Unique SEO News – Hard to Find Topics & Articles


New Technologies

Last step before the shortage of IPv4 addresses in Japan

The organization in charge of managing IP addresses in Japan, the JPNIC (Japan Network Information Center), announced April 15, 2011 the beginning of the assignment of the last block of IPv4 addresses for the Asia-Pacific, meaning using the latest available address before a shortage.

IPv4, the protocol currently used by a vast majority of users for Internet access, has a total of 4.3 billion addresses. However, among these addresses, 4.2 billion addresses are already used. This lack of address was long anticipated but still only 37% of operators in the Asia-Pacific [1] are now ready to migrate to the latest version of the protocol, IPv6 offers a significantly most important places (equivalent to 667 million billion IP addresses available per mm2 of the surface of the Earth [2]).

Asia-Pacific is approaching soon the shortage of IPv4 addresses, in part because of the very rapid increase in demand from emerging countries and highly populated area The JPNIC has announced that the distribution of the last block of IPv4 addresses (about 16 million addresses) would be reserved for architecture migration and adaptation to the new IPv6 protocol. In addition, the JPNIC says it does not address a particular stock for Japan, so this number being supplied to the entire Asia-Pacific.. In addition, addresses previously allocated and not used will be reused.. Indeed, some too large address blocks were allocated to certain organizations that do not need.. These address blocks will be transferred to other organizations that can justify its use.

This system should avoid a complete shortage of IPv4 addresses, but APNIC (Asia Pacific Network Information Center, the organization responsible for IP address management for the Asia-Pacific) indicates the need for operators to launch the now to IPv6 deployment process to avoid a critical situation.

The BMWi present the winners of “Trusted Cloud

“Trusted Cloud is a program of the Federal Ministry for Economy and Technology (BMWi) aims to demonstrate and exploit the potential of cloud computing for businesses. The contest “Secure Computing Cloud for SMEs and the public sector – Trusted Cloud”, whose winners were announced at CeBIT 2011 in Hanover, is part of this program. Of a total of 116 project proposals, the twelve selected will be financed by the BMWi, and three of them are from the North Rhine-Westphalia.

The first, entitled “cloud sensors (Sensor Cloud) and based in Cologne, is to build a platform for the use and multidimensional analysis of data from heterogeneous sensors. Indeed, the new possibilities in collecting, storing and processing data, permitted by the many features included in sensors connected in a “cloud” are regarded as having a high market potential. This should also allow direct access and exploitation of these fast multidimensional heterogeneous data, a real asset to drive the complex organizational systems. The scientific support of the project will be conducted by the Technical University of Aachen (RWTH, North Rhine-Westphalia) and the University of Cologne.

The second winning project of North Rhine-Westphalia called “cycle of cloud” (Cloud Cycle), a joint project of the IT cluster of Aix-la-Chapelle (Aachen regio iT) and IBM. It aims to build a platform Stock (open source), which would offer cloud services more comprehensive (eg, adapted to the life cycle of the business), plus a more secure environment for ICT companies using the cloud.. So far, the project was known as “education-Cloud,” aimed primarily vocational training for new services developed into “cloud”, which is tested in such school authorities.. The performance of computer processing under this project would lead the researchers said a significant reduction in administrative costs.

Finally, the “cloud of Health” is borne by society RECORDED GmbH, in cooperation with the Fraunhofer Institute SCAI Sankt Thus, this project breaks new ground in presenting for the first time an infrastructure “cloud of confidence,” that is to say computer applications where information regarding personal data and health care are crossed in integrated servers for better care for patients and their medical actions consistent over time.. “Cloud of health” turns out to be a major project of medical administration, aimed at improving care management and health economics.

The winners will get the BMWi a total of 50 million euros over 3 years to promote the development and testing of innovative solutions for cloud computing, secure and consistent with the law.. The contribution of partners in these projects is similar in height, totaling 100 million euros.

New Technologies

Payment via mobile phone is becoming Made in Japan

The FeliCa Networks Inc. company., A subsidiary of Sony Corp. and NTT DoCoMo, announced at the show IC CARD WORLD 2011 its intention to create a new system of contactless payment using NFC international standard (ISO / IEC 14443), paving the way for a generalization of this concept abroad .

This system is rather used in Japan and allows a payment approaching his cell phone from a reader of contactless chips. Nevertheless, the FeliCa standard is not compatible with types A and B of the NFC standard (ISO / IEC 14443) despite similar frequencies (it had been proposed as type C of the standard), which represents a considerable obstacle to the adoption of it abroad.

FeliCa Networks has announced it is working in collaboration with manufacturers of microchips, the creation of a new chip that is compatible with the NFC standard. This should be finalized no later than the end of 2012 and then sold to manufacturers of mobile phones. The company also wants to provide service for the secure contactless payment (“Trusted Service Manager” [1]), making the relationship between telephone operators and banks.

