Adobe Gives Up On Windows XP
Adobe said today that the current CS6 version of Photoshop will be the last one to support the operating system.
Adobe Product Manager Tom Hogarty said in a blog post that the Photoshop team would like to provide advanced notice that Photoshop CS6 (13.0) will be the last major version of Photoshop to support Windows XP. He said that modern performance-sensitive software requires modern hardware graphics interfaces that Windows XP lacks, in particular a way to tap into the power of GPUs. By only working on newer operating systems and hardware Adobe can bring in significantly better performance.
Photoshop CS6 already demonstrates that relying on a modern operating system, graphics cards/GPUs and graphics drivers can lead to substantial improvements in 3D, Blur Gallery and Lighting Effect features not available to Windows XP customers, he said.
Adobe hopes that by providing this information early it will help you understand our current decisions around operating system support and where we we’re headed with future releases of Photoshop. It is hard to see how any serious user of Adobe products could be using an XP machine anyway. The move away from XP started with CS 5 which only ran on Vista.
1 In 5 U.S. PCs Have No Antivirus Protection
Comments Off on 1 In 5 U.S. PCs Have No Antivirus Protection
Nearly a fifth of Windows PCs in the U.S. lack any active security protection, an antivirus vendor stated on Wednesday, citing numbers from a year-long project.
“The scale of this is unprecedented,” argued Gary Davis, the director of global consumer product marketing for McAfee, talking about the scope of his company’s sampling of PC security.
McAfee took measurements from scans of more than 280 million PCs over the last 12 months, and found that 19.3% of all U.S. Windows computers browsed the Web sans security software. Owners of those systems downloaded and used McAfee’s free Security Scan Plus, a tool that checks for antivirus programs and enabled firewalls.
Globally, the average rate was 17%, putting the U.S. in the top 5 most-unprotected countries of the 24 represented in the scans.
Of the unprotected PCs in the U.S., 63% had no security software at all, while the remaining 37% had an AV program that was no longer active. The latter were likely trial versions of commercial antivirus software that had expired.
Antivirus trials are a fact of life in the Windows world. Most new machines come with security software that runs for a limited time. Some new Dell PCs, for example, come with a 30-day trial of McAfee’s Security Center program.
RIM Goes Non-BlackBerry
April 9, 2012 by admin
Filed under Smartphones
Comments Off on RIM Goes Non-BlackBerry
Research In Motion on Tuesday launched software that will allow its large “enterprise” customers to manage Apple and other rival devices through the same servers as they use for the BlackBerry smartphone and Playbook tablet.
The new Mobile Fusion software, first announced in November, is an acknowledgement of sorts by RIM of a growing preference by many users inside big corporations and government to access professional communications over their personal devices, often the Apple iPhone or iPad, or devices running Google’s Android.
RIM, which long dominated the so-called enterprise market, has watched the BlackBerry’s market share steadily erode in recent years. Unable to arrest the trend, the company now aims to generate a fresh revenue stream from it. Mobile Fusion will cost $99 per user to license and $4 per user a month, with discounts available for bulk orders.
In a second announcement on Tuesday that highlights RIM’s eroding market position, it said its PlayBook tablet now boasts 15,000 applications – still just a tiny fraction of the number available on the iPad. One of the biggest complaints about RIM’s products is the dearth of content and applications.
A recent survey from Appcelerator and IDC showed less than 16 percent of developers were “very interested” in creating programs for RIM, compared with 90 percent for Apple and 80 percent for Android.
Future PCs Will Be Constant Learners
Comments Off on Future PCs Will Be Constant Learners
Tomorrow’s computers will constantly improve their understanding of the data they work with, which in turn will aid them in providing users with more appropriate information, predicted the software mastermind behind IBM’s Watson system.
Computers in the future “will learn through interacting with us. They will not necessarily require us to sit down and explicitly program them, but through continuous interaction with humans they will start to understand the kind of data and the kind of computation we need,” said IBM Fellow David Ferrucci, who was IBM’s principal investigator for Watson technologies. Ferrucci spoke at the IBM Smarter Computing Executive Forum, held Wednesday in New York.
“This notion of learning through collaboration and interaction is where we think computing is going,” he said.
IBM’s Watson project was an exercise for the company in how to build machines that can better anticipate user needs.
IBM researchers spent four years developing Watson, a supercomputer designed specifically to compete in the TV quiz show “Jeopardy,” a contest that took place last year. On “Jeopardy,” contestants are asked a range of questions across a wide variety of topic areas.
Watson did win at its “Jeopardy” match. Now IBM thinks the Watson computing model can have a wide range of uses.
Social Networks Go Verified Accounts
February 23, 2012 by admin
Filed under Around The Net
Comments Off on Social Networks Go Verified Accounts
Celebrities and other public figures will soon have the ability to verify their accounts and display a preferred “alternative name,” TechCrunch reports.
In an effort to stop impostors, Facebook will reportedly soon allow celebrities and other public figures to verify their accounts in much the same way that Twitter does.
The social network will begin notifying public figures with many subscribers that they can verify their accounts by submitting an image of a government-issued ID, allowing them to display a preferred pseudonym instead of their birth name, according to a TechCrunch report. Facebook will then manually approve the “alternative names” to confirm they are the real stage names or pen names.
Facebook users must be chosen to participate in the program; there is no way to volunteer for verification. However, unlike Twitter, verified accounts will not receive a special badge indicating verified status.
Verification will allow celebrities to be more readily accessible to fans when using their stage names instead of what is officially listed on their birth certificates. The program will also gain more prominent placement in the “People To Subscribe To” section.
