Google+ for iPhone gets first big visual overhaul

If there’s one thing to be said about Google+ for the iPhone (iTunes), it’s that it hasn’t looked as good as its Web counterpart. With an update today, Google is hoping to change people’s opinions on that.

In a new version of the software that went out to Google+ users for iPhone today, the company has overhauled the look and feel of the app, making text bigger and adding a kinetic feel as photos float into view as users scroll down.

In a blog post about the update, Google Senior Vice President Vic Gundotra called it “a mobile app with sense and soul.”

“We’re embracing the sensor-rich smartphone (with its touchable screen and high-density display), and transforming Google+ into something more intimate, and more expressive,” Gundotra said.

The update comes on the heels of Google more deeply integrating Google+ inside of its Gmail Web e-mail service. Yesterday the company rolled out a way for users to view and respond to a Google+ comment thread, as well as +1 posts that are sent to their in-box.

Gundotra says that the Google+ app for the company’s Android platform will arrive “in a few weeks” with “a few extra surprises.” Still missing is a version of Google+ for Apple’s iPad. However, unlike earlier versions of the app, the iPhone version can be scaled up using the iPad’s x2 mode.

Apple, Google , , Leave a comment

Judge rejects attempt to derail Google’s ‘fair use’ defense

SAN FRANCISCO — While Google is trying to push for a mistrial over the first phase of its legal battle with Oracle over intellectual property, there is still a bigger issue at hand: can APIs be copyrighted?

Technically, that issue is for Judge William Alsup to decide, which could change the whole future of this case.

That also plays into the partial verdict that the 12-person jury returned at the U.S. District Court of Northern California on Monday afternoon. It was a bit of a mixed bag because while the jury found that Google infringed upon Oracle’s copyrights of the 37 Java APIs implemented on Android, they could not come to a unanimous decision if Google proved that it was a case of fair use or not.

In an afternoon session at the courthouse at which the jury was not present, attorneys for both Oracle and Google debated for two hours about what can be considered an an example of fair use, if fair use is a matter of law, and what can be copyrighted in the first place.

Although he didn’t offer an official ruling yet on whether or not APIs are copyrightable, Alsup’s line of questioning throughout the hearing hinted that he is leaning towards declaring that they are not.

However, Alsup did deny Oracle’s motion for a judgment as a matter of law that fair use can’t be claimed in this case. Basically, that means Google still has a shot at winning this on fair use.

Before that ruling came, both sides repeated condensed versions of their arguments from the first two weeks of the trial, which eventually came off looking like last-ditch efforts.

Oracle’s lead counsel Michael Jacobs started off by citing precedent cases since 1992 that didn’t find fair use as a matter of law. His main point was that Google’s use of the 37 Java APIs was not a case of fair use anyway because it was commercial and did not re-purpose the APIs for something new.

Jacobs also reiterated that Google used those 37 packages because they were the most popular.

“Popularity does not allow for infringement,” argued Jacobs, “Investment doesn’t allow for infringement.”

Google attorney Robert Van Nest countered by stating that “commercial use is one factor,” and that we have to weigh all the factors that the jury deems appropriate.

Van Nest also fought back against Oracle’s creative slant argument in which Jacobs has previously compared writing an API to writing a poem or a song.

“This is a situation where we’re talking about computer software, which is purely functional,” Van Nest argued.

Soaking all of the information in, Alsup remained steady on the stand even as the lawyers in front of him started to look more agitated — and possibly nervous — of where he might be headed in terms of a final ruling.

Alsup conceded that there are at least three out of four factors that defend Google’s argument for fair use, which he added “would deny a global win for Oracle on this point.” But Alsup also blamed Oracle’s legal team because he said they put it to the jury this way.

Jacobs rebutted that if he approved Google’s fair use argument, it would be “devastating” to the Java business model.

“If Google can do it, so can the next guy,” Jacobs added.

But Alsup continued to demonstrate his understanding of the makeup of the Java packages, remarking that along with names, methods in APIs are not copyrightable because if a developer wants a particular function, there is only one possibility.

“Oracle doesn’t have a monopoly on that,” Alsup continued. “If you want to have a function, that is the only way to write it.”

Jacobs tried to distinguish that Oracle’s case is not about any single method or group of methods but rather the combination of elements and the structure, sequence and organization of the Java APIs. To that extent, Jacobs argued, they would be protected by copyright.

Nevertheless, the fair use card is still at play.

In the end, it is still unclear as to how the first phase of the trial will be wrapped up — if it is at all. The fair use debate could still be sent back to the jury, or phase one could be declared a mistrial. If the latter route pans out, the copyrights phase of the lawsuit would be retried with a new jury.

