Microsoft's Windows Phone 8 "Apollo" Coming Up in June
Latest Windows Phone 8 rumor suggests that current Windows Phone devices will receive the updateMicrosoft has yet to come forward with a statement of their own regarding the update path of Windows Phone 8. Based on the back and forth rumors, there have been arguments by some prominent names in the industry that have suggested that current Windows Phone 7.5 devices will not see the Windows Phone 8 update, while vague rumors from murky sources have suggested otherwise. Since nothing has been officially announced, at this point in time we guess it could head either way, so if you’re a Windows Phone 7.5 user hoping that your phone will be eligible for the update, here’s a rumor you might be pleased to hear.
According to My Microsoft Life, they have been tipped by one a “trusted source” from Microsoft’s PR firm Waggener Edstrom who apparently revealed that the current batch of Windows Phone devices will be getting the Windows Phone 8 update. No word on what the current batch refers to (could be phones which launched with Mango), but the report goes on to state that this information will be corroborated in the coming weeks via “leaks”. All of this admittedly sounds very suspicious so we suggest that you not read too much into this for now, at least until the alleged “leaks” start to appear that might lend some credence to the rumor. Until then generous doses of salt are recommended.
IBM, SAP Now Support Microsoft‘s Standardization Move
It's perhaps the one way that database interaction can work reliably using any format, any server and any client on the Web today. It happens to be a protocol created by Microsoft. But in a symbol of how Microsoft is now perceived today as just another major player instead of a dominant force, the leading platform makers are joining Microsoft in a formal move to standardize OData, the Open Data Protocol. The reason Microsoft and IBM are no longer fighting over this? The real competition is no longer just amongst these old-line technology companies, but largely between them and a new breed of competitors often based around new mobile devices and consumer platforms.
Nearly six years ago one of the most bitter standards battles in all of computing was fought between OASIS, caretaker of the OpenDocument format, and Microsoft. The issue was whether, by making the document formats for Microsoft Office available as open standards, the company was unfairly leveraging Office's broad base of installation to unseat its only real competitor, the storage format behind OpenOffice.
That year, 2006, marked the turning point in Microsoft's public stance towards openness and interoperability. This despite bitter opposition led by IBM, which was working to resurrect the Symphony brand it had acquired through Lotus. IBM argued that Microsoft was undermining the standards process to suit its purposes. Just how much the computing environment has changed since then was made evident today as IBM (whose heart grew three sizes this day) joined with SAP and Citrix in backing a move by Microsoft to declare the OData HTTP-based database interaction prototol - also known as Open Data Protocol - an OASIS standard.
"OData is an application-level protocol for interacting with data via RESTful Web services," reads a white paper on an OData extension for XML published by OASIS (PDF available here). "An OData Service’s contract is defined by simple, well-defined conventions and semantics applied to the data model exposed by the service, providing a high level of semantic interoperability between loosely coupled clients and services."
Phrasing data in XML, ATOM or JSON format does allow it to be visible to many different database engines. They can see data in these formats, so that's not the problem. Essentially, how does a Web client (any browser on any device) request data from any server (any database engine or framework), and then initiate a dialog with that server so it can update or change one or more records? Remember, HTTP is a stateless protocol: Clients make GET requests and the occasional POST statement, and servers acknowledge and, when they can, comply.
So OData enables communication using any of these three formats for data expression, setting up the mechanism for clients to authenticate themselves and enter into a secure dialog. It already works. And as IBM discovered two years ago, OData was pretty much the only way of creating a single Web client for WebSphere data that worked with .NET, AJAX and PHP clients.
While an XML document contains the body of data, expressed explicitly within the markup, OData expresses the schema - the arrangement and relations between data in a database. It also allows for vendor-specific properties that enable features that one vendors database might utilize while another's does not, though these properties are typically flagged within the metadata using obvious vendor-specific tags; for example, sap:filterable.
