Posts Tagged ‘download’

A new information end adult in a cloud

Thursday, November 15th, 2012

In ways that Google has spin synonymous with search, Facebook with networking, tweeting with being concise, on a setting is Dropbox for sharing. Folks are already saying, “I’ll Dropbox a record for we to download.”

At a spin of a decade, while people were awaiting cloud computing to change a computing paradigm, it seems to be trickling in late as pointed practices altering users’ computing etiquette. Small-scale attempts such as Dropbox are gaining momentum, while behemoths such as Google, Apple and Microsoft are now relocating quick to get a share of a common man’s cloud.

Cloud computing

Think no computers, though demeanour during a clouds for a minute. Clouds are opaque, and they are flourishing constantly by coalescing smaller clouds into them — a garb grows to spin one mass.

In mechanism networks, scaling adult resources has always been same to mouth-watering a crisis. For instance, when an organization grows from 40 employees to 200, not usually does a partial of a network infrastructure spin redundant, though it also has to make room for additional users. And afterwards there is a strenuous charge of migrating all a existent user data.

Enter cloud computing, and a biggest guarantee it has brought with it is seamless scaling. Whatever competence be a apparatus direct in terms of storage or computation, a mega installations of fast-performing servers with high-speed networking (cloud) as is claimed by cloud use providers, hides a whole scaling weight from a users, simply permitting a networks to grow.

Cloud computing, when nude of a hype that surrounds it these days, can be accepted to be in a inlet of a vendor-consumer transaction. While consumers sinecure computing resources from a vendor’s infrastructure over a Internet, use providers franchise services, that can be possibly in terms of infrastructure or program resources. When a user leases a few gigabytes of storage space, or a practical appurtenance regulating on a use provider’s installation, in cloud lingo it is Infrastructure as a Service (IaaS) or Software as a Service (SaaS).

The Dropbox effect

Dropbox, a start-up, that was innate in 2007, offers storage IaaS. Like many other Internet ventures, Dropbox offers a use on a ‘freemium’ (portmanteau of giveaway and premium) basis. It lures users with a giveaway cloud storage comment of 2 GB, and charges a medium reward for some-more storage ability or for modernized features. Dropbox achieved viral expansion in this niche domain shortly after it started operations; it now has 50 million and users.

The primary reason for a exile success of Dropbox is not simply a giveaway storage it provides, though a solemnly combined underline additions that come bundled with a storage. For instance, one really useful underline of Dropbox is a “synchronising” focus created in a Python programming language, that runs on all handling systems as a client. Users need not record on to a Web browser to entrance their cloud account. A internal folder on a user’s mechanism is automatically configured to upload and download calm from a Dropbox account, and reduces a to-and-fro invert to a Website.

Security

Handing over one’s information to a third celebration is some-more or reduction like entrusting your assets to a third-party bank. The questioning about a confidence of users’ information on a cloud has been a biggest roadblock for cloud enterprises.

In Aug 2012, many Dropbox users found their accounts burst into, information stolen and their remoteness compromised. This spam conflict was immediately patched by Dropbox with apologies and upgraded confidence features.

Prachet Verma, a student, uses Dropbox extensively to combine with peers, and is bending to a nuances that Dropbox offers. “The concede of guileless my information to a third chairman in box of Dropbox is value a risk, for it firstly removes a paranoia of losing information on my internal drives.”

Moreover, he says a open couple choice in Dropbox is an “excellent feature”, regulating that we can share files even with people not connected to Dropbox. “No longer do we worry about a record extent for attachments in my mail,” says Prachet. The box of Dropbox, and in ubiquitous cloud computing, will take engaging turns in a months forward with large players bootstrapping for a competition to a cloud.

Google with a Google Drive, Apple with iCloud, and Microsoft with Skydrive are all diving in. Clearly, Dropbox will have to build on a trust it already enjoys among existent users to stay forward on a cloud.

