15 tablet apps for your new paperless office – Whether you’re working for yourself or a customer, these tablet-optimized apps take the dead trees out of doing business.
Some Facebook Users Can Pay to Promote Friends’ Posts – Facebook on Thursday began a gradual rollout of its new pay-to-promote feature that allows people to advertise friends’ posts, for a fee.
Android security suffers the slings and arrows of outrageous fortune – Android’s overwhelming popularity may be its undoing. Malware against Android exceeds threats against Windows. The threats are bigger and more is at stake than ever before.
Infographic: The top 10 productivity-killers (and how to beat them) – Time is on your side, at least according to Mick Jagger. (Think: song lyric.) But it rarely seems that way when you get to the end of the day and realize you didn’t have nearly enough of it. Where on earth does the time go? To find out, OfficeTime conducted a survey of “over 600 small business owners, freelancers and professionals.” The resulting infographic (see below) lists “The Top 10 Time Killers (and how to fight back!)”.
Free iPad apps (February 2013) – Looking for some free apps to fill up your iPad? Here are five of the most popular free iPad apps for February 2013.
Keyboard bubbles up from touch screen on demand – When it comes to typing on mobile devices, most of us grin and bear it. We correct the typos, we laugh at the autocorrections, but let’s face it — we’re frustrated. Would a physical keyboard ease our pain? CNET’s Sumi Das tries out a new user interface from Tactus Technology.
Ubuntu smartphone developer preview arrives next week – Ubuntu Linux for the smartphone is taking a big step forward. The developer preview will be available next week for Galaxy Nexus and Nexus 4 smartphones.
Two portable rootkit tools no SMB should be without – Keep Bitdefender’s Rootkit Remover and Kaspersky’s TDSSKiller on a USB drive, and your SMB will be ready when a machine is compromised by a rootkit.
Two Ubuntu Linux versions can now work with Secure Boot – After many months of painstaking effort, the problems caused by Microsoft’s Windows 8 “Secure Boot” technology are finally being solved for Linux users.
Steam lands on Linux, revving up for a living room battle – The problem with Linux, at least for now, is that game support is extremely limited. Linux has only 60 games on Steam right now, compared to nearly 1900 games for PC. Many major publishers, such as Activision, EA, and Ubisoft, have avoided Linux entirely. Valve will need to get those publishers on board with Linux for the Steam Box to be a hit.
Facebook hit by ‘sophisticated attack’; Java zero-day exploit to blame – The world’s largest social network suffered a “sophisticated attack” last month, apparently caused by a Java zero-day exploit that has since been fixed, but there is “no evidence” that user data was compromised.
Point-of-Sale malware attacks – crooks expand their reach, no business too small – The crooks have added a few tricks over the last 15 months. Find out what’s new, and why no business can “fly under the radar” of cybercrime…
More Mac malware attacking minority groups in China – A targeted Mac malware attack strikes a minority group in China, exploiting an old Microsoft Word vulnerability.
Research Outlines New Deep Freeze Data Recovery Technique on Android Phone – A group of German researchers from the University of Erlangen-Nuremberg have discovered a new way to potentially scrape encrypted data from Android phones after they’ve been stowed away in a freezer for an hour or so. The group’s method involves extracting valuable RAM information from a phone, in particular the Samsung Galaxy Nexus, using a “cold boot attack.”
Successful ways of undermining cybercrime ecosystems – Most cybercrime is carried out by a loose confederation of independent contractors who work together when necessary through online forums and “partnerkas” that allow them to pool their resources, but these online criminal networks can be foiled, according to a new report by the Digital Citizens Alliance.
Researchers reveal the identity of a Chinese hacker – It all started with Joe Stewart, director of malware research at Dell SecureWorks, who when investigating an unusual piece of malware and the command nodes which it contacted discovered that many of them were registered under the names “Eric Charles” and “Tawnya Grilth”.
Microsoft’s plan: Moving ‘millions’ from Messenger to Skype – Microsoft is forging ahead in moving its Messenger user base to Skype. Here’s the updated timeline for its aggressive plan.
Google Hits Back at BT With Patent Suits – Google has hit back at British Telecom (BT) more than a year after the company sued Google for infringing on its patents with Android.
Sage sells ACT and SalesLogix CRM to Swiftpage – As part of a move away from non-core activities, accounts specialist Sage has disposed of two of its CRM products.
Facebook Wins ‘Real Name’ Battle in Germany – Facebook cannot be forced to allow its users to use fake names on the social network.
Report: Google to open U.S. retail stores later this year – Google says the company plans to open its first physical stores in time for the holidays.
Competitive price intelligence – Also called price intelligence, in ecommerce terminology, competitive price intelligence refers to the use of detailed analytics to create and optimize a retailer’s pricing strategy. For example, a retailer might use price intelligence tools to scan the Web for pricing data, then use competitive price intelligence software to optimize its pricing based on the accumulated pricing data in order to better compete in the market and improve sales. Most competitive price intelligence software and platforms provide retailers with the tools required to analyze industry pricing and obtain information on current market prices, detailed analytics to help make informed business decisions about pricing and the tools to measure the effectiveness of a competitive pricing strategy.
Off Topic (Sort of):
Dvorak: The Computer That Never Crashes – There was a funny article in the New Scientist about a computer that never crashes. A follow-up story later ran in the Washington Post and I had to laugh out loud. Instead of questioning the ludicrous nature of the invention, the article extolled the imaginary virtues and the “far-reaching consequences for physicians and the military.” Is there some rule against stopping for a minute and questioning the veracity of these claims?
Can Office 365 convince you that renting software is a good deal? – With its just-announced Office 365 subscription plans, Microsoft is asking customers to rent its flagship productivity software instead of buying outright. It might be a good deal for everyone, but is Microsoft willing to be aggressive with pricing?
Tiny Tech: Mini gadgets and super compact cameras – Downsizing your devices? Grab some miniature tech accessories for macro – geeks.
12 Crazy Videos of the Russian Meteor Strike – In the age of YouTube, we already know what it was like to be on the ground in Chelyabinsk.
Download our App or we’ll keep pestering you until you do – Companies invest a great deal to create apps. Is this the reason they try to force them on every visitor, every time they visit?
“The most erroneous stories are those we think we know best – and therefore never scrutinize or question.”
– Stephen Jay Gould
Today’s Free Downloads:
Flutter 0.5.50 – Flutter allows you to play & pause iTunes, Spotify, VLC, and Quicktime using hand gestures via your webcam. The hand gestures that control the playback, and pause are quick and easy to perform. They are best done within 1-6 feet of the webcam.
Recuva Portable – Recuva (pronounced “recover”) is a freeware Windows utility to restore files that have been accidentally deleted from your computer. This includes files emptied from the Recycle bin as well as images and other files that have been deleted by user error from digital camera memory cards or MP3 players. It will even bring back files that have been deleted by bugs, crashes and viruses! This is the no installer, portable version. Extract it, copy to your portable device and run, delete when done.