Writing on behalf of the OData organization today, Microsoft's senior program manager for OData Alex James said today, "With interoperability front and center in OData we saw more and more technology stacks that started to work with it. Now there are a number of companies that use OData in their products to ensure the data they manage is easily accessible beyond the boundaries of their applications. Many of these companies regularly collaborate on the ongoing design effort for OData. While so far we’ve run the OData design process as transparently as we could (sharing designs, taking feedback through the odata.org blog and distribution list, etc.), we are at a point where the level of adoption and the scale at which organizations are betting on OData require a more formal commitment to shared ownership of the design of this protocol."
It’s tempting to draw the conclusion that Microsoft and IBM are “joining forces,” in coalition against a common enemy. The facts are more economic than melodramatic: Waging platform wars, especially over something that should be as ubiquitous as data exchange, costs way too much money. While the Open Office XML/OpenDocument fracas generated plenty of headlines and even sparked a few campaign rallies, it was a drain on both sides’ resources at a time when the platforms supporting both standards – client-side applications – were starting to become obsolete anyway. The fact of the matter is, OData works, and creating a competing format just to rally the troops and produce headlines is a waste of time and money. It’s best that companies pick their battles more wisely. What’s more, IBM, Microsoft, and SAP alike have come to the realization – perhaps a mutual one – that the best platforms are never islands unto themselves
Nearly six years ago one of the most bitter standards battles in all of computing was fought between OASIS, caretaker of the OpenDocument format, and Microsoft. The issue was whether, by making the document formats for Microsoft Office available as open standards, the company was unfairly leveraging Office's broad base of installation to unseat its only real competitor, the storage format behind OpenOffice.
That year, 2006, marked the turning point in Microsoft's public stance towards openness and interoperability. This despite bitter opposition led by IBM, which was working to resurrect the Symphony brand it had acquired through Lotus. IBM argued that Microsoft was undermining the standards process to suit its purposes. Just how much the computing environment has changed since then was made evident today as IBM (whose heart grew three sizes this day) joined with SAP and Citrix in backing a move by Microsoft to declare the OData HTTP-based database interaction prototol - also known as Open Data Protocol - an OASIS standard.
"OData is an application-level protocol for interacting with data via RESTful Web services," reads a white paper on an OData extension for XML published by OASIS (PDF available here). "An OData Service’s contract is defined by simple, well-defined conventions and semantics applied to the data model exposed by the service, providing a high level of semantic interoperability between loosely coupled clients and services."
Phrasing data in XML, ATOM or JSON format does allow it to be visible to many different database engines. They can see data in these formats, so that's not the problem. Essentially, how does a Web client (any browser on any device) request data from any server (any database engine or framework), and then initiate a dialog with that server so it can update or change one or more records? Remember, HTTP is a stateless protocol: Clients make GET requests and the occasional POST statement, and servers acknowledge and, when they can, comply.
So OData enables communication using any of these three formats for data expression, setting up the mechanism for clients to authenticate themselves and enter into a secure dialog. It already works. And as IBM discovered two years ago, OData was pretty much the only way of creating a single Web client for WebSphere data that worked with .NET, AJAX and PHP clients.
While an XML document contains the body of data, expressed explicitly within the markup, OData expresses the schema - the arrangement and relations between data in a database. It also allows for vendor-specific properties that enable features that one vendors database might utilize while another's does not, though these properties are typically flagged within the metadata using obvious vendor-specific tags; for example, sap:filterable.
Writing on behalf of the OData organization today, Microsoft's senior program manager for OData Alex James said today, "With interoperability front and center in OData we saw more and more technology stacks that started to work with it. Now there are a number of companies that use OData in their products to ensure the data they manage is easily accessible beyond the boundaries of their applications. Many of these companies regularly collaborate on the ongoing design effort for OData. While so far we’ve run the OData design process as transparently as we could (sharing designs, taking feedback through the odata.org blog and distribution list, etc.), we are at a point where the level of adoption and the scale at which organizations are betting on OData require a more formal commitment to shared ownership of the design of this protocol."
