Thursday, 26 December 2013

Top 10 Mobile Operating System

1. Google Android OS

Source: Google Android
Simply Android, Google Android OS is the most popular open-source software created by Android, Inc. and was purchased by Google, Inc. If you have an android phone, you are familiar with the Google Play (formerly known as Android Market) where you can download ranges of apps for free or for a fee. It is estimated to have 700 000 apps registered there. Too many right?
Current versions of android are as follows: Donut, Éclair, Froyo, Gingerbread, Honeycomb, Ice Cream Sandwich, and Jelly Bean. Did you see it? letters starts with D E F G H I and J. So we may assume the next version starts with letter K and guess what it is.Tadaa - Key Lime Pie. Haven't eaten it.

2. Apple iOS

Source: stuffpoint
Yes. Anybody knows it. If you are an iPhone or iPad user you know what I mean. The smartphones from apple uses the iOS software. Unlike Android, iOS not an opensource software.
Users that I interviewed [I'm an android user/programmer - sorry :-)] applauds iOS's performance - fast, smooth, and it doesn't slows down. Worth the price they said. But we can also consider int hardware for good performance.
Visit Apple Store for more info.
It's the Apple's product that beats the Research In Motion's BlackBerry. And talking about BlackBerry.

3. BlackBerry

Once the leading in smartphone, Research In Motion's (Now BlackBerry) mobile operating system is back on track with its new line of smartphones.
With its open platform, developers can create applications using different languages like C\C++ Native SDK, HTML5, ActionsScript, you can also port existing Android Apps, and more. You may visit BlackBerry Developer site to start developing apps.
Like Google's Google Play and and Apple's App Store, BlackBerry has its own -BlackBerry World.

4. Symbian OS

Symbian is one of the mobile operating system used by Nokia. During year 2009, Symbian Foundation made the platform "available open source and royalty-free". However it the foundation then shifted to a licensing entity.
It was taken over by Nokia. The website discussing Symbian's futurehttp://symbian.nokia.com/ was already closed last 2012.

5. Firefox OS

Source: Forbes.com
Once a desktop browser, the leading in free and open platforms now introduces the Firefox OS for mobile phones. Same thing, it is intended to be an open platform free from the rules and restrictions of existing proprietary platforms.
Firefox OS was made using HTML5. The free and open platform was backed by different names in industry such as eBay, Twitter, Facebook, SMART, LG, Alcatel, and more.
For developers, you may interested in visiting this site.

6. Windows 8

Source: Microsoft
Windows 8 is Microsoft's newest operating system. Design not only for PCs, Windows 8 is also for Tablets and Smartphones - it's Microsoft's way pf keeping up with the consumer demands. As you see, people now prefers a mobility.
Thousands of apps can be downloaded at their store. The new OS from Microsoft has its unique metro style UI. Developers interested in creating Windows 8 apps may find their Windows Dev Center useful.

7. Ubuntu Mobile

Source: Ubuntu
What I like with Ubuntu is its simplicity and elegance. I run Ubuntu together with my Windows operating system. Simple, elegant, and free.
"Ubuntu is an ancient African word meaning 'humanity to others'. It also means 'I am what I am because of who we all are'. The Ubuntu operating system brings the spirit of Ubuntu to the world of computers." - So they say. About Ubuntu.
Now Ubuntu's simplicity and elegance will be on your phone. Being backed by Canonical, Ubuntu for phone is hoped to compete with leading proprietary platforms. They also provide resources for developers.

8. Tizen OS

Source: Tizen Phones
Formerly LiMo, Tizen is also an operating system for tablets, smartphones, and smart TVs. Samsung has plans to shift from Bada ans Android to Tizen.
The operating system was built using Linux. Samsung has not released smartphones yet running on Tizen platform, However, demonstration was done during Mobile World Congress and expects it to be released at the endof 2013.
Developers may already download its SDK at Tizen Foundation site.

9. Bada OS

Source: Bada
Bada OS is Samsung's smartphone platform. previous devices from Samsung runs a Bada operating system. However, Samsung is currently known as competitor for Apple by releasing smartphones running on Android platform.
Samsung has plans to release smartphones running on new platform Tizen. Bada in Korean means ocean or sea. They also have website for interested developers.

10. BREW OS

Pin It
See all 9 photos
Source: Mobilestore1
Short for Binary Run-time Environment for Wireless. Maybe you never heard of it - until now. It seems unpopular because of lack of branding.

BREW is an application development platform by Qualcomm for CDMA mobile Phones. Resources for developing BREW Apps can be seen at brewmp.com.
BREW is used by LG CDMA, Hwuawei, INQ Mobile, Amoi, and Samsung are some manufactures that uses BREW OS.

Well, that's all folks. List should not end here. Is there some Mobile OS you wish to share? Comment below.

Tuesday, 24 December 2013

How to Install Oracle in Windows PC

Use JSON in ASP.NET

What is JSON?

  • JSON stands for JavaScript Object Notation
  • JSON is lightweight text-data interchange format
  • JSON is language independent *
  • JSON is "self-describing" and easy to understand

JSON - Evaluates to JavaScript Objects

The JSON text format is syntactically identical to the code for creating JavaScript objects.
Because of this similarity, instead of using a parser, a JavaScript program can use the built-in eval() function and execute JSON data to produce native JavaScript objects.