The willingness of society to adapt to global market and the growing adoption of Android (mobile operating system from Google is capable of managing an NFC chip since version 2.3) in Japan [2] were definitely reasoned decisions.
————————————————————————–
Technology

India will launch its own operating system (OS)

The DRDO (Defence Research and Development Organization) work currently developing an operating system according to VK Saraswat, Scientific Adviser to the Ministry of Defence and Director General of DRDO. The development of the clean operating system seems to be the only solution to deal with multiple attacks on India in recent months. According to him this system could also help protect banks and organizations requiring high security.

Two engineering centers will be established one in New Delhi and one in Bangalore. 50 engineers will be divided between these two centers. They will work with leading Indian institutes like Indian Institute of Science, Indian Institute of Technology in Madras or the
Centre for Development of Telematics.

He said the operating system may have commercial value to the extent that the Indian state will own the source code but he refused to commit to the budget and the time required to achieve this OS .
————————————————————————–
Sky brings TV to mobile devices

Pay-TV launched “Sky Go” for computers, tablets and smartphones. Social networks are integrated.

T he proposes to pay channel Sky Bridge on the social networks. On Thursday, Sky, the service “Sky Go” presented that not only brings the content to mobile platforms and computers, but all the pieces of the interaction plays: Who’s about a football match in the eye, can not only own it on the Smartphone calendar can remember, but also make friends via Facebook and Twitter’s attention.

Sky-Germany-CEO Brian Sullivan, who presented the offer on Thursday evening in Berlin, is “Sky Go” nothing less than “the start of the kind of television, how they will use our children,” he said. Indeed, the pay channel has come up with the additional offer a comprehensive package that knows the power of web streaming and mobile applications to exploit them.

“Mood” selection

On the iPad app as it encompasses almost all the deals get the Sky-film library, enhanced by interactive features, such as a “mood” selection. The user indicates his mood – from bright to pensive – and gets films that proposed. Even for actors can submit to the offer and, when this path towards “Mitmachweb”, such as the Twitter feed of your favorite actor.

For the Web 2.0 generation probably that feature is designed with whom one has seen Sky program can reveal even her own friends: If you like, can Facebook and Twitter and film recommendations or make his contacts aware of an upcoming TV event – joint football evenings can are so well-planned rather efficient.

Web browser, iPhone, supports iPad

And who is indeed interested in a particular match, however, can absolutely do not arrive at the right time on the living room couch, has the opportunity to watch the game on your smartphone or tablet PC.

“Sky Go” currently works alongside web browsers and runs on iPhone and iPad in Germany and Austria. In the coming months to further mobile terminals are added.
———————————————————————————————
Google adapts to Indian languages

Google has launched a program allowing users to run queries in 14 Indian languages (Hindi, Bengali, Gujaratis, Kannada, Malayalam, Marathi, Punjabi, Tamil, Telugu and Urdu), so from a phonetic English alphanumeric keyboard . According to Rahul Roy Chowdhury, Senior Product Manager implementation type of tools is Google’s mission of making information accessible to more people.

According to a study published on the site and the site Statcounter comScore, Google accounted for between 89% and 96% of Internet search market in India for the month of September 2009. The implementation of such tools should enable Google to reach new audiences on the Indian market.

——————————————————————————–
New software can detect depression in blogs and online texts

BGU researchers have developed software that can detect depression in blogs and online texts.
The software can identify the language used, may indicate the psychological state of the author and could be used as a screening tool.

The software, developed by a team led by Associate Professor Yair Neuman Department of Education, was used to scan more than 300,000 English-language blogs posted on websites related to mental health.

The program has identified what he considers the 100 cases the most “depressed” and 100 cases less “depressed” among bloggers. A panel of four clinical psychologists examined samples, and concluded that there was a correlation of 78% between the results obtained by the computer and their own conclusions. Professor Yair Neuman will present the work of his team at the 2010 International Conference IEEE / WIC / ACM Web Intelligence of Intelligent Technology Agency “in Toronto, Canada, August 31-September 3, 2010. Results will also be published in conference proceedings. “The software was designed to find the content hidden depression in language which does not mention the obvious terms like” depression “or” suicide “, says Professor Neuman.” A psychologist knows how to identify different emotional states by intuition . Here we have a program that makes it methodically through the innovative use of Web intelligence. “For example, the program highlights words that express different emotions, like the colors that the author uses metaphor to describe some situations. Words such as “black” combined with other terms that describe symptoms of depression such as sleep deprivation or loneliness, are recognized by the software as “depressed” text.

