Thursday, January 6, 2011

India's cheapest Android phone coming from Intex























Intex is joining the Android bandwagon by releasing its first Android smartphone in February 2011. And this is not just the end of news. The smartphone from Intex will also be the cheapest Android phone to be available in the Indian market at 5,500.

Due to launch in the first week of February next year, the phone will be running on Android 2.2 (Froyo), complete with a 3.2MP camera, 2.8 inch resistive full-touch screen, Wi-Fi and GPS.


It should be noted that the Intex phone will be in competition with Micromax's Andro A60, launched earlier in the month. The Andro A60 however costs more at 6,999 and runs on Android 2.1. This will give an edge to the Intex phone when it releases.

While we don't have the full specs of the Intex phone at present, we will get all of that when the phone releases. We have to wait for the phone to release to see how the market reacts to it.

What's in store for the mobile market in 2011?

The mobile market is spiralling toward growth with each year. So with the new year approaching fast, here are the top 10 mobile market trend predictions by the Mobile Marketing Association for the year 2011 in the Asia Pacific region.

1. With evolving mobile technology, the messages on mobile marketing will turn more personalized. Introduction of regulations in the mobile marketing sphere can lead to greater business-to-consumer transactions, eliminating the spams involved in mobile advertising.
What's in store for the mobile market in 2011?


2. Over-the-top services will bring in revenues for value added services. Operators need to focus more on converged devices like tablets.

3. Applications allowing free SMS, video and phone calls will enter the market. Few like WhatsApp and Viber are already doing so. With more such applications, basic mobile features will be available for free, irrespective of the devices used.

4. With the introduction of the Windows 7, the focus is moving toward strict hardware specifications, along with Research In Motion (RIM) and Apple. This means that ads on these platforms will be counted as more credible, helping the cause of mobile marketing.

5. New apps are showing the way to mobile ads. The presence of an app without even a data connection, with high usability levels are making the cases of these kind of ads stronger. However, since apps are device specific, avenues for experimentation will be limited. This may lead to waning out of the popularity of apps itself.

6. The increase in GPS and digital compasses has led to a number of location based Augmented Reality (AR) software platforms and apps. The combination of location based services and AR allow for graphic content to be made in relation to the user's position. This case is a classic example of specific targeting in the ad world scenario promising to increase ad spend and transactions.

7. Mobiles becoming a means for payment of bills gives the advantage of quick transaction. It also ensures customers can purchase while on the go without the need of cash in hand. This promises a bright future for mobiles in future as a mode of transaction.

8. Mobiles are fast becoming replacements for computers, as they are turning more feature rich. With introduction of converged devices like tablets, consumers now have greater speed and battery life. These devices are fast becoming the choice of medium for writers/ bloggers, allowing them to edit and upload contents in various formats even while travelling.

9. Increasing number of handsets ship with browsing capabilities letting people to access Web on their mobiles. This paves a way for business-to-consumer applications to be delivered via phones. Smartphones are allowing consumers to view richer content on their mobile devices helping the marketers.

10. With 3D technology sweeping the mobile arena too, it will create space for innovation in mobile ads. The technology is definitely shape the future of mobile ad contents.

Skype launches Wi-Fi, 3G video calling to iPhone app

Skype is offering a new video calling application which will run on iPhone, iPad, and iPod Touch. The video calling works over both Wi-Fi and 3G.

With this new Skype 3.0 will enable free video calling to the Apple devices and the users will be able to use both Wi-Fi and AT&T's 3G cellular network. With this, users can activate any video chats from their contacts by turning on the video feature.

The app is compatible with iPhone 4, iPhone 3Gs, and the 4G iPod Touch with iOS 4.0 and above. It also offers free services such as voice or video calls to other Skype users. Users need to pay to make calls from a PC to a landline or cell phone.

As earlier, Skype remains to offer instant messaging, text messaging, audio-only chats, and the ability to call landlines and mobile phones at low rates.

It should be noted that Skype for iPhone is free and video calling needs iOS 4.0 or above. The application can be run on any device with at least iOS 3.0.

Tracking of lost laptops made easier with new tech

Quick Heal, an Internet security tools provider, has introduced a new technology called Laptop Tracker that helps to track and recover lost laptops. The technology works on the premise that every laptop or PC has a Media Access Control ID (MAC ID) - the physical address of the device. When the stolen devices are connected to the Internet, its IP location can be found using the physical address number.

