Google Fiber, Google‘s
project which aims to blanket Kansas City with ultra-fast optical net
access, has so far been a success, with 180 “fiberhoods” successfully
registering for the service.
The project had started
on July 26, giving households in Kansas City, Kan., and Kansas City,
Mo., weeks to apply for the service. In that time frame, 202 fiberhoods
have applied and at least 180 have qualified for Google Fiber.
In a blog post,
Google wrote it is “amazed and humbled” by the response, and plans to
share the final list of fiberhoods who have qualified for Google Fiber
on Thursday, Sept. 13.
Selected households will be able to select from three subscription packages
— free internet will cost 0$ per month, but users will have to pay a
one time $300 construction fee, with the ability to stretch that payment
into twelve $25 monthly installments. The Gigabit Internet package will
cost $70 per month (with no construction fee), and the Gigabit Internet
+ TV will cost $120 per month. Google claims the service runs about 100
times faster than the average broadband speed in the U.S.
All three plans come without a data cap and with a free network box.
The $70 package additionally includes 1TB of Google Drive cloud storage,
while the $120 package includes 2TB of Google Drive storage, a TV box, a
storage box and a Nexus 7 tablet.
For those fiberhoods that didn’t qualify for the service, Google
promises to include them in a future rally “sometime next year.”
Read: Mashable
New Generation, New Technology
Inform the people about the latest in the world of Information Technology
Monday, September 10, 2012
Amazon Updates Kindle for Mac With Multi-Touch Gestures
Amazon has released a new version of its Kindle app for Macs, bringing support for Lion‘s multi-touch gestures, such as panning and swiping.
Version 1.10.3 also brings support for Kindle Format 8 books (which means richer formatting) and larger libraries, as well as the usual bug fixes and performance improvements.
The update should be welcome news for those reading ebooks with a large number of notes and highlights, as those will load and react much more quickly than in the previous version.
Read: Mashable
Version 1.10.3 also brings support for Kindle Format 8 books (which means richer formatting) and larger libraries, as well as the usual bug fixes and performance improvements.
The update should be welcome news for those reading ebooks with a large number of notes and highlights, as those will load and react much more quickly than in the previous version.
Read: Mashable
5 Steps to Prevent Data Loss When Disaster Hits
Small businesses are lacking when it comes to disaster relief plans. A
recent study by Symantec found that 57% of small businesses have no
disaster recovery plan in place.
That inaction can have serious consequences for small business owners. Scott Moyer, director of business development at data recovery services provider DriveSavers, offers the following tips for small businesses to prevent data loss from a disaster.
Moyer suggests business owners start by creating an emergency action plan for all data associated with your business.
“This plan includes a complete inventory of your business’ storage-based hardware,” Moyer said. “In addition, this is an excellent time to research a data recovery vendor. By conducting this research ahead of time, when you aren’t distressed from a data loss, you can ensure that you’re working with a reputable, secure data recovery vendor.”
“Some data recovery providers offer discounts if you are a member of their business partner program,” he noted. “When researching a data recovery vendor, it’s important to ask about that vendor’s manufacturer authorization to open drives without voiding a warranty, security and industry certifications to ensure data is safe while out of your in-house secure network and recovery methods and capabilities.”
In addition, Moyer says businesses must make sure to always be using software that is up-to-date to ensure optimal protection for your business.
“Never assume that your computer is protected from incoming viruses because you have protection software, be sure to scan all incoming data for corruption,” Moyer said. “By enabling your computer with backup software and virus protection, you will drastically decrease the chances of losing important files.”
To ensure optimal protection, Moyer suggests businesses do their research when searching for a data recovery vendor for disasters.
“But before you trust a data recovery service provider with your data, do your homework and research the vendor,” Moyer said. “Cheap services are typically that way for a reason. Make sure the data recovery vendor is reputable by checking for proof of industry certifications and security protocols. You do not want a data breach that includes your critical financial data (or worse yet, your customers’ data) stolen.”
“Hard drives are extremely sensitive to static electricity and physical jarring,” he said. “Also, do not power up a device that has obvious physical damage or is making unusual sounds. Lastly, turn your hardware in to the reputable data recovery provider that you have researched in your emergency action plan.”
Read: Mashable
That inaction can have serious consequences for small business owners. Scott Moyer, director of business development at data recovery services provider DriveSavers, offers the following tips for small businesses to prevent data loss from a disaster.
1. Plan for the Worst
“As an entrepreneur, your files are your livelihood and without a data recovery plan, losing your files could mean losing your business,” Moyer said. “If you’re prepared for the worst and making proactive decisions, you are increasing the likelihood that your business will not only succeed, but flourish.”Moyer suggests business owners start by creating an emergency action plan for all data associated with your business.
“This plan includes a complete inventory of your business’ storage-based hardware,” Moyer said. “In addition, this is an excellent time to research a data recovery vendor. By conducting this research ahead of time, when you aren’t distressed from a data loss, you can ensure that you’re working with a reputable, secure data recovery vendor.”
