Thursday, April 3, 2014

HTC One M8 Features and TV App


HTC One M8: a quick look.

The original HTC One smartphone received widespread rave reviews. But can the Taiwanese firm attract similar critical acclaim with the M8? The Guardian takes a lightning look at the new device, touching on its sleek design and build, the modified news app BlinkFeed, its Boom Sound speakers, a cute new dot matrix case, the five-megapixel front facing 'selfie' camera and the nifty new depth sensor on the main camera.


Top 5 features.

1. 4 ultra pixel camera with a hardware solution for selective focus like a DLR.

2. Build quality: Made with aluminum that does not interfere with antenna, and screen bumped up to 5 inches with a curved back that has a nice feel.

3. Speakers with a 25 percent volume boost.

4. Sixth sense BlinkFeed ... BlinkFeed is a Flipboard-like tile interface that is set permanently on the main home page. Created in collaboration with Mobiles Republic, BlinkField pulls in content from various publications and social networks (Twitter, Plurk, LinkedIn, Flickr, Zoe Share and more), as well as your calendar and TV shows from the TV app. The feed can be customized, but the first version doesn't allow custom RSS feeds.

5. Longer battery life.


A demo showing the TV remote app on the new HTC One M8 and it works.

Saturday, March 29, 2014

Embedding Google Maps with Traffic Layer Included -- HTML and JavaScript

The following code can be used to create a web page with an embedded Google map with the traffic layer activated. The example shows the latitude-longitude for Los Angeles. Simply find the desired latitude-longitude coordinate for your desired location, and replace the coordinates in the code below.

++++++

<!DOCTYPE html>
<html>
  <head>
    <meta name="viewport" content="initial-scale=1.0, user-scalable=no">
    <meta charset="utf-8">
    <title>Traffic layer</title>
    <style>
      html, body, #map-canvas {
        height: 100%;
        margin: 0px;
        padding: 0px
      }
    </style>
    <script src="https://maps.googleapis.com/maps/api/js?v=3.exp&sensor=false"></script>
    <script>
function initialize() {
  var myLatlng = new google.maps.LatLng(34.04924594193164, -118.24104309082031);
  var mapOptions = {
    zoom: 13,
    center: myLatlng
  }

  var map = new google.maps.Map(document.getElementById('map-canvas'), mapOptions);

  var trafficLayer = new google.maps.TrafficLayer();
  trafficLayer.setMap(map);
}

google.maps.event.addDomListener(window, 'load', initialize);

    </script>
  </head>
  <body>
    <div id="map-canvas"></div>
  </body>

</html>

+++++

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 3.0 License, and code samples are licensed under the Apache 2.0 License. 

SOURCE:

Friday, March 28, 2014

Virtual Desktop on Mac, iPad, Google tablet, or Kindle: Amazon Workspaces Available Starting at $35 per Month


Amazon WorkSpaces: Desktop Computing in the Cloud (ENT104) | AWS re:Invent 2013.

Amazon WorkSpaces is a fully managed desktop computing service in the cloud, which allows customers to easily provision cloud-based desktops that allow end-users to access the documents, applications and resources they need with the device of their choice. Amazon WorkSpaces uses Teradici’s cloud-optimized PCoIP technology, which easily scales to meet customer requirements, and provides best-in-class security and a superior user experience over a range of networks.

Desktop virtualization has long held the promise of productivity and security benefits, but has been held back by large CapEx requirements and complicated installation and management. In this session, Gene Farrell, General Manager, AWS, and Deepak Suryanarayanan, Sr. Product Manager, AWS, provide a detailed introduction to Amazon WorkSpaces, a new AWS service that combines the benefits of desktop virtualization and a cloud-based, pay-as-you-go model. You learn about the key steps for setting up and delivering a secure cloud-based workspace accessed through purpose-built client applications.

Amazon Workspaces uses PCoIP software clients -- software implementation of the PCoIP protocol for flexible client device support. Select OEM's include this in their products for x86 and ARM based thin clients, which is also the basis for the VMware and AWS Amazon Workspaces software clients for Windows, Mac, Linux, iOS and Android which use Teradici-developed core PCoIP protocol and decoding technology.