Article source: http://www.thehindu.com/news/states/karnataka/a-new-data-destination-up-in-the-cloud/article4085548.ece

SA mobiles jump forward in broadband

Thursday, November 1st, 2012

The country’s mobile operators have shown a noted alleviation in a opening of their networks in a past year, new investigate shows. But there’s a prolonged approach to go. By Craig Wilson.


Added by Craig Wilson on 1 Nov 2012.
Saved underneath News, Top
Tags:




South Africa is one of a many softened countries in terms of mobile network performance, carrying shown a 50% alleviation between 2011 and 2012, new investigate by Cisco shows.

However, a nation is still distant behind a rest of a universe when it comes to connectivity speeds indispensable for next-generation broadband services.

The commentary are contained in Cisco’s second annual Global Cloud Index report. The news forecasts that a Middle East and Africa will have a top expansion in cloud-computing formed network trade by 2016.

Cisco found that South Africa’s bound lines offer an normal download speed of 2,05Mbit/s and an normal upload speed of 764kbit/s. Average latency — a magnitude of network loiter — is 95ms for consumers and business users combined.

Overall, consumer and business mobile network opening showed normal download speeds of 2,63Mbit/s, upload speeds of 1,25Mbit/s and latency of 134ms.

This is compared to a tellurian averages of a fixed-line download speed of 9,4Mbit/s and an upload speed of 4,5Mbit/s. Global mobile download speeds normal 2,2Mbit/s while upload speeds normal 0,97Mbit/s.

Cisco forecasts that tellurian data-centre trade will grow 4 fold, reaching a sum of 6,6 zettabytes (a billion terabytes) annually by 2016. The association also predicts that a Middle East and Africa will have a top rate of cloud-based trade growth, with a 79% devalue annual expansion rate. The subsequent top turn of expansion is approaching to come from Latin America, with 66% devalue annual increases.

Globally, Cisco predicts that cloud trade – that it says is a fastest-growing member of data-centre trade – will grow 6 fold. This represents a 44% devalue annual expansion rate, or a pierce from 683 exabytes of annual trade in 2011 to 4,3 zettabytes by 2016.

According to Cisco, a immeasurable infancy of data-centre trade is not caused by finish users though by information centres and cloud-computing workloads. By 2016, Cisco expects roughly 76% of data-centre trade will be generated by storage, prolongation and growth data. Replication between information centres will comment for a serve 7%, with a remaining 17% of data-centre trade driven by finish users accessing cloud-based services for browsing, e-mail and streaming video content.

In a Middle East and Africa, trade stemming from cloud services will comment for 64% of sum data-centre trade by 2016, adult from 37% in 2011.

Cloud-based data-centre trade for a segment grew 93% in 2011. Traditional data-centre traffic, meanwhile, will cringe from 63% to 36% of a sum by 2016. Overall trade will strech 91 exabytes a year in 2016 compared to a 15 exabytes in 2011.  — (c) 2012 NewsCentral Media

Share this article


Article source: http://www.techcentral.co.za/sa-mobiles-leap-ahead-in-broadband/35974/

Amazon error fixed

Tuesday, October 23rd, 2012

Do we illegally download calm from a internet?

Related story: (See story)

Article source: http://www.stuff.co.nz/technology/digital-living/7850913/Amazon-outage-causes-global-headache

Apple drops Java after confidence warnings

Tuesday, October 23rd, 2012

Do we illegally download calm from a internet?

Related story: (See story)

Article source: http://www.stuff.co.nz/technology/digital-living/7852145/Apple-drops-Java-after-security-warnings

Time To Update Java – Or Disable It!

Friday, August 31st, 2012

Image representing Oracle Corporation as depic...

Image around CrunchBase

Earlier this week a new and really critical vulnerability was detected by confidence researchers in a Java height that is commissioned into millions computers worldwide. This left users using Java on Windows, Mac and even Linux non-stop to being hacked by simply visiting a antagonistic web page.

Now Oracle, a association obliged for Java, has expelled an refurbish that fixes these vulnerabilities. In fact, a association has expelled an refurbish both for a latest recover (version 1.7, also called Java 7) and for an progressing recover (version 1.6, also called Java 6).