JSON Example

{
"employees": [
{ "firstName":"John" , "lastName":"Doe" },
{ "firstName":"Anna" , "lastName":"Smith" },
{ "firstName":"Peter" , "lastName":"Jones" }
]
}

 

Videos

Part 1


Part 2


Part 3


Part 4


Part 5


Part 6




Theory By W3cSchool

Saturday, 21 December 2013

The Hidden Cybersecurity Threats of Corrupted Software Files

The Hidden Cybersecurity Threats of Corrupted Software Files

A file becomes corrupted when malicious code, also known as malware, is inserted into the file. All types of software files are at risk of this type of corruption, from word processing documents to spreadsheet files to images. Corrupted files are distributed to victims through email or by a malicious or hacked website. When the corrupted file is downloaded and opened, the malware is spread. Corrupted software files can be more than an inconvenience. These files can also infect your computer, affecting its overall performance and potentially leaving you vulnerable to identity theft.

How Corrupt Files Work

Attackers leverage the vulnerabilities present in commonly used software to spread malware, which may be a virus, Trojan horse or worm. Viruses can damage files, programs and operating hardware. A Trojan horse is a software program that appears to be legitimate, but can actually damage files or lead to data theft. Worms are software programs that are designed to replicate themselves and spread throughout a network, overwhelming capacity and causing individual computer or complete system crashes.
Corrupted files might delete or alter existing files on a computer – or they could install new, undesirable files. Malware can destroy data or permanently damage a computer or system. It can also give the cyber attacker access to your computer – a security risk that could result in identity theft and financial loss.

Precautionary Measure to Defend and Protect Yourself

Some corrupt files target older versions of software. When users fail to update software, they leave themselves at risk. Others target users who will download files from an email or the Internet without knowing whether the sender or website can be trusted.
While everyone is potentially at risk, you can reduce your exposure to cyber security threats. Implement these simple solutions to protect yourself and your computer from corrupted software files:
  1. Use a Firewall: A firewall allows access to trusted programs and websites, while acting as a barrier against hackers.
  2. Update Software: Keep software up to date with security patches. Many packages and operating systems offer automatic updates, for greater protection.
  3. Check Your Security Settings: Use the highest level of security offered by your email provider and Internet browser that also allows for the functionality you need.
  4. Use Caution When Downloading From the Internet: Avoid downloading from websites you don’t trust. On sites you do trust, always check the website’s certificate.
  5. Don’t Open Unexpected Email Attachments: If you receive an email with an attachment that you’re not expecting, or from someone you do not know, don’t open it, or scan it for viruses first. Remember, hackers often make emails appear to come from one of your contacts or will use your contacts’ computers to spread viruses.
  6. Install and Maintain Anti-Virus Software: Anti-virus software is designed to detect and remove a virus before it can do damage. Keep yours up to date to guard against new attacks.
  7. Use A Spam Filter: Spam filters block emails that could contain malicious content or links that lead to malicious websites.

Protect Yourself from Cybersecurity Threats

When it comes to malicious attacks on networks or individual computers, cybersecurity experts will tell you there is no perfect way to stay ahead of hackers. However, following these common-sense tips and best practices can drastically reduce your risk. Cybersecurity training also goes a long way to protecting individuals and organizations from the growing threat of corrupted software files and other cyber attacks.

 

Importance of Cybersecurity for Electronic Devices

Importance of Cybersecurity for Electronic Devices

While we may be used to security procedures for our work or home computers, we sometimes forget that today’s smartphones and tablets are also vulnerable to hacks and exploits. Smartphones are computers, after all, and they demand just as much attention to security as traditional desktop or laptop computers. Fortunately, by following these suggestions and understanding the types of vulnerabilities that affect modern devices, you can help keep all of your electronic devices as secure as possible.

Remember Physical Security

It is important to not neglect the physical security of your devices. To reduce the risk of theft, try to minimize using the device in public areas. Do not store your device, particularly a smartphone, in an area where it could be pick pocketed, such as the external pockets of bags or clothing. If laptops must be left unattended for a period of time, consider investing in a laptop lock that can be secured to a desk or table.
Physical security also applies to your home wireless network. Try positioning your router away from walls, particularly walls to the outside of your house or apartment. This limits the range of your router’s signal and reduces the chance that a hacker will be able to reach your network.

Keep All Software Up To Date

Software updates do more than add useful features to applications. They also patch any recently discovered security holes or vulnerabilities. This is particularly true for operating system updates, which are often designed to provide overall system-level fixes. In order to ensure that your system is protected against the latest threats, always install any software updates as soon as they become available.

Use Strong Passwords

Strong passwords are typically the first line of defense against any attack and one of the easiest areas for improvement in system security. Make sure that your passwords are not easy to guess. For example, avoid using a name or birthday as your password, and try to avoid using the same password for multiple sites or services.
Smartphone users should ensure that their phones are protected by pass codes, such as the four-digit codes used by many popular devices. Devices should also be set to lock after a period of inactivity. As with computer passwords, pass codes should be difficult to guess. Avoid consecutive digits, birthdays or 1234.
For any portable electronic device, you should likely not enable any options to remember passwords. While convenient, saved passwords can potentially allow complete access to a device that has been compromised by a thief or hacker.

Disable Remote Connectivity

Some devices use Bluetooth technology to connect to external headsets, a computer mouse or keyboard. When these peripherals are not in use, however, it is important that Bluetooth be turned off. Skilled hackers can potentially exploit most any connection from your device to the “outside world.” While you should not let this dissuade you from taking advantage of Bluetooth or similar technologies, keeping remote connectivity disabled as much as possible reduces the chance a hacker will exploit your device.

