

    Continuing the Pace of Innovation – Moore's Law
    Transistors continue to get smaller, cheaper and more energy efficient in accordance with Moore's Law – named for Intel co-founder Gordon Moore. Because of this, Intel has been able to innovate and integrate, adding more features and computing cores to each chip, increasing performance, and decreasing manufacturing cost per transistor.

    Sustaining the progress of Moore's Law becomes even more complex with the 22nm generation. Anticipating this, Intel research scientists in 2002 invented what they called a Tri-Gate transistor, named for the three sides of the gate. Today's announcement follows further years of development in Intel's highly coordinated research-development-manufacturing pipeline, and marks the implementation of this work for high-volume manufacturing.

    The 3-D Tri-Gate transistors are a reinvention of the transistor. The traditional "flat" two-dimensional planar gate is replaced with an incredibly thin three-dimensional silicon fin that rises up vertically from the silicon substrate. Control of current is accomplished by implementing a gate on each of the three sides of the fin – two on each side and one across the top -- rather than just one on top, as is the case with the 2-D planar transistor. The additional control enables as much transistor current flowing as possible when the transistor is in the "on" state (for performance), and as close to zero as possible when it is in the "off" state (to minimize power), and enables the transistor to switch very quickly between the two states (again, for performance).

    Just as skyscrapers let urban planners optimize available space by building upward, Intel's 3-D Tri-Gate transistor structure provides a way to manage density. Since these fins are vertical in nature, transistors can be packed closer together, a critical component to the technological and economic benefits of Moore's Law. For future generations, designers also have the ability to continue growing the height of the fins to get even more performance and energy-efficiency gains.

    "For years we have seen limits to how small transistors can get," said Moore. "This change in the basic structure is a truly revolutionary approach, and one that should allow Moore's Law, and the historic pace of innovation, to continue."

    World's First Demonstration of 22nm 3-D Tri-Gate Transistors
    The 3-D Tri-Gate transistor will be implemented in the company's upcoming manufacturing process, called the 22nm node, in reference to the size of individual transistor features. More than 6 million 22nm Tri-Gate transistors could fit in the period at the end of this sentence.

    Today, Intel demonstrated the world's first 22nm microprocessor, codenamed "Ivy Bridge," working in a laptop, server and desktop computer. Ivy Bridge-based Intel® Core™ family processors will be the first high-volume chips to use 3-D Tri-Gate transistors. Ivy Bridge is slated for high-volume production readiness by the end of this year.

    This silicon technology breakthrough will also aid in the delivery of more highly integrated Intel® Atom™ processor-based products that scale the performance, functionality and software compatibility of Intel® architecture while meeting the overall power, cost and size requirements for a range of market segment needs.

    Source : http://newsroom.intel.com/community/intel_newsroom/blog/2011/05/04/intel-reinvents-transistors-using-new-3-d-structure

    Thursday, May 26, 2011

    China, US vie for mantle of world's biggest hacking victim

    China and the US have been battling lately to portray themselves as the more pathetic victim of cyberattacks.
    The US has lamented its own lack of preparedness for a major Internet hack attack and focused on the 30+ companies affected by the recent China-based hack that set Google off on its recent anti-censorship kick. But it is Beijing that has been most at pains to claim the mantle of "victim."

    We're number 1!