“Some data recovery providers offer discounts if you are a member of their business partner program,” he noted. “When researching a data recovery vendor, it’s important to ask about that vendor’s manufacturer authorization to open drives without voiding a warranty, security and industry certifications to ensure data is safe while out of your in-house secure network and recovery methods and capabilities.”
2. Always Back Up and Protect
“The best protection is prevention,” Moyer said. “Invest in redundant backup system. Establish a structured backup procedure to make copies of all critical data files, using software compatible with the operating system and applications. Periodically test the backups to verify that data, especially databases and other critical files, are being backed up properly. Keep at least one verified copy of critical data offsite.”In addition, Moyer says businesses must make sure to always be using software that is up-to-date to ensure optimal protection for your business.
“Never assume that your computer is protected from incoming viruses because you have protection software, be sure to scan all incoming data for corruption,” Moyer said. “By enabling your computer with backup software and virus protection, you will drastically decrease the chances of losing important files.”
3. Data Missing? Don’t Panic!
“Sometimes the simplest of answers can be the ultimate solution,” Moyer said. “Before you panic, double check to ensure you haven’t misplaced your file. Use the ‘search’ box located in ‘Start’ button on the bottom tool bar of your computer. If your file doesn’t appear using the search function, double check the recycle bin or trash on your computer’s desktop.”4. Leave It to the Professionals
“As a small business, it is important to watch every nickel and dime and understand where priorities lie when spending money on vendors,” Moyer said. “But when it comes to your losing your data, it’s time to throw that do-it-yourself attitude out the window. Do not attempt recover your data personally by using any type of diagnostic or repair tools. Doing so may cause further damage or permanent data loss. Remember, the first recovery attempt is the most successful. Play it safe and send hardware to a professional.”To ensure optimal protection, Moyer suggests businesses do their research when searching for a data recovery vendor for disasters.
“But before you trust a data recovery service provider with your data, do your homework and research the vendor,” Moyer said. “Cheap services are typically that way for a reason. Make sure the data recovery vendor is reputable by checking for proof of industry certifications and security protocols. You do not want a data breach that includes your critical financial data (or worse yet, your customers’ data) stolen.”
5. Know Your Recovery ABCs
“Knowing the signs of a drive failing will help you optimize your chances for recovery,” Moyer said. “If you are hearing clicking, grinding or whirring sounds, shut down your computer immediately and do not use data recovery or utility software. The use of data recovery or utility software can potentially cause data loss. Next, unplug the power to the computer before removing the hard drive.”“Hard drives are extremely sensitive to static electricity and physical jarring,” he said. “Also, do not power up a device that has obvious physical damage or is making unusual sounds. Lastly, turn your hardware in to the reputable data recovery provider that you have researched in your emergency action plan.”
Read: Mashable
App Publisher Takes Blame for Massive Apple ID Hack
A small Florida publishing company has stepped up to take the blame for last week’s release of 1 million Apple iOS Unique Device IDs by the hacker group AntiSec.
AntiSec had claimed it compromised a total of 12 million UDIDs, and that the information came from an FBI staffer’s laptop.
A UDID is a sequence of 40 letters and numbers specific to Apple devices including the iPhone, iPad and iPod Touch. A UDID alone doesn’t contain a wealth of information, but could be combined with such information as billing addresses and payment data to pose a risk to users. AntiSec’s claim had stoked fears that the FBI was using UDIDs to eavesdrop and glean personal information from Americans who own Apple devices. The FBI denied it ever had the data, and Apple said it had never given the information to the FBI.
Blue Toad publishing company CEO Paul DeHart on Monday morning told NBC News that the information had come from his company. Blue Toad analysts downloaded the released UDID data and found a 98% correlation between it and the company’s own information.
“That’s 100 percent confidence level, it’s our data,” DeHart told NBC. “As soon as we found out we were involved and victimized, we approached the appropriate law enforcement officials, and we began to take steps to come forward, clear the record and take responsibility for this.”
But DeHart did allow for the possibility that the compromised data could have been obtained by other sources, potentially including the FBI, after being hacked from his company’s servers.
Read: Mashable
AntiSec had claimed it compromised a total of 12 million UDIDs, and that the information came from an FBI staffer’s laptop.
A UDID is a sequence of 40 letters and numbers specific to Apple devices including the iPhone, iPad and iPod Touch. A UDID alone doesn’t contain a wealth of information, but could be combined with such information as billing addresses and payment data to pose a risk to users. AntiSec’s claim had stoked fears that the FBI was using UDIDs to eavesdrop and glean personal information from Americans who own Apple devices. The FBI denied it ever had the data, and Apple said it had never given the information to the FBI.