Enable File Encryption, If Possible

If your device supports it, file encryption can be a great way to protect sensitive information. File encryption makes it very difficult to read data from a compromised computer, even if a thief has physical access to the device. While not as popular with tablets and smart phones, laptop computer operating systems can often be used to encrypt files or folders.
Be advised, however, that when you encrypt your files you do so by setting a master password that completely locks access to your data. As such, it is extremely important that you remember this password. Should you forget it, you will likely lose any data that had been encrypted.

 

 

Interesting Facts on Cybersecurity

Interesting Facts on Cybersecurity

  • The prevalence of cyber crime has skyrocketed over the past several years to include cyber espionage, malware and phishing schemes. In response, the cybersecurity market has also grown and is expected to reach $120.1 billion by 2017. This may seem like an excessive estimate, but many tech users are unaware of just how costly cyber crime can be. The FBI’s Most Wanted List for cyber criminals currently contains just five individuals, but each is responsible for consumer losses ranging from $350,000 to $100 million.
  • The United States loses $100 billion annually as a result of cyber crime, which targets over 556 million victims per year. Cyber crime targets range from individual citizens to massive organizations like the U.S. Navy, which receives 110,000 cyber attacks every hour. Businesses, especially those with fewer than 2,500 employees, have become popular targets. Current trends such as cloud computing, bring-your-own-device policies, and consumerization increase the risks for businesses.
  • As consumers expand their tech use to new outlets, cyber criminals follow them. Social media and mobile devices have opened many new opportunities for hackers to compromise the security of computer systems and networks. Criminals are opting to use social networks over email as their primary means of targeting victims, as social media has become the primary source of Internet activity for most people. Social networks, including sites such as Facebook and Pinterest, are primarily used by cyber criminals as mediums for implementing spamming and phishing techniques.
  • "Online criminals target social media because that's where the victims are," stated Symantec's 2013 Internet Security Threat report. About 10% of all social media users have received a cyber threat. More than 600,000 accounts are compromised every day on Facebook alone. People are more likely to share personal information like addresses, phone numbers, and dates of birth on social networks. These facts are useful to hackers who want to figure out passwords or steal their victims' identities. 
  • Social media users are also likely to click links posted by trusted friends, which criminals can use to their advantage. Like-jacking, which occurs when criminals post fake Facebook "like" buttons to webpages, is a popular method of cyber crime. Users who click the button don't "like" the page, but instead download malware.
  • SMS scams have increased among mobile users, who are especially vulnerable because their devices are directly connected to their cellphone bills. Cyber criminals can send expensive text messages without the user's knowledge. Mobile botnets described in a recent Symantec report used this tactic to generate $547,500 to $3,285,000 per year.
  • Although mobile and social threats have increased, desktop and laptop users should also pay close attention to their computer security. Apple users in particular should take caution, as Macs have become an attractive target for cyber crime as the company has gained more market share. An example of this can be seen in the 2013 Flashback Attack, during which cyber criminals took control of 600,000 Macs. It should be noted that just 2.5% of all threats in 2012 were targeted towards Macs, but this number is expected to grow as Apple continues to grow within the market.

 

 

Chief Security Officer (CSO) Career Guide

 Chief Security Officer (CSO) Career Guide

As the global business environment becomes increasingly complex, organizations around the world face internal and external security threats that can pose significant obstacles to operations, earnings and customer goodwill. To counter these threats, corporate security experts are ever more in demand. Many organizations have established the role of chief security officer to lead efforts in fighting security breaches that could potentially cause significant losses. According to national data published by the U.S. Bureau of Labor Statistics (BLS) in 2011, employment growth for security managers is projected to increase by as much as 13% through 2018 *.

What is a Chief Security Officer?

In many organizations, the chief security officer (CSO) position is a fluid one, with evolving responsibilities defined by the company’s needs. In general, these accomplished professionals lead security efforts related to sensitive information and data. They are responsible for setting the procedures, guidelines and direction for information security policies that are meant to protect organizational assets from internal as well as external threats – from employees and vendors to cyber criminals and hackers. Some CSOs are also responsible for the physical security of employees and facilities.

The Importance of a Chief Security Officer

Businesses must be able to utilize and share information, while at the same time keeping it safe. Few can afford the monetary losses or interruption to operations caused by security breaches. They depend on chief security officers to stay ahead of security issues, solve problems and ensure the organization is running smoothly. Proactive CSOs identify risks and eliminate them before they become an issue, instead of reacting to security breaches – saving time, effort, money and goodwill. In addition, federal and other regulations have compelled many businesses to implement safeguards and reporting mechanisms that require the expertise of chief security officers.
Chief security officers perform duties ranging from planning and coordinating an organization’s information security policies, to developing and implementing security solutions, as dictated by a rapidly changing business environment. These professionals also monitor systems to safeguard information and technology infrastructure, while allowing access to authorized users.
Additional duties may include training staff in security procedures, hiring and managing security staff, and supporting an organization’s risk management, disaster recovery and business continuity efforts.

Where Can I Find Jobs as a Chief Security Officer?

Businesses across the globe are finding value in the role of chief security officer. Aspiring CSOs may find employment opportunities in industries such as financial services, information technology services, healthcare, pharmaceuticals, consulting, education, government contracting or with military organizations.

