Ventrilo is a Voice over IP
(VoIp) software that includes text chart. The program was released on August 3,
2002 by developer Brian Knapp. The program can be installed in Mac OS X,
Microsoft Windows, Linux, and other variants of Unix (Server). The software is licensed
as Proprietary Freeware. Users can rent a hosting server and then connect to
Ventrilo using hosting address and login information from the rented
server. Users can create many channel
within the hosting server and share the login information with their friends so
they can join the channel and communicate with each other. Ventrilo currently supports GSM Full Rate and
Speedx as their main codecs.
When Mark Zuckerberg called for a “Space Hackathon” to decorate Facebook’s massive new headquarters at 1 Hacker Way, he probably didn’t expect employees to take him so literally. A few scurried up to the roof with some tar paint, and now there’s a 42-foot wide QR code on the roof that’s visible from space.
Scanning it opens the new FB QR Code Page on Facebook which may host puzzles, jokes, and other flavor to humanize the company. For now you’ll need an airplane or Facebook security badge to get a look at it first-hand, but once indexed it should appear on your favorite satellite mapping website.
When the Hackathon was announced, most employees imagined beautifying the campus with posters and spray paint murals but Mark Pike had something bigger in mind. “It started with a comment on Zuck’s post. I wrote, “Hack yeah! I’d like to paint a gigantic QR code somewhere so we can RickRoll online maps, or point people to our careers site, or send them to a ‘Clarissa Explains it All’ GeoCities Page” Pike says.
At 8pm the night of the Hackathon, Pike and 5 others started on the project. By midnight they had a crew of 30, but it would take until daylight to see whether they screwed up the layout. An employee hacked a Canon camera’s firmware, strapped it to a home-made remote-controlled “frankencopter”, and flew it over the roof.
When it landed with the photos the team finally found out the code really works. Facebook let us on the roof to check it out, and it’s pretty epic. You can try scanning the big picture above with Scan for iOS, QR Droid for Android, or most other QR apps.
What started in a dorm room has matured into one of the world’s most powerful companies. Now there are database architecture and business models to worry about. But with a silly 42-foot wide QR code on the roof, Facebook proves it’s still young at heart.
Safeway is one of the leading grocery stores in the
California. They provide services to millions of individuals at a time. Safeway
has also utilized social media to promote excellent customer service relation
withtheir customer. Safeway is
currently using Facebook, Twitter, and Blogs to reach out to their client base.
Having the ability to reach out to their cliental is a key way
to ensure future business and handle customer complaints as they arise.
In addition Safeway is trying to implement delivery services
to their clients. Social media portals are the best way to notify and inform
their prospective clients.
In 2010, TechCrunch broke the news that Facebook was going to release a “Like” button for the whole darn Internet. Now, TechCrunch has learned Facebook is considering a “Hate” button as well.
According to Facebook’s S-1 filing, users are now generating 2.7 billion Likes and Comments per day. With the Hate button, Facebook expects to at least double that. The S-1 noted “popular Pages on Facebook include Lady Gaga, Disney, and Manchester United, each of which has move than 20 million Likes.” Many inside the company think the Hates could easily top that.
When the original Like button was announced, Mark Zuckerberg made a bold prediction there would be over 1 billion Likes across the web in just the first 24 hours. Sources at Facebook say Mark is estimating 2 billion Hates on the first day. Facebook studies have shown the sad fact that people hate things on the Internet more than they like things. There’s also an internal debate on whether the new button should be called “Hate” or “Dislike.”
Since the tiny Like button makes up such a huge part of Facebook’s revenue, the introduction of the Hate button could raise Facebook’s valuation further ahead of the IPO.
Facebook has already shown they are open to changing the Like button. Earlier this month, Facebook Mobile changed the 2-Click Like button with a 1-Click Like bar.
The company has also experimented with the “Fax” button, as TechCrunch was also the first to notice.
Other buttons under consideration are the “Meh”, “Love”, “Who Cares”, and “+11″ but there is also a fear this could lead to a button explosion.
Our sources say the Hate button is not a sure thing. It’s being heavily debated inside the social networking company. This new feature would fit with Facebook’s mission to “build tools to help people connect with the people they want and share what they want” whether that’s love or hate.
While the product and sales teams favor the idea, many inside Facebook oppose it. That view is best summed up by Robert Scoble who wrote “I really hope we never see a hate button that gets wide adoption. The world has enough hate as it is.”
Since Facebook is in their quiet period ahead of their IPO, Facebook had no official comment on this report.
Research InMotion (RIM), a global leader in wireless
innovation, revolutionized the mobile industry with the introduction of the
BlackBerry solution in 1999. BlackBerry products and services are used by
millions of customers around the world to stay connected to the people and
content that matter most throughout their day.