Blue Toad publishing company CEO Paul DeHart on Monday morning told NBC News that the information had come from his company. Blue Toad analysts downloaded the released UDID data and found a 98% correlation between it and the company’s own information.
“That’s 100 percent confidence level, it’s our data,” DeHart told NBC. “As soon as we found out we were involved and victimized, we approached the appropriate law enforcement officials, and we began to take steps to come forward, clear the record and take responsibility for this.”
But DeHart did allow for the possibility that the compromised data could have been obtained by other sources, potentially including the FBI, after being hacked from his company’s servers.
Read: Mashable
Sprint Rolling Out 4G LTE Network to 100 Cities
Sprint announced on Monday that it will be expanding its 4G LTE network to more than 100 cities in the upcoming months.
The company — which began its 4G LTE network rollout with 15 cities in July 2012 — will be adding the service to more major areas including Chicago, Boston, New York City and Los Angeles. Smaller cities such as Rockford, Ill. and Salisbury, Md. will also be getting the network.
4G LTE is about ten times faster than 3G, allowing mobile users to load websites more seamlessly.
Sprint said construction has already started within those regions. For a full list of which cities are scheduled to get the network, click here.
“During the pre-launch phase, customers with capable 4G LTE devices
may begin to see 4G LTE coverage in these areas and are welcome to use
the network even before it officially launches,” Sprint said in a
statement. “Sprint plans to announce commercial availability of 4G LTE
in these cities in the coming months, at which point we expect coverage,
performance and reliability to get even better.”
The company is also doing an overhaul of its 3G infrastructure to improve wireless signal strength, in-building coverage and less dropped calls.
“We know our customers depend on their mobile devices as their primary source of communication, business connectivity and entertainment,” said Bob Azzi, senior vice president of network at Sprint. “We want to deliver a network that delivers mobile access, productivity and entertainment at a highly competitive price point.”
Read: Mashable
The company — which began its 4G LTE network rollout with 15 cities in July 2012 — will be adding the service to more major areas including Chicago, Boston, New York City and Los Angeles. Smaller cities such as Rockford, Ill. and Salisbury, Md. will also be getting the network.
4G LTE is about ten times faster than 3G, allowing mobile users to load websites more seamlessly.
Sprint said construction has already started within those regions. For a full list of which cities are scheduled to get the network, click here.
The company is also doing an overhaul of its 3G infrastructure to improve wireless signal strength, in-building coverage and less dropped calls.
“We know our customers depend on their mobile devices as their primary source of communication, business connectivity and entertainment,” said Bob Azzi, senior vice president of network at Sprint. “We want to deliver a network that delivers mobile access, productivity and entertainment at a highly competitive price point.”
Read: Mashable
GoDaddy’s DNS Servers Go Down, Along With Thousands of Sites
GoDaddy, the world’s largest domain registrar and one of the biggest web hosts, is experiencing major downtime.
The main GoDaddy.com domain is unreachable and websites hosted by GoDaddy are also down. The more problematic part is that any domain registered with GoDaddy that uses its nameservers and DNS records are also down. That means that even if you host your site elsewhere, using GoDaddy for DNS means it is inaccessible.
On Twitter, Anonymous Own3r — the security leader of Anonymous — is taking personal responsibility for the attack.
Read: Mashable
The main GoDaddy.com domain is unreachable and websites hosted by GoDaddy are also down. The more problematic part is that any domain registered with GoDaddy that uses its nameservers and DNS records are also down. That means that even if you host your site elsewhere, using GoDaddy for DNS means it is inaccessible.
On Twitter, Anonymous Own3r — the security leader of Anonymous — is taking personal responsibility for the attack.
@wordwhacker nah it’s not Anonymous coletive the attack is coming just from me— Anonymous Own3r (@AnonymousOwn3r) September 10, 2012Although not directly involved, Anonymous has also tweeted its support.
#TangoDown — godaddy.com | by @anonymousown3r |— Anonymous (@AnonOpsLegion) September 10, 2012Also on Twitter, GoDaddy said that it is “aware of the trouble people are having with our site” and that it is working on getting things fixed.
Read: Mashable
7 Chrome Extensions to Make You More Efficient
This summer, Google Chrome became the world’s most popular web browser, with about one third of the global market share, according to StatCounter.
Chrome’s market dominance is largely due to its speed, security, and
flexible address bar, which can be used as a range of tools including a
calculator, a currency converter, and a movie guide.
In addition to these built-in core benefits, Chrome’s large cache of extensions is another great perk. The seven Chrome extensions listed here can help boost productivity at work, make emailing more efficient, and even help multi-taskers manage an ever-growing number of tabs.
Read: Mashable
In addition to these built-in core benefits, Chrome’s large cache of extensions is another great perk. The seven Chrome extensions listed here can help boost productivity at work, make emailing more efficient, and even help multi-taskers manage an ever-growing number of tabs.
Read: Mashable
Subscribe to:
Posts (Atom)