To use the services of the Laptop Tracker technology, one needs to register into its website known as www.trackmylaptop.net. All one needs to do there is key in the physical address number of the laptop or PC.

The solution from the Pune-based company is open for everyone. However those of who are using its anti-virus solution do not have to fill the MAC IDs. The technology would help the cyber crime departments and law enforcement departments of the country and the company is in talks with them to deploy the technology.

Saturday, December 18, 2010

12 common mistakes done by programmers

Most often, software developers seem locked into certain failure modes that can't be avoided and such is the frequency with which they fall prey to a particular poor programming practice.Peter Wayner of Computerworld writes about twelve most common programming mistakes, each of which is accompanied by its opposing pair. Below are the twelve programming pitfalls developers should stay away from.
12 common mistakes done by programmers


Playing it fast and loose
Failing to prop up the basics is the easiest way to make errors in coding. There are a lot of small places where a developer may make a mistake which causes software to fail. And the worst part about sloppy programming is that advances in language design aimed to fix these problems don't do their job. There have been improvements in syntax in programming languages. For instance, the latest version of Java tries to make null-pointer checking easier by offering shorthand syntax for the endless pointer testing. But such syntax improvements can only prevent code from crashing. They don't eliminate the root of the problem: the proliferation of null values due to fast and loose programming.

Overcommitting to details
On the flip side, overly buttoned-up software can slow to a crawl. Relentless devotion to detail can even lock up software if the obsessive checking requires communicating with a distant website over the network. Here, the challenge is to design the layers of code to check the data when it first appears, which is much easier said than done.

Not simplifying control
Not simplifying control over tasks in their code may invite disaster for developers. The software assumes that if someone creates an object of type Name with two fields first and last, then it should immediately create a database table called Name with two columns, first and last. The names are specified in only one place, avoiding any problems that might come if someone fails to keep all of the layers of configuration in sync.

Delegating too much to frameworks
Sometimes the magic tools lead only to confusion. By abstracting functionality and assuming what we want, frameworks can all too often leave developers at a loss for what's gone wrong in their code. The rules are, while quite reasonable, not entirely trivial. As the app grows, it depends on more and more of these almost-trivial bits of external knowledge.

Trusting the client
Many of the worst security bugs appear when developers assume the client device will do the right thing. For example, code written to run in a browser can be rewritten by the browser to execute any arbitrary action. If the developer doesn't double-check all of the data coming back, anything can go wrong.

Not trusting the client enough
Sometimes too much security can lead paradoxically to gaping holes. Because of this, many Web developers are looking to reduce security as much as possible, not only to make it easy for people to engage with their products but also to save them the trouble of defending more than the minimum amount of data necessary to set up an account.

Relying too heavily on magic boxes
Many programmers assume they can link in the encryption library, push a button, and have iron-clad security. But many of these magic algorithms have subtle weaknesses, and avoiding these weaknesses requires learning more than what's in the Quick Start section of the manual.

Reinventing the wheel
Then again, writing your own libraries just because you think you know a better way to code can come back to haunt you. But grow-your-own cryptography is a welcome sight to attackers. Many libraries don't need to be perfect, so grabbing a magic box is more likely to be better than the code you write yourself.

Opening up too much to the user
Placing the onus on users to customize functionality they do not fully understand can invite disaster in the form of inadvertent security holes and privacy violations. When making purchasing decisions, most users can't handle the breadth of features offered by any given piece of software.

Overdetermining the user experience
Some developers decide to avoid the trouble of too many features by offering exactly one solution. But if users don't like the idea, they will look for ways to work around these limitations, and it will lead to an outcome that could translate into security vulnerabilities.

Closing the source
The decision to not distribute code works against the integrity of that code and it can discourage innovation and fixing bugs. Just opening up the code forces you to make the info more accessible, understandable, and thus better.

Assuming openness is a cure-all
While openness can make it possible for others to pitch in and, thus, improve your code, the mere fact that it's open won't do much unless there's another incentive for outside contributors to put in the work. Opening up a project can also add new overhead for communications and documentation. Moreover, a good open source project comes with extensive documentation of the API and road maps for future development.