It’s tempting to draw the conclusion that Microsoft and IBM are “joining forces,” in coalition against a common enemy. The facts are more economic than melodramatic: Waging platform wars, especially over something that should be as ubiquitous as data exchange, costs way too much money. While the Open Office XML/OpenDocument fracas generated plenty of headlines and even sparked a few campaign rallies, it was a drain on both sides’ resources at a time when the platforms supporting both standards – client-side applications – were starting to become obsolete anyway. The fact of the matter is, OData works, and creating a competing format just to rally the troops and produce headlines is a waste of time and money. It’s best that companies pick their battles more wisely. What’s more, IBM, Microsoft, and SAP alike have come to the realization – perhaps a mutual one – that the best platforms are never islands unto themselves
Microsoft wins ruling against Motorola over texting
A German regional court ruled in a hearing on Thursday that Motorola Mobility(GOOG.O) infringed Microsoft(MSFT.O) patents by offering the option on its mobile phones to send a longer text in a batch of several messages.
"We're pleased the court agreed today that Motorola has infringed Microsoft's intellectual property, and we hope Motorola will be willing to join other Android device makers by taking a license to our patents," Microsoft said in a statement, referring to Google's Android operating system for mobile phones.
Motorola, which was recently bought by Google, said: "We expect a written decision from the court on June 1 and upon review, will explore all options including appeal."
The two companies are fighting each other in courts across the globe, as are several other makers of devices including Apple (AAPL.O), over the intellectual property of software features offered in the latest smart phones and gadgets.
In another case, the same regional court in the city of Munich on Thursday rejected a complaint by Microsoft against Motorola Mobility's use of a software feature called programme localisation.
Motorola Mobility, in turn, is currently suing Microsoft in the U.S. over features in the Xbox gaming console.
Facebook to lift ban on under-13s joining social network site?
Facebook may relax a ban on children under the age of 13 joining its site after finding that many kids, some with their parents' permission and help, were already using it.
"There is reputable evidence that there are kids under 13 who are lying about their age to get on to Facebook," Sunday Times quoted Simon Milner, Facebook's head of policy in Britain as saying.
"Some seem to be doing it with their parents' permission and help," Milner said.
If the decision to lift the ban is implemented, a flood of new users are likely to sign up to the social network, which floated on the stock market last week for USD 105 billion last week.
The number of people with profiles - currently estimated at 900 million active users - would probably hit the iconic one billion mark, meaning that more than one in seven people in the world would be an active user of the site.
However, Milner said the decision to allow children to create profiles was still at a very early stage.
Milner said he will launch a debate about the minimum age in Britain when he appears next month at Wellington college, Berkshire.
"We have a strict under-13 rule because of legal issues in America," he said.
"We apply the same rule all over the world. But a lot of parents are happy their kids are on it. We would like to hear from people what the answer might be."
Supporters of the minimum age believe it helps shield children from cyberbullying and inappropriate contact with adults.
Past surveys in the UK have suggested that one in three British children has been the victim of abuse on the Internet.
The poll, commissioned by charity Beatbullying in 2009, also revealed that girls are up to four times more likely to face online bullying than boys, Daily Mail reported.
Some school bullies have even set up Facebook groups allowing dozens of people to band together to abuse classmates, it said.
Facebook has responded to criticism in the past by adding a number of safety features to the site to attempt to combat online bullying.
Microsoft‘s social network So.cl now open to all
Microsoft has opened up its So.cl social networking service to the general public, which lets users share and comment on interesting search results and connect with "like-minded" people.
It is targeted at students and had earlier been restricted to invitees at universities and schools in the US.
The service integrates with Facebook and is being pitched as an "experiment" rather than a rival to other networks.
Microsoft revealed that the product was developed by its Fuse Labs unit as a "research project... focused on the future of social experiences and learning."
Members are invited to create "collages of content" using the firm's Bing search engine technology and external links, which they can, then share with others.
Users can then identify people who are interested in the same topics, monitor their associates' feeds and take part in "video parties" during which members watch online videos together, commenting on them via chat function.
Members can sign in using their Facebook login details, however, their So.cl activities do not show up on Facebook's pages unless the option is activated.
The move to open up the service to the general public was taken over the weekend with little fanfare, prompting some analysts to speculate that Microsoft only had limited ambitions for the project.
"The fact that So.cl is targeted at students echoes Facebook's beginnings and has made many assume it is a Facebook clone," the BBC quoted Eden Zoller, principal analyst at technology consultants Ovum, as saying.