Education Preparation for Chief Security Officer Jobs

The education and expertise required to land a chief security officer job are usually accrued through formal education and work experience. This senior-level position takes extensive knowledge of IT security technology, architecture, networks and systems infrastructure, as well as a highly developed leadership and management ability. Specific qualifications for CSO positions will vary according to the employer’s needs.
  • Associate’s Degree: The path to a corporate security career could begin by earning a two-year associate’s degree and landing an entry-level IT job. With experience and additional education, you may find opportunities for advancement. Most mid-level security positions will require at least a bachelor’s degree.
  • Bachelor’s Degree: For many IT security positions, employers will generally require at least a four-year bachelor’s degree in computer science, information technology, engineering or a related discipline. Many also require industry certifications and work experience. 
  • Master’s Degree: Landing a CSO position may require an advanced degree, as well as extensive work experience. Employers may show preference to candidates holding a Master of Science in Information Assurance & Cyber security. An advanced degree typically takes an additional one to two years beyond the bachelor’s level.
Potential employers may also seek candidates with professional training, industry certifications or related higher education certificates, such as a graduate degree or For-Credit Graduate Certificate in Information Assurance and Cyber security. Some government and military employers will require security clearances and additional certifications.

Other Qualifications and Advancement

A successful chief security officer will be intelligent and driven, with effective interpersonal skills, a strong foundation of business knowledge and a combination of in-demand expertise, including:
  • Strong written and verbal communication ability.
  • The ability to collaborate and build consensus across departments and among stakeholders.
  • Experience with a wide range of relevant systems, and security monitoring and detection tools.
  • Extensive ability to plan, design, develop, test, implement and monitor IT security systems.
  • Strong leadership, negotiation and persuasion ability.
Maintaining a high level of expertise is vital for success and advancement. Continuing education may lead to CSO positions in larger or more prestigious firms.

Chief Security Officer Potential Salary

According to a 2010 national survey conducted by the U.S. Department of Labor, the median annual salary for security managers was $96,450. Because salary potential may vary depending on location, education, experience and other factors, prospective students are encouraged to conduct independent research to determine actual earning potential.

The Path to a Chief Security Officer Career

If you’re interested in cyber security, results-oriented and driven to succeed, you could aspire to the position of chief security officer. Start with this career guide to help you plan the education and experience you’ll need to work your way into this exciting and challenging career.

Cybersecurity vs. Information Security - Intresting Info.

       Cyber security v/s Information Security 

Cyber Security vs. Information Security

Hollywood exerts influence over many areas of modern life, even down to how people think about and refer to different types of work. Movies and television shows often depict the professionals who deal with computer security as Cyber security or information security specialists. These terms are often used in the entertainment industry in a way that implies that they are identical, which can create confusion for those who are interested in pursuing a career in one of these exciting and growing fields. Prospective students need to be able to distinguish between these two professions in order to determine which career path is the best fit.

Cyber security

Cyber security is the use of various technologies and processes to protect networks, computers, programs and data from attack, damage or unauthorized access. Since all computer systems rely on operating systems and networks to function, those areas are often targeted for attack and are the main sources of many security vulnerabilities.
Cyber security jobs require strong technical skills and most require a technical degree in Cyber security, computer science, information technology or engineering. Cyber security degree courses often offer classes in:
  • Computer forensics
  • Advanced computer security issues and practices
  • General computer topics. 
Cyber security jobs might include information systems security professional, senior system manager and system administrator.

Information Security

Information security involves protecting information from unauthorized access, use, disruption, modification or destruction, regardless of whether the information is stored electronically or physically. Cyber security is a subset of the larger area of information security.
Similar to Cyber security jobs, information security jobs also rely on strong technical skills since most information is stored digitally. A solid background in networking, system administration, software development and data integrity and security is an asset to those looking to enter this field. Prospective students should also consider supplementing technical courses with general communication and business courses. Information security jobs include security systems administrator, security auditor and security analyst.
Understanding technology and security issues is critical for any Cyber security or information security professional, regardless of the specific field of specialization. By understanding the differences between these two related but distinct fields, individuals choose the most appropriate educational options that will best prepare them for a career that matches their goals and interests.

The Bottom Line

When deciding on one of these computer security-related career paths, it is critical to be clear and detailed about exactly what it is you’re looking for in a career.  Cyber security and Information Security are two similar fields which offer a great variety of job options, but they are distinct career choices.
By fully understanding the differences and similarities between these two fields of study, individuals will better be able to select the educational path that best matches their skills, interests and career goals. By researching potential professions carefully, you’ll be able to discern the differences and similarities between several possible programs of study.  Gathering data about your prospective field and evaluating it carefully will allow you to make an informed choice about the best career path for you.

6 scary facts your computer security company won't tell you

6 scary facts your computer security company won't tell you 

 Your network support company is focused on making sure your computer systems are up and running.

While they probably address security basics, few keep experienced security experts on staff. As a result, they may not be fully aware of today's many serious risks.
Likewise, most business owners have limited tech budgets, and what money is available is dedicated to expanding capabilities, not locking down the systems you already have.
With new automated tools, software packages and third-party programming consultants, it is easier than ever for nearly anyone to launch a sophisticated attack.
Here's what you need to know to protect your business.