BlackBerry offers their customers BlackBerry communities to join and
follow to receive and send information to the company. Their customer can follow them via Facebook,
Twitter, YouTube, Flickr, and their blogs.
This allows BlackBerry to communicate with their customers at any time
of the day, any day of the week.
In times of trouble, social media is a nice tool to help remedy a problem. Recently Visa's services were down for approximately 45min in certain areas of the US on Sunday April 1. Many Visa cardholders were extremely upset because they were unable to make purchases or pay bills. As of 5:17 April 1, spokeswoman Sandra Chu reported that the problem was unrelated to the security breach on Friday. On Friday there was a security breach at Global Payments Inc. in which it potentially affected both Visa and Mastercard customers. However, today's particular case is completely un related. Chu reported that the Sunday incident occurred from a Visa update.
Having social media at Visa's disposal, Visa was able to reduce the amount of speculation about the incident. Visa was able to relay facts to their customers to ensure that the issues are being handled accordingly.
Piriform is a private
limited company founder in London, UK in 2004. The company is located in 78
York Street, London United Kingdom. CCleaner is one of the main products that are
currently developed by Piriform. CCleaner cleans unwanted leftover files from
computer program such as Internet Explorer, Google Chrome, Opera, Safari,
Windows Media Player, eMule, Google Toolbar, Netsacape, Microsoft office, Nero,
Adobe Acrobat, Adobe Flash Player, Sun Java, WinRAR and other application.
CCleaner also has function to clean up Windows Registry and an uninstall tool. CCleaner
can be installed on both Windows or Mac OS X. The program is available in 47
languages and free.
The military has a data problem. More specifically, it has a too-much-data problem. Analysts have to sort through massive amounts of information collected by orbiting surveillance drones and satellites, or finding the data trails left behind by spies inside defense networks. Sorting through all this data is also necessary for making unmanned vehicles more autonomous.
Bring on the White House’s new “big data” research initiative. Announced this morning, the plan aims to invest “more than $200 million” in six government agencies to develop systems to “extract knowledge and insights from large and complex collections of digital data,” according to a White House statement (.pdf). That means anything too large for normal software to handle, meaning data sets of at least dozens of terabytes, at minimum. The biggest beneficiary of all this could be the Department of Defense.
The Pentagon already spends hundreds of millions annually on “big data”-esque problems. The initiative announced today could add to that kitty up to $60 million per year for new research projects. That includes a $25 million yearly sum for a new Darpa data mining program called XDATA, which is broadly defined as a tool to analyze large amounts of meta-data and “unstructured” data like message traffic. (In comparison, the Department of Energy is receiving only $25 million in funding for a new data mining institute and the National Science Foundation is being granted $13.4 million.)
Where is all the rest of that defense research going? Several places, and a lot of it for helping drones crunch the massive amounts of information pulled from sensors.
“The Department of Defense if placing a big bet on big data.” Zachary Lemnios, the Pentagon’s research and engineering chief, told reporters on Thursday. “We are within sight of a new generation of systems that understand and interpret the real world with computer speed, computer precision and human agility. These systems will not only be central to helping our commanders and analysts make sense of the huge volumes of data our military sensors collect, they will also support multiple missions.
Some of these systems, like Darpa’s Mind’s Eye, seeks to develop “visual intelligence” in aerial sensors, which would give military computers the ability to connect visual data with pre-written cues. Effectively, that could mean giving drones the tools to spot enemy soldiers automatically. Other programs likely to benefit include the Insight program, which can help drones spot potential threats on the battlefield.
That information is “growing rapidly in both volume and complexity,” Darpa acting director Ken Gabriel said. “From scraps of paper to hard drives, to overhead imagery and intercepts — the data collected is often imperfect, incomplete and heterogeneous. This trend is further accelerated by the proliferation of various digital devices and the internet. All of which is used by our adversaries to operate and hide in this data terrain. The sheer volume of information itself is creating a background clutter.”
Clutter so thick, even a quarter-billion dollars in investments may not be enough to cut through.
A purported leaked screenshot of a Google Drive download page. Image courtesy of TalkAndroid
This morning, Ars Technica’s Jon Brodkin reported on newly leaked images of Google Drive, a rumored cloud storage offering from the web storage king. Gmail already offers more than 7 gigabytes (GB) of email storage, so the question was, what will Google Drive offer. From these leaked images — the validity of which is unverified — the answer is 5GB, even though last week it was 2GB.
Why the screenshots would show different starting sizes is unclear. Assuming the images are real, they could have been taken from different stages of development, or may not be representative of the final version that Google will offer.
In the last few months rumors have swirled any many have speculated on when exactly Google is going to jump into the consumer cloud storage market. Companies like DropBox and Box both offer gigabytes of free storage so that anyone can access their PDF’s, pictures and documents from any web browser. Despite not yet having a dedicated service, Google is still the web’s storage giant, so such a product is inevitable.