Google Goes Pay To Track
February 15, 2012 by admin
Filed under Around The Net
Comments Off on Google Goes Pay To Track
Amid widespread concern about its new privacy policies, Google is now facing additional criticism over a deal to offer users Amazon gift certificates if they open their Web movements to the company in a program called Screenwise.
Google says the program launched “near the beginning of the year,” but the company’s low-key offer was disclosed Tuesday night on the blog Search Engine Land.
Google is asking users to add an extension to the Chrome browser that will share their Web-browsing activity with the company. In exchange, users will receive a $5 Amazon gift when they sign up and additional $5 gift card values for every three months they continue to share. (Amazon is not a partner in the project.) Users must be over age 13, and minors will need parental consent to participate. The tracking extension can be turned off at any time, allowing participants to temporarily close their metaphorical shades on Google.
The company says the program will help it “improve Google products and services and make a better online experience for everyone.”
FCC Changes Phone Policy
February 7, 2012 by admin
Filed under Smartphones
Comments Off on FCC Changes Phone Policy
The U.S. Federal Communications Commission has approved an overhaul to its Lifeline program, which subsidizes telephone service for economically disadvantaged people. The goals are to save money and allow the subsidy to be applied toward broadband service.
The FCC on Tuesday voted to make several changes to the program, including the launch of a $25 million pilot program to use Lifeline for broadband. The pilot program will solicit proposals from broadband providers starting this year, the FCC said. Under the changes approved by the commission, recipients of Lifeline subsidies could use the money for bundled services, including voice and broadband packages.
In addition, the FCC set a 2012 savings target of $200 million for the program, which costs about $2.1 billion a year, and the commission will create a national Lifeline database to prevent multiple telecom carriers from receiving program support for the same consumer. Critics of the program have complained that there’s significant abuse, with recipients getting subsidies for multiple phone and mobile lines.
The FCC will also create an eligible database, using government data, focused on verifying recipients’ initial and ongoing eligibility for the program. The database should reduce the potential for fraud and cut red tape for both recipients and carriers, the FCC said.
Commissioners set a goal of saving up to $2 billion over the next three years, but Commissioner Robert McDowell, a Republican, said he doubted the FCC can achieve that goal. McDowell questioned the “assumptions and models” FCC staff used to predict the savings.
Nevertheless, McDowell voted to approve the changes. The changes will help Lifeline better fulfill its purpose of helping low-income U.S. residents stay connected, he said.
.
RIM Hopes Apps Will Help Sales
January 18, 2012 by admin
Filed under Consumer Electronics
Comments Off on RIM Hopes Apps Will Help Sales
Research In Motion is highlighting the native and Android apps available on its struggling PlayBook at the Consumer Electronics Show as it gets ready to launch the first major overhaul of the tablet’s software in February.
The company is showing the PlayBook OS 2.0 in its booth, demonstrating the Android apps that will finally be available to users of the tablet. RIM said in March last year that it would release a player that would let users of the tablets run apps designed for Android, and that capability will finally be available with PlayBook OS 2.0.
Popular games such as Cut the Rope and Plants vs. Zombies will be available in the store, said Alec Saunders, vice president of developer relations and ecosystem development. The apps appear and work like any other app; users don’t have to launch a separate player to run them.
Not just any Android app will be accessible to users, and that’s by design, Saunders said. “We don’t want to enable an open marketplace the way the Android Market is,” he said. Android developers must use a software package to make their apps compatible with the PlayBook, and then they must submit it to RIM’s standard app curation process. The company hopes to weed out the malware and pirated apps that often appear in the Android Market, he said.
When PlayBook OS 2.0 becomes available, “some number of thousands” of Android apps will be available in the market, Saunders said. The company has been working with some of the aggregator marketplaces to port apps and attending Android meetups to encourage developers to make their apps available to PlayBook users, Saunders said.
RIM is taking pains to attract as many developers as possible by supporting as many languages and frameworks as possible. “One thing we’re focused on is providing a rich palette of tools developers can use,” Saunders said. RIM has developed ports for a number of frameworks and languages to make it easy for developers to use whatever tools.
Apple Website Is Ripe For Hacking
July 4, 2011 by admin
Filed under Around The Net
Comments Off on Apple Website Is Ripe For Hacking
According to the Ethical Hacking group YGN, Apple’s website for developers is virtually wide open and gives the opportunity for hackers to introduce malware such asphishing attacks to gain access to subscriber’s vital personal information.
One group known as Networkworld identified three holes on Apple’s website that arbitrary URL redirects, cross-site scripting and HTTP response splitting. That said, these holes could allow hackers to arbitrarily redirect to other websites and make phishing attacks against developers login credentials more successful.
Pentagon Practices Cyberwar
June 23, 2011 by admin
Filed under Around The Net
Comments Off on Pentagon Practices Cyberwar
A mock Internet where the Pentagon can practice cyberwar games — complete with software that simulates human behavior under multiple military threat levels — is due to be up and running in a year’s time, according to a published report.
Called the National Cyber Range, the computer network mimics the architecture of the Internet so military planners can study the effects of cyberweapons by acting out attack and defense scenarios, Reuters says.
Planning for the Cyber Range was carried out by Lockheed Martin, which won a $30.8 million Defense Advanced Research Projects Agency (DARPA) grant, and Johns Hopkins University Applied Physics Laboratory, which won $24.7 million.
Cyber Range plans call for the ability to simulate offensive and defensive measures of the caliber that nations might be able to carry out. DARPA wants the range to support multiple tests and scenarios at the same time and to ensure that they don’t interfere with each other. “The Range must be capable of operating from Unclassified to Top Secret/Special Compartmentalized Information/Special Access Program with multiple simultaneous tests operating at different security levels and compartments,” according to DARPA’s announcement of the project.