1. Easy to hack
Every network can be penetrated.
According to certified ethical hacker Dave Chronister, founder of Parameter Security: "In most small businesses, it takes mere minutes to gain access to their systems through common security holes that hackers know how to exploit."
For example, if you don't keep your systems patched with the latest Microsoft updates, you're asking for trouble; leave passwords set to factory defaults, and you'll surely invite unwanted intruders.
Even simple passwords can be cracked with a basic "dictionary" hack that rapidly tries password after password until a successful result is achieved. That may sound like a lot of trouble, but it's completely automated. All a hacker has to do is set things in motion.

2. You may not know
If you don't keep a close watch on your network, you may not be aware of outside attacks. Your server could be spamming thousands of victims around the world without your knowledge, or your confidential customer data may have been copied and shared with others, all without leaving any obvious trace.
Security should be revisited every time a new device or software package is installed, but few companies take this step.
Chronister points out another common vulnerability: "Most companies never think about their log files. Hackers usually clean up after themselves to avoid detection. That means if your log files are stored on the compromised server, the logs will likely be altered, leaving no trace of what really happened. Make sure all logs are shipped off the source device, either to a logging server or some other medium like e-mail."

3. Employee data theft
One of the most common sources of data theft is, unfortunately, your employees. It's not unusual to hear of customer or prospect lists being copied when an employee or sales person leaves. Even worse is the transfer of company secrets, customer financial data or sensitive employee information, such as Social Security numbers. In bad economic times, these types of incidents tend to increase due to the high value of this information.

4. employees help hackers
Chronister warns: "There is no technology to protect you from your employees; social engineering plays into almost any major or minor intrusion these days."
You may be acquainted with some of the tricks sales people use to gain access to decision-makers in target companies. Hackers use similar tactics, referred to as "social engineering," to uncover key information that can help them access computer systems over the Internet and in person.
Phishing scams that trick employees to click links online and in e-mail also are a huge issue as they bring unwanted programs inside your computer network, opening the door for hackers to get in. These could be e-mails that look legitimate but aren't or programs that appear helpful but have been designed with an ulterior motive in mind.
"The key to a successful social engineering attack is understanding what will entice the target to click the link or open the e-mail. Social sites like Facebook and Twitter provide a malicious attacker all the background information they need to be successful," Chronister said.

5. You're an appealing target
Many businesses skimp on security, thinking no one would bother with them because they are too small. Nothing is further from the truth.
Chronister explained: "Often, the hacker is looking for a computer network that can be used to launch attacks on others. Hacker sites are filled with lists of vulnerable IP addresses ripe for exploitation. What this means is that your very own unprotected systems could be used for credit card theft or even a government attack."
Another worry: being targeted based on your vendors or customers. "If I were targeting a Fortune 500 company, I might try hacking one of their smaller vendors to see if there is a way in through an extranet, billing system or some other backdoor," Chronister said.

6. Attacks can be costly
Attacks can expose your business to financial liability in a number of ways.
According to the 2008 CSI Computer Crime and Security Survey, the average annual loss is just under $300,000. Costs include response to loss of confidential information, which is often subject to regulatory compliance requirements and may carry hefty financial penalties. There are additional costs involved to restore your computer network to a clean, secure state, which can be a complex, time-consuming process. It's likely that after an attack, you also will put stronger safeguards in place to prevent a repeat incident.
But Chronister noted: "The worst thing you lose after an attack is your company's reputation. We've seen companies go under because their reputation couldn't be rebuilt."
So what can you do? A good place to start is an audit conducted by an experienced security company. You may see advertisements for inexpensive security scans, but these won't accomplish much since they typically don't show the whole picture. If you are taking the time to strengthen security, do it right and bring in experts. They'll advise you on intrusion detection, firewalls and other tools that make it harder for outsiders to get in, as well as strong security policies and security awareness training to ensure your staff is protecting you, too.
Wendy Gauntt is president of CIO Services LLC, a technology consulting company that specializes in small business solutions.

BlackBerry CEO Delivers Never-Say-Die Message

BlackBerry's new CEO, John Chen, apparently has a knack for reinvigorating failing companies, and with BlackBerry, he's got his work cut out for him. Following years of crushing blows to its efforts to catch up in the smartphone space, it's do-or-die for the company. A new deal with Foxconn and the flow of $1 billion in new investments could help it do.


BlackBerry has announced dismal quarterly results, but its new chief executive officer, John Chen, still believes there's cause for optimism as the company strides into a new future.
The firm posted a loss of US$4.4 billion, compared with a profit of $9 million in the same quarter ending Nov. 30 last year, on revenue of $1.19 billion. Excluding one-time items, however, the loss was $354 million, or 67 cents a share.

Mass Write-Downs

The multibillion dollar loss was due to inventory write-downs and asset impairment charges. Yet the company's share price actually increased 16 percent to $7.26 as investors gained confidence in a move to lower the risk of further write-downs for unsold handsets.
"The market seems to be cutting them a little slack and giving them some room during the transformation," telecommunications analyst Jeff Kagan told the E-Commerce Times. "However, there are no guarantees of success. I think virtually everyone is rooting for BlackBerry to succeed."

Foxconn Deal

The company has begun a five-year partnership with Foxconn Technology -- a key Apple manufacturer -- to develop and build handsets. The first phone off the line will be a low-end device targeted at Indonesia and other developing markets. As part of the deal, BlackBerry will no longer pay for the devices Foxconn creates for it.
Chen, who took the top job last month, told investors he believes the deal will turn the handset business into a profitable one. He also expects the company to make a profit in fiscal 2016, which begins in early 2015.

