Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Wednesday, February 12, 2014

Micromax Launched Funbook P280 at Just Rs. 4,650



Micromax has launched a new tablet based on Android operating system which is worth a buy because of low price. Funbook P280 is now available for Rs. 4,650 online  and  you can probably guess from the price of the tablet, that there’s nothing especially attractive about this tablet. However, if we consider the price P280 could compete against the likes of Datawind’s Ubislate series, better known by Aakash in India .

The Funbook P280 runs on Android 4.2.2 Jelly Bean, and is quite underpowered. There’s an All Winner A13 single-core Cortex-A8 with 1GHz processor, according to the official statement from the company. There’s also 512MB of RAM to help things along. Screen is of  7-inch capacitive TFT LCD on the P280 with a 800×480 pixel resolution. Do not expect to be shooting great pictures as there’s only a 0.3MP camera on the front and none on the rear. Internal storage is of 4GB with option for expandable storage up to 32GB via microSD cards.

In addition , You’ll find a full-sized USB port to connect data dongles, and Wi-Fi connectivity. That’s it. There’s no Bluetooth or GPS tracking system or a SIM slot for 3G. Disappointingly, there’s only a 2400 mAh battery inside the tablet. We have seen smartphones with larger battery packs. Micromax claims it’s good for 250 hours of standby time. Just like the Canvas smartphones range, this tablet is preloaded with various apps including Spuul, Opera Mini, Kingsoft Office, M!Live.


Sunday, February 9, 2014

Valentine Special ~ " Romantimatic " A Smart Phone App



Have you ever came across an app that will teach you to be romantic? No, but this time your mood will automatically turn into romance by this magical app developed by Greg Knauss, a web and software developer named “ Romantimatic ” who has been married for 18 years.

He got this idea when he realized that he sometimes forgets to tell his wife that he loves her a lot.

"With this amazing technology we have in our pockets, we can fly throughout the day without remembering to send a simple 'I love you' to the most important person we love in our lives. Romantimatic will help in reminding you to call your loved ones or sends them a sweet text message.

Tuesday, February 4, 2014

Google Nexus Device To Be Shutdown in 2015


Google will soon shut down its popular Nexus brand from next year i.e., 2015 as per the leak article.

From next year Google will be more focusing on “PLAY” edition. At this point of time Google can bring change in the title ‘PLAY’ also.

Nexus brand is among the most popular brand these days because of its prices, quality of hardware and Android software.

An 8 inch sized tab from Nexus could come into the market this year which will be running on Android Kitkat operating system.

Recently Google android’s official website has published a picture of an 8 inch tablet and is created by by the makers of Nexus 4 and Nexus 5 , LG.


So get ready for the upcoming products from Nexus this year as you will not be able to see few more in the next year.

Saturday, January 25, 2014

Bengaluru Gets 6 Free Public Wi-Fi Hotspots

On Friday, Karnataka government launched free Wi-Fi connectivity in six commercial hotspots in Bengaluru. This is said to be the 1st free public Wi-Fi service of its kind in India which includes airports and confined retail spaces. This service will gonna be extended to 10-15 more locations over the next few months.
Free public Wi-Fi will enable you to access the internet on your mobile devices even when you are on the road. You no need to have a 2G or 3G connection.
Description: http://articles.timesofindia.indiatimes.com/images/pixel.gifPlenty of  applications can be built using free public Wi-Fi. Bengaluru is looking at using it for high-definition traffic surveillance, and parking management. Cameras have already been installed at Wi-Fi hotspots, and so that people can view the traffic conditions on those roads and will also help people to where parking is available.
At these 6 hotspots, one can access Internet at a speed of up to 512kbps and the usage will be limited to three hours per day or up to 50MB data.
Around the globe, many governments and cities are beginning to provide free Wi-Fi connectivity. In United States of America, at least 57 cities now have free Wi-Fi. Many European and Asian cities too provide free public Wi-Fi.

Mumbai Mayor Sunil Prabhu said the project proposal is still at a nascent stage and the civic body was working on the security aspects. "We have appointed consultants who are studying how all security concerns can be addressed before kickstarting the project," Prabhu said.

Wednesday, December 15, 2010

India is the World's 3rd Largest Internet User





Hindustan Times  says that India is now the 3rd largest Internet user-base in the world, as claimed by the Google India's Head of Products Vinay Goel. The 1st 1 in the list is China with 300 million users, then U.S. at 207 million. India comes in 3rd at with 100 million people entangled in the digital web. 

What is more important to note is that 40 percent of those 100 million are accessing the net through their cell phones. Vinay's estimate is that by two years, the number of mobile Internet users will surpass those using PCs. That's a big contrast from 2007 - only three years ago, when the nation had just two million users. He stated that there's a major scope for improvement for the mobile Internet market, as the 40 million mobile Internet users comprise of only 8 percent of the total number of people using cell phones in general. Finally, Goel said that Indian internet users search for songs the most.
  