Monday, November 29, 2010

Top 10 IT certifications in demand today

With the global economy moved out of the great recession, technology jobs are playing a significant role in the recovery. There are a number of technology certification programs. Some of them are sponsored by software vendors, some by vendor-neutral organizations, and some by educational institutions. But which are the skills and certifications that can give you an edge over the others on getting the job?
Top 10 IT certifications in demand today


Microsoft Certified Technology Specialist (MCTS)
MCTS helps IT staff validate skills in installing, maintaining, and troubleshooting a specific Microsoft technology. The MCTS certifications are designed to communicate the skills and expertise a holder possesses on a specific platform. For example, candidates won't earn an MCTS on SQL Server 2008. Instead, they'll earn an MCTS covering SQL Server business intelligence, database creation or SQL server. MCTS credential enables professionals to target specific technologies, and is generally the first step toward the Professional-level certifications.

Cisco Certified Internetwork Expert (CCIE)
CCIE is a vendor-sponsored certification, focusing on Cisco's products. It requires that the candidate passes both a written exam and a hands-on lab. Candidates have to choose from one of several tracks: Routing and Switching, Security, Storage Networking, Voice, and Service Provider. CCIEs must recertify every two years or the certification is suspended. CCIE accreditation captures most of the networking company's certification glory.

Cisco Certified Security Professional (CCSP)
CCSP focuses on skills related to securing networks that run Cisco routers and other equipment. Candidates are required to pass five written exams and must recertify every three years by passing one current exam. Before a candidate can take the CCSP exams, he must meet the prerequisites by obtaining one of Cisco's lower-level certifications, either the Cisco Certified Network Associate (CCNA) or the Cisco Certified Internetwork Specialist (CCIP). It focuses on skills related to securing networks that run Cisco routers and other equipment.

Red Hat Certified Engineer (RHCE)/Red Hat Certified Architect (RHCA)
RHCE is one of the well respected Linux certifications in the industry. The exam is performance-based. Candidates are required to perform actual network installation, configuration, troubleshooting, and administration tasks on a live system.

RHCA is an advanced certification that requires completion of five endorsement exams, each of which costs $749. Like the RHCE exam, they are hands-on skills tests. Candidates must have the RHCE certification to take the RHCA exams.

Technology Infrastructure Library (ITIL)
ITIL certifications provide demonstration of knowledge and skills involved in management positions in IT services. There are three certification levels: Foundation, Practitioner, and Manager. The Manager level certification requires completion of a two-week training program, and candidates must have the Foundation certification and five years of IT management experience. Then, they must pass two three-hour exams consisting of essay questions. ITIL is intended to assist organizations in developing a framework for IT service management. Worldwide, ITIL is the most widely recognized qualification in IT service management.

International Software Testing Qualifications Board (ISTQB)
ISTQB is a software testing qualification certification organization. It is responsible for the international qualification scheme called "ISTQB Certified Tester". The qualifications are based on a syllabus, and there is a hierarchy of qualifications and guidelines for accreditation and examination. It is the ISTQB's role to support a single, universally accepted, international qualification scheme, aimed at software and system testing professionals, by providing the core syllabi and by setting guidelines for accreditation and examination for national boards.
Project Management Professional (PMP)
The Project Management Institute (PMI), a nonprofit organization that serves as a leading membership association for project management practitioners, maintains the PMP exam. The certification measures a candidate's project management expertise by validating skills and knowledge required to plan, execute, budget, and lead a technology project. Eligible candidates must have five years of project management experience or three years of project management experience and 35 hours of related education.

Microsoft Certified Professional Developer (MCPD)
MCPD accreditation measures a developer's ability to build and maintain software solutions using Visual Studio 2008 and Microsoft .NET Framework 3.5. Split into three certification paths (Windows Developer 3.5, ASP.NET Developer 3.5, and Enterprise Applications Developer 3.5), MCPD targets IT professionals tasked with designing, optimizing, and operating those Microsoft technologies to fulfill business needs.

Sun certified system administrator (SCSA)
SCSA gives the wide opportunity to professionals interested in imparting knowledge related to the Solaris operating system administrator. It's beneficial for all system administration professionals and linked with performing an essential system administration tasks on Solaris system. The basic requirements for SCSA certification is, to have deep knowledge of Solaris system and involves two examinations related to different versions of this operating system.

Oracle's Database administration (DBA)
Oracle has introduced a wide range of certification programs for entry level to experienced professionals and for domains ranging from database administration and database management to programming.

