Woman And computer
Human And Computer

Tablet thoughts

I don't know anything about Apple's tablet, and I generally don't pay much attention to the speculation about their unannounced products. However, John Gruber has a nice post today which discusses the hypothetical Apple tablet.

The best part is the core product question -- how does this new product fit in with all existing products? Revolutionary products are underestimated because we evaluate them relative to existing products. This quote gets it:

Like all Apple products, The Tablet will do less than we expect but the things it does do, it will do insanely well. It will offer a fraction of the functionality of a MacBook� but that fraction will be way more fun. The same Asperger-y critics who dismissed the iPhone will focus on all that The Tablet doesn't do and declare that this time, Apple really has fucked up but good.

That was certainly the case with the iPod, or as slashdot put it, "No wireless. Less space than a nomad. Lame."

When considering revolutionary new products, we can not simply compare them with existing products, but must instead compare them with the products that don't yet exist, but should. For example, the PC was more than just an expensive, hard-to-use typewriter -- it was a whole new thing that just happened to have some typewriter features. Obviously this comparison is much more difficult than the "count the checkboxes" approach that we like to use when evaluating the "better mousetrap", but it's critical if we're going to understand or create anything truly new.

I have no idea what Apple is planning to release, but to me the revolutionary product need is in bridging the virtual and physical worlds. If you spend your entire day in front of the computer, this need may not seem real, but if you move between the two worlds you may notice that they are strangely disconnected. For example, imagine that I'm looking at a picture on my computer and want to give you a copy. In the physical world, I would simply hand you the print (I would have gotten double-prints), but with computers it's nearly impossible. Yes, there may be some complicated 10-step process that I can use to share the image, or maybe I can download and install some obscure software, but I'm not going to do that and neither are most other people. Imagine if I instead had a simple (built-in) gesture for passing the photo off to person standing next to me, and it were just as easy as handing them a real photo.

Of course exchanging photos is just one small example of these physical/virtual interactions. It's a whole new category, so many of them, including the most important, haven't been invented yet. However, you can get some ideas by thinking of the marketing cliche where two people are standing around a computer collaborating on something, taking quick notes, working off a recipe, etc. Those images occur in marketing because they are appealing, but they don't occur much in real life because our existing devices and software are awful. Current laptop computers are too bulky, awkward, and keyboard centric (the ui needs to be gesture-centric), and the iPhone is too small and limited. I want something about the size of a notepad that can be used naturally while standing up and walking around, just like an actual pad of paper, except that it's fully integrated with the virtual world as well as the physical world.

I hope this is what Apple is building -- it would be a great product. (or someone else could build it, though honestly I can't imagine anyone besides Apple getting it right)

Serangan Umum Internet di 2009

Labels:

Sepanjang tahun 2009 ini, gelombang serangan terhadap pengguna internet di seluruh dunia tak habis-habisnya menghadang. Symantec, salah satu pemain utama di bidang keamanan mencatat beberapa metode utama serangan yang marak hadir tahun ini.

Drive-by Download Semakin Banyak
Penyerang menginfeksi komputer penjelajah internet secara diam-diam dengan menyusup di situs legal. Popularitas metode ini terus tumbuh. Di tahun 2008, Symantec mengamati sebanyak 18 juta percobaan serangan drive-by download; akan tetapi, dari Agustus sampai Oktober 2009 sendiri, Symantec mencatat terjadi sebanyak 17,4 juta serangan.

Kembalinya Intensitas Spam ke Sebelum McColo
Symantec melihat penurunan sebesar 65 persen dari jumlah total pesan spam dalam 24 jam setelah penutupan McColo di akhir 2008 dan 24 jam setelahnya, jumlah spam turun mencapai level 69,8 persen dari seluruh email. Akan tetapi, di 2009, volume keseluruhan spam kembali ke angka rata-rata 87,4 persen dari seluruh email, mencapai maksimum 95 persen dari seluruh pesan di akhir Mei.

Meningkatnya Ancaman Polimorfis
Polymorfisme berarti memiliki kemampuan untuk bermutasi. Dengan demikian, ancaman polimorfis merupakan ancaman yang membuat setiap malware sedikit berbeda dengan malware sebelumnya. Kode pengubahan otomatis yang dibuat di dalam malware tidak mempengaruhi fungsionalitasnya, tetapi membuat teknologi pendeteksian milik antivirus tradisional tidak dapat mengatasinya. Symantec telah mengamati ancaman polimorfis seperti Waladac, Virut, dan Sality, menjadi semakin umum sejalan dengan penjahat dunia maya mencari cara untuk memperluas cara mereka mengelak dari teknologi antivirus konvensional.

Meningkatnya Pembajakan Reputasi
Geocities merupakan merek yang paling umum yang dibajak oleh spammer sebagai usaha untuk menipu pengguna komputer, tetapi dengan penutupan layanan web hosting tersebut oleh Yahoo pada akhir Oktober lalu, Symantec melihat bahwa terjadi peningkatan pesat dari jumlah layanan web gratis berskala kecil, seperti layanan pemendek URL, yang nama dan reputasinya disalahgunakan oleh spammer. Hal ini dikarenakan oleh kemajuan di teknologi penembus CAPTCHA, yang memudahkan karakter berbahaya membuat akun dan profil ganda yang digunakan untuk spamming. Symantec bahkan telah mengamati bahwa beberapa dari perusahaan layanan web berskala kecil tersebut telah menutup situs mereka sendiri sebagai satu-satunya cara untuk menghentikan spam.