Niche Potential

"To me, if Apple and Google Android and Samsung are doing so well, BlackBerry should be able to carve out a niche for themselves. They just continued to make the wrong moves," Kagan noted.
"Working with Foxconn makes sense. Hopefully it'll work," he added.
"It's a little concerning they're leaving hardware design up to Foxconn," Michael Morgan, senior analyst of mobile devices at ABI Research, told the E-Commerce Times.
"The reasons that they do it is to save on their fixed costs. They will outsource that and turn it into more of a variable cost with Foxconn. These are things you need to do when a company is bleeding cash -- it makes it more efficient."

Decreasing Value

"When you're a handset OEM -- look at some of the more successful ones like Samsung or Apple -- they bring a lot of value to devices themselves," Morgan continued. "When you start to offload that stuff, suddenly the value of your company is going to decrease because you don't have control over your software or hardware. They're going to hopefully retain differentiation through their software, but as you're seeing the software is just not popular."
One of the key aspects of the company that should help it grow is the services business, which handles smartphone traffic for the internal networks of government and corporate customers.
BlackBerry sold around 4.3 million handsets in the quarter and recognizes hardware revenue on 1.9 million devices -- down by 1.8 million from the previous quarter.

Chen's Success

Chen has a history of successfully turning around struggling companies. SAP bought Sybase in 2010 for $5.8 billion, after Chen had steered it to more than six times its valuation.
BlackBerry actually spent several months looking for a buyer, but it ended those efforts last month as Chen came aboard, replacing Thorsten Heins as CEO. The firm had agreed to sell to its largest shareholder, Fairfax Financial Holdings, but instead struck a deal with Fairfax and other investors to put $1 billion into the company.
Yet history suggests the cash injection and the revamp of BlackBerry's business may not be enough to save the company.

10 Percent Survival Chance?

"When you look historically at any handset OEM that falls below profitability even once ..., nine out of 10 never come back to profitability. They go out of business, they get acquired by somebody else, they merge," ABI's Morgan pointed out.
"Over the last five to 10 years, only LG has come back to profitability, and they don't do it on a regular basis," he continued. "But they also have the advantage that the handset part is just a small part of a larger conglomerate that can support the losses for a while to get them back on their feet. BlackBerry has even less of that now. They're continuing to outsource more and more and cut more and more.

Friday, 20 December 2013

Latest IT News on Computer and Mobile Security 20th Dec. 2013

Latest IT News on Computer and Mobile Security

 Washington Post Hacked Again; Suspects Chinese Involvement

The Washington Post reported Wednesday that its servers had been breached for the third time in as many years. The intrusion is believed to have been limited in duration and effect; but the company suspects that Chinese hackers were responsible.
20 December 2013

Mobile Security Woes Escalate a Whopping 733%

Mobile devices are bringing endpoint security threats to an acute level: 68% of IT and IT security professionals in a recent survey said that their mobile devices have been targeted by malware in the last 12 months. And over the last five years, there’s been a staggering 733% increase in concern over mobile devices in the workplace.
19 December 2013

Target Breach Affecting 40 Million Was Likely an Inside Job

The US, originator of Black Friday holiday sales and the dubious homeland of in-store, post-Thanksgiving brawls over hot toys (remember Tickle-Me Elmo?), has been hit with the largest retail breach of credit and debit card information of 2013. In fact, at 40 million affected and counting, the security incident at Target may be one of the largest retail breaches ever.
19 December 2013

Industry Predictions for 2014; Part 4: Managed Security Services

In Part 4 of this week's series on the security industry's predictions for 2014 we examine the likely evolution of managed security services (MSS). Gartner has predicted that the MSS market will grow from $12 billion in 2013 to more than $22.5 billion by 2017. Next year is seen as the beginning of a rather dramatic growth period for MSS.
19 December 2013

White House Releases the NSA Surveillance Review

The five-man panel charged with reviewing intelligence and communications technologies in the US has completed its work and the White House has released the findings: Liberty and Security in a Changing World. Analysis of the 300 page document has begun, but the initial response is generally cautious optimism.
19 December 2013

Apple Give OS X Mavericks its First Update

OS X Mavericks, Apple’s latest Mac operating system, has gotten its first major update. Granted, they’re mostly non-security specific, but it comes bundled with the Safari Web browser 7.01 update, which does address some vulnerabilities.
18 December 2013

Microsoft Joins FIDO Alliance

Microsoft has thrown its hat in the universal authentication ring with the Fast IDentity Online (FIDO) Alliance, joining as a member of the Board of Directors.
18 December 2013

Chewbacca Malware Smuggles Keylogging with Tor

There’s a new bug plying the hyperspace lanes of crime, dubbed Chewbacca. It could have originated in a galaxy far, far away but we would never know, because Chewbacca comes with Tor integration.
18 December 2013

Mobile Endpoint Security Market Set to More than Double

The risks of truly smart smartphones and tablets are acutely underestimated on a global scale, as hackers are learning to better exploit not only those devices, but emerging technologies such as cloud computing and virtualization technologies. That’s the word from Frost & Sullivan, which estimates the global mobile endpoint protection market to reach $1 billion in 2017, up from just $433.5 million last year.
18 December 2013

Industry Predictions for 2014; Part 3: The Effect and Influence of Government

In Part 3 of our week-long look at industry predictions, we examine the effect and influence of government. There are two primary aspects: the influence of government (regulations); and the effect of government (which has been shown in the latter half of 2013 to have turned the internet into its own private surveillance machine).