Oracle's OCA DBA 11g is an entry-level certification specifically designed to certify foundation skills required for database administration or application development. Its objectives are intended to measure a candidate's ability to work as a junior team member with database administrators or application developers. OCP DBA 11g develops, within the candidate, the skills of managing a large scale database and enhances the knowledge regarding the concepts and architecture relating to database, backup and recovery procedures. OCA DBA 10g is an entry-level certification specifically designed to certify foundation skills required for database administration or application development. OCP Certification DBA 10g validates a candidate's skills that include implementing and managing complex Oracle Database 10g functions, and recovering and tuning the database using advanced tools and technologies. OCA DBA 9i is an entry-level certification specifically designed to certify foundation skills required for database administration or application development.

Thursday, November 18, 2010

Top 5 Security Suites for your PC

Thanks to the various malicious software and phishing scams, today no one can stay online without having the threat of stealing of personal details, hijacking of browser, malware attacks and many other security issues. A mere antivirus program is not just well enough to stop malicious software like malwares from infiltrating your computer. We need multi-functional security suites that target not only viruses, but all types of attacks. A number of security firms are offering much improved multi-functional security suites these days. Below are the top five security suites that are capable of securing your PC from multiple security threats.
Top 5 Security Suites for your PC


Symantec Norton Internet Security 2011

Symantec Norton Internet Security 2011 meliorates its already-excellent protection. The edition is very easy to install and use. Most of the tasks run in idle time. It is loaded with additional virus cleanup tool and an intelligent firewall. It also offers many Web-based products and services like online backup and parental controls. There is a new interactive panel in its main window makes Norton Internet Security 2011 a manager for these online services.

Symantec Norton Internet Security 2011 extends the "Download Insight" feature introduced by the earlier edition. In the latest edition Norton also has introduced a free stand-alone application, Norton Power Eraser that discovers and kills hard-to-find scareware that cannot be detected by traditional antivirus software.

Symantec Norton Internet Security 2011 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 256 MB RAM and minimum 300 MB free hard disk space. It is available at 1,200.

Kaspersky Internet Security 2010

With a well-designed interface, Kaspersky Internet Security 2010 finishes second in the list for strong malware detection and efficient performance. Kaspersky is good in detecting active malware infections on a PC. It is a top performer in rootkit detection, finding and removing all inactive and active rootkits. In detection and disinfection of malware through behavioral scanning, Kaspersky Internet Security 2010 is very effective.

Kaspersky Internet Security's impact on system performance is minimal. A PC with Kaspersky's suite installed booted in 43.4 seconds on average, beating the average starting time by 3.5 seconds. The same PC running the McAfee or Norton suites, by comparison, took about 50 seconds to start up.

Kaspersky Internet Security 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only) for downloading updates. It requires minimum 256 MB RAM and minimum 375 MB free hard disk space. It is available at 890.

McAfee Total Protection 2010

With excellent malware protection, McAfee Total Protection 2010 provides effective and real-time anti-phishing protection. The anti-spam is also great. This security suite has a very user friendly interface and it is an efficient solution which won't slow your system down. The firewall includes a useful feature called Attack Detection, which is used to detect popular exploits and attacks on the Web.

It also features malware protection that works to remove malware and spyware that could potentially give out sensitive information to thieves. McAfee Total Protection 2010 installs a browser toolbar called SiteAdvisor Plus, which helps users avoid malicious Web sites.

McAfee Total Protection 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 512 MB RAM and minimum 200 MB free hard disk space. It is available at 1,220.

BitDefender Total Security 2010

BitDefender Total Security 2010 offers effective malware protection, anti-phishing coverage, a good spam filter and excellent parental controls. BitDefender gets a new interface that comes in three variations: a basic display with only three large icons and simple text, an intermediate design showing more detail, and an advanced interface for those who want to see granular details.

In detecting and disabling active infections, BitDefender Total Security 2010 is quite effective. It is also good at detection and disinfection of rootkits. BitDefender has improved the average startup time by roughly 3.5 seconds for a total of 43.46 seconds at startup.

BitDefender Total Security 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 512 MB RAM and minimum 450 MB free hard disk space. It is available at 1,790.

PC Tools Internet Security 2010

PC Tools, which is better known for Spyware Doctor, also offers this complete security suite with firewall, anti-virus, anti-spyware, anti-phishing, and spam filter protection. The software is easy to use but the spam filter is slow and the package does significantly increase your system boot time.

Although the interface has very little change from last year, it's very user friendly. In rootkit detection PC Tools Internet Security 2010 is capable of scoring high. In detecting, blocking, and removing unknown malware, PC Tools is quite effective. The program gets installed quickly, but it does require a system reboot.

PC Tools Internet Security 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 256 MB RAM and minimum 150 MB free hard disk space. It is available at 1,890.