Mar 112013
 

 opera

Last month Opera announced it would be abandoning the Presto rendering engine that has been the basis of the browser since its inception. Instead the company will use the WebKit rendering engine for all its future releases, starting with this Opera Mobile for Android beta.

The revamped Opera for Android isn’t just different under the hood, Opera has redesigned the entire browser from the ground up opting for a more Android-native look. The new user interface is cleaner and reminiscent of Chrome for Android with a single menu button at the top of the screen rather than the space-eating toolbar found in the old Opera Mobile. While I prefer the new UI, it’s worth noting that the new design is decidedly less thumb-friendly.

Other cosmetic changes include combining the URL bar and search bar, and a new tab switching interface also similar to what you’ll find in Safari on iOS.

However, while the first WebKit-based Opera Mobile is clearly different it manages to retain, and even improve on, much of what made (makes) Opera unique.

For example, Opera Mobile’s trademark “Speed Dial” page

READ MORE: Reborn Opera Mobile Sings on Android | Webmonkey | Wired.com.

 

 


 

Mar 112013
 

 launchrock

Here are 30 blogs I read consistently.  They’re well written, informative and actionable. Read these blogs and you’ll have strategies you can use today. Each recommendation includes a description of the value proposition and a link to a good article to start with.  I’ve sorted the blogs into general categories.

  • Tech & Startup News
  • Experienced Entrepreneurs
  • Comprehensive Resources
  • Blogging & Copywriting
  • Marketing & Analytics
  • Social Media
  • Community & Customer Support
  • Design & Conversion
  • SEO

READ MORE:  30 Must Read Blogs For Entrepreneurs Running a Startup – LaunchRock.

 

 


 

Mar 062013
 

We asked designers to change the future by designing an app for Windows Phone that would help us create, connect or simply impress our future selves. You answered the call with hundreds of amazing and inspiring submissions from scrapbooks and font managers, trip trackers or convoy road managers, to diaries that don’t broadcast your every thought or will even seal them up for the future. After hours of review and deliberation by our fantastic jurors Chris Caldwell (GSkinner.com), Jennifer Bove (Kicker Studio), Corrina Black (Microsoft), Pratik Kothari (Techark Solutions), and Eric Ludlum (Core77), we are proud to announce our 50 finalists and five winners!

READ MORE:  App to the Future: Design Challenge Winners – Core77.

 

 


 

Mar 062013
 

 

3D printers are gaining in popularity, with uses spanning the spectrum from moon bases to firearms, but there’s another area where the ability to construct complex shapes is beginning to provide benefits: getting high.

Online magazine Motherboard has published the story about the slow but inevitable rise of 3D-printed bongs. MakerBot’s Thingiverse site returns almost two dozen template results when searching for “bong,” all of which are downloadable in STL format and printable on tons of different 3D printers.

Common resin-based 3D printers can’t create glass, so a water pipe produced from these templates wouldn’t be entirely print-n-toke, but most appear to be ready to go as soon as glass pipes are added. The descriptions for many of the pipes indicate that they should be printed with PLA, which the Ice Bong creator notes “is biodegradable and poses no health risk and also has no smell.”

READ MORE:  Download this bong: 3D printer templates for getting your buzz on | Ars Technica.

 

 


 

Mar 052013
 

evernote

Security experts are criticizing online note-syncing service Evernote, saying the service needlessly put sensitive user data at risk because it employed substandard cryptographic protections when storing passwords on servers and Android handsets.

The scrutiny of Evernote’s security comes two days after Evernote officials disclosed a breach that exposed names, e-mail addresses, and password data for the service’s 50 million end users. Evernote blog posts published over the past few years show that the company protects passwords and sensitive user data with encryption algorithms and schemes that contain known weaknesses. That is prompting criticism that the company’s security team isn’t doing enough to protect its customers in the event that hackers are able to successfully compromise the servers or end-user phones.

The chief complaint involves Evernote’s use of the MD5 cryptographic algorithm to convert user passwords into one-way hashes before storing them in a database. Use of MD5 to store passwords has long been frowned on by security experts because the algorithm is an extremely fast and computationally inexpensive way to convert plaintext such as “password” into a unique string of characters such as “5f4dcc3b5aa765d61d8327deb882cf99.” MD5 makes an attacker’s job of cracking the hashes much easier by allowing billions of guesses per second, even on computers of relatively modest means.

By comparison, the use of slow algorithms such as bcrypt, which Twitter uses to protect its passwords, adds considerable time and computing requirements to the task of converting the hashes into the underlying plaintext passwords. Even when hashes are generated using cryptographic salt to add randomness—as Evernote says it does—MD5 is still considered a poor choice.

