Alibaba Debuts Smartphone Running Its Cloud OS
August 3, 2011 by admin
Filed under Smartphones
Comments Off on Alibaba Debuts Smartphone Running Its Cloud OS
Alibaba Group unveiled its first self-developed mobile operating system and smartphone on Thursday in a bid to capture a slice of China’s burgeoning mobile Internet market.
The cloud computing-based operating system, Aliyun, will run the K-Touch Cloud Smartphone, to be launched at the end of July in 10 colors, said Wang Jian, president of Alibaba Cloud Computing, a unit of Alibaba Group.
A tablet PC running the Aliyun OS, which is based on a customized Android system, will also be launched in China by the end of the year, Wang told reporters after a presentation in Beijing.
Handset manufacturer Tianyu will manufacture the K-Touch as well as the tablet, Wang said.
“Mobile users want a more open and convenient mobile OS, one that allows them to truly enjoy all that the Internet has to offer, right in the palm of their hand, and the cloud OS, with its use of cloud-based applications, will provide that,” said.
The Aliyun operating system will feature cloud services such as email, Internet search and support for web-based applications. Users will not be required to download or install applications onto their mobile devices, Wang said.
Alibaba Cloud plans to integrate the operating system with other devices including mobile phones with larger screens and tablet computers in the coming months.
Wang said the company was looking to launch tablet computers running Aliyun by the end of the year.
The company is currently in talks with Qualcomm Inc to develop a lower-end chipset optimized to run Aliyun OS in lower-end mobile phones, Wang said. The K-Touch phones use a high-end chipset from Nvidia Corp for crisp display of intricate games.
New Exploit Exposed In Microsoft Windows
Comments Off on New Exploit Exposed In Microsoft Windows
The exploit deals with the Windows protocol handler in Windows for MHTML. Be advised the exploit can only be done if the user is running Internet Explorer. Apparently, hackers are using cross-site scripting attacks are intercepting and collecting peoples information, spoofing the content that is displayed to the browser, or interfering with the user’s browsing activities. Read More….