"But So.cl is, as Microsoft stresses, an experiment designed to be a layer on existing social networks.
"Microsoft is being sensible in positioning So.cl in this way - the opposite approach of Google, which entered social networking all guns blazing with a full on service, and is having modest success," Zoller said.
Zoller added that the project could also help Microsoft further improve Bing's search capabilities.
A study by Comscore suggested that Microsoft had a 15.4 percent share of the US search market in April compared with Google's 66.5 percent lead.
Earlier surveys have suggested that the gap is even wider in the UK and parts of Europe.
Microsoft's SOCL
Beware: Hacked websites can now infect your Android smartphone
Thursday, May 10, 2012 // by Saurabh //
Labels:
Android,
Malwares,
Quick Heal,
Security
//
No comments:
Quick Heal's malware analysis team has discovered a malicious software that targets Android smartphones through hacked websites. This adds further credibility to our predictions about the growing threat of mobile malware. This new malware, known as NotCompatible, gets downloaded automatically when an Android user visits a hacked website. A hidden iframe present at the bottom of the hacked page aids the ‘Update.apk’ download to begin (fooling the system into believing that it is downloading a system update).
The process of downloading dangerous malware simply by visiting a website is known as a ‘drive-by download’ – a phenomenon that has been afflicting PCs for a long time so we are well aware of it. However, this is the first time such an incident has been found on an Android device, so the cause for concern is genuine. If hackers can master this technique the threat potential imposed will be immense since it will be a drastic change from their regular social engineering techniques to trick victims.
Interestingly, once the download is completed a notification appears on the device prompting the user to install the program. By default, Android devices only allow applications from the native app market, Google Play, to get installed. But this setting can be changed by going to ‘Settings’, then going to ‘Applications’ and then checking the box next to ‘Unknown sources’. Doing so allows the device to install apps from non-market sources – a process known as ‘sideloading’.
If a user unwittingly allows this installation, his smartphone will get infected and could then potentially act as a TCP relay proxy and provide private network access to the source of this malware. This can adversely affect enterprise networks and personal networks. However, the websites that are hacked and are carriers of this malware see very little traffic as of now so the chances of coming across them are quite low. Nevertheless, this could possibly be a test-run by malicious parties to check the efficiency of this technique and if that is true, Android users everywhere need to be extremely cautious.
Quick Heal advises that Android owners uncheck the ‘Unknown sources’ option so that non-market apps never get installed on their device without their knowledge. Additionally, they should also visit trusted websites only and not click on links that take them to unknown webpages as these could be carrying all kinds of potential threats. Users of Quick Heal Mobile Security are protected from this threat as it detects the malware as Android.Notcompatible.A.
Microsoft: ‘iCloud might not be enough for you’
Wednesday, May 9, 2012 // by Saurabh //
Labels:
Apple,
iCloud,
iDisk,
Microsoft,
Microsoft Live,
Sky Drive
//
No comments:
News and Articles
We covered the release of Microsoft’s new SkyDrive for Mac and updated iOS apps last month, and today the company is once again trying to convince iCloud users to make the switch. On the Office for Mac blog and SkyDrive blog, Microsoft posted a video today titled “iCloud not enough? Try SkyDrive,” alongside the following three reasons to choose its cloud service over Apple’s:
Access files and Office docs, anywhere:
With iCloud, you can only access certain files across devices—like iWork files or photos you take on your iPhone.
With SkyDrive, you can access or manage any file from anywhere. It doesn’t matter whether the file is a document, photo, video, PDF, or anything else—just drag files to theSkyDrive folder on your Mac and they’ll automatically be available on youriPhone, iPad, or PC. If you don’t have your devices with you, you can still access, view, or edit any file by signing in to SkyDrive.com on any browser.
Share and work together with anyone:
With iCloud, you can only collaborate with people who have the right software.
But with SkyDrive, you can share any type of file—even big ones up to 2 GB—with anyone. SkyDrive works seamlessly with Office. Anyone you share with can view or edit Word,PowerPoint, or Excel files using Officefor Mac, Office for Windows, or withOffice Web Apps in their browser (it’s free!).