Note that usually Java 7 was exposed to a new conflict highlighted this week. Java 6 is tormented by a different, uncertain disadvantage referred in a releases records as “a security-in-depth fix”.

The dual patched versions are Java 7 refurbish 7 and Java 6 refurbish 35.

Windows users can download a latest chronicle of Java approach from Oracle. Depending on what chronicle we are now using afterwards we might be offering this refurbish automatically.

What Mac users have to do depends on what chronicle of OS X are running. Java 7 was usually accessible to users using OS X 10.7 ‘Lion’ and 10.8 ‘Mountain Lion’. Neither of these versions was shipped with Java commissioned and users would have had to download and implement it manually from Oracle, so chances are good that not many Mac users are affected.

When it comes to progressing versions of OS X things are a small different. Here Java 6 was granted as customary and it was Apple and not Oracle that was obliged for providing users with a updates. As nonetheless Apple has not expelled refurbish 35 for Java 6.

Official Java updates can be downloaded from Oracle. Mac users using OS X 10.6 ‘Snow Leopard’ or progressing will have to wait for a refurbish to come to them around a handling system’s Software Update channel.

My recommendation is that if we don’t need Java — and chances are today that unless we know because we need it, we don’t — we should invalidate it, either we are using Windows or Mac. This is not as easy to do as it should be, though assistance is during hand. Security publisher Brian Krebs has put together an excellent beam to disabling Java for opposite browsers underneath both Windows and Mac.

Article source: http://www.forbes.com/sites/adriankingsleyhughes/2012/08/31/time-to-update-java-or-disable-it/

8 confidence tips for your Mac

Wednesday, August 22nd, 2012


It’s tough to repudiate that Macs are flattering damn secure. According to Sophos, there are 4 famous viruses on OS X, compared to 80,000 on Windows. That said, Macs aren’t godlike by any means. Viruses aren’t a customarily approach people with bad intentions can get during your computer. In fact, enemy are good wakeful of Apple owners’ fake clarity of security, and we’ve seen them take advantage of this time after to time to concede OS X systems.

With that in mind, we’ve put together some easy to follow tips to assistance secure your Mac systems and personal data. They’re listed in sequence of paranoia – a initial dual are mandatory, really, while a final few are tailored to a intensely security-conscious.

1. Back adult your data

We wouldn’t routinely classify behind adult as a confidence issue, nonetheless a new penetrate of Wired publisher Mat Honan incited it into one, as he schooled a tough approach a giddiness of relying usually on iCloud for backup. Apple creates tough backups impossibly easy with Time Machine, a built-in underline that frequently backs adult your whole complement onto an outmost tough drive. All we need to do is retard it in. Apple’s iCloud and other cloud-based backup services are convenient, nonetheless we should never rest entirely on a cloud (or indeed, any singular backup solution). After all, you’re entrusting all your information to another association with a cloud, and you’d be astounded during how drifting they can be. The Mat Honan case, and a approach enemy managed to pretence Amazon and Apple reps into resetting his iCloud account, illustrates this some-more than aptly.

2. Install new program updates immediately

Unpatched program is still one of a many common vectors for mechanism attacks. OS X creates checking for updates easy by doing it for you. Open a Software Update mirror in System Preferences, make certain “Check For Updates” is on (it customarily is by default) and set it to a many visit setting.

3. Enable Keychain

Hopefully by now we know never to use a same cue for everything, since if an assailant gains entrance to one of your accounts, he’ll try regulating a same cue to entrance other kinds of accounts. That’s because it’s essential to use mixed “insanely secure” passwords. Fortunately, in OS X we don’t have to know them all by heart. Just use a built-in cue manager Keychain that allows we to store your passwords, certificates, and other trusted information used to substantiate an focus or website. Find Keychain in a Utilities folder underneath Applications.