This item first appeared on ZDNet’s Between the Lines blog under the headline “Judge denies Oracle’s motion to throw out Google’s fair use claim.”

Android, Google , Leave a comment

Facebook App Center: More showcase than store, actually

The app store model is winning the evolutionary battle for software businesses. It’s how operating system manufacturers are making ongoing money, especially on mobile devices. But now Facebook, which has a social networking platform and not an operating system of its own, has figured a way to take advantage of the model.

The challenge, for a platform like Facebook, is that it has to build a store on top of these other existing stores. It is especially tricky to build on top of the Apple App store, which remains the only legitimate channel for users to get apps onto iOS devices. Facebook, instead of opening a store per se, has announced that it’s opening a hybrid marketplace: Part store, part showcase.

Facebook , , Leave a comment

AT&T to sell Nokia Lumia 900 for $100 on April 8

Nokia’s Lumia 900 smartphone will hit AT&T’s store shelves on April 8, a move Nokia hopes will usher a return to theU.S.in a big way.

The phone will sell for $99.99 with a two-year contract, AT&T told CNET. It is one of the most affordable flagship products AT&T has ever sold.

There’s a lot at stake with this launch. Nokia badly needs a buzz-worthy hit product in theU.S., a market it has struggled to operate in over the last few years despite dominating early in the cellphone business. AT&T hopes the 4G LTE-capable Lumia 900 will spark interest in its still new next-generation network. Microsoft, meanwhile, needs any Windows Phone, especially the Nokia Windows phone, to succeed in the market and establish some legitimacy to its platform.

The Lumia 900 faces the same challenges that many past Windows Phones have struggled to overcome, including convincing consumers that the relatively new mobile operating system is worth taking over Apple’s iOS and Google’s Android. The iPhone and a host of high-end Android smartphones dominate current sales.

Nokia , , Leave a comment

HTACCESS 404 redirect

A 404 error is an HTTP status code that means that the page you were trying to reach on a website couldn’t be found on their server. If a visitor comes to your site and sees a standard 404 error message it’s unlikely they will make the effort to see any part of your site. Therefore it is very important to create a 404 page on your site and redirect traffic from incorrect urls.

Once you have create your 404 page, all you need to do is send visitors to incorrect url’s to this page. To do this just add the following line to your .htaccess file :
RewriteEngine on
ErrorDocument 404 /404.php

Google, Web , , , Leave a comment

What is a microprocessor

A microprocessor or processor is the heart of the computer and it performs all the computational tasks, calculations and data processing etc inside the computer. In the world of personal computers, the terms microprocessor and CPU are used interchangeably. At the heart of all personal computers and most workstations sits a microprocessor. Microprocessors also control the logic of almost all digital devices, from clock radios to fuel-injection systems for automobiles.

Three basic characteristics differentiate microprocessors:

Instruction set:
Instruction set is the set of instructions that the microprocessor can execute.

Bandwidth:
Bandwidth is the number of bits processed in a single instruction.

Clock Speed:
The clock speed determines how many instructions per second the processor can execute. It is given in megahertz (MHz).

The speed of the microprocessor is measured in the MHz or GHz.  The processor is also known as the CPU (Central Processing Unit).   It contains the control unit and the arithmetic unit and both works together to process the commands.  CPU is used in every computer whether it is a workstation, server or a laptop.  CPU is a complete computational engine that is designed as a chip.  It starts the work when you turn on your computer.

CPU is designed to perform the arithmetic and logical operations inside the computer.  Common operations inside the computer include adding, subtracting, multiplying, comparing the values and fetching the different numbers to process them.  The higher the CPU clocks’ speed the more efficient will be the performance of the computer.

Computer’s performance is also influenced by the system bus architecture, memory used, type of the processor and software program being running.  Pentium 4 is the fastest type of the Intel’s processor that contains 125,000,000 transistors and operates at the speed of 3.6 GHz.

Hardware, Microprocessor , , , Leave a comment

Fiber Distributed Data Interface (FDDI)

Standard is ANSI X3T9.5 . Topology is ring with two counter rotating rings for reliability with no hubs. Cable type is fiber-optic. Connectors are specialized. The media access method is token passing. The maximum length is 100 kilometers. The maximum number of nodes on the network is 500. Speed is 100 Mbps. FDDI is normally used as a backbone to link other networks. A typical FDDI network can include servers, concentrators, and links to other networks.

Devices called concentrators provide functions similar to hubs. Most concentrators use dual attachment station network cards but single attachment concentrators may be used to attach more workstations to the network.