Your notes, everywhere:
With iCloud, you can access notes across your devices but can’t share them.
SkyDrive and OneNote, both free, are integrated so you can take notes, track to-dos and lists all in one place, and share your lists with friends and family so they can coordinate shopping or other tasks you’re working on together. You can share and keep your lists automatically updated from any device.
Microsoft also linked to a page with instructions for moving from iDisk to SkyDrive.
When Facebook Apps cease to be ‘Cool’
Monday, May 7, 2012 // by Saurabh //
Labels:
Articles,
Facebook,
Microsoft Security Essentials,
Security
//
No comments:
Articles
Have you ever wondered why certain ads show up in the right hand corner of your Facebook page? A closer look at these ads and you will be surprised at the volumes they speak about your lifestyle choices – be it exclusive shoes from an e-retailer or a self-development course! How does it all happen?
The Unique Facebook ID (UID) is a number assigned to each user – this being the most public part of the Facebook profile. Anyone with a browser can look up a person’s name with the UID even if that profile is set to be private. For others, it reveals all the information they have set to share with “everyone” like, age, occupation, photos, location etc.
Apps are considered to be an important way for Facebook to extend the utility of its network and converting it into a hub of activity. They are also a growing source of revenue beyond advertising for Facebook itself.
Here are a few examples to help you understand the working of the apps and how your information is used.
- Applications like FarmVille or Texas HoldEm Poker when given access to, request for permissions and data elements like your friends’ data (email address, current location, sexual preference, status updates, birthdays etc.) So even if you never connect your Facebook account to a single app, dozens of them may still have access to your profile information via your Facebook friends.
- When you keep your location up-to-date on Facebook it just gets scarier with the “Maps” feature which can be used for geotagging. It gathers data from a user’s location like, IP address, location, type of browser used or pages visited. This data is collected, even when a friend has GPS on and tags you in a photo that is being uploaded from a mobile phone.
- If you have to you have to RSVP on Facebook to an ‘Invite’ for a party or an event hosted by your local club and you click “Attending”, your plans are aired to your entire network – whether you realise it or not! “Sponsored Stories” are an effect of your ‘RSVP’ activity. Every time you like a brand or respond positively to a public event, companies can let your friends know that you are attending an event with hopes of getting a positive response from them too. Your information thus becomes available for brand ambassadorship!
- You find that your friend has read an article that interests you through the Washington Post Social Reader. The moment you click that link, the app requests for permission before reading the article. The working of this app doesn’t require for prompts before sharing the activity. So once you start clicking, your activity is reflected on others mini-feed. Thus, even without direct access your reading habits are exposed for anyone to access.
- You have given access to “My Calendar Birthdays” and you have liked your bank’s Facebook page. Under your Facebook list of family members is included your mother, whose profile is searchable under both her maiden and married name.
This provides ample opportunity for the data brokers to gather data from Facebook profiles and compare it with public browsing habits, creating a mine of data that can give any ad firm or a cyber crook a field day!
How do you prevent this? Have extremely conservative privacy settings – remove applications that you don’t use and edit the settings for the ones that you do. If any application requests for data that you are not comfortable sharing revoke that access. If access is required for that app, remove it. You can also have Internet Security software with parental control features would allow or block access to only specific sites.
In the attempt to have an overly social experience of making the world a smaller place to live in, what we have actually ended up with is, a situation where the boundary between what is sacredly private and personal and what is public, is heavily blurred. A situation that demands users to be educated on the implications of privacy policies and what it means to make personal information public.
Popular Posts
-
It's been about three years since Microsoft unveiled a new version of Office, and particularly with Windows 8 just months away from ...
-
There's general agreement that Sony stumbled out of the gate with the PlayStation 3. Months of intense hype were followed by a la...
-
Latest Windows Phone 8 rumor suggests that current Windows Phone devices will receive the update Microsoft has yet to come forward wi...
-
Microsoft is holding an invitation-only press event in San Francisco today at which it is expected to debut the next version of its...
-
Gaming & Gadgets Microsoft kick-started the "next-generation" of gaming on November 22, 2005, when the company release...