4. Know your source

The few instances of Mac malware we’ve seen have all entered users’ systems by rowdiness a user into downloading antagonistic email attachments, or downloading a legitimate ostensible square of software. In a latest program OS X 10.8 Mountain Lion (see a examination of it here), Apple has introduced a new confidence underline in a control row called Gatekeeper. This lets we name acceptable sources of app installations. At a top confidence setting, you’ll customarily be means to download and implement apps from a Mac App Store. The default choice I’d hang with lets we download apps sealed with a Developer ID (like Microsoft). The lowest confidence environment lets we download apps from anywhere.

Pin It

5. Disable Java and Flash plug-ins

Security experts have prolonged speedy users to invalidate Java and Flash in their browsers, that closes renouned conflict vectors on Macs. For instance, a Flashback malware that putrescent over half a million Macs progressing this year exploited systems by Java. So unless you’re a artistic form who relies heavily on Adobe Creative Suite, we substantially don’t need these plug-ins now that many websites are switching to HTML5. Disable Java by going to a Applications folder, Utilities, and unchecking all a Java boxes underneath a General tab. To invalidate Flash, you’ll have to use a Chrome or Firefox browsers that let we configure this setting.

6. Install antivirus software

If your genius is that “you can never be too safe,” there are lots of popular, giveaway options out there that will strengthen your complement from a several Trojans, viruses, and phishing scams that spasmodic ambuscade Mac users. Mac-specific confidence vendors like Intego, Sophos, and ClamXav yield giveaway (or during slightest giveaway trials of) antivirus software, nonetheless we contingency acknowledge we haven’t tested them yet.

7. Use a stronger firewall

OS X has a built-in firewall (disabled by default) that blocks incoming tie attempts, nonetheless you’ll find distant some-more granularity in a renouned OS X firewall, Little Snitch. Little Snitch tells we when an focus tries to settle an effusive connection, that could forestall a antagonistic app from promulgation out private data. It handles all network interfaces, including AirPort, PPP, network cards and so forth, and distinct OS X’s built-in firewall lets we retard specific IP addresses. However, it does take time to entirely configure.

Pin It

8. Encrypt with FileVault 2

If your MacBook is carrying State secrets or likewise trusted information, we can capacitate this built-in underline to encrypt your whole tough expostulate with AES 128 encryption.

Pin It

And that’s a lot for a small tips excursion. As mentioned earlier, tips 1 and 2 are mandatory, really. This list is by no means exhaustive, so feel giveaway to share your possess Mac confidence tips in a comments territory below.

Article source: http://www.itproportal.com/2012/08/22/8-security-tips-for-your-mac/

AT&T 4G LTE Available In Wichita

Monday, July 9th, 2012

WICHITA, Kan., Jul 9, 2012 /PRNewswire/ — ATT* has incited on a 4G LTE network in Wichita, bringing business a latest era of cutting-edge wireless network technology. ATT 4G LTE provides several benefits, including:

  • Faster speeds. LTE record is means of delivering speeds faster than many other mobile Internet technologies. Customers can stream, download, upload and diversion faster than ever before.
  • Cool new devices. ATT offers several LTE-compatible devices, including new ATT 4G LTE smartphones and tablets, such as a HTC One(TM) X, Samsung Focus® 2, Nokia Lumia 900, Samsung Galaxy Note(TM), and Pantech Element(TM) tablet.
  • Faster response time. LTE technology offers reduce latency, or a estimate time it takes to pierce information by a network, such as how prolonged it takes to start downloading a webpage or record once you’ve sent a request. Lower latency helps to urge services like mobile gaming, two-way video job and telemedicine.
  • More fit use of spectrum. Wireless spectrum is a calculable resource, and LTE uses spectrum some-more well than other technologies, formulating some-more space to lift information trade and services and to broach a improved network experience.

(Logo: http://photos.prnewswire.com/prnh/20120612/DA23287LOGO)

“We continue to see direct for mobile Internet skyrocket, and a new 4G LTE network in Wichita responds to what business wish from their mobile knowledge — some-more access, faster speeds, and a best devices,” pronounced Nancy Garvey, clamp boss and ubiquitous manager for a Greater Midwest Region of ATT. “Wichita business now have a fastest accessible speeds with 4G LTE, and business opposite a area are enjoying quick speeds on a nation’s largest 4G network.”