Have your say: Will you take Google Drive for a ride if 5 GB is on offer? Should the folks at DropBox be worried?
Adobe helps businesses
thrive in a world where media is pervasive, and where marketing increasingly is
being held accountable for business results. They are the leader in delivering
solutions that let customers produce, distribute, and realize value from great
content, whether in media and publishing or in digital marketing. Adobe is
changing the world through digital experiences.
content authoring solutions lead the industry, enabling our customers to more
effectively produce, distribute, and monetize digital content. They allow their customers to contact them
via Facebook, Twitter, email, and phone.
Adobe delivers the most innovative solutions for optimizing marketing campaigns
and maximizing return on every marketing dollar.
While coverage ahead of Oracle’s fiscal third quarter results yesterday focused on it losing ground to younger cloud rivals, my question of “But for how long?” did not take long to be answered, sort of.
“After a long period of testing … Oracle’s cloud applications will be generally available. We’ve named our cloud the Oracle Secure Cloud,” Oracle CEO Larry Ellison said during yesterday’s analyst call about its Q3 results.
Oracle President Mark Hurd also stated in the press release before the call, “…Fusion in the Cloud is winning with great success against niche HCM cloud vendors in the US and worldwide. Our modular, integrated platform of 100 apps available in the cloud or on-premise is a key differentiator.”
Over at Forbes, Victoria Barret highlights how Ellison could not resist going after big-fish rivals Salesforce.com and SAP after he planted the Oracle Secure Flag brand in the ground:
Here he couldn’t help but take aim at Salesforce.com, suggesting that the company run by his former protege, Marc Benioff, can’t offer the same level of security. Benioff has long ridiculed Ellison for selling legacy software systems not able to keep pace with the shift to cloud computing.”
Then Ellison swiftly moved on to SAP, explaining that the German rival hasn’t yet moved its heavy-duty business software suite to the cloud. “Six years ago we made the decision to write Fusion. It will take years for SAP to catch up,” he said. SAP’s Web offering, called Business ByDesign, seems so far limited to smaller customers. SAP in December announced 1,000 customers to the product. Then again, Ellison did not mention customer names for Fusion or Secure Cloud.
Oracle Secure Cloud, which will be available in the next few weeks, is a private cloud, rented by the month and managed by Oracle, but living behind a company’s own firewall in their data center. “Salesforce.com does not offer this kind of security in their cloud. This is a key advantage for us,” Ellison said during the call yesterday. “But by far our biggest application competitor is SAP, not Salesforce.com. And SAP does not even offer CRM, HCM and financial applications in the cloud to their large customers.”
“Six years ago we made the decision to rewrite our ERP and CRM suit for the cloud. We called it Fusion. SAP called it confusion,” Ellison said. “It will take years for SAP to catch up.”
Ellison, well known for his flamboyance and fierce competitiveness, even went so far as to question SAP’s sobriety with its focus on building Oracle competitor HANA. “When SAP, and, specifically Hasso Plattner, said they’re going to build this in-memory database and compete with Oracle, I said. God, get me the name of that pharmacist, they must be on drugs,” he told analysts yesterday. “That was interpreted by Hasso as Larry doesn’t believe in in-memory databases… We’ve been working on in-memory databases for 10 years. We have the world’s leading in-memory database. It’s called TimesTen.”
So that’s where Oracle has planted its flag with regard to the cloud, in contrast to Salesforce and Workday, and butting heads with SAP. Is that going to do the trick? Is Oracle keenly aware of what the marketplace wants, or is it putting its game face on given what it can offer in terms of cloud now? Do the RightNow and Taleo buys, in addition to Fusion (in the cloud) give it enough to go on? Have your say in the comments section, below.
Over 1,100 games are
available to purchase, download, and play from any computer. Check out the new
releases, indie hits, casual favorites and everything in between. Find someone
to play with, meet up with friends, connect with groups of similar interests,
and host and join chats, matches, and tournaments. See when your friends are
online or playing games and easily join the same games together. Chat with your
buddies, or use your microphone to communicate in any game. The Steam Community
is comprised of people who play all sorts of PC and Mac games. Now it's easy to find your friends online, organize groups, and join
chats. Steam offers their customers an
online community where they release news and updates as well as allow them to
collaborate with each other and contact their customers directly.
In recent years Google has taken its fair share of criticism from publishers as its Google News aggregation and AdWords micro-advertising have disrupted traditional publishing in major ways. But a new product quietly launched by Google this week might provide a powerful new business model for online publishing.
Google Consumer Surveys allows publishers to make money from running various micro-surveys on their sites. When a user visits a participating site, they will be presented with a survey before being allowed access to the content (text, video, or apps). Think of it as a soft paywall in which the user still gets the content for free, and doesn't need to register, but can't simply click the well-known "skip this ad" link to access the desired content. Once the short survey is filled out, the users gets her content for free, the publisher earns a small payment, and the company behind the survey gets the valuable market data it was looking for from a real, sometimes demographically specific person.