4th Generation Intel® Core™ Processors Are Here

Hi All
Refer the Intel 4th generation CPU advance feature with following given URL:

http://www.intel.com/content/www/us/en/processors/core/4th-gen-core-processor-family.html









Thursday, 19 December 2013

Three Layer Architecture in C# .NET

First let me give you a small overview about the topic I would like to cover in this article.
  1. Tier vs. Layer
  2. Three Tier/Layer Architecture Design Components
  3. Demo: Three Layer Windows Application in C#.NET
  4. 1. Tier vs. Layer

    1.1 Tier: Tier indicates a physical separation of components, which may mean different assemblies such as DLL, EXE, etc. on the same server or multiple servers.
    As you can see in the above figure, Data Tier have no direction with Presentation Tier, but there is an intermediate Tier called Business Tier which is mainly responsible to pass the data from Data Tier to Presentation Tier and to add defined business logic to Data.
    So, if we separate each Tier by its functionality, then we come to know the below conclusion:

    1.2 Layer: Layer indicates logical separation of components, such as having distinct namespaces and classes for the Database Access Layer, Business Logic Layer and User Interface Layer.

    2. Three Tier/Layer Architecture Design Components

    As we have already seen, tier is the sum of all the physical components. We can separate the three tiers as Data Tier, Business Tier and Presentation Tier.
  5. Data Tier is basically the server which stores all the application’s data. Data tier contents Database Tables, XML Files and other means of storing Application Data.
  6. Business Tier is mainly working as the bridge between Data Tier and Presentation Tier. All the Data passes through the Business Tier before passing to the presentation Tier. Business Tier is the sum of Business Logic Layer, Data Access Layer and Value Object and other components used to add business logic.
  7. Presentation Tier is the tier in which the users interact with an application. Presentation Tier contents Shared UI code, Code Behind and Designers used to represent information to user.

The above figure is a mixture of Three Tier and Three Layer Architecture. Here, we can clearly see a different between Tier and Layer. Since each component is independent of each other, they are easily maintainable without changing the whole code.
This approach is really very important when several developers are working on the same project and some module needs to be re-used in another project. In a way, we can distribute work among developers and also maintain it in the future without much problems.
Testing is also a very important issue for Architecture when we are considering writing a test case for the project. Since it’s like a modular architecture, it’s very handy testing each module and to trace out bugs without going through the entire code.

3. Demo: 3 Layer Windows Application in C#.NET

Let’s go though from one module to other to have a better understanding of it.

Part1



Part 2



Part 3


Part 4



                                                                                                                                                                                                                    Theory By Codeproject.com

Monday, 16 December 2013

Ajax AsyncFileUploader in Asp .Net

AsyncFileUpload is an ASP.NET AJAX Control that allows you asynchronously upload files to server. The file uploading results can be checked both in the server and client sides.

Events
  • UploadedComplete - Fired on the server side when the file successfully uploaded
  • UploadedFileError - Fired on the server side when the uloaded file is corrupted

Properties
  • CompleteBackColor - The control's background color on upload complete. Default value - 'Lime'.
  • ContentType - Gets the MIME content type of a file sent by a client.
  • ErrorBackColor - The control's background color on upload error. Default value -'Red'.
  • FileContent - Gets a Stream object that points to an uploaded file to prepare for reading the contents of the file.
  • FileName - Gets the name of a file on a client to upload using the control.
  • HasFile - Gets a bool value indicating whether the control contains a file.
  • OnClientUploadComplete - The name of a javascript function executed in the client-side after the file successfully uploaded
  • OnClientUploadError - The name of a javascript function executed in the client-side if the file uploading failed
  • OnClientUploadStarted - The name of a javascript function executed in the client-side on the file uploading started
  • PostedFile - Gets a HttpPostedFile object that provides access to the uploaded file.
  • ThrobberID - ID of control that is shown while the file is uploading.
  • UploaderStyle - The control's appearance style (Traditional, Modern). Default value - 'Traditional'.
  • UploadingBackColor - The control's background color when uploading is in progress. Default value - 'White'.
  • Width - The control's width (Unit). Default value - '355px'.

Methods

  • SaveAs(string filename) - Saves the contents of an uploaded file.






source code By http://www.asp.net

Wednesday, 11 December 2013

The Top 10 Programming Languages

The Top 10 Programming Languages


The knowledge of a handful of programming languages could come to be a lifesaver to many a programmer, especially since most languages that were popular 10 years ago are not as viable as they are now.

But there are many developers who have earned their worth simply by knowing the right programming language at the right time, simply because they had solid skills that were profitable while the language was popular.

Here are some languages though, which stayed popular through the years, and prove to give young developers a jumpstart to their careers, and always are a bonus to add to any developer’s resume, as compiled by TIOBE software, a coding standards company.

1. Java

What is it?
 An object-oriented programming language developed in the late 1990s by James Gosling and colleagues at Sun Microsystems.

Why is it important?
This “beautiful” programming language is central for any non-Microsoft developer, i.e. any developer who focuses on the non-.NET experience. It is mostly derived from C and C++ but has a more basic object model. It ranked first on TIOBE’s list of most popular programming languages.