Pencurian Data Terus Berlangsung
Menurut Identity Theft Resource Center, sampai 13 Oktober 2009, 403 kasus penerobosan data telah dilaporkan sepanjang tahun dan mengekspos lebih dari 220 juta dokumen. Menurut Ponemon Institute, orang dalam yang tidak bermaksud jahat terus mewakili bagian terbesar dari insiden hilangnya data dengan 88% dari seluruh insiden kehilangan data disebabkan oleh orang dalam seperti karyawan dan partner. Meski demikian, terdapat peningkatan perhatian terhadap kehilangan data berbahaya. Menurut penelitian Ponemon, 59% mantan karyawan mengakui bahwa mereka mengambil data perusahaan saat mereka meninggalkan pekerjaannya. Di saat organisasi semakin meningkatkan fokus untuk menghindari kehilangan data, tampak jelas bahwa banyak hal yang perlu dilakukan untuk mencegah informasi sensitif dibawa ke luar dari perusahaan.

Kabar gembiranya, di tahun 2009 ini, kerjasama intra dan lintas industri untuk mengatasi ancaman internet semakin semakin solid. Bersama dengan ulang tahun varian pertama ancaman Conficker pada pengguna, kita diingatkan bagaimana peningkatan organisasi dan kecerdasan penjahat dunia maya telah membuat jalinan kerjasama yang lebih luas di antara vendor keamanan, penegak hukum, dan penyedia layanan internet.

Contoh yang tampak di tahun 2009 antara lain adalah Conficker Working Group (CWG), gerakan �Operation Phish Phry� yang dilancarkan FBI dan Digital Crimes Consortium, yang menggelar pengukuhannya di Oktober.


Sumber : http://www.arrahmah.com

FREE DOWNLOAD James Cameron s Avatar: The Game

Labels:

http://i46.tinypic.com/2n8vptg.jpg


Publisher: the Beech | Genre: Action (Shooter) / 3D / 1st Person | 4,4 GB
Language : English

Year of release: 2009
The Genre: Action (Shooter / Slasher) / 3D / 1st Person / 3rd Person

The game Description:
In the far future earth dwellers have settled resources of a native planet and now Pandory aspire to seize gifts not the Earth, but. Peaceful Na'vi, natives of Pandory, live, without knowing technologies, in harmony in the fine world of the wild nature. What happens with the fragile world ????????? giants of Na'vi with long tails and huge green eyes when the technogenic armada of the Earth will hang in heavens of their planet? How to rescue mankind from resource hunger and, at the same time, not to ruin a biological civilisation of natives? What of civilisations eventually will come the first in race for a survival? To these a question players can receive answers, having risen on one of the parties of the conflict and with own hand having constructed the future of the nation.

Features of game:
- Play we can both for people (corporation), and for Na'Vi.
- The subject line of game will differ from film history though, certainly, familiar characters will meet everywhere.
- Battling to enemies, you will receive experience which can be spent for improvement of skills.
- James Cameron�s Avatar: The Game - one of few games using technology of the volume image, that is for high-grade immersing in - process to you is required to put on 3D-points with which each box with game will be completed.
- Developers promise tremendous special effects: fire, explosions, the three-dimensional grass, bullets whistling by you, etc.

The Minimum system requirements:
- An operating system: Windows� XP (with SP2) or Windows Vista� (with SP1);
- The processor: 3 Ghz Intel� Pentium� D 830, AMD Athlon � 64 X2 3800 + or better;
- Operative memory: 1 GB Windows XP / 2 GB Windows Vista, Windows 7;
- A video card: NVidia � 6800 or ATI � X1650 or better 256 MB DirectX� 9.0c-compliant card with Shader Model 3.0 or higher;
- An empty seat on ?????? a disk: 1.5 GB


http://hotfile.com/dl/19617952/dac0a8b/James_Cameron_s_Avatar_YMT.part01.rar.html http://hotfile.com/dl/19619100/c89afd5/James_Cameron_s_Avatar_YMT.part02.rar.html
[ ... ]

FREE DOWNLOAD GAME : Greed

Labels:

Image

Publisher: Headup Games | Platform: PC | English | Bin | 742Mb
Genre: Action

GREED features all ingredients to create an enthralling hack'n'slash classic. In the tradition of other critically acclaimed and proven genre colleagues you as the player will need to fight your way through masses of critters, robots, aliens and many other exotic adversaries while collecting unique items and skills thus leveling up your character. In contrast to the genre ancestors, the story of GREED takes place in an adult and mature science fiction scenario. In the futuristic universe of GREED the discovery of novel interstellar travel possibilities has lead to a new age of colonialization. The five largest colonial powers are
entangled in a full-scale war over a new element called Ikarium, the recently discovered rare source of nearly unlimited energy. You as a former member of an elite military unit will fight a battle for your survival not know-ing that your actions will lead fate of all mankind into dramatic consequences

System Requirements - minimum:
* DirectX 9c compatible graphics card with Shader 2.0 (GeForce 6200 or Radeon 9700 min)
* CPU: Pentium 4 3.2 GHz or Athlon 64 3500 +
* Min RAM. 1 GB
* Display: 1024x768
* DVD-ROM drive


http://uploading.com/files/8969f398/GREED.Black.Border-ViTALiTY.part1.rar/
http://uploading.com/files/27cem327/GREED.Black.Border-ViTALiTY.part2.rar/
http://uploading.com/files/mm2eb97c/GREED.Black.Border-ViTALiTY.part3.rar/
http://uploading.com/files/6d6f82fm/GREED.Black.Border-ViTALiTY.part4.rar/

"IE is being mean to me"

Promoting a comment, since it includes a musical performance of an original song (embedded below):

Anonymous said...

One of our developers wrote a song called "IE is being mean to me" and you can find the video here:

http://with.us/meanie
or
http://www.youtube.com/watch?v=vTTzwJsHpU8

Hope you like it.


"IE is Being Mean to Me" is an original song written and performed by Scott Ward.

 
Internet