Large or small companies can target survey questions toward the general U.S. population for $0.10 per response (or $150.00 for 1,500 responses), or opt for demographic targeting at $0.50 per response ($750.00 for 1,500). Insights are grouped by demographics including income, location (U.S. Northeast, South, Midwest, West Coast), age (18-24, 25-34, 35-65+) and gender.
After setting up a survey, companies have the ability to view extremely detailed breakdowns of the survey answer data. Alcohol, tobacco, gambling, and pharmaceutical products are currently excluded from the program. Publishers already set up to use the survey tool with their content offerings include The Texas Tribune, the Star Tribune, and Adweek.
"The idea behind Google Consumer Surveys is to create a model that benefits everyone," said Google product manager Paul McDonald. "You get to keep enjoying your favorite online content, publishers have an additional option for making money from that content, and businesses have a new way of finding out what their customers want."
Upon further inspection, it does appear that Google may have finally discovered the Holy Grail for monetizing digital content in a way that benefits everyone. Few consumers have a problem filling out short, anonymous surveys, most online publishers have already learned that surveys are a fun way to engage visitors, particularly when it comes to niche sites, and large companies absolutely live and die on the vital data that market research provides regarding emerging trends, and current consumers tastes.
-Jon Udell, via Wired.com/Cloudline (sponsored by IBM)
As we migrate personal data to the cloud, it seems that we trade convenience for privacy. It’s convenient, for example, to access my address book from any connected device I happen to use. But when I park my address book in the cloud in order to gain this benefit, I expose my data to the provider of that cloud service.
When the service is offered for free, supported by ads that use my personal info to profile me, this exposure is the price I pay for convenient access to my own data. The provider may promise not to use the data in ways I don’t like, but I can’t be sure that promise will be kept.
Is this a reasonable trade-off?
For many people, in many cases, it appears to be. Of course we haven’t, so far, been given other choices. And other choices can exist. Storing your data in the cloud doesn’t necessarily mean, for example, that the cloud operator can read all the data you put there. There are ways to transform it so that it’s useful only to you, or to you and designated others, or to the service provider but only in restricted ways.
Early Unix systems kept users’ passwords in an unprotected system file, /etc/passwd, that anyone could read. This seemed crazy when I first learned about it many years ago. But there was a method to the madness. The file was readable, so anyone could see the usernames. But the passwords were transformed, using a cryptographic hash function, into gibberish. The system didn’t need to remember your cleartext password. It only needed to verify that when you typed your cleartext password at logon, the operation that originally encoded its /etc/passwd equivalent would, when repeated, yield a matching result.
Everything old is new again. When it was recently discovered that some iPhone apps were uploading users’ contacts to the cloud, one proposed remedy was to modify iOS to require explicit user approval. But in one typical scenario that’s not a choice a user should have to make. A social service that uses contacts to find which of a new user’s friends are already members doesn’t need cleartext email addresses. If I upload hashes of my contacts, and you upload hashes of yours, the service can match hashes without knowing the email addresses from which they’re derived.
In the post Hashing for privacy in social apps, Matt Gemmell shows how it can be done. Why wasn’t it? Not for nefarious reasons, Gemmell says, but rather because developers simply weren’t aware of the option to uses hashes as a proxy for email addresses.
The best general treatise I’ve read on this topic is Peter Wayner’s Translucent Databases. I reviewed the first edition a decade ago; the revised and expanded second edition came out in 2009. A translucent system, Peter says, “lets some light escape while still providing a layer of secrecy.”
Here’s my favorite example from Peter’s book. Consider a social app that enables parents to find available babysitters. A conventional implementation would store sensitive data — identities and addresses of parents, identities and schedules of babysitters — as cleartext. If evildoers break into the service, there will be another round of headlines and unsatisfying apologies.
A translucent solution encrypts the sensitive data so that it is hidden even from the operator of the service, while yet enabling the two parties (parents, babysitters) to rendezvous.
How many applications can benefit from translucency? We won’t know until we start looking. The translucent approach doesn’t lie along the path of least resistance, though. It takes creative thinking and hard work to craft applications that don’t unnecessarily require users to disclose, or services to store, personal data. But if you can solve a problem in a translucent way, you should. We can all live without more of those headlines and apologies.
more than 100 million active users globally, eBay is the world's largest online
marketplace, where practically anyone can buy and sell practically anything.eBay
connects a diverse and passionate community of individual buyers and sellers,
as well as small businesses.It’s a
meeting-point for eBay buyers and sellers to chat ask questions and exchange
advice and tips with each other. eBay
gives their customers an online chat between buyers and sellers as well as
customers to customer service. This
allows eBay to deal with their customers directly and give them the correct guidance