ATT’s 4G Network
ATT business have entrance to a nation’s largest 4G network, covering some-more than 260 million people. According to recent third-party speed tests by PCWorld, ATT 4G LTE speeds are faster than a competition. Testing in 13 cities showed that ATT’s multiple of 4G LTE and HSPA+ technologies delivered faster download speeds than any other conduit tested.

Even as 4G LTE expands, ATT business are means to suffer widespread, ultra-fast and unchanging 4G speeds on their concordant device as they pierce in and out of LTE areas. ATT has two 4G networks that work together for customers, LTE and HSPA+ with extended backhaul. With other carriers, when we transport outward of their LTE coverage area, you’re on a many slower 3G network.

Limited 4G LTE accessibility in name markets. Deployment ongoing. 4G LTE device and information devise required. LTE is a heading of ETSI. 4G speeds not accessible everywhere. Learn some-more about 4G LTE during att.com/network.

*ATT products and services are supposing or charity by subsidiaries and affiliates of ATT Inc. underneath a ATT code and not by ATT Inc.

About ATT
ATT Inc. (NYSE:T) is a premier communications holding association and one of a many respected companies in a world. Its subsidiaries and affiliates – ATT handling companies – are a providers of ATT services in a United States and around a world. With a absolute array of network resources that includes a nation’s largest 4G network, ATT is a heading provider of wireless, Wi-Fi, high speed Internet, voice and cloud-based services. A personality in mobile Internet, ATT also offers a best wireless coverage worldwide of any U.S. carrier, charity a many wireless phones that work in a many countries. It also offers modernized TV services underneath a ATT U-verse(®) and ATT ?DIRECTV brands. The company’s apartment of IP-based business communications services is one of a many modernized in a world.

Additional information about ATT Inc. and a products and services supposing by ATT subsidiaries and affiliates is accessible during http://www.att.com. This ATT news recover and other announcements are accessible during http://www.att.com/newsroom and as partial of an RSS feed during www.att.com/rss. Or follow a news on Twitter during @ATT.

© 2012 ATT Intellectual Property. All rights reserved. Mobile broadband not accessible in all areas. ATT, a ATT trademark and all other outlines contained herein are trademarks of ATT Intellectual Property and/or ATT dependent companies. All other outlines contained herein are a skill of their particular owners.

Cautionary Language Concerning Forward-Looking Statements
Information set onward in this press recover contains financial estimates and other forward-looking statements that are theme to risks and uncertainties, and tangible formula competence differ materially. A contention of factors that might impact destiny formula is contained in ATT’s filings with a Securities and Exchange Commission. ATT disclaims any requirement to refurbish and correct statements contained in this news recover formed on new information or otherwise.

SOURCE ATT Inc.

Article source: http://www.redorbit.com/news/entertainment/1112652047/att_4g_lte_available_in_wichita/

PC about to get the biggest facelift

Wednesday, July 4th, 2012

A deputy demonstrates a ASUS Tablet 810 during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012.

A deputy demonstrates a ASUS Tablet 810 during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012. Photo: Bloomberg

The personal mechanism is about to get a biggest facelift, with program builder Microsoft about to recover a radical new chronicle of a renouned handling complement called Windows 8.

What is Windows 8?

An attendant demonstrates regulating an Acer Aspire 7600U touchscreen mechanism during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012.

An attendant demonstrates regulating an Acer Aspire 7600U touchscreen mechanism during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012. Photo: Bloomberg

Windows 8 is a latest chronicle of Microsoft’s personal mechanism handling system. It follows a recover of Windows 7 in 2009, that superceded 6 prior versions.

What’s an handling system?

An handling complement is program that creates it probable to use mechanism hardware, such as a motherboard, memory and tough hoop drive. A mechanism though an handling complement is unfit to use. Software writers emanate new applications with a sold handling complement in mind. There are 3 categorical contenders for mechanism hardware. Microsoft Windows dominates during around 90 per cent, Apple has around 6 per cent and a subsequent large actor is Linux, an open source handling complement for a some-more technically disposed that is giveaway to download and install.