    "As one of the major victims of hacking in the world," said a Foreign Ministry spokesperson, "China advocates stronger international cooperation in combating hacking to protect citizens' privacy and safeguard cyber security according to law."
    The accusations of Chinese hacking come as China tries to deflect the Google story, saying that it's a business dispute (and thus the US government should stay away), that the government had nothing to do with the hacking, and that Chinese people "fully enjoy the freedom of speech and have immediate access to adequate information in accordance with law, which is one of the important reasons that they firmly follow the path of socialism with Chinese characteristics."
    "According to law" is important in this formulation, because it allows the Chinese to have a consistent focus on following the law. Google must censor search results in China because it is the law; China isn't behind hack attacks that break the law; let's all work together to make cybersecurity an international issue (according to law).
    The spokesperson's last comments came on February 1 in response to questions about a meeting between China and US Secretary of State Clinton that came on the sidelines of an Afghan donor conference. The response is telling, because it fits into the emerging Chinese narrative about cyberattacks: "hey, we're huge victims!"
    China has stressed its own victimization ever since it recovered from its initial confusion and began responding to the Google narrative. Back on January 19, the Foreign Ministry was stressing the "we're victims too" theme, saying that cyberattacks from abroad increased 148 percent in 2008. (Also: China's Internet "was open and managed in accordance with the law.")
    On January 22, in the wake of Hillary Clinton's major speech on Internet freedom, the Foreign Ministry stressed that it was "a major victim of hacking in the world," asked for international cooperation, and claimed that China "supervises Internet according to law."
    We're victims, too!
    The US intelligence community remains skeptical of China's interest in stopping international cyberattacks of a certain kind: state-backed attacks trolling for data, corporate secrets, or infrastructure weaknesses.
    In a report (PDF) submitted to Congress yesterday, Dennis Blair, the Director of National Intelligence, placed cyberattacks at the very top of the document. And, while China wasn't called out by name, Blair's single example was telling.
    "The recent intrusions reported by Google are a stark reminder of the importance of these cyber assets, and a wake-up call to those who have not taken this problem seriously," he wrote.
    How bad is the problem? Well, the US sees itself as a major victim of cyberattacks, too. "Sensitive information is stolen daily from both government and private sector networks," wrote Blair. "We often find persistent, unauthorized, and at times, unattributable presences on exploited networks, the hallmark of an unknown adversary intending to do far more than merely demonstrate skill or mock a vulnerability."
    In the section on China, Blair noted four key areas of concern; one was "China’s aggressive cyber activities." (The US maintains such capabilities too, of course, and Blair called on Congress to deliver more funding.)

    Source : http://arstechnica.com/tech-policy/news/2010/02/china-us-vie-for-mantle-of-worlds-biggest-hacking-victim.ars

    Major Israeli websites hacked

    Unprecedented number of Israeli websites hacked: Hundreds of websites were damaged by hackers in recent hours, following IDF activity in the Gaza Strip. The hackers are members of the Moroccan “Team Evil” group, responsible for most of the website damage in Israel in the past year. This is the largest, most concentrated attack on Israeli websites in recent years.
    A Ynet investigation revealed that more than 750 Israeli websites, on a number of different domains, were hacked into and damaged in recent days. Prominent among them were the Soldier’s Treasury Bank, Bank Hapoalim (not the main page), Rambam Hospital, the Society for Culture and Housing, BMW Israel, Subaru Israel, Jump Fashion, non-profit organization “Yedid,” Kadima’s youth website, and the Globus Group ticket center. Many of these sites have not yet returned to normal.

    Hackers left the message: You’re killing Palestinians, we’re killing servers.

    Early on Wednesday, the IDF began operation “Summer Rains” in Gaza: Forces entered the southern end of the strip, adjacent to the

    point of Cpl. Gilad Shavit’s kidnap. The air force attacked a power station and blacked out areas of Gaza. Three bridges were bombed in central Gaza, in order to prevent movement of the kidnapped soldier.   Many Israeli websites are hacked every day – most of these are small sites, with inadequate information security. It is significantly different when the sites are ones of large companies, who have adequate defenses from this sort of attack.

    Past success of Team Evil

    In the past, Team Evil succeeded in hacking into several sites of medium-sized but recognized Israeli companies. In April, they hit tens of sites, including those of the “Shilav” children’s store, “The Blue Square” supermarket and McDonald’s.

    The group’s spokesman previously told Ynet that “we are a group of Moroccan hackers that hack into sites as part of the resistance in the war with Israel. We attack Israeli sites every day. This is our duty…hacking is not a crime.”

    Added another group member: “We want Israel to stop fighting. Stop killing children and we’ll stop hacking.” According to the spokesman, the group’s members are all Moroccan youths, under the age of 20.

    The increase in hacking of websites following military operations is a well-known phenomenon, in Israel and in the rest of the world. A similar increase was seen in attacks on both Israeli and Arab websites in the first days of the second intifada, pursuant to military operations that took place in Gaza, Judea and Samaria at that time.

    World's biggest hacker held

    A London man described as the "world's biggest computer hacker" has been arrested.

    Gary McKinnon, 39, was seized by the Met's extradition unit at his Wood Green home.