Originally conducted for academic purposes, the results could be used to screen for suicidal behavior. The software provides a selection process that aims to educate the individual to the state, allows mental health professionals to identify people needing treatment, and may recommend professional help because “no one can really replace excellence of Human Judgement, “according to Professor Yair Neuman. There are many people with undiagnosed depression. The screening process is usually done by an online questionnaire, a self-selective process. If a person participates in an investigation, she suspects is already a problem. With this software, you can proactively analyze, with the agreement of the blogger, whether or not he needs the advice of a professional.

——————————————————————————–
Unresolved ownership of the Facebook page of the Museum Quarter in Vienna

Helmut Lammer is outraged by the “expropriation” of his side. (© MQ / Hertha Hurn)
By WZ Online

More than 25,000 fans in one fell swoop on Facebook – that might the Vienna Museum Quartier (MQ) is not difficult. As the came about but is now being strongly criticized by users.

In February 2009, the student Helmut Lammer as a private individual an unofficial site for the museum district on the social media platform was established within two years and accumulated more than 25,000 fans. April, the MQ, the unofficial site – taken over – and with their fans. “Without further consultation,” as Lammer criticized on Friday in a press release. The MQ replied that they had made contact, some can not.

How Lammer indicates in a press release, he was on 23 contacted by the MQ. “We thank you for setting up the page that you would now take over. Biennial cards and a ‘goodie pack’ offers you in return for 25,000 Facebook fans,” the contents of the message. Those same fans mean but “years of work,” said Lammers. “The museum district is thus very fast and cheap to thousands of fans.” Mit 1. On 1 April, the takeover; Lammer has now denied access to his side.

“Brutal acquisition of content”

In a statement, the MQ said today, Saturday, Lammer was made no details of his person on the page. Many people therefore have joined the site, “in the belief it was here to see the official presence of the MQ on Facebook. Since Lammer had no contact info, “asked the MQ merging the Facebook Page of Mr. Lammer with that of the Museum Quarter of Vienna”. On the following contact on 23 March had responded “with a financial claim as compensation for the existing fans” – it was not an agreement, “which might explain his anger,” the MQ in the press release.

Lammers explained his displeasure on the now official Facebook page as a comment to how the action went from Equip. “The brutal business of user-generated content and integrate into the marketing department” contradicts “the open culture in social networks” and should be punished by the fans. Also, users are switched on in the dispute, ordered the change in posts for an information “advertising page”. A user criticized the “bizarre what to do if a fan site is taken over by the same company and moved to subscribe to the site, what to do with Facebook the” Like ” button’s back. “MQ Genier you,” writes one fan, while another can not believe it, “I hope so, these are just a (bad) April Fool’s joke.” (APA)
——————————————————————————–

How to properly archive e-mails

Many rules, but no separate law.

Professional and private e-mail away more clear.

“Most Austrian companies in e-mail archiving are far from a legally compliant solution away yet,” warns Günther Leissler, privacy expert and lawyer with the firm Schönherr Rechtsanwälte in Vienna. The companies are suffering from the lack of transparency of the rules. ” “There are a number of regulations that apply to e-mail archiving application, but no special law,” said Leissler.

A common misconception is that each e-mail must be archived – that is not the case. The law prescribes no single retention period, says the expert. How long to file e-mails are directed, rather to their content. It should be, for example, tax law relevant business correspondence to store up to seven years, while can be found in other correspondence such as with a three-year holding the questioning. The basic scheme were e-mails may as well as other personal information should only be stored for as long as it is absolutely necessary for their purpose. Advice should work e-mails seen as business correspondence, and seven years are kept. It is also important to see to it that the e-mail is actually deleted after the retention period.

Problems with private correspondence

On the accounts of the employees are often not only professional but also private e-mails stored. “This can in practice lead to big problems,” warns Leissler. Thus the employer stood to naturally provide more extensive access rights to the professional correspondence of its employees as in their private e-mails. Moreover, it is not clear whether the chief was ever justified or required to store personal e-mails to its employees. Leissler recommends to provide for a structured development of the e-mail management concern, which provideing a clear distinction between professional and private correspondence of its employees. This could be countered many legal problems in advance.

It is increasingly difficult to separate personal and business use of IT resources, Wieland Algae stresses of storage, security and networking vendor Barracuda Networks. “With social media, many employees ignore the border completely,” said the expert. Leading the private or semi-private e-mail correspondence during working hours, be in positions that require a strong personal network, consistently. Algae: “A legal ban appears easy, but it is only the best solution if you are prepared to warn his best employee for a violation.”

Better than a ban to be imposed, it was to ensure that the private e-mails are not part of the archiving routine. According to Algae, there are many opportunities. “Some companies require a note in the subject, others set up each employee a second e-mail address.” The more frequently encountered the scheme, the more frequently the use of free e-mail account was authorized. Incoming mail must move the private employees in a folder, which ensures that the mail will be deleted permanently or not covered by backup and archiving routine.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s