What creates Windows 8 so radical?

It’s touch-sensitive so when commissioned on a touch-sensitive device, such as Microsoft’s recently announced Surface inscription computer, we will be means to work it though touching a keyboard or a mouse. This is good for mobile computing.

But it will also broach a scarcely matching knowledge on some-more normal computers operated around keyboards and mice.

Windows 8 needs reduction mechanism resources than both of a predecessors, a magisterial Windows Vista and Windows 7, that means it will run on any mechanism using possibly of those.

It’s designed for mixed devices, that means users will have a same, or during slightest really similar, practice either they record in to Windows 8 on a smartphone, a inscription computer, a laptop or a desktop. User profiles are saved to a internet so whenever we record on to a Windows 8 machine, either it’s yours or a open one, we will be means to entrance all your settings. You can indicate Internet Explorer 10, Windows 8 new web browser, during any of your favourite websites.

Will my aged program work with it?

For a many part, yes. It’s built on Windows 7 record that means anything that runs on Windows 7 should run on Windows 8. But it also connects to a Microsoft Marketplace that means we will be means to download thousands of applications generally created for Windows 8 as well.

What about a Microsoft Office suite?

Microsoft Office will run on Windows 8, and a new chronicle called Office15 is approaching in a New Year. Expect lots of formation with Windows 8 there.

When will it be available?

This is a closely rhythmical secret, though dual proof versions are accessible for giveaway download from Microsoft. These will stop to work when a blurb chronicle is released. If Microsoft sticks to a 3 year product cycle, Windows 8 should be commissioned on new machines come October. In fact anyone shopping a new Windows 7 appurtenance between now and Jan in Australia is eligible for a $14.99 ascent to Windows 8 when it hits stores. If we don’t like it, we can hurl behind to Windows 7.

You will also be means to download it or buy it on DVD from electrical retailers.

Chris Gardner recently travelled to Amsterdam as a guest of Microsoft for its TechEd Europe discussion where it showed off Windows 8 in detail.

Fairfax NZ News

Article source: http://www.smh.com.au/digital-life/computers/pc-about-to-get-its-biggest-facelift-20120705-21icc.html

PC about to get the biggest facelift

Wednesday, July 4th, 2012

A deputy demonstrates a ASUS Tablet 810 during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012.

A deputy demonstrates a ASUS Tablet 810 during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012. Photo: Bloomberg

The personal mechanism is about to get a biggest facelift, with program builder Microsoft about to recover a radical new chronicle of a renouned handling complement called Windows 8.

What is Windows 8?

An attendant demonstrates regulating an Acer Aspire 7600U touchscreen mechanism during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012.

An attendant demonstrates regulating an Acer Aspire 7600U touchscreen mechanism during a news discussion in Taipei, Taiwan, on Monday, Jun 4, 2012. Photo: Bloomberg

Windows 8 is a latest chronicle of Microsoft’s personal mechanism handling system. It follows a recover of Windows 7 in 2009, that superceded 6 prior versions.

What’s an handling system?

An handling complement is program that creates it probable to use mechanism hardware, such as a motherboard, memory and tough hoop drive. A mechanism though an handling complement is unfit to use. Software writers emanate new applications with a sold handling complement in mind. There are 3 categorical contenders for mechanism hardware. Microsoft Windows dominates during around 90 per cent, Apple has around 6 per cent and a subsequent large actor is Linux, an open source handling complement for a some-more technically disposed that is giveaway to download and install.

What creates Windows 8 so radical?

It’s touch-sensitive so when commissioned on a touch-sensitive device, such as Microsoft’s recently announced Surface inscription computer, we will be means to work it though touching a keyboard or a mouse. This is good for mobile computing.

But it will also broach a scarcely matching knowledge on some-more normal computers operated around keyboards and mice.

Windows 8 needs reduction mechanism resources than both of a predecessors, a magisterial Windows Vista and Windows 7, that means it will run on any mechanism using possibly of those.