    The unemployed former computer engineer is accused of causing the US government $1billion of damage by breaking into its most secure computers at the Pentagon and Nasa. He is likely to be extradited to America to face eight counts of computer crime in 14 states and could be jailed for 70 years.

    The former Highgate Wood comprehensive-pupil was granted bail today at Bow Street Magistrates' Court.

    Most of the alleged hacking took place in 2001 and 2002. At one stage the US thought it was the work of the al Qaeda terror network.

    Friends said that he broke into the networks from his home computer to try to prove his theory that the US was covering up the existence of UFOs.

    He is accused of a series of hacking offences including deleting "critical" files from military computers. The US authorities said the cost of tracking him down and correcting the alleged problems was more than £570,000. The offences could also see him fined up to £950,000 if found guilty on all charges.

    He was arrested yesterday evening but the US first issued an indictment against him in November 2002.

    Prosecutor Paul McNulty alleged that McKinnon, known online as "Solo," had perpetrated "the biggest hack of military computers ever". He was named as the chief suspect after a series of electronic break-ins occurred over 12 months at 92 separate US military and Nasa networks.

    McKinnon was also accused of hacking into the networks of six private companies and organisations.

    It is alleged that he used software available on the internet to scan tens of thousands of computers on US military networks from his home PC, looking for machines that might be exposed due to flaws in the Windows operating system.

    Many of the computers he broke into were protected by easy-to-guess passwords, investigators said. In some cases, McKinnon allegedly shut down the computer systems he invaded.

    The charge sheet alleges that he hacked into an army computer at Fort Myer, Virginia, where he obtained codes, information and commands before deleting about 1,300 user accounts.

    Other systems he hacked into included the Pentagon's network and US army, navy and air force computers.

    Reports when he was first indicted said that McKinnon found his career as a computer engineer tedious.

    One message updating old schoolfriends on a website read simply: "Computers (Yawn)".

    Friends said he was desperate to prove that the Americans had mounted a huge cover-up to deny his belief that aliens had visited earth.

    Andrew Edwards, who has known McKinnon since their days together at Highgate Wood comprehensive, said in 2002: "Gary told me all he was doing was looking for proof of a cover-up over UFOs.

    "He's been interested in UFOs for some time and believes the Americans are holding back information - although he didn't find any proof."

    Outside court, his solicitor Karen Todner said he was disappointed it had taken the authorities this long to bring him to court.

    She said: "This decision for extradition is driven by the American government. Mr McKinnon intends to contest this case most vigorously.

    "Of particular concern to him is the treatment of other British nationals under the American judicial system which inspires little confidence.

    "We believe that as a British national, he should be tried here in our courts by a British jury and not in the US."

    Source : http://www.thisislondon.co.uk/news/article-19164714-worlds-biggest-hacker-held.do

    Wednesday, May 25, 2011

    How to Earn Money From Facebook



    Facebook has become a social networking phenomenon that started just with college students but now has expanded to all types of social groups. Much of Facebook users are so addicted to this website, they spend hours exploring and using different kinds of social applications. Like the television, people are spending more and more time in front of their computers - surfing the web or trying out new applications on Facebook.

    Like with more popular media like the television, radio or print advertisements, Facebook also generates advertisements that go with their applications. You can apply the same concept - make a product and sell it. So, how do you do this with Facebook? Here are ways to get your profits running.

    Sell your product.

    If you already have a product, you can sell it on Facebook - most especially if your service or product caters to the 18 to 35 year old group. For example, if you own a twenty-four hour pizza place, you can put up your page with your company profile and your products. Some college students that go online during the wee hours of the night might actually crave for pizza.

    Or if you have a bookstore, you can put up a page asking people if they want to order a book online for a significantly lower price compared to other online bookstores. Know your consumers and find ways on how to get in touch with them. Join groups or causes so your presence would be more visible.

    Make your Facebook page interesting.

    A lot of people also browse Facebook looking for interesting content like causes to support, funny stuff or photos that are worth taking a look at. You can start thinking of ways on how to make your page interesting, so a lot of readers would go to your profile page.

    You just have to put an advertising space on your profile page. Then, find advertisers that would be interested in putting up their ad banners on your site. If your page is about books, maybe you'd like to get in touch with Amazon. It would be logical, of course, to get advertisers that are related with your actual content.