PC-over-IP (PCoIP) is a proprietary remote display protocol developed by Teradici, which is available in hardware silicon and in software. Images rendered on the server are captured as pixels, compressed and encoded and then sent to the client for decryption and decompression. Depending on the image, different codecs are used to encode the pixels sent. There are different techniques to compress video images compared to those for text.  The PCoIP protocol transmits ‘pixels only’ across any standard IP network, so that data never leaves the data center or the AWS cloud.

The service is available on multiple devices, including laptop computers (Mac OS or Windows), iPads, Kindle or Android tablets. Amazon Workspaces will also be available on secure, high-performance PCoIP zero clients, and PCoIP Optimized™ thin clients from Teradici’s broad partner ecosystem.

Some early reviews have reported that the service is laggy in its early implementation. There are currently no trial programs for the service, which costs a minimum of $35 per month for 50GB storage, 3.75 GB RAM and no additional software, except Internet Explorer, Adobe Reader and Mozilla Firefox.

Monday, March 17, 2014

TrakDot Luggage GPS Tracking Technology: Could a Luggage Tracker Help Locate Malaysia Airlines Flight MH370?

When you are the president of a highly service-oriented telecommunications sales company and you enjoy finding technical solutions for people and businesses, you're always considering new and better solutions. That's what Michael Ginsberg, President of 3GStore, was doing this morning in the shower. The missing Malaysia Airlines Flight MH370 was on his mind, and like what often happens in Ginsberg's mind, he linked a problem and possible solutions. He thought of TrakDot, a product that his company sells.

TrakDot is a wireless device that is designed to track an airline passenger's luggage. TrakDot is powered on and placed inside a passenger's luggage. TrakDot has a built in cellular modem that connects to a local cellular network, and has the capability of sending an email and text alert to its owner(s), letting them know their luggage has safely arrived with them at the airport. When the TrakDot and its built in accelerometer sense the takeoff of a plane, it goes into a sleep mode, so it doesn't congest the airwaves, and since at high altitudes it's not going to connect with a cellular tower anyway. However, as soon as the built-in accelerometer senses the plane has slowed down under 100 knots, the TrakDot finds a local cellular carrier if available, connects to the network, and sends out the appropriate text and email alert and reports its airport location.


Wednesday, March 12, 2014

Is Google Quality Control Slipping? Stray Parenthesis Character in YouTube Embed Code

In error, a close parenthesis character has been visible as a stray character in the YouTube embed code at least all day Tuesday, March 11, 2014 and part of the day Wednesday, March 12, 2014.

There should be no parenthesis character after the closing "greater than" character

<iframe width="500" height="281" src="//www.youtube.com/embed/-YCeIgt7hMs" frameborder="0" allowfullscreen></iframe>)


Notice the parenthesis at the lower right of the video ...

)

It is easy to fix. Just remove the parenthesis manually from the code.

Wednesday, February 26, 2014

Tech Radar: Best Smartphone 2014, Spring Top 10, HTC One, LG G2, and More

TechRadar's top 10 list of the best smartphones of Spring 2014.

 01 HTC One

 02 LG G2

 03 Sony Xperia Z1 Compact

 04 Google Nexus 5

 05 Samsung Galaxy S4

 06 Apple iPhone

 07 Moto G

 08 HTC One Mini

 09 Samsung Galaxy Note 3

 10 Nokia Lumina 520

Monday, February 24, 2014

What's Up? RedFoo -- WhatsApp Outage is Screwing My Biz

WhatsApp has been down all day and RedFoo, and the singer says it's totally messing with his business -- so he's taking his patronage elsewhere.

WhatsApp was down for more than three hours on Saturday, coincidentally just days after Facebook bought it for $19 billion. However, the outage is supposed to have been caused by a router problem, which cascaded down through a bunch of servers.

WhatsApp Messenger is a proprietary, cross-platform instant messaging subscription service for smartphones, which is available for Google Android, BlackBerry OS, Apple iOS, Symbian,  Microsoft Windows Phone, BlackBerry 10, limited Nokia Series 40, and limited on the Nokia Asha platform.

On Thursday, February 19, 2014, Facebook announced it is acquiring WhatsApp for US$19 billion, and will pay $4 billion in cash, $12 billion in Facebook shares and an additional $3 billion in restricted stock units to be granted to WhatsApp's founders, Jan Koum, Brian Acton, and employees that will vest over four years subsequent to closing. The transaction is the largest purchase of a company backed by venture capitalists ever. Previously venture capital financial analysts valued the business at almost $1.5 billion.