FDDI token passing allows multiple frames to circulate around the ring at the same time. Priority levels of a data frame and token can be set to allow servers to send more data frames. Time sensitive data may also be given higher priority. The second ring in a FDDI network is a method of adjusting when there are breaks in the cable. The primary ring is normally used, but if the nearest downstream neighbor stops responding the data is sent on the secondary ring in attempt to reach the computer. Therefore a break in
the cable will result in the secondary ring being used. There are two network cards which are:

1. Dual attachment stations (DAS) used for servers and concentrators are attached to both rings.
2. Single Attachment stations (SAS) attached to one ring and used to attach workstations to concentrators.

A router or switch can link an FDDI network to a local area network (LAN). Normally FDDI is used to link LANs together since it covers long distances.

Data Communication and Networks , , , Leave a comment

Network Protocols – Data Communication and Networks

  • ethernet – Provides for transport of information between physical locations on ethernet cable. Data is passed in ethernet packets
  • SLIP – Serial line IP (SLIP), a form of data encapsulation for serial lines.
  • PPP – Point to point protocol (PPP). A form of serial line data encapsulation that is an improvement over SLIP.
  • IP – Internet Protocol (IP). Except for ARP and RARP all protocols’ data packets will be packaged into an IP datapacket. Provides the mechanism to use software to address and manage data packets being sent to computers.
  • ICMP – Internet control message protocol (ICMP) provides management and error reporting to help manage theprocess of sending data between computers.
  • ARP – Address resolution protocol (ARP) enables the packaging of IP data into ethernet packages. It is the system and messaging protocol that is used to find the ethernet (hardware) address from a specific IP number. Without this protocol, the ethernet package could not be generated from the IP package, because the ethernet address could not be determined.
  • TCP – A reliable connection oriented protocol used to control the management of application level services between computers.
  • UDP – An unreliable connection less protocol used to control the management of application level services between computers.
  • DNS – Domain Name Service, allows the network to determine IP addresses from names and vice versa.
  • RARP – Reverse address resolution protocol (RARP) is used to allow a computer without a local permanent data storage media to determine its IP address from its ethernet address.
  • BOOTP – Bootstrap protocol is used to assign an IP address to diskless computers and tell it what server and file to load which will provide it with an operating system.
  • DHCP – Dynamic host configuration protocol (DHCP) is a method of assigning and controlling the IP addresses of computers on a given network. It is a server based service that automatically assigns IP numbers when a computer boots. This way the IP address of a computer does not need to be assigned manually. This makes changing networks easier to manage. DHCP can perform all the functions of BOOTP.
  • IGMP – Internet Group Management Protocol used to support multicasting.
  • SNMP – Simple Network Management Protocol (SNMP). Used to manage all types of network elements based on various data sent and received.
  • RIP – Routing Information Protocol (RIP), used to dynamically update router tables on WANs or the internet.
  • OSPF – Open Shortest Path First (OSPF) dynamic routing protocol.
  • BGP – Border Gateway Protocol (BGP). A dynamic router protocol to communicate between routers on different systems.
  • CIDR – Classless Interdomain Routing (CIDR).
  • FTP – File Transfer Protocol (FTP). Allows file transfer between two computers with login required.
  • TFTP – Trivial File Transfer Protocol (TFTP). Allows file transfer between two computers with no login required. It is limited, and is intended for diskless stations.
  • SMTP – Simple Mail Transfer Protocol (SMTP).
  • NFS – Network File System (NFS). A protocol that allows UNIX and Linux systems remotely mount each other’s file systems.
  • Telnet – A method of opening a user session on a remote host.
  • Ping – A program that uses ICMP to send diagnostic messages to other computers to tell if they are reachable over the network.
  • Rlogin – Remote login between UNIX hosts. This is outdated and is replaced by Telnet.
Data Communication and Networks , , Leave a comment

Data Encryption in Data Communication

Privacy is a great concern in data communications. Faxed business letters can be intercepted at will through tapped phone lines or intercepted microwave transmissions without the knowledge of the sender or receiver. To increase the security of this and other data communications, including digitized telephone conversations, the binary codes representing data may be scrambled in such a way that unauthorized interception will produce an indecipherable sequence of characters. Authorized receive stations will be equipped with a decoder that enables the message to be restored. The process of scrambling, transmitting, and descrambling is known as encryption.
Custom integrated circuits have been designed to perform this task and are available at low cost. In some cases, they will be incorporated into the main circuitry of a data communications device and function without operator knowledge. In other cases, an external circuit is used so that the device, and its encrypting/decrypting technique, may be transported easily.
Data Communication and Networks , Leave a comment

Download Java Free

Here you can download java for free. Download java for windows firefox.

Click Here to Download

Java Programming, Science and Technology, Software , , Leave a comment