READ MORE:  Critics: Substandard crypto needlessly puts Evernote accounts at risk | Ars Technica.

 

 


 

Mar 052013
 

random-numbers

Some say we’re living in a “post-PC” world, but malware on PCs is still a major problem for home computer users and businesses.

The examples are everywhere: In November, we reported that malware was used to steal information about one of Japan’s newest rockets and upload it to computers controlled by hackers. Critical systems at two US power plants were recently found infected with malware spread by USB drives. Malware known as “Dexter” stole credit card data from point-of-sale terminals at businesses. And espionage-motivated computer threats are getting more sophisticated and versatile all the time.

In this second installment in the Ars Guide to Online Security, we’ll cover the basics for those who may not be familiar with the different types of malware that can affect computers. Malware comes in a variety of types, including viruses, worms, and Trojans.

Viruses are programs that can replicate themselves in order to spread from computer to computer, while targeting each PC by deleting data or stealing information. They can also change the computer’s behavior in some way.

“Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program,” Cisco notes. “When the host code is executed, the viral code is executed as well. Normally, the host program keeps functioning after it is infected by the virus. However, some viruses overwrite other programs with copies of themselves, which destroys the host program altogether. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.”

READ MORE:  Viruses, Trojans, and worms, oh my: The basics on malware | Ars Technica.

 

 


 

Mar 052013
 

tweetdeck

Twitter will shut down multiple TweetDeck apps to focus on the product’s web-based version, the microblogging service announced Monday.

In yet another sign of the battle between social media’s two biggest players, Facebook integration will be removed, too.

The announcement was met largely with a chorus of “nooooooooo,” “whyyyyyyy” and “gaaaaaaaah” on social media, reflecting TweetDeck’s widespread popularity with hardcore Twitter users.

TweetDeck AIR, TweetDeck for iPhone and TweetDeck for Android will be removed from their respective app stores in May, and stop working soon after, according to a TweetDeck blog post.

“To continue to offer a great product that addresses your unique needs, we’re going to focus our development efforts on our modern, web-based versions of TweetDeck,” the post says.

READ MORE:  Twitter Killing TweetDeck for iPhone and Android.

 

 


 

Mar 052013
 

opera-beta

The first results of Operas WebKit brain transplant are now available for people to try: a beta version of Opera for Android.The new version uses Android-native user-interface elements but preserves many Opera features such as Speed Dial. It gets some new features, too, such as Off-road Mode to enable a proxy-browsing technology designed for slow network connections and the Discovery tool for people who want to browse content tailored to their interests.

READ MORE:  Operas overhauled Android browser now in beta | Internet & Media – CNET News.

 

 


 

Mar 042013
 

Database_3

NoSQL databases have made it possible to store more data faster and cheaper than ever before. Web giants like Google, Amazon and Facebook have come to depend on them in a big way. But they have some fundamental drawbacks that prevent them from handling many software applications. And FoundationDB wants to change that.

FoundationDB is the company behind the new proprietary database of the same name, and it claims to offer the performance benefits of NoSQL without many of the well-known trade-offs. The product has been available to a small group of alpha testers since January 2012, but on Monday, the company is making it available to the world at large.

The NoSQL movement grew out of papers published in 2006 and 2007 by Amazon and Google that described data storage systems distributed across hundreds or even thousands of cheap servers. These papers inspired open source imitators like Cassandra, Hbase, and Riak. But to achieve the mammoth scale that they did, these databases had to break with an old database tradition called “ACID.”

ACID stands for “atomicity, consistency, isolation, durability.” Together, these properties ensure that when you make a change to a database — or a series of changes — those changes are either recorded reliably and permanently or rejected completely.

READ MORE: Database House Wants You to Stop Dropping ACID 

 

 


 

 

Feb 192013
 

 putlook-image

Outlook.com officially launched Tuesday, marking the demise of its predecessor, Hotmail.

Nearly seven months after unveiling a preview of the email service last July, Microsoft announced the end of its beta run in a blog post.

Microsoft, which acquired Hotmail in 1997, said it will switch users to the new service “soon,” but won’t force them to change their emails to an “outlook.com” address. It added that all users should expect to see the change take place by this summer.

“Everything from their @hotmail.com email address, password, messages, folders, contacts, rules, vaation replies, etc. will stay the same, with no disruption in service.”

The software giant also revealed that over 60 million people are actively using Outlook.com.

READ MORE >>  Outlook.com Officially Replaces Hotmail, Boasts 60M Users.