Facebook Founder and CEO Mark Zuckerberg discusses his company's acquisition of mobile messenger WhatsApp at the Mobile World Congress in Barcelona.


European Business Correspondent Caroline Hyde reports on WhatsApp's plans to allow voice service on iPhones and Android devices. She speaks on Bloomberg Television's "Bloomberg Surveillance."

Saturday, February 22, 2014

Apple Releases iOS 7.0.6 to Fix Flaw That Fails to Check Authenticity in SSL Sent by the Server

Apple rushed the release of iOS 7.0.6 Friday with a patch to attempt to fix a disgracefully overlooked SSL encryption issue that leaves Apple iPhone, iPad and Mac computer users (using Mac OS X 10.9.1) open to a man-in-the-middle (MITM) attack. Apparently, the Apple iOS does not check to make sure that the "common name" record in the SSL certificate sent by the server matches the hostname used to connect to the server's IP address, thereby allowing a man-in-the-middle attack to defraud the system.

 A man-in-the-middle attack seamlessly intercepts communication, such as unencrypted passwords -- between yourself and your intended recipient or website, and according to Open Web Application Security Project (OWASP), "the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication." SSL and TLS are used worldwide to prevent eavesdroppers from snooping on network traffic while communicating with sensitive services, such as banking and shopping websites and email servers.

SSL and TLS only works if the other end of the connection can be verified and trusted. Security experts always instruct users to make sure the sensitive service always presents the https instead of http in the web address. With the middle man intercepting traffic, https is meaningless.

The vulnerability allows anyone with a certificate signed by a "trusted CA" to do a man-in-the-middle (MITM) attack.

A new version of Apple's iOS for its tablets and phones was rushed out the door Friday to patch a vulnerability with its mobile, tablet and desktop software, which is not doing SSL/TLS hostname checking. The communications meant to be encrypted, is NOT encrypted. The patch has only been issued for the more recent iPhones (iPhone 4 and later), iPod touch (5th generation) and iPad (2). 

Unfortunately, the official Apple.com website front page does not warn users of this serious security flaw, and Apple has not released a statement on when to expect this patch, nor what version range of iPhone, iPad, iPod Touch or Mac computer is affected by the major flaw. Apple's security page does not offer a simple step plan for user. It is mostly loaded with confusing technical information and disclaimers about security notifications, security disclosures, and third-party. And to make matters worse, Apple's security announcement list (http://rss.lists.apple.com/security-announce.rss) linked from its main security page "Apple Product Security" (https://ssl.apple.com/support/security/) is NOT updated. The latest listing on Saturday, February 22, 2014 at 9:20 a.m. is dated November 14, 2013.
Apple Mailing List APPLE-SA-2013-11-14-1 iOS 7.0.4 Subject: APPLE-SA-2013-11-14-1 iOS 7.0.4 From: Apple Product Security
Security researchers across several communities believe that Mac computers with OS X Mavericks, released October 22, 2013 are even more at risk, as they are currently left operating without a patch. The security flaw involves a different issue, which is also present in the iOS version, but apparently has not been addressed, yet.

BOTTOM LINE: WHAT TO DO ... Update your Apple devices and systems as soon as possible to the latest available versions, unless you're using a Mac OS X system before Maverick (10.9.1). DO NOT use untrusted networks (especially Wi-Fi) while traveling or in public Wi-Fi network. Update the patch, make purchases, or perform other sensitive operations only while operating in a trusted network, To be extra safe, and definitely while operating unpatched mobile devices; TURN OFF the "Ask to Join Networks" setting.

Past Security Flaws with iOS 

Embarrassingly thieves could turn off "Find My iPhone" by turning on Airplane Mode.

In September 2013 Apple released a fix that prevented offenders from using a sequence of actions that could defeat the Lock screen passcode.

 An offender could cause an iOS7 iPhone to restart if the emergency call button was tapped repeatedly, and eventually dial regular non-emergency numbers. While the lock screen was restarting, the call dialer displayed and allowed non-emergency numbers to be dialed.