2. C

What is it?
C, a general purpose programming language built by Dennis Ritchie when he was a part of Bell Telephone labs, is the bass of C++ and other programming languages. It was built to work with the Unix operating system.

Why is it important?
C is one of the most widely used programming languages of all time, and ranked second on the list. “Learning C is crucial. Once you learn C, making the jump to Java or C# is fairly easy, because a lot of the syntax is common. Also, a lot of C syntax is used in scripting languages,” Wayne Duqaine, director of Software Development at Grandview Systems, of Sebastopol, Calif., told eWEEK.
 
3. C#

What is it?
This general-purpose programming language developed by Microsoft evolved from C and C++ as a part of the software company’s .NET initiative.

Why is it important?
This language is an essential part of the .NET framework, so developers who use Microsoft heavily will find it critical, according to Duqaine.

4. C++

What is it?
C++ is a general purpose multi-paradigm spanning compiled language that has both high-level and low-level languages’ features. It was started as an enhancement to the C programming language, Bjarne Stroustrup in 1979.

Why is it important?
It is one of the most popular programming languages, winning fourth place on the list, with application domains including systems software, application software, server and client applications, and entertainment software such as video games.  The language has also greatly influenced many other popular programming languages, such as C# and Java.

5. Objective-C
 
What is it?
This object-oriented programming language created first by Brad Cox and Tom Love at their company Stepstone in the early 1980s, adds Smalltalk-like messaging to the C programming language.

Why is it important?
This language is most used on the Apple iOS and Mac OS X. Objective-C is the principal language used for Apple's Cocoa API as well.

6. PHP

What is it?
This language is especially suited for Web development because of it easy embedding into HTML pages. It is an open-source, server-side, cross-platform, interpretive HTML scripting language

Why is it important?
It is a popular language, ranking sixth on TIOBE’s list. "High-speed scripting with caching, augmented with compiled code plug-ins (such as can be done with Perl and PHP) is where the future is. Building Web apps from scratch using C or COBOL is going the way of the dinosaur," said Duquaine, according to eWEEK’s report.

7. (Visual) Basic

What is it?
This is an event-driven programming language which is implemented on Microsoft’s .Net framework.

Why is it important?
This language ranked as the seventh most popular language on TIOBE’s list, probably because it was designed by Microsoft to be easy to learn and use. According to Tim Huckaby, CEO of San Diego-based software engineering company CEO Interknowlogy.com, “It is currently dominating in adoption and that is where all the work is,” as in eWEEK’s report.

 8. Python

What is it?

This is an event-driven programming language which is extensively used by Google because of its simplicity. It is managed by the Python Software Foundation.

Why is it important?

Python is a general-purpose, high-level programming language whose design philosophy emphasizes code readability. Python claims to combine "remarkable power with very clear syntax", and its standard library is large and comprehensive.

It is releases on 4 September 2011, 6 months ago.It is developed by Python Software Foundation.

9. Perl

What is it?
Being a high-level programming language, its emphasis lies in code readability and clear syntax. It combines Object-oriented and functional programming styles, and is often used as a scripting language. Perl is an open-source language used widely to process text through CGI programs.


Why is it important?
Perl’s efficiency in processing of piles of text has ranked it ninth in terms of programming language popularity. It is used extensively to write Web server programs for a variety of tasks. “Learning some form of scripting language, such as Perl or PHP is critical if you are doing Web apps," told Wayne Duqaine, director of Software Development at Grandview Systems, of Sebastopol, Calif., in a talk with eWEEK.

10. JavaScript

What is it?
JavaScript is an object-oriented scripting language that is smaller than Java. Being a client-side language, it runs in the web browser on the client-side with a simplified set of commands, easier code and no need for compilation.

Why is it important?

JavaScript is simple to learn and is the tenth most widely used programming language. It is used in millions of web pages to authenticate forms, detect browsers and improve design, and it is easier to run these functions as it is embedded into HTML.

What cloud computing really means


----------------------------------------------------------------------------------------------------------------
Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition.
As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing.
[ Stay on top of the state of the cloud with InfoWorld's "Cloud Computing Deep Dive" special report. Download it today! | Also check out our "Private Cloud Deep Dive," our "Cloud Security Deep Dive," our "Cloud Storage Deep Dive," and our "Cloud Services Deep Dive." ]
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.

Cloud computing is at an early stage, with a motley crewSaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are 
InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:
1. SaaS
This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office?
2. Utility computing
The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.
3. Web services in the cloud
Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services -- such as Strike Iron and Xignite -- to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.
4. Platform as a service
Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com,Coghead and the new Google App Engine. For extremely lightweight development, cloud-basedmashup platforms abound, such as Yahoo Pipes or Dapper.net.
5. MSP (managed service providers)
One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.
6. Service commerce platforms
A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.
7. Internet integration
The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.
Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately described as "sky computing," with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It's a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the hardest one to argue with in the long term.
This article, "What cloud computing really means," was originally published at InfoWorld.com. Follow the latest developments in cloud computing at InfoWorld.com. For the latest developments in business technology news, follow InfoWorld.com on Twitter.
Read more about cloud computing in InfoWorld's Cloud Computing Channel.



The Future of Remote Work, According to Startups

  The Future of Remote Work, According to Startups No matter where in the world you log in from—Silicon Valley, London, and beyond—COVID-19 ...