    You don't actually have to sell anything on your Facebook page, you just have to put up advertising spaces once you get the traffic rolling.

    Create applications.

    Facebook is so popular because of the various third-party applications it offers. First of, you should know what the market demands. What applications do Facebook users want? Most users are between the ages of 18 and 35 so it is understandable that most Facebook applications would be mashups between music, video, applications that are just for fun or their profiles. Applications would range from free gifts, to horoscopes, to trivia games, personality tests or graffiti walls on their profile pages. These applications are viral - meaning it can spread in a matter of minutes! So, a lot of people can be using your application minutes after it has been launched. That would mean that you can sell advertising spaces on your application.
    If you don't have the means or the money to get your application up and running, you can sell your idea to companies like Bay Partners or get developers to help you with it.

    Copyright (c) Althea Marie Tan. If you are interested to know more about how to use Facebook and to earn money from it, visit Facebook Social Ads [http://facebook-social-ads.net]

    Article Source: http://EzineArticles.com/?expert=Thea_Tan

    Tuesday, May 24, 2011



    PSN & SONY hack - Recent Hacking Case

    In April 2011, Hacker stole 77 million PSN customers personal information--including names, addresses, billing history.The  some days later another massive breach at Sony was 100 million user's personal info hacked in Japan . Just yesterday Sony PlayStation Network hacked again, user passwords compromised. The Hacker News investigate about this Biggest Hacking case of Year and Finally we Release our 1st Report on Sony's 3rd Attack Issue on 8th May 2011. In our Report we prove that How hackers get the list Customers info just using simple Google Searches.

    Further a Hacking Group named "
    PH4N70M Hacking Team" Claiming to Hack the PSN Network. We (THN) try to talk with these hackers and try to collect some info about this Breach. The Statement by Founder of PH4N70M Hacking Team -- "The PSN was comprised of multiple forwarding servers. When my team went in, we found an authorization server (Codenamed auth.sony). This server had no encryption, no DDoS protection was in place. No load balancing. This is how the PSN network was taken down. I thought I’d pass that along to you due to the confusion people are having. This gateway was not load balanced and not secured operating through the default port 80. This server, during early operations back in February (when the operation was initiated in a vote in Operation Payback) was also thought to control login to sonys stores and shop networks. (Marketplace) I cannot confirm this. The original planned attack was going to be a LOIC + Slowloris attack. I also heard before I left of a bufferoverflow attack.The key players in PH4N70M (Phantom) include an exploiter (TH0R), Xik, and several others including the operation payback collaborator named Wolfy. The rest of the team will remain hidden for now.The credit card concerns were all because the data was never encrypted when sent"


    Source : http://www.thehackernews.com/2011/05/role-of-hacking-in-stealing-and-selling.html

    Role of Hacking in Stealing and Selling Credit Cards !

    People use the Internet in their everyday lives. With technology advancing as fast as it is, most modern day homes have gone online, turning to the Internet to save time with busy days, performing simple tasks like online banking, purchasing items on eBay or Amazon, even taking college classes online. Internet Banking , Credit Cards are become the mode of Payments.

    Its 2011, Hacker have Eye on your Bank Balance, Credit Card details and Logins. These online Criminals get you Credit Card details and sell them to other customers. Credit card numbers can be purchased for a dollar or less if you buy in bulk And so-called full profiles, including a Social Security number and mother’s maiden name, are available for just $80. ATM pin numbers and platinum cards cost extra.

    Computer hackers have been found stealing and selling other people's credit card information in masses. Hacking happens just like any other crime, having both low level attacks like a single person stealing and using your online email accounts, to a more organized structure like a group of hackers attacking a corporate mainframe for large amounts of personal information.

    Source : http://www.thehackernews.com/2011/05/role-of-hacking-in-stealing-and-selling.html

    Students arrested in Nye country computer haking case

    A dozen students were arrested by the Nye County Sheriff's Department for allegedly changing their grades in the school computer system.
    Police say Tyler Coyner is suspected of stealing the password to the grade system at Pahrump Valley High School and then selling the password to others. The alleged crime went on for two semesters.
    Police say Coyner even went as far as changing his own grades, making himself the salutatorian at graduation.
    Coyner and another suspect, Matthew Miller, are also accused of stealing a television from Wal-mart and possessing fake ID's. They are facing charges of altering computer data, conspiracy to commit a crime, burglary and grand larceny.
    Ten other un-named students, all under the age of 18, have also been charged in the incident.

