Monday, March 31, 2008

Now take a look at MARS through Google

Googles new Google MARS explores the planet Mars with a detailed map view. The maps are created by NASA scientists . Its really cool ! revealing the potential of Google maps.
So now move from Earth to Mars . Read More

Saturday, March 29, 2008

Fedora 9 Beta Preview

Almost two months back Fedora 9 Alpha released. Now Red Hat has pushed out the beta release of Fedora 9 (codenamed Sulphur) with many more features implemented and ready to be tested. We have taken the time to explore the features of Fedora 9 and the progress that has been made. Read More

Sun Certified Mobile Application Developer (SCMAD)

This certification is for developers who create mobile applications using Java technologies for cell phones or "smart" devices.
To achieve this certification, candidates must succesfully complete one exam. Prior to attempting certification, candidates must be certified as a Sun Certified Programmer (SCJP), any edition. Read More

Tuesday, March 25, 2008

Yahoo Empowering Semantic Web Programmers

Yahoo announced that it will soon provide APIs to its Search platform to allow third-party developers to alter search results with structured data to make it more useful for Web users. The program will enable developers to overlay their own algorithms to determine how the Yahoo Search index is used. Yahoo is also supporting several semantic Web standards, including RDF, and microformats to make programming on Yahoo's search platform easier, says Yahoo's Amit Kumar. Programmers have been slow to support standards and write software for the semantic Web, in part because it lacks a killer application, Kumar says. He says Web search is the missing killer app. Instead of independently developed semantic silos scattered across the Web, Yahoo aims to bring all the semantic information together once it is available. For example, Kumar says that marking up profile pages with microformats will allow Yahoo Search to better understand the semantic content and the relationships of its site's components. "If I can put an algorithm on top of search that says here are all of the things I want the algorithm to prioritize and here's all of the things I want it to exclude that's really powerful," says IDC analyst Rachel Happe. Read More

Defending Laptops from Zombie Attacks

Intel is developing more-accurate ways to tell when a machine has been infected.
Laptop-based security software that adjusts to how an individual utilizes the Internet so that the detection of malicious activity is more dynamic and personalized has been developed by Intel researchers. The software targets corporations that pass out laptops and mobile devices to workers, since IT departments typically install homogeneous security software on all their hardware, which partly explains why security breaches are so profuse, according to Intel Research Berkeley researcher Nina Taft. Most IT departments deploy security software with a component that analyzes the stream of Internet traffic flowing into and out of a computer, and that suggests infection when traffic exceeds a preset limit. However, this method can incorrectly target people who habitually send out large volumes of information while ignoring traffic that falls below the threshold that may harbor malevolent activity without the sender's knowledge. Intel researchers have devised algorithms capable of more subtle evaluations, including one that creates individualized traffic thresholds by monitoring a person's Internet use through standard statistical and machine-learning techniques, and another that assesses how people's Internet usage changes throughout the day. Another set of algorithms uses the same behavioral principles to study communication between laptops and other devices on the Internet to detect the presence of botnets. "I think the basic takeaway is, if you can be really precise in capturing user behavior, you can make the work of the attackers much harder," notes Taft. Georgia Institute of Technology professor Nick Feamster attributes the lack of application of the behavioral security strategy to laptops to the absence of an automated way to develop personalized rules. Read More

Saturday, March 8, 2008

Yahoo launches Fire Eagle

At the O’Reilly ETech Conference in San Diego, Yahoo’s Tom Coates demonstrated their latest API, and perhaps their most unique API: Fire Eagle. It’s a platform for sharing your location online. It gives applications the ability to update, query and track your location, with user-driven privacy controls allow setting of location availability and granularity. We have created a new Fire Eagle API profile here.
Yahoo’s site describes it as: The secure and stylish way to share your location with sites and services online while giving you unprecedented control over your data and privacy. We’re here to make the whole web respond to your location and help you to discover more about the world around you.

Some key informations:
It’s currently an invite only beta release.
Since privacy issues are naturally a top concern in any system capable of sharing your current location, the Fire Eagle platform has this built-in a very deep level. You can choose how specific a location to make available as well as how long to make this available (Fire Eagle can send you reminders).
It’s unique in that it’s a pure platform play — there is currently no consumer-facing Yahoo app on top it.
The REST-based API is one of the first from a major vendor to support OAuth as the authentication mechanism. One implication of this is that the application does not need to know the Yahoo ID of the user.
The query API lets you retrive data in GeoJSON and GeoRSS formatted data.
There are user-selectable levels of accuracy that range from neighborhood to country.
The Dopplr service will be one of the first to use it.
Initial sample apps from Yahoo will include a Fire Eagle widget badge for MySpace, an app for connecting with friends on Facebook, and an SMS updater for texting your location.
The API includes user-specific methods like /update and /lookup, as well as general purpose methods like /recent.
It keeps only the most recent piece of location information it received.

Free training on Microsoft Windows Server 2008, Visual Studio 2008 & SQL Server 2008

Introductory training on the latest Microsoft Products are offered free in selected cities on March 15, 23 & 29.
Registration link http://www.heroeshappenhere.co.in/FirstLookClinic.aspx

Wednesday, March 5, 2008

Adobe Design Challenge 2008

The 2008 Adobe Design Achievement Awards gives higher education students from around the world the creative license to propel their careers in the future. Enter in 12 categories in 3 media areas endorsed by the industry, over 60$K US in cash prizes will be awarded in New York City.
more on http://www.adaaentry.com/

Google Summer of Code™ 2008 is coming

The prestigious Google summer code contest is going to start this year for students all over the world.
Have a look http://code.google.com/soc/2008/

Adobe Launches AIR

Adobe AIR is a cross-operating system runtime that enables users to use existing HTML/Ajax, Flex, or Flash web development skills and tools to build and deploy rich Internet applications to the desktop.
AIR applications support native desktop integration, including clipboard and drag-and-drop support, local file IO, system notification, and more.


More on AIR http://www.adobe.com/devnet/air/

Google Android Developer Challenge - $100,000 awards.

Android is a software stack for mobile devices from Google that includes an operating system, middleware and key applications.
Making applicatioin for Android is really cool. Eclipse has got plugin which makes development process very easy.
Getting Started
Download the SDK
Build your applications
Submit your applications