It’s designed for mixed devices, that means users will have a same, or during slightest really similar, practice either they record in to Windows 8 on a smartphone, a inscription computer, a laptop or a desktop. User profiles are saved to a internet so whenever we record on to a Windows 8 machine, either it’s yours or a open one, we will be means to entrance all your settings. You can indicate Internet Explorer 10, Windows 8 new web browser, during any of your favourite websites.

Will my aged program work with it?

For a many part, yes. It’s built on Windows 7 record that means anything that runs on Windows 7 should run on Windows 8. But it also connects to a Microsoft Marketplace that means we will be means to download thousands of applications generally created for Windows 8 as well.

What about a Microsoft Office suite?

Microsoft Office will run on Windows 8, and a new chronicle called Office15 is approaching in a New Year. Expect lots of formation with Windows 8 there.

When will it be available?

This is a closely rhythmical secret, though dual proof versions are accessible for giveaway download from Microsoft. These will stop to work when a blurb chronicle is released. If Microsoft sticks to a 3 year product cycle, Windows 8 should be commissioned on new machines come October. In fact anyone shopping a new Windows 7 appurtenance between now and Jan in Australia is eligible for a $14.99 ascent to Windows 8 when it hits stores. If we don’t like it, we can hurl behind to Windows 7.

You will also be means to download it or buy it on DVD from electrical retailers.

Chris Gardner recently travelled to Amsterdam as a guest of Microsoft for its TechEd Europe discussion where it showed off Windows 8 in detail.

Fairfax NZ News

Article source: http://www.canberratimes.com.au/digital-life/computers/pc-about-to-get-its-biggest-facelift-20120705-21icc.html

Secunia PSI 3.0 can silently muster confidence rags for Windows software

Thursday, June 28th, 2012

Danish disadvantage comprehension and investigate organisation Secunia has launched chronicle 3.0 of a Personal Software Inspector (PSI) patch government program, that can silently implement confidence updates for a vast series of module applications.

PSI leverages Secunia’s disadvantage comprehension to establish if module programs commissioned on a user’s Windows mechanism are blank confidence patches. The product is giveaway for personal use and supports applications from over 3,000 module vendors.

The initial chronicle of a module was usually means of notifying users about accessible confidence updates and providing them with links to download them.

That altered in chronicle 2.0, that combined a ability to automatically download and silently implement rags for a singular series of renouned applications like Adobe Reader, Flash Player and Java.

The new PSI 3.0 extends a wordless patching functionally to all upheld applications. However, users can capacitate and invalidate a underline during will from a program’s interface.

Secunia is means to yield a patching knowledge that doesn’t need any user communication or bid by encapsulating all businessman rags into a exclusive installer that suppresses their dialogs.

“Updating module is a daunting task,” pronounced Thomas Kristensen, Secunia’s arch confidence officer, around email. Most module vendors don’t yield correct programmed and wordless updating mechanisms for their programs, that causes many users to destroy to keep adult with confidence updates, he said.

Statistics recently collected by Secunia from PSI users in a U.S. showed that 16 percent of a unpatched vulnerabilities rescued on their computers were located in a handling system, 18 percent in Microsoft programs and 66 percent in module applications from other vendors.

Oracle’s Java, Apple QuickTime and Adobe Shockwave Player were found to be a many unprotected programs formed on their marketplace share and unpatched rate.

Java, that is one of a many ordinarily targeted applications in exploit-based attacks, was commissioned on 83 percent of a scanned computers. However, 31 percent of them were using an old-fashioned version.

In sequence to forestall a involuntary refurbish underline from causing problems for users who need an comparison and uncertain chronicle of a module for harmony reasons, PSI 3.0 allows users to emanate omit manners for sold applications.

In further to involuntary updates for all upheld applications, a new PSI 3.0 comes with a significantly simplified user interface compared to chronicle 2.0 and supports 5 languages — English, French, Spanish, German and Danish.

Article source: http://www.cio.com.au/article/429023/secunia_psi_3_0_can_silently_deploy_security_patches_windows_software/