wibiya widget

RSS

Chip revenue falls 11.4 percent in 2009

Filed Under:

The semiconductor industry is set to post a revenue drop of $29 billion for this year, according to research firm Gartner.

Worldwide revenue for 2009 totaled $226 billion, down 11.4 percent from 2008, the company said in a research report published on Thursday. It marks only the sixth time in 25 years that the semiconductor industry has posted an annual decline, and is the first time it has seen a drop for two years in a row, according to Gartner.

While revenue fell sharply at the beginning of 2009, carrying on a fall prompted by the economic recession the year before, it began to rise again in the spring, according to the report.

more info. Chip revenue falls 11.4 percent in 2009 at ZDNet UK.


edit post
Reactions: 
Filed Under:

Twitter.com was down Thursday evening, and it appears that the microblogging site may have been hacked or the victim of a DNS hijacking.

The site, which was inaccessible for about an hour starting around 10 p.m. PST, was defaced with the following image before it was taken offline:

The message at the bottom of the image appears to be written in Perso-Arabic script and when translated to English it read:

Iranian Cyber Army

THIS SITE HAS BEEN HACKED BY IRANIAN CYBER ARMY

iRANiAN.CYBER.ARMY@GMAIL.COM

U.S.A. Think They Controlling And Managing Internet By Their Access, But THey Don't, We Control And Manage Internet By Our Power, So Do Not Try To Stimulation Iranian Peoples To....

NOW WHICH COUNTRY IN EMBARGO LIST? IRAN? USA?

WE PUSH THEM IN EMBARGO LIST

Take Care.

Twitter's status blog was also inaccessible. CNET has inquiries out to Twitter and we will let you know more when we hear back.

Chris Hoare, a Flickr user in Leicester, England, captured the screenshot above and said his attempt to connect to Twitter bounced through a second Web-hosting server before the image was displayed but that he couldn't catch the address.

"The HTML was pretty basic, and everything that it showed was local on the server it was being sent from," Hoare told CNET News.

A Twitter update message posted at 11:28 p.m. said the site was "working to recovery from an unplanned downtime" and indicated that the incident was indeed a hijacking of Twitter's DNS records:

Twitter's DNS records were temporarily compromised but have now been fixed. We are looking into the underlying cause and will update with more information soon.

Security has been a thorny issue for Twitter in the past. In January, a hacker hijacked CNN anchor Rick Sanchez's feed and proclaimed the journalist was "high on crack." Twitter users have also been the target of a password-stealing phishing scam. Disguising itself as a private message that led to a fake Twitter log-in screen, the scam was widespread enough for Twitter to put a warning message on all members' home pages alerting them of the issue.

Certainly, there is a contentious history between Twitter and Iran. In the wake of supposed results of that nation's presidential election in June, protesters in Iran used Twitter to skirt government filters to report events, express outrage, and get people out to opposition rallies. Twitter even rescheduled some planned downtime in order to stay accessible for Iranian users in the midst of political upheaval at the request of the U.S. Department of State.









edit post
Reactions: 

iText 5.0.0 news

Filed Under:
A new release of iText is out and it seems they've changed a lot: The license was changed from MPL/LGPL to AGPL. Package names were changed from com.lowagie to com.itextpdf. Java 5 is used instead of JDK 1.4. Only PDF... is supported, instead of multiple document formats. Upgrading to iText 5 will involve changes to your source code and policy, so it should not be done without forethought.

edit post
Reactions: 

Office 2010:new version of Office

Filed Under:
Microsoft Office is going through several upgrades recently. Just a little after Microsoft revealed its Enterprise version for Office, it released the streaming version of Office. The enterprise-worthy version is called the Professional-Grade Plus. As of recently, streaming office is in its beta version. Microsoft made this version available to the public three days after improving on the Home and Business section and just a week after the release of Professional-Grade Plus. It seems that the software giant is moving fast in terms of Microsoft Office’s improvements and apparent move towards word processing perfection.

info about Office 2010:
it's just like the old verision of office. It has Ms word,exel,power point,outlook and one note.
the price of 2010 version is not yet revealed for consumer you have the choice to stay on old version or upgrade it to new version.

edit post
Reactions: 

Hackers Prove that Illustrator Is Flawed

Filed Under:
Digital artists should rejoice. The Adobe Illustrator weakness that has left it vulnerable to hacking will be fixed come January 8, 2010. Artists do not have to fear the loss of their works of art because the Illustrator’s developers have been alerted by an unknown hacker’s attacks and are discovering ways to fend such attacks in the future. If attacks such as these can target a weak spot in software, the effect is more than about losing digital illustrations. According to Adobe, hackers can infiltrate into computer systems through the software and spread malware that could mess up the personal computer. Adobe’s security advisory emphasizes that versions 3 and 4 from the Illustrator Creative Suite are the two most vulnerable to similar attacks. Those using versions 3 and 4 may suddenly find their computers invaded by unauthorized software. Adobe hopes that the solution due January 8 will bounce all attempts to attack.

The hacker’s attack is posted through a "proof of concept" blog post. This means that the hacker's information can be accessed by cybercriminals, making this flaw a critical issue for the developers of Adobe Illustrator.