For detailed statistics, we'd recommend you to check out this Wikipedia page about Global Internet Usage. It just shows the massive population of the country; as these 100 million people constitute just 8.5 percent of the entire nation's population! This news is in a way ironic too - it is the end of 2010 and all of us are yet to use 3G Internet even as we see the world slowly progressing to 4G. Also, Internet costs in India are comparatively expensive to the Western regions and the cap on the cheaper data-plans is fairly low. 

Thursday, November 4, 2010

Are these 3G Tablets Digging our Wallets Deeper?

Tablet computers have never made this big a noise since the iPad launch this year. Most tablets including Apple's shiny 10-inch device or even Samsung's Galaxy Tab (which we recently checked out) come with Wi-Fi for connecting to the net when you're around a hotspot. Many also have 3G for Internet accessibility anywhere you go. Now, something that many may tend to overlook are the recurring charges for the latter. This is more relevant to people who own tablet computers as well as smartphones (which I believe is a big percentage). For such people, they're already paying a monthly fee for 3G on their cell phone.

Over and above this, if you own an iPad 3G model, you'll be shelling out $15 per month to AT&T for a paltry 250MB. Another American carrier Sprint charges $30 per month for 2GB of usage when you purchase the Samsung Galaxy Tab via them. A possible way out of this is to share the Internet connection from your cell phone when required (known as Internet Tethering). For example, Google's Android 2.2 has a feature built-in that lets you turn your phone into a Wi-Fi hotspot. It uses its 3G connection to serve other Wi-Fi enabled devices (like say the Wi-Fi only iPad or iPod Touch) with broadband internet. A popular app called Joikuspot for Symbian devices lets you do the same. However, some operators do not allow such type of sharing of their 3G Internet to more than one device.

We still don't know the fate of 3G Internet tethering till all operators launch it. At least most of them have no such harsh restrictions for the currently running 2.5G Internet (or EDGE) service. So, for people already owning a 3G smart-phone and planning to buy a tablet, I'd suggest you do your math before jumping to buy a 3G tablet with a monthly plan. Explore Internet sharing over your smartphone before. You could save a big sum at the end of the year.

Friday, October 15, 2010

You may not want to be the Internet police, but you need to be !


Today’s Internet connected businesses must be concerned not only with threats originating from the Internet, but also threats that can manifest from their employees accessing the Internet both recreationally and as a part of their job. Employees can expose the company to threats from malware, and from litigation resulting from employees downloading copyrighted material or accessing inappropriate content. An acceptable use policy and a written information security policy are both critical, and great places to start, but more is required.
Packet filtering firewalls are very effective at blocking unsolicited inbound connections, but they can do very little to block malware downloaded by an internal client with Internet access. Nor can they recognise inappropriate content, or copyrighted material. Antivirus software can help protect against malware, but not against pornography or the latest Hollywood blockbuster. Internet monitoring software is another layer of defence that can help protect your network from threats of the technical variety, and your company from threats of the litigation variety.


Internet monitoring software can be run on appliances inline to your Internet connection, on a server acting as a proxy, out of band but in tandem with your firewall, or as an agent installed on your clients. The type of deployment you choose depends on your network architecture, how easily you can manage your clients, and whether or not you want the ability to protect machines when they are remote. Whatever the type of deployment, the purpose of Internet monitoring is to examine all internet activity and, protect against threats, and to enforce policy. Your acceptable use policy should define what is considered acceptable business use, address whether or not any recreational access to the Internet is acceptable, and clearly explain what is considered inappropriate use of the Internet.
Internet monitoring solutions can help protect your users from threats in several ways. Most combine several different methods. One popular approach is to maintain a list of websites by category that is regularly updated through a subscription service. Websites and ip addresses are sorted into categories that make it very easy for the administrator to select what types of sites should be permitted, and what types of sites should not be accessed. When the client makes a request, the traffic is compared against the lists and permitted or blocked based on policy. Another way these products can monitor Internet activity and protect against Internet threats is to examine file types requested; permitting html, text, and graphics, but blocking scripts, executable content, and media files that could contain copyrighted material. Many Internet monitoring software packages also offers anti-x capabilities; examining all files for malware, emails for suspect links, and traffic flows for known patterns related to backdoor programs and bot-nets.
Internet monitoring can, but does not necessarily have to, log all such activities. Whether you log access or not depends on many factors, including your privacy policies, your corporate policy regarding monitoring employee activities, and whether or not you wish to invest the time and storage necessary to review and archive these logs. Some companies expressly choose not to log; taking advantage of the protections offered by their Internet monitoring software without tasking personnel to monitor Internet activity. They get the benefits of policy enforcement without the efforts and potential HR overhead that goes along with investigating policy violations to determine whether the act was accidental or intentional. With this approach you can safely regulate Internet access without being branded as the Internet Police.
Whatever approach you take, monitoring Internet activity is a critical part of a defense in depth approach to securing your network. Look at your options, and select the approach that best fits in with your client base, your Information Security Policies, and your management’s philosophy.