    Source : http://www.thehackernews.com/2011/03/students-arrested-in-nye-county.html

    Build Safety Into the Very Beginning of the Computer System

    ScienceDaily (May 11, 2011) — A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this fundamental system firmware -- computer code built into hardware -- initializes the hardware when you switch on the computer before starting the operating system. BIOS security is a new area of focus for NIST computer security scientists.

    "By building security into the firmware, you establish the foundation for a secure system," said Andrew Regenscheid, one of the authors of BIOS Protection Guidelines (NIST Special Publication 800-147). Without appropriate protections, attackers could disable systems or hide malicious software by modifying the BIOS. This guide is focused on reducing the risk of unauthorized changes to the BIOS.
    Designed to assist computer manufacturers writing BIOS code, SP 800-147 provides guidelines for building features into the BIOS that help protect it from being modified or corrupted by attackers. Manufacturers routinely update system firmware to fix bugs, patch vulnerabilities and support new hardware. SP 800-147 calls for using cryptographic "digital signatures" to authenticate the BIOS updates before installation based on NIST's current cryptographic guidelines. The publication is available just as computer manufacturers are beginning to deploy a new generation of BIOS firmware. "We believe computer manufacturers are ready to implement these guidelines and we hope to see them in products soon," said Regenscheid.
    The publication also suggests management best practices that are tightly coupled with the security guidelines for manufacturers. These practices will help computer administrators take advantage of the BIOS protection features as they become available.
    BIOS Protection Guidelines, NIST SP 800-147, is available at http://csrc.nist.gov/publications/nistpubs/800-147/NIST-SP800-147-April2011.pdf.

    Source : http://www.sciencedaily.com/releases/2011/05/110511162533.htm

    Hacker penetrates T-Mobile systems

    A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned.

     Twenty-one year-old Nicolas Jacobsen was quietly charged with the intrusions last October, after a Secret Service informant helped investigators link him to sensitive agency documents that were circulating in underground IRC chat rooms. The informant also produced evidence that Jacobsen was behind an offer to provide T-Mobile customers' personal information to identity thieves through an Internet bulletin board, according to court records.

    Jacobsen could access information on any of the Bellevue, Washington-based company's 16.3 million customers, including many customers' Social Security numbers and dates of birth, according to government filings in the case. He could also obtain voicemail PINs, and the passwords providing customers with Web access to their T-Mobile e-mail accounts. He did not have access to credit card numbers.

    The case arose as part of the Secret Service's "Operation Firewall" crackdown on Internet fraud rings last October, in which 19 men were indicted for trafficking in stolen identity information and documents, and stolen credit and debit card numbers. But Jacobsen was not charged with the others. Instead he faces two felony counts of computer intrusion and unauthorized impairment of a protected computer in a separate, unheralded federal case in Los Angeles, currently set for a February 14th status conference.

    The government is handling the case well away from the spotlight. The U.S. Secret Service, which played the dual role of investigator and victim in the drama, said Tuesday it couldn't comment on Jacobsen because the agency doesn't discuss ongoing cases-- a claim that's perhaps undermined by the 19 other Operation Firewall defendants discussed in a Secret Service press release last fall. Jacobsen's prosecutor, assistant U.S. attorney Wesley Hsu, also declined to comment. "I can't talk about it," Hsu said simply. Jacobsen's lawyer didn't return a phone call.

    T-Mobile, which apparently knew of the intrusions by July of last year, has not issued any public warning. Under California's anti-identity theft law "SB1386," the company is obliged to notify any California customers of a security breach in which their personally identifiable information is "reasonably believed to have been" compromised. That notification must be made in "the most expedient time possible and without unreasonable delay," but may be postponed if a law enforcement agency determines that the disclosure would compromise an investigation.

    Company spokesman Peter Dobrow said Tuesday that nobody at T-Mobile was available to comment on the matter.

    Source : http://www.securityfocus.com/news/10271

    Share

    Twitter Delicious Facebook Digg Stumbleupon Favorites