How the attack will work

The attack, however, does not work on its own. Users will have to unknowingly open an Encapsulated Postscript (.eps) file for the attack code to be generated. The scary thing about this attack code is that it is publicly available. If the code gets into the wrong hands, there could be more possibly successful attempts at infiltration and malware spread. The real solution then is to fix the software itself. Getting rid of the code is far more complicated. Adobe Illustrator users are also further warned against opening .eps files from unknown or uncertain sources. They should await the Illustrator patch, which will be available early January of 2010.

Brad Arkin, head of Adobe’s Product Security, reveals that his team has not yet confirmed if the point of concept attack can include the release of viruses on the personal computer with versions 3 or 4 of Adobe Illustrator installed. Software flows are not limited to the Adobe Illustrator, however. Both Microsoft and Adobe are experiencing software problems that should be remedied as soon as possible. Both companies are hoping to deliver patches for flaws found in Adobe’s Flash Player and Microsoft’s Internet Explorer. The vulnerabilities and flaws of other software, unfortunately, are only discovered when attacks have already occurred.

Microsoft's bug fixes

Microsoft’s bug fixes also extend to Windows and Office. There will be no less than six security updates to correct some of the flaws. Internet Explorer alone will need a patch to be secured. Consumers can only hope that the said security updates and patches can truly make the software safe and bug-free.

edit post
Reactions: 

translate the web page

Filed Under:

we all know that when chinese make a website almost all of them they use a chinese words.
but to be able us to understand their site your need a translator word by word.
Using this yahoo site easy change the language of the whole webpage just by putting the URL of the site.

If you like to try it click here

edit post
Reactions: 

ITSOC Philippines

Filed Under:
Join the community that deals about the computer.
We will help you learn more about the computer world.


edit post
Reactions: 

Multiple login in yahoo Without Using any Software

Filed Under:
You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps :
1. Go to Start ----> Run . Type regedit, then enter .

2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test

3.On the right page , right-click and choose new Dword value .

4.Rename it as Plural.

5.Double click and assign a decimal value of 1.

Now close registry and restart yahoo messenger and try Multiple Login

edit post
Reactions: 

Increase your RAM and so system speed

Filed Under:
1). Start any application, say Word. Open some large documents.

2).
Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3).
Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).

4).
Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.


5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.


edit post
Reactions: 

Google chrome

Filed Under:
Google is developing a new web browser built from the ground up and based on WebKit, the same rendering engine that Safari uses.The browser, called Chrome, is open-source software built with security, compatibility and speed in mind. Each tab in the browser will be its own separate running process. For example, if JavaScript hangs in one tab, the other tabs will remain unaffected. The approach is similar to the way Mac OS X isolates applications in their own private areas to prevent one crash from taking down the whole system.

edit post
Reactions: 

Shopping

Filed Under:
did you know that most of the people like to go to the mall to shop in holidays????
In that way almost of all malls are trying to sell their product or stocks to get a new design,
that's why some people having hard time to buy a few things only when it comes on holidays..
Some people are looking for a faster way to buy or to shop in the internet.
but most shoppers are afraid to try shopping online.

don't worry their is a new way by using a SMILDS account.

In this way No scam.

No Hackers can get your Account number or Credit card number.

Sure you will get the product that you purchase.

You can sell and cross-selling a products that you like.



edit post
Reactions: 

Ecommerce

Filed Under:
You now about ecommerce???

Electronic commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with widespread Internet usage. The use of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing,electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.

We have a new style of Ecommerce where you buy and sell a product. The e-commerce system is hard to get the trust of the buyer because in this way you can easy scam the buyer because it's online but in SMILDS.com we will not give the money to the merchant unless you get what you really like to buy in this way the buyer will have a trust on the merchant to go back again. In this way you can easy buy and sell a products by no worry at all. We have a free seminar for you to know more about SMILDS just contact me for more info (09158123533).

edit post
Reactions: 

NEED HELP

Filed Under:

This is one of the victim of the ondoy....
If you like to help us on sharing foods and clothes to the victims of the ondoy you can donate here.
All your donation will be given to the people that is victims of the Typhoon Ondoy.







edit post
Reactions: 

ONDOY TRAGEDY

Filed Under:

hi! Im a student and i like to share to you about the big problem that happens here in the philippine. We are facing now the ONDOY tragedy almost all place's in manila,bulacan,etc. are being now in a state of calamity and many people needs a help. Many people needs food because of the tragedy that happen.If your are not believing me i will show here some pictures and videos that i take. the video is taken in our place in bulacan.

video

edit post
Reactions: 
Filed Under:

edit post
Reactions: 

How To Install Computer Memory

Filed Under:

edit post
Reactions: 

about me

Filed Under:
hi!, Im niceguy05 i will teach you all about the computers...
i made this blog to help every student in their computer subjects. Im a IT student i want to help my country to improve their skills in computers. If you want to help me you can donate some ideas.


thanks in reading my blog...

edit post
Reactions: 

hi!

Filed Under:
we are starting my own blog...
it's all about the internet here you can see how earn money in just a min.
ill show you next time some of the video on how to